5,350 research outputs found

    A survey of performance enhancement of transmission control protocol (TCP) in wireless ad hoc networks

    Get PDF
    This Article is provided by the Brunel Open Access Publishing Fund - Copyright @ 2011 Springer OpenTransmission control protocol (TCP), which provides reliable end-to-end data delivery, performs well in traditional wired network environments, while in wireless ad hoc networks, it does not perform well. Compared to wired networks, wireless ad hoc networks have some specific characteristics such as node mobility and a shared medium. Owing to these specific characteristics of wireless ad hoc networks, TCP faces particular problems with, for example, route failure, channel contention and high bit error rates. These factors are responsible for the performance degradation of TCP in wireless ad hoc networks. The research community has produced a wide range of proposals to improve the performance of TCP in wireless ad hoc networks. This article presents a survey of these proposals (approaches). A classification of TCP improvement proposals for wireless ad hoc networks is presented, which makes it easy to compare the proposals falling under the same category. Tables which summarize the approaches for quick overview are provided. Possible directions for further improvements in this area are suggested in the conclusions. The aim of the article is to enable the reader to quickly acquire an overview of the state of TCP in wireless ad hoc networks.This study is partly funded by Kohat University of Science & Technology (KUST), Pakistan, and the Higher Education Commission, Pakistan

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Signal Strength Based Congestion Control in In MANET

    Get PDF
    All nodes in MANET (Mobile Ad-hoc Network) are mobile and dynamically connected in an arbitrary manner.  Mobility causes frequent link failure which results in packet losses. TCP assumes that these packet losses are due to congestion only. This wrong assumption requires packet retransmissions till packet arrives successfully at the receiver. Goal is to improve TCP performance by using signal strength based cross layer approach which obviously resolves the congestion. We are reviewing a signal strength based measurements to improve such packet losses and no need to retransmit packets. Node based and link based signal strength can be measured. If a link fails due to mobility, then signal strength measurement provides temporary higher transmission power to keep link alive. When a route is likely to fail due to weak signal strength of a node, it will find alternate path. consequently avoids congestion. We will make changes at MAC routing and routing layer to predict link failure. MANET hits the protocol's strength due to its highly dynamic features, thus in testing a protocol suitable for MANET implementation we have selected two routing protocols AODV and DSR. Packet Delivery Ratio, Packet Drop, Throughput and end to end delay are the metrics used for performance analysis of the AODV routing protocols. Keywords: Congestion  control, Signal strength, TCP performance ,Cross layer interaction, Route discover
    • …
    corecore