mobile hosts
Recently Published Documents


TOTAL DOCUMENTS

179
(FIVE YEARS 8)

H-INDEX

22
(FIVE YEARS 1)

Author(s):  
Raman Kumar ◽  
Er Jyoti Arora

While dealing with Mobile Distributed systems, we come across some issues like: mobility, low bandwidth of wireless channels and dearth of stable storage on mobile nodes, disconnections, inadequate battery power and high failure rate of mobile nodes. Minimum-process coordinated checkpointing is considered an attractive methodology to introduce fault tolerance in mobile systems transparently. In this paper, we propose a non-blocking coordinated global state compilation algorithm for mobile computing systems, which requires only a minimum number of processes to take permanent recovery points. We reduce the communication complexity as compared to the Cao-Singhal algorithm [4], while keeping the number of useless recovery points unchanged. Finally, the paper presents an optimization technique, which significantly reduces the number of useless recovery points at the cost of minor increase in the communication complexity. In coordinated global state compilation, if a single process fails to take its tentative recovery point; all the recovery point effort is aborted. We try to reduce this effort by taking soft recovery points in the first phase at Mobile Hosts.


2021 ◽  
Author(s):  
Anusha Chintam ◽  
A. Sra ◽  
T.V. Madhusudhan Rao

Abstract Wireless mesh network formed temporarily by using mobile hosts (nodes) without the help of any centralized and cooperate to dispatch the data packets through wireless links over the network. Due to this decentralization, each node act as both router as well as host for dispatching packets in the network. Because of a dynamic nature that is the mobility nature of the node in a network is vulnerable to various types of attacks. Some of the attacks are gray and black hole attacks. These attacks are advertised incorrect information regarding the shortest path to the sink node. This paper proposes a secure Dynamic Source Routing (SDSR) for providing a secure and safe route between the origin and sink nodes which identify and remove the gray and black hole nodes in the network. The proposed work is simulated by using the NS2 simulator tool and got the better performance for considered performance variables such as packet delivery ratio, throughput and node overhead. The simulation results give better performance compared to normal DSR and selfish DSR with increased packet delivery ratio and throughput and with decreased overhead of the network.


Author(s):  
J. Kaur ◽  
S. Kaur

Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the base station. A trust-based model in MANET estimates and sets up trust relationship among objectives. Trust-based routing is utilized to keep away data from different attackers like a wormhole, DOS, black-hole, selfish attack and so forth. Trust can be executed in different steps like reputation, subjective rationale and from the supposition of the neighboring node. A trust estimation approach not just watches the behavior of neighbor nodes, additionally it screens the transmission of the information packet in the identification of the route for exact estimation of trust value. A survey is carried out to find some of the limitations behind the existing works which has been done by the researchers to implement various approaches thus to build the trust management framework. Through the survey, it is observed that existing works focused only on the authenticated transmission of the message, how it transmits packets to the destination node securely using a trust-based scheme. And also, it is observed that the routing approach only focused on the key management issues. Certain limitation observed in the implemented approaches of existing work loses the reliability of framework. Thus, to withstand these issues it is necessary to establish a reliable security framework that protects the information exchanged among the users in a network while detecting various misbehaving attacks among the users. Confidentiality, as well as the integrity of information, can be secured by combining context-aware access control with trust management. The performance parameters should be evaluated with the previous works packet delivery ratio, packet drop, detection accuracy, number of false positives, and overhead.


2020 ◽  
Vol 8 (6) ◽  
pp. 5580-5585

Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or centralized administration. Due to the mobility of the nodes in the network, these nodes are self-organizing and self-configuring. Not only they act as hosts, but also, they function as routers. In MANETs, routing protocols are necessary to find specific paths between the source and the destination. The primary goal of any ad-hoc network routing protocol is to meet the challenges of the dynamically changing topology. Therefore, an efficient route between any two nodes with minimum routing overhead and bandwidth consumption should be established. The design of these routing protocols is challenging due to the mobility and the dynamic nature of the mobile ad-hoc networks. MANET routing protocols are categorized into two types: proactive and reactive. In this paper, the MANET characteristics and challenges are highlighted. Moreover, a comparison is conducted between three protocols: namely, DSDV, DSR and AODV in terms of both properties and performance.


Electronics ◽  
2019 ◽  
Vol 9 (1) ◽  
pp. 58 ◽  
Author(s):  
Moneeb Gohar ◽  
Jin-Ghoo Choi ◽  
Waleed Ahmed ◽  
Arif Ur Rahman ◽  
Muhammad Muzammal ◽  
...  

In the Identifier Locator Network Protocol (ILNP) networks, the existing mobility control schemes based on the centralized entity, called the Dynamic Domain Name Service (DDNS) server, such that all the control traffic is processed at the DDNS server. However, the centralized mobility schemes have significant limitations, such as control traffic overhead at the server and large handover delay. In order to resolve these issues, we propose a new mobility control scheme for ILNP networks, which manages the identifier-locators (ID-LOCs) in the fully distributed manner. In our scheme, each domain has a dedicated mobile DDNS (m-DDNS) server at the site border router (SBR). The m-DDNS server maintains two databases; i.e., home host register (HHR) and visiting host register (VHR), to support the roaming of mobile hosts. When a mobile host roams into a domain, the m-DDNS server in the visiting domain registers the host’s ID-LOC in the VHR and requests the update of HHR to the m-DDNS server in the home domain. Since the m-DDNS servers communicate each other directly, the ID-LOC mappings are managed without involvement of any central entities. We analyzed our proposed mobility scheme via numerical analysis and compared its performance with those of existing schemes. Numerical results showed that our scheme outperforms the existing mobility control schemes substantially in terms of control traffic overhead at the servers, total transmission delay and handover delay.


Mobile Ad hoc Network (MANET) is a group of wireless mobile nodes that dynamically creates a network without the support of central management. The mobile hosts of MANET network are not restricted to move freely in any direction and thus linking with any other mobile host can be easily done. Without giving any notification to other hosts in the network, they can be switched on or off. Each mobile host must forward traffic, unrelated to its own use and therefore acts as a router. Because of the mobility of wireless nodes, each node must have the capability of managing an autonomous system, or a routing function without requiring any centralized administration. This mobility and autonomy of the wireless nodes along with the transient nature of the end hosts and intermediate host in a communication path creates a dynamic topology of the network. These mobile hosts are connected in an arbitrary manner and as they are highly mobile, the topology changes take place frequently. The rate of change is based on the velocity of the nodes and the challenge is these devices are small and the available transmission power is limited. In this Trust Based Secured Routing Protocol for MANET (TSRPM), certain changes have been made in the design of secure ad hoc routing protocols. First, a modified Diffie Hellman algorithm is implemented; secondly a trust based model has been developed.


2019 ◽  
Vol 8 (2) ◽  
pp. 4789-4794

An ad hoc network is a set of wireless mobile hosts which form a provisional network without the help or central administration of an existing infrastructure. An Ad Hoc vehicle network (VANET) utilizes shifting cars as portable network servers are created. Each involved unit becomes a mobile router with a VANET. The technique of networking of VANET is fast and versatile investments of equipment and VANET will not be restricted by set topology. A big number of road based implementation of portable apps ranging from the dissemination of vehicle warning and vibrant path scheduling to the promotion of context and file sharing are anticipated to assist VANET. The primary issues are: routing, broadcasting, service quality (QoS), collision avoidance, traffic optimization, network management, low error tolerance, security. The most important issues are: The design of an effective VANET routing protocol is very difficult; a relatively more stable routings must be established by the routing protocol. A range of road protocols was developed to deal with the problem of routing. Several protocols do not influence the stream of vehicles through the longest track between the origin and the target. VANET routing protocols efficiency is dependent on different parameters, such as mobility model, operating atmosphere, and many more. Fuzzy logic has been used in the protocol planning studies for wireless Ad Hoc networks, given that it is nice to choose the highest secure path from the notion of the fuzzy sets. In the draft job fuse oriented routing protocol the car lifetime, car number of cars travelling along the same lines and the distance between the stubble regarded three significant considerations for track choice are taken into consideration.


2019 ◽  
Vol 8 (02) ◽  
pp. 24484-24490
Author(s):  
Abdulghani Saif Kasem Mohammed ◽  
Khalid Hamid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized  administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission  range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other properties of  wireless transmission such as attenuation, multipath propagation, interference etc. This paper discuses   study of Mobile ad-hoc Networks (MANET): classification, characteristics, structure of  MANET  and challenges that are imposed by Mobile ad-hoc Networks.


2018 ◽  
Vol 35 ◽  
pp. 1-6
Author(s):  
Tailan Moretti Mattos ◽  
Dandhara Rossi Carvalho ◽  
Mateus Santos de Brito ◽  
Francisco Gerson Araújo

. Phoretic relationships often bring large advantages to epibionts. By attaching themselves to mobile hosts, epibionts are able to: expand their ranges without spending energy, reduce their risk of being predated, and increase their probability of finding food. We assessed the phoretic relationship between the siluriform fish Ancistrusmultispinis (Regan, 1912) and the chironomid larva Ichthyocladius sp. in three streams of the Atlantic forest in southeastern Brazil. We evaluated changes in epibiont distribution throughout the body regions of the host and among three different aquatic systems. We had predicted that certain body regions are more prone to support epibiont attachment, and that epibiont prevalence increases with increased host size and quality of the aquatic system. Three streams (Santana, São Pedro and D’Ouro), tributaries of the Guandu River, were sampled during 2010 and 2011. A total of 102 specimens of A.multispinis were collected and analyzed. Epibionts were found in fourteen of fifteen body regions of the host. Observation from scanning electron microscopy revealed that Chironomidae larvae fix themselves to the spicules through the anal prolegs, not at the skin, as previously reported. The amount of epibionts (degree of infestation) was significantly correlated with fish size in the Santana Stream (r = 0.6, p < 0.01), and São Pedro Stream (r = 0.56, p < 0.01), but not in the D’Ouro Stream, the most altered of the three. The presence of epibionts on the body of the fish is directly correlated with the availability of spicules on the fish’s body, the largest numbers of infestations being found in structures associated with swimming (caudal and pectoral fins), since the swimming movement can create favorable conditions (e.g., suspension of organic particles, increasing oxygenation) for the epibiont.


2017 ◽  
Vol 7 (3) ◽  
pp. 1681-1684
Author(s):  
S. Soni ◽  
J. S. Shah

MANETs (Mobile Ad-hoc Networks) is the self organizing wireless structure of mobile hosts. Wireless media is used for communication in MANETs. Considering the developing requirements for multimedia and real-time traffic applications in real world, QoS (Quality-of-Service) support is essential in MANETs. But most of the characteristics of MANETs make QoS support a difficult problem. It is challenging to support QoS routing in MANET due to dynamic behavior and mobility of the hosts. The OLSR (Optimized Link State Routing) protocol can be efficiently used in MANETs to provide QoS routing because of its dynamic MPR (Multi Point Relay) selection criteria and proactive nature. In this paper, a design of QoS routing framework integrated with OLSR protocol is proposed and also analyzed using network simulator. Proposed QoS framework combines a bandwidth estimation algorithm with explicit resource reservation, QoS routing and connection admission control (CAC). OLSR protocol is extended for QoS framework to solve performance issues related to node mobility using cross layer approach. Results after simulation conclude about efficiency of the proposed QoS routing framework.


Sign in / Sign up

Export Citation Format

Share Document