179,318 research outputs found

    Congestion Control for Wireless Ad-Hoc Networks

    Get PDF
    We study joint design of end-to-end congestion control and Per-link medium access control (MAC) in ad-hoc networks. In the current scenario wireless communication is emerging the world. Wireless Ad Hoc networks demands for higher intermediate node supports for long-range communication. Wireless Ad Hoc network is an emerging communication approach. Ad Hoc networks are usually defined as an autonomous system of nodes connected by wireless links and communicating in a multi-hop fashion. The wireless ad-hoc networks are for easy of deployment without centralized administration or fixed infrastructure, to achieve the goal of less interference communication. In wireless Ad-hoc network the connections between the wireless links are not fixed but dependent on channel conditions as well as the specific medium access control (MAC). The channel medium and transmission links are affected by the interference, delay, and buffer overflow these may cause the network congestion. To avoid network congestion various congestion control methods were developed in past but they were performed less control of end-to-end congestion and less in per link connection control. To overcome the above problems and to improve the resource allocation an efficient method has to be developed

    A NOVEL APPROACH TO ENHANCE THE PERFORMANCE OF MOBILE AD HOC NETWORK (MANET) THROUGH A NEW BANDWIDTH OPTIMIZATION TECHNIQUE

    Get PDF
    Now is the age of information technology. World is advancing day by day. At present in this progressing world communication from one place to another has become so easy, less costly, and faster. This modern life is almost impossible with the help of these communication technologies. People need to talk, need to share data, need to express their emotion from long distance. So they need to use technologies to communicate with one another. Nowadays the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. Mobile Ad Hoc Network (MANET) is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses. Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to the end users. But these communication services of Mobile Ad Hoc Network (MANET) use high capacity of bandwidth and a big amount of internet speed. Bandwidth optimization is indispensable in various communications for successful acceptance and deployment of such a technology. Thinking of this, I propose a New Bandwidth Optimization Technique that Enhance the Performance of Mobile Ad Hoc Network (MANET). The new Bandwidth optimization technique which is more efficient in terms of time delay in Mobile Ad Hoc Network (MANET) can redirect a new way towards optimization development in network communication and device junction technology

    Group Key Rekeying Technique with Secure Data Encryption in MANETs

    Get PDF
    A Mobile Ad hoc Network (MANET) is a collection of autonomous nodes or mobile devices that can arrange themselves in various ways and operate without strict network administration. Ensuring security in mobile ad hoc network is a challenging issue and most of the applications in mobile ad hoc networks involve group-oriented communication. In Mobile ad-hoc network, each node treated as a terminal and also acts as an intermediate router. In this scenario, multi-hop occurs for communication in mobile ad hoc network. There may be a possibility of threats and malicious nodes in between source and destination. Providing the security in MANET is entirely different from the traditional wired network. In the present scenario, various applications of the mobile ad hoc network have been proposed and issues are solved by using the cryptographic techniques. Mostly cryptographic techniques are used to provide the security to MANETs. Cryptographic techniques will not be efficient security mechanism if the key management is weak. The purpose of key management is to provide secure procedures for handling keys in the cryptographic technique. The responsibilities of key management include key generation, key distribution, and key maintenance. Several key management schemes have been introduced for MANETs. The Group key management scheme is an efficient method for key management in MANET. In group key management scheme, rekeying is used whenever a new node joins or existing node leaves from the group. In this paper, we propose a periodic rekeying method (PRK) and analyze the performance of LKH rekeying techniques in a group key management schemes. The symmetric encryption techniques are analyzed with different parameters, such as Throughput and Energy consumption. Security and performance of rekeying protocols are analyzed through detailed study and simulation

    A Survey of QoS Routing Protocols for Ad Hoc Networks

    Get PDF
    The aim of this paper is to give a big survey in enhancing the balance of the routing load and the consumption of resources using network layer metrics for the path discovery in the MAODV protocol. A ad hoc network (AD HOC NETWORKS) consists of a collection of wireless mobile nodes, which form a temporary network without relying on any existing infrastructure or centralized administration. The bandwidth of the ad hoc networks architecture is limited and shared between the participating nodes in the network, therefore an efficient utilization of the network bandwidth is very important. Multicasting technology can minimize the consumption of the link bandwidth and reduce the communication cost too. As multimedia and group-oriented computing gains more popularity for users of ad hoc networks, the effective Quality of Service (QoS) of the multicasting protocol plays a significant role in ad hoc networks. In this paper we propose a reconstruction of the MAODV protocol by extending some featuring QoS in MAODV. All simulations are prepared with the NS2 simulator and compare the performance of this algorithm with the MAODV algorithm. The achieved results illustrate faster path discovery and more performing routing balance in the use of MAODV-Extension.This paper would give relatively a modest support in Mobile Technology according to QoS communication
    • …
    corecore