141 research outputs found

    Mobile-IP ad-hoc network MPLS-based with QoS support.

    Get PDF
    The support for Quality of Service (QoS) is the main focus of this thesis. Major issues and challenges for Mobile-IP Ad-Hoc Networks (MANETs) to support QoS in a multi-layer manner are considered discussed and investigated through simulation setups. Different parameters contributing to the subjective measures of QoS have been considered and consequently, appropriate testbeds were formed to measure these parameters and compare them to other schemes to check for superiority. These parameters are: Maximum Round-Trip Delay (MRTD), Minimum Bandwidth Guaranteed (MBG), Bit Error Rate (BER), Packet Loss Ratio (PER), End-To-End Delay (ETED), and Packet Drop Ratio (PDR) to name a few. For network simulations, NS-II (Network Simulator Version II) and OPNET simulation software systems were used.Dept. of Electrical and Computer Engineering. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2005 .A355. Source: Masters Abstracts International, Volume: 44-03, page: 1444. Thesis (M.Sc.)--University of Windsor (Canada), 2005

    Energy Efficient Location Aided Routing Protocol for Wireless MANETs

    Get PDF
    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. In this paper we introduce an Energy Efficient Location Aided Routing (EELAR) Protocol for MANETs that is based on the Location Aided Routing (LAR). EELAR makes significant reduction in the energy consumption of the mobile nodes batteries by limiting the area of discovering a new route to a smaller zone. Thus, control packets overhead is significantly reduced. In EELAR a reference wireless base station is used and the network's circular area centered at the base station is divided into six equal sub-areas. At route discovery instead of flooding control packets to the whole network area, they are flooded to only the sub-area of the destination mobile node. The base station stores locations of the mobile nodes in a position table. To show the efficiency of the proposed protocol we present simulations using NS-2. Simulation results show that EELAR protocol makes an improvement in control packet overhead and delivery ratio compared to AODV, LAR, and DSR protocols.Comment: 9 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423, http://sites.google.com/site/ijcsis

    A New Approach to Coding in Content Based MANETs

    Full text link
    In content-based mobile ad hoc networks (CB-MANETs), random linear network coding (NC) can be used to reliably disseminate large files under intermittent connectivity. Conventional NC involves random unrestricted coding at intermediate nodes. This however is vulnerable to pollution attacks. To avoid attacks, a brute force approach is to restrict the mixing at the source. However, source restricted NC generally reduces the robustness of the code in the face of errors, losses and mobility induced intermittence. CB-MANETs introduce a new option. Caching is common in CB MANETs and a fully reassembled cached file can be viewed as a new source. Thus, NC packets can be mixed at all sources (including the originator and the intermediate caches) yet still providing protection from pollution. The hypothesis we wish to test in this paper is whether in CB-MANETs with sufficient caches of a file, the performance (in terms of robustness) of the restricted coding equals that of unrestricted coding. In this paper, we examine and compare unrestricted coding to full cache coding, source only coding, and no coding. As expected, we find that full cache coding remains competitive with unrestricted coding while maintaining full protection against pollution attacks

    Virtual Router Approach For Wireless Ad Hoc Networks

    Get PDF
    Wireless networks have become increasingly popular in recent years. There are two variations of mobile wireless networks: infrastructure mobile networks and infrastructureless mobile networks. The latter are also known as mobile ad hoc network (MANET). MANETs have no fixed routers. Instead, mobile nodes function as relay nodes or routers, which discover and maintain communication connections between source nodes and destination nodes for various data transmission sessions. In other words, an MANET is a self-organizing multi-hop wireless network in which all nodes within a given geographical area participate in the routing and data forwarding process. Such networks are scalable and self-healing. They support mobile applications where an infrastructure is either not available (e.g., rescue operations and underground networks) or not desirable (e.g., harsh industrial environments). In many ad hoc networks such as vehicular networks, links among nodes change constantly and rapidly due to high node speed. Maintaining communication links of an established communication path that extends between source and destination nodes is a significant challenge in mobile ad hoc networks due to movement of the mobile nodes. In particular, such communication links are often broken under a high mobility environment. Communication links can also be broken by obstacles such as buildings in a street environment that block radio signal. In a street environment, obstacles and fast moving nodes result in a very short window of communication between nodes on different streets. Although a new communication route can be established when a break in the communication path occurs, repeatedly reestablishing new routes incurs delay and substantial overhead. To address this iv limitation, we introduce the Virtual Router abstraction in this dissertation. A virtual router is a dynamically-created logical router that is associated with a particular geographical area. Its routing functionality is provided by the physical nodes (i.e., mobile devices) currently within the geographical region served by the virtual router. These physical nodes take turns in forwarding data packets for the virtual router. In this environment, data packets are transmitted from a source node to a destination node over a series of virtual routers. Since virtual routers do not move, this scheme is much less susceptible to node mobility. There can be two virtual router approaches: Static Virtual Router (SVR) and Dynamic Virtual Router (DVR). In SVR, the virtual routers are predetermined and shared by all communication sessions over time. This scheme requires each mobile node to have a map of the virtual routers, and use a global positioning system (GPS) to determine if the node is within the geographical region of a given router. DVR is different from SVR with the following distinctions: (1) virtual routers are dynamically created for each communication sessions as needed, and deprecated after their use; (2) mobile nodes do not need to have a GPS; and (3) mobile nodes do not need to know whereabouts of the virtual routers. In this dissertation, we apply Virtual Router approach to address mobility challenges in routing data. We first propose a data routing protocol that uses SVR to overcome the extreme fast topology change in a street environment. We then propose a routing protocol that does not require node locations by adapting a DVR approach. We also explore how the Virtual Router Approach can reduce the overhead associated with initial route or location requests used by many existing routing protocols to find a destination. An initial request for a destination is expensive v because all the nodes need to be reached to locate the destination. We propose two broadcast protocols; one in an open terrain environment and the other in a street environment. Both broadcast protocols apply SVR. We provide simulation results to demonstrate the effectiveness of the proposed protocols in handling high mobility. They show Virtual Router approach can achieve several times better performance than traditional routing and broadcast approach based on physical routers (i.e., relay nodes

    Routing Protocols Evaluation Review in Simple and Cloud Environment

    Get PDF
    In the field of information technology there are many computer jargons like cloud computing Ad-hoc, Software Define Network (SDN), network function virtualization (NFV) , and virtual machine (VM), etc. This review paper is basically a blend of brief study and review of many routing protocols used for Mobile ad hoc Networks (MANET) in the cloud as well as in simple network environment i.e. without cloud computing. This paper would also suggest the different challenges that are facing in cloud computing. The description of the different network simulators used in networking like NS2 tool, Opnet and Cisco packet tracer. The different metrics that are used in the networking are briefly explained. MANET is a group of wireless nodes that do not need centralized controlling entity as it rapidly moveschanges and forms networks to the nearest networking nodes

    Design and evaluation of two geocast protocols for vehicular ad-hoc networks

    Get PDF
    Vehicular ad-hoc networks (VANETs) offer a large number of new potential applications. One of the envisioned applications is of course Internet access, which can be provided with the help of some roadside basestations. Many of the applications benefit from multi-hop relaying of information, thus requiring a routing protocol. Characteristics unique to VANETs (such as high mobility and the need for geographical addressing) make many conventional ad hoc routing protocols unsuitable. In this paper we design and evaluate two different, so called, geocast protocols for VANETs. One protocol is designed for fast communication across a large area. The purpose of the other protocol is to provide a routing service for a future reliable transport protocol (enabling Internet applications). We evaluate the performance of the protocols using realistic network and traffic models

    Counter Attack as a Defense Mechanism in Ad Hoc Mobile Wireless Networks

    Get PDF
    Ad-Hoc Mobile Wireless Network (MANETs) have emerged and evolved in many forms. MANETs are rapidly gaining popularity because they do not rely on a pre infrastructure and can be deployed spontaneously. However, compared to wired networks, MANETs are more vulnerable to security attacks due to their unique features, such as stringent power consumption, error prone communication media and highly dynamic network topology. Most of the work done for improving security are focused on defensive mechanism like firewalls, gateways etc. Little research has been done on more offensive mechanisms to provide security. We propose three counter attack models, namely, Round Robin attack, Self-Whisper and flooding. The goal of all these attacks is to use up the intruder's critical resources like energy, communications bandwidth and force the intruder to eventually enter into DoS status. Simulation results shows that proposed counter attack models are an effective tool to counterattack. Simulation shows that a single model may not perform well in all situations. The choice of counter attack model is highly governed by the objective of counterattack. The Self-Whisper attack is the best if the objective is to have minimum energy consumption rate and minimum packet drop rate for agent nodes. On the other hand, if the protocol used is UDP, and the objective is to consume maximum amount of intruder energy, self- whisper performs better but if the objective is to have maximum packet drop rate at the intruder in the minimum time period, Round Robin is perhaps a best choice. Simulation shows that once counter attack begins, any traffic that is through intruder is disrupted. This disruption causes the ordinary nodes that have been tricked by the intruder advertizing false route information, to seek an alternate path to the destination. Hence, counter attack helps in improving security of the network as a whole.Computer Science Departmen

    End-to-End Resilience Mechanisms for Network Transport Protocols

    Get PDF
    The universal reliance on and hence the need for resilience in network communications has been well established. Current transport protocols are designed to provide fixed mechanisms for error remediation (if any), using techniques such as ARQ, and offer little or no adaptability to underlying network conditions, or to different sets of application requirements. The ubiquitous TCP transport protocol makes too many assumptions about underlying layers to provide resilient end-to-end service in all network scenarios, especially those which include significant heterogeneity. Additionally the properties of reliability, performability, availability, dependability, and survivability are not explicitly addressed in the design, so there is no support for resilience. This dissertation presents considerations which must be taken in designing new resilience mechanisms for future transport protocols to meet service requirements in the face of various attacks and challenges. The primary mechanisms addressed include diverse end-to-end paths, and multi-mode operation for changing network conditions
    • …
    corecore