924 research outputs found

    Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks

    Get PDF
    Mobile ad hoc network is a collection of mobile nodes forming dynamic and temporary network. The mobile nodes work in collaborative nature to carry out a given task. It can receive and transmit data packets without the use of any existing network infrastructure or centralized administration. Multicasting is among the pertinent issues of communication in such networks. The reliable delivery of multicast data packets needs feedback from all multicast receivers to indicate whether a retransmission is necessary. The Feedback Implosion Problem (FIP) states that reliable multicast in ad hoc networks suffers from redundant feedback packets, loss, duplication, and out-of-order delivery of data packets. To carry out this task, several reliable multicast protocols have been proposed to reduce the number of feedback packets from the receiver nodes. This is achieved by placing the responsibility to detect packet loss and initiating loss recovery timer on the receiver nodes which is complemented by feedback suppression. The initiating loss recovery timer depends on the number of hops between the nodes. As the dynamic nature of the number of hops between the nodes in ad hoc networks is unstable the loss recovery timer become inaccurate. Thus, the inaccuracy of the loss recovery timer, in return, causes extra overhead and more delays. The main objectives of this research are to enhance the FIP and decrease the recovery delays in reliable multicast protocol for mobile ad hoc networks using suggested approaches. First, the Source Tree Reliable Multicast (STRM) protocol adopting a novel technique to select a subset of one-hop neighbors from the sender node as its Forward Servers (FS). The key idea behind selecting this subset one-hop neighbors is to forward the retransmitted lost data packets and to receive the feedback packets from the receiver nodes. Second, proposed two algorithms to improve the performance of the STRM protocol. The first algorithm is developed to avoid the buffer overflow in the FS nodes. This is achieved by managing the buffer of the FS nodes; by selecting the FS nodes depending on the empty buffer size it has and reducing the amount of feedback sent from the receiver nodes to their FS node. The second algorithm is developed to decrease the number of duplicated packets in the multicast members in the local group. This is achieved by sending the repair packets only to the member that has requested it. The FS in the local group should create a dynamic and temporary sub group whose members are only the members that requested the retransmission of the repair packet. The approaches were tested using detailed discrete-event simulation model which was developed encompassing messaging system that includes error, delay and mobility models to characterize the performance benefits of the proposed algorithms in comparison to ReMHoc protocol. Our approaches achieve up to 2.19% improvement on average packet delivery ratio, 3.3% on requested packets, and 46% on recovery latency time without incurring any additional communication or intense computation

    Adaptive Multicast on Mobile Ad Hoc Networks Using Tree-Based Meshes With Variable Density of Redundant Paths

    Get PDF
    Multicasting has been extensively studied for mobile ad hoc networks (MANETs) because it is fundamental to many ad hoc network applications requiring close collaboration of multiple nodes in a group. A general approach is to construct an overlay structure such as multicast tree or mesh and to deliver a multicast packet to multiple receivers over the overlay structure. However, it either incurs a lot of overhead (multicast mesh) or performs poorly in terms of delivery ratio (multicast tree). This paper proposes an adaptive multicast scheme, called tree-based mesh with k-hop redundant paths (TBM k ), which constructs a multicast tree and adds some additional links/nodes to the multicast structure as needed to support redundancy. It is designed to make a prudent tradeoff between the overhead and the delivery efficiency by adaptively controlling the path redundancy depending on network traffic and mobility. In other words, when the network is unstable with high traffic and high mobility, a large k is chosen to provide more robust delivery of multicast packets. On the other hand, when the network traffic and the mobility are low, a small k is chosen to reduce the overhead. It is observed via simulation that TBM k improves the packet delivery ratio as much as 35% compared to the multicast tree approach. On the other hand, it reduces control overhead by 23–87% depending on the value of k compared to the multicast mesh approach. In general, TBM k with the small value of k offers more robust delivery mechanism but demands less overhead than multicast trees and multicast meshes, respectively

    Adaptive Multicast on Mobile Ad Hoc Networks Using Tree-Based Meshes With Variable Density of Redundant Paths

    Get PDF
    Multicasting has been extensively studied for mobile ad hoc networks (MANETs) because it is fundamental to many ad hoc network applications requiring close collaboration of multiple nodes in a group. A general approach is to construct an overlay structure such as multicast tree or mesh and to deliver a multicast packet to multiple receivers over the overlay structure. However, it either incurs a lot of overhead (multicast mesh) or performs poorly in terms of delivery ratio (multicast tree). This paper proposes an adaptive multicast scheme, called tree-based mesh with k-hop redundant paths (TBM k ), which constructs a multicast tree and adds some additional links/nodes to the multicast structure as needed to support redundancy. It is designed to make a prudent tradeoff between the overhead and the delivery efficiency by adaptively controlling the path redundancy depending on network traffic and mobility. In other words, when the network is unstable with high traffic and high mobility, a large k is chosen to provide more robust delivery of multicast packets. On the other hand, when the network traffic and the mobility are low, a small k is chosen to reduce the overhead. It is observed via simulation that TBM k improves the packet delivery ratio as much as 35% compared to the multicast tree approach. On the other hand, it reduces control overhead by 23–87% depending on the value of k compared to the multicast mesh approach. In general, TBM k with the small value of k offers more robust delivery mechanism but demands less overhead than multicast trees and multicast meshes, respectively

    Easy Wireless: broadband ad-hoc networking for emergency services

    Get PDF
    Wireless ad-hoc networks will enable emergency services to continuously overview and act upon the actual status of the situation by retrieving and exchanging detailed up-to-date information between the rescue workers. Deployment of high-bandwidth, robust, self-organising ad-hoc networks will enable quicker response to typical what/where/when questions, than the more vulnerable low-bandwidth communication networks currently in use. This paper addresses a number of results of the Easy Wireless project that enable high bandwidth robust ad-hoc networking. Most of the concepts presented here have been experimentally verified and/or prototyped

    IPv6 multicast forwarding in RPL-based wireless sensor networks

    Get PDF
    In wireless sensor deployments, network layer multicast can be used to improve the bandwidth and energy efficiency for a variety of applications, such as service discovery or network management. However, despite efforts to adopt IPv6 in networks of constrained devices, multicast has been somewhat overlooked. The Multicast Forwarding Using Trickle (Trickle Multicast) internet draft is one of the most noteworthy efforts. The specification of the IPv6 routing protocol for low power and lossy networks (RPL) also attempts to address the area but leaves many questions unanswered. In this paper we highlight our concerns about both these approaches. Subsequently, we present our alternative mechanism, called stateless multicast RPL forwarding algorithm (SMRF), which addresses the aforementioned drawbacks. Having extended the TCP/IP engine of the Contiki embedded operating system to support both trickle multicast (TM) and SMRF, we present an in-depth comparison, backed by simulated evaluation as well as by experiments conducted on a multi-hop hardware testbed. Results demonstrate that SMRF achieves significant delay and energy efficiency improvements at the cost of a small increase in packet loss. The outcome of our hardware experiments show that simulation results were realistic. Lastly, we evaluate both algorithms in terms of code size and memory requirements, highlighting SMRF's low implementation complexity. Both implementations have been made available to the community for adoption

    A cross-layer middleware architecture for time and safety critical applications in MANETs

    Get PDF
    Mobile Ad hoc Networks (MANETs) can be deployed instantaneously and adaptively, making them highly suitable to military, medical and disaster-response scenarios. Using real-time applications for provision of instantaneous and dependable communications, media streaming, and device control in these scenarios is a growing research field. Realising timing requirements in packet delivery is essential to safety-critical real-time applications that are both delay- and loss-sensitive. Safety of these applications is compromised by packet loss, both on the network and by the applications themselves that will drop packets exceeding delay bounds. However, the provision of this required Quality of Service (QoS) must overcome issues relating to the lack of reliable existing infrastructure, conservation of safety-certified functionality. It must also overcome issues relating to the layer-2 dynamics with causal factors including hidden transmitters and fading channels. This thesis proposes that bounded maximum delay and safety-critical application support can be achieved by using cross-layer middleware. Such an approach benefits from the use of established protocols without requiring modifications to safety-certified ones. This research proposes ROAM: a novel, adaptive and scalable cross-layer Real-time Optimising Ad hoc Middleware framework for the provision and maintenance of performance guarantees in self-configuring MANETs. The ROAM framework is designed to be scalable to new optimisers and MANET protocols and requires no modifications of protocol functionality. Four original contributions are proposed: (1) ROAM, a middleware entity abstracts information from the protocol stack using application programming interfaces (APIs) and that implements optimisers to monitor and autonomously tune conditions at protocol layers in response to dynamic network conditions. The cross-layer approach is MANET protocol generic, using minimal imposition on the protocol stack, without protocol modification requirements. (2) A horizontal handoff optimiser that responds to time-varying link quality to ensure optimal and most robust channel usage. (3) A distributed contention reduction optimiser that reduces channel contention and related delay, in response to detection of the presence of a hidden transmitter. (4) A feasibility evaluation of the ROAM architecture to bound maximum delay and jitter in a comprehensive range of ns2-MIRACLE simulation scenarios that demonstrate independence from the key causes of network dynamics: application setting and MANET configuration; including mobility or topology. Experimental results show that ROAM can constrain end-to-end delay, jitter and packet loss, to support real-time applications with critical timing requirements

    A General Survey on Rushing Attack in MANETs

    Get PDF
    MANETs (Mobile Ad hoc Network) is a kind of network in which all the nodes are connected via wireless link. There is no fixed infrastructure because of which any node can join or leave the network at any point time. There is no central monitoring system. All the nodes are working as host as well as client at the same time. This makes the network vulnerable to different kind of attacks. Standard routing protocols are also not that secured to protect the network from all probable attacks. Attacker may attack the network and disrupt the network services abruptly. Some of the common attacks in MANETs are Rushing attack, Black hole attack, Sybil attack, Neighbor attack and Jellyfish attack etc. In this paper we are trying to accumulate different probabilities of getting rushing attack in MANETs. And also discuss about different counter measures to prevent as well as to detect rushing attack.Keywords:Rushing attack, MANETs, Security, Denial of Service (DoS), Security threat
    corecore