15,588 research outputs found
QoS-Based Web Service Discovery in Mobile Ad Hoc Networks Using Swarm Strategies
Mobile ad hoc networks are noncentralised, multihop, wireless networks that lack a common infrastructure and hence require self-organisation. Their infrastructureless and dynamic nature entails the implementation of a new set of networking technologies in order to provide efficient end-to-end communication according to the principles of the standard TCP/IP suite. Routing, IP address autoconfiguration and Web service discovery are among the most challenging tasks in the ad hoc network domain. Swarm intelligence is a relatively new approach to problem solving that takes inspiration from the social behaviours of insects, such as ants and bees. Self-organization, decentralization, adaptivity, robustness, and scalability make swarm intelligence a successful design paradigm for the above-mentioned problems. In this paper we proposeBeeAdHocServiceDiscovery, a new service discovery algorithm based on the bee metaphor, which also takes into account quality metrics estimates. The protocol has been specifically designed to work in mobile ad hoc network scenarios operating withBeeadhoc, a well-known routing algorithm inspired by nature. We present both the protocol strategy and the formal evaluation of the discovery overhead and route optimality metrics showing thatBeeAdHocServiceDiscoveryguarantees valuable performances even in large scale ad hoc wireless networks. Eventually, future research suggestions are sketched
Many-to-Many Invocation: A New Framework for Building Collaborative Applications in Ad Hoc Networks
Many-to-Many Invocation (M2MI) is a new paradigm for building collaborative systems that run in wireless proximal ad hoc networks of fixed and mobile computing devices. M2MI is useful for building a broad range of systems, including service discovery frameworks; groupware for mobile ad hoc collaboration; systems involving networked devices (printers, cameras, sensors); and collaborative middleware systems. M2MI provides an object oriented method call abstraction based on broadcasting. An M2MI invocation means ``Every object out there that implements this interface, call this method.\u27\u27. M2MI is layered on top of a new messaging protocol, the Many-to-Many Protocol (M2MP), which broadcasts messages to all nearby devices using the wireless network\u27s inherent broadcast nature instead of routing messages from device to device. In an M2MI-based system, central servers are not required; network administration is not required; complicated, resource-consuming ad hoc routing protocols are not required; and system development and deployment are simplified
Cross-Layer Routing Based on Semantic Web Services Discovery with Energy Evaluation and Optimization in MANET
The web services discovery process in mobile adhoc networks is considered as a very difficult challenge due to the continuous change in the topology of the network and also the lack of a fixed central directory for publishing web services. Several approaches have been proposed which are based on either keywords or identifiers representing the service to be searched or by using a specific scenario of discovery. All of those proposed solutions try to respect the constraints of ad hoc networks such as energy, bandwidth, throughput ... etc. In this paper we present our new proposed model for measuring the cost of the overall energy consumption in ad hoc networks depending on the web services discovery protocols. We also present a new optimized web services discovery protocol in MANET based on cross_layer routing techniques with the dissemination in the routing process at the same time the semantic web services information and a Discovery_Diameter parameter that we have proposed to limit the area of discovery in the network. Finally, we present simulation results of our defined approach showing a significant optimization of the energy consumption level and the average throughput
A Composite Trust Model for Secure Routing in Mobile Ad-Hoc Networks
It is imperative to address the issue of secure routing in mobile ad-hoc networks (MANETs) where the nodes seek for cooperative and trusted behaviour from the peer nodes in the absence of well-established infrastructure and centralized authority. Due to the inherent absence of security considerations in the traditional ad-hoc routing protocols, providing security and reliability in the routing of data packets is a major challenge. This work addresses this issue by proposing a composite trust metric based on the concept of social trust and quality-of-service (QoS) trust. Extended from the ad-hoc on-demand distance vector (AODV) routing protocol, we propose an enhanced trust-based model integrated with an attack-pattern discovery mechanism, which attempts to mitigate the adversaries craving to carry out distinct types of packet-forwarding misbehaviours. We present the detailed mode of operations of three distinct adversary models against which the proposed scheme is evaluated. Simulation results under different network conditions depict that the combination of social and QoS trust components provides significant improvement in packet delivery ratio, routing overhead, and energy consumption compared to an existing trust-based scheme
Design and Implementation of ID Based MANET Autoconfiguration Protocol
Auto-configuration protocols are used for assignment of unique IP addresses to nodes in Mobile ad hoc networks. Without the assignment of unique IP addresses, service provisioning between the nodes is not possible. Such protocols use various heuristics to ensure the uniqueness in IP address assignment; such aspects increase the overall complexity in MANET system design. Moreover the overriding role of IP address as an ID in Application layer and Locator in routing space is a bottleneck in future wireless network (FWN) design. Contemporary FWN research is focusing on ID/Locator split concept designs. In this paper we propose an ID/Locator based architecture for MANETs which also solves auto-configuration requirements for MANETs. Our proposed architecture is an adaptation from available ID/Locator split concepts for infrastructure oriented networks for usage in MANET context. The designed protocol uses identifiers for node identification, node discovery and traffic flow between end points. The protocol support provision for running contemporary IP oriented services. We have also verified various use cases of our proposed protocol through Linux based implementation
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy
efficient multicast routing protocols and secure multicast routing protocols in
Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which
witness the need of energy management and security in ad hoc wireless networks.
The objective of a multicast routing protocol for MANETs is to support the
propagation of data from a sender to all the receivers of a multicast group
while trying to use the available bandwidth efficiently in the presence of
frequent topology changes. Multicasting can improve the efficiency of the
wireless link when sending multiple copies of messages by exploiting the
inherent broadcast property of wireless transmission. Secure multicast routing
plays a significant role in MANETs. However, offering energy efficient and
secure multicast routing is a difficult and challenging task. In recent years,
various multicast routing protocols have been proposed for MANETs. These
protocols have distinguishing features and use different mechanismsComment: 15 page
Konzeption und Realisierung eines kontextsensitiven Routingverfahrens
Communication and information services both depend on the individual needs
of the users and on the possibilities of the used network techniques. To
provide an optimal service level adapted to the user, his context must be
considered. Thereby, service access should be carried out as flexibly and
independently from the network as possible. Infrastructure networks, due to
their topology, cannot give mobile access to such services everywhere.
Mobile ad hoc networks are not bound to any infrastructure and are
therefore very flexibly applicable. As a result of their dynamic topology,
there are special requirements to routing and service discovery compared to
conventional networks. Conventional methods usually are neither usable in
ad hoc networks, nor suitable in heterogeneous environments. Especially
because of the progressive convergence of the networks a network-wide
solution is inevitable.
This work therefore is concerned with the topics of ad hoc networks as
well as routing protocols and procedures which are used for these.
Possibilities for service discovery are described and compared. Based on
this, an architectural concept is developed, which permits service
discovery both in ad hoc networks and in conventional infrastructure
networks. Service discovery is combined with a routing protocol especially
extended for this purpose. Why this kind of service discovery on network
level is advantageous is described and well founded. Principal components
of the developed architecture are the so-called context-routers, which
support service discovery independently of the address of a service
provider. Thus, the user does not need to know such an address. Service
discovery is, therefore, depending on the service itself and on the
available information about the context of the user. Hence, a service
optimally adapted to the user is selected. The concept supports rerouting
data messages to an alternative server, if the original server breaks down,
and offers the possibility for the provider to control service discovery
and communication.
A verification of the presented concept is carried out with practical
implementations. The demonstrator network developed for this is used for a
set of tests to verify the functions and the efficiency of the
architecture. The results prove that the concept can meet the requirements.
Finally, suggestions for future advancements conclude this dissertation.Das Angebot von Kommunikations- und Informationsdiensten richtet sich einerseits nach den individuellen Bedürfnissen der Nutzer andererseits aber auch nach den Möglichkeiten der verwendeten Netztechniken. Um einen optimal auf den Nutzer angepassten Dienst bereitstellen zu können, muss dessen Kontext berücksichtigt werden. Ein Dienstzugriff soll dabei möglichst flexibel und unabhängig vom Netz erfolgen. Den mobilen Zugriff auf solche Dienste können Infrastrukturnetze, durch ihre Topologie bedingt, nicht überall bedienen. Mobile Ad-hoc-Netze sind dagegen an keine Infrastruktur gebunden und deshalb sehr flexibel einsetzbar. Durch deren dynamische Topologie ergeben sich jedoch gegenüber den herkömmlichen Netzen auch spezielle Anforderungen an die Routen- und Dienstsuche. Konventionelle Verfahren sind hierbei in der Regel weder nutzbar, noch für einen Einsatz in heterogenen Umgebungen geeignet. Gerade mit der fortschreitenden Konvergenz der Netze ist aber eine netzübergreifende Lösung unumgänglich.
Die vorliegende Arbeit befasst sich deshalb mit den Themen Ad-hoc-Netze sowie den hierbei eingesetzten Routingprotokollen und -verfahren. Es werden Möglichkeiten zur Dienstsuche erläutert und gegenübergestellt. Mit den Erkenntnissen daraus wird ein Architekturkonzept entwickelt, das die Dienstsuche sowohl in Ad-hoc- als auch in herkömmlichen Infrastrukturnetzen erlaubt. Die Dienstsuche erfolgt dabei in Verbindung mit einem für diesen Zweck erweiterten Routingverfahren. Warum diese Art einer Dienstsuche auf Netzwerkebene vorteilhaft ist, wird erläutert und begründet. Kernstück der entwickelten Architektur bilden die so genannten Kontextrouter, die eine Dienstsuche unabhängig von der Adresse eines Dienstanbieters unterstützen. Auch der Nutzer benötigt keine Kenntnis über eine solche Adresse. Eine Suche erfolgt lediglich über den Dienst und den zur Verfügung stehenden Informationen über den Kontext des Nutzers. Damit wird ein auf den Nutzer optimal angepasster Dienst ausgewählt. Das Konzept unterstützt die Weiterleitung von Daten zu einem alternativen Server, sofern der ursprüngliche Server ausfällt, und bietet Providern die Möglichkeit, steuernd auf die Dienstsuche und -kommunikation einzuwirken.
Das Verifizieren des vorgestellten Konzeptes erfolgt auf Basis praktischer Realisierungen. Das dazu aufgebaute Demonstratornetzwerk dient für eine Reihe von Tests zum Nachweis der Funktionen und der Leistungsfähigkeit der Architektur. Die daraus resultierenden Ergebnisse beweisen, dass das Konzept den gestellten Anforderungen genügen kann. Abschließend werden in der Arbeit Vorschläge für zukünftige Weiterentwicklungen unterbreitet
- …