9,849 research outputs found

    Experimentation with MANETs of Smartphones

    Full text link
    Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective. Smartphones are the most adequate network nodes in many of these scenarios, but it is not straightforward to build a network with them. We extensively survey existing possibilities to build applications on top of ad-hoc smartphone networks for experimentation purposes, and introduce a taxonomy to classify them. We present AdHocDroid, an Android package that creates an IP-level MANET of (rooted) Android smartphones, and make it publicly available to the community. AdHocDroid supports standard TCP/IP applications, providing real smartphone IEEE 802.11 MANET and the capability to easily change the routing protocol. We tested our framework on several smartphones and a laptop. We validate the MANET running off-the-shelf applications, and reporting on experimental performance evaluation, including network metrics and battery discharge rate.Comment: 6 pages, 7 figures, 1 tabl

    A testbed for MANETs: Implementation, experiences and learned lessons

    Get PDF
    In this paper, we present the implementation, experiences and lessons learned of our tesbed for Ad-hoc networks and Mobile Ad hoc Networks (MANETs). We used OLSR protocol for real experimental evaluation. We investigate the effect of mobility and topology changing in the throughput of a MANET. We study the impact of best-effort traffic for Mesh Topology and Linear Topology. In this work, we consider eight experimental models and we assess the performance of our testbed in terms of throughput, round trip time and packet loss. We found that some of the OLSR's problems can be solved, for instance the routing loop, but this protocol still has the self-interference problem. Also, there is an intricate interdependence between MAC layer and routing layer. We carried out the experiments considering stationary nodes of an Ad-hoc network and the node mobility of MANETs. We found that throughput of TCP was improved by reducing Link Quality Window Size (LQWS). For TCP data flow, we got better results when the LQWS value was 10. Moreover, we found that the node join and leave operations increase the packet loss. The OLSR protocol has a good performance when the source node is moving. However, the performance is not good when the relay nodes are moving.Peer ReviewedPostprint (published version

    Identifying Design Requirements for Wireless Routing Link Metrics

    Full text link
    In this paper, we identify and analyze the requirements to design a new routing link metric for wireless multihop networks. Considering these requirements, when a link metric is proposed, then both the design and implementation of the link metric with a routing protocol become easy. Secondly, the underlying network issues can easily be tackled. Thirdly, an appreciable performance of the network is guaranteed. Along with the existing implementation of three link metrics Expected Transmission Count (ETX), Minimum Delay (MD), and Minimum Loss (ML), we implement inverse ETX; invETX with Optimized Link State Routing (OLSR) using NS-2.34. The simulation results show that how the computational burden of a metric degrades the performance of the respective protocol and how a metric has to trade-off between different performance parameters

    Secure Position-Based Routing for VANETs

    Get PDF
    Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So far, the security of VC applications has mostly drawn the attention of research efforts, while comprehensive solutions to protect the network operation have not been developed. In this paper, we address this problem: we provide a scheme that secures geographic position-based routing, which has been widely accepted as the appropriate one for VC. Moreover, we focus on the scheme currently chosen and evaluated in the Car2Car Communication Consortium (C2C-CC). We integrate security mechanisms to protect the position-based routing functionality and services (beaconing, multi-hop forwarding, and geo-location discovery), and enhance the network robustness. We propose defense mechanisms, relying both on cryptographic primitives, and plausibility checks mitigating false position injection. Our implementation and initial measurements show that the security overhead is low and the proposed scheme deployable
    • …
    corecore