1,309 research outputs found

    Link Available Bandwidth Monitoring for QoS Routing with AODV in Ad Hoc Networks

    Full text link

    Adaptive link-weight routing protocol using cross-layer communication for MANET

    Get PDF
    Routing efficiency is one of the challenges offered by Mobile Ad-hoc Networks (MANETs). This paper proposes a novel routing technique called Adaptive Link-Weight (ALW) routing protocol. ALW adaptively selects an optimum route on the basis of available bandwidth, low delay and long route lifetime. The technique adapts a cross-layer framework where the ALW is integrated with application and physical layer. The proposed design allows applications to convey preferences to the ALW protocol to override the default path selection mechanism. The results confirm improvement over AODV in terms of network load, route discovery time and link reliability

    Secure Routing in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to the service providers. Unlike traditional Wi-Fi networks, with each access point (AP) connected to the wired network, in WMNs only a subset of the APs are required to be connected to the wired network. The APs that are connected to the wired network are called the Internet gateways (IGWs), while the APs that do not have wired connections are called the mesh routers (MRs). The MRs are connected to the IGWs using multi-hop communication. The IGWs provide access to conventional clients and interconnect ad hoc, sensor, cellular, and other networks to the Internet. However, most of the existing routing protocols for WMNs are extensions of protocols originally designed for mobile ad hoc networks (MANETs) and thus they perform sub-optimally. Moreover, most routing protocols for WMNs are designed without security issues in mind, where the nodes are all assumed to be honest. In practical deployment scenarios, this assumption does not hold. This chapter provides a comprehensive overview of security issues in WMNs and then particularly focuses on secure routing in these networks. First, it identifies security vulnerabilities in the medium access control (MAC) and the network layers. Various possibilities of compromising data confidentiality, data integrity, replay attacks and offline cryptanalysis are also discussed. Then various types of attacks in the MAC and the network layers are discussed. After enumerating the various types of attacks on the MAC and the network layer, the chapter briefly discusses on some of the preventive mechanisms for these attacks.Comment: 44 pages, 17 figures, 5 table

    QoS-aware Routing for Real-Time and Multimedia Applications in Mobile Ad Hoc Networks

    Get PDF
    International audienceWith the increasing development of real-time and multimedia applications, there is a need to provide bandwidth and delay guarantees. Most of QoS ad hoc network routing protocols select path guaranteeing delay and/or bandwidth. However, they don't consider throughput optimization, which results in a low number of admitted real-time and multimedia flows. In this paper, we propose a cross-layer TDMA-based routing protocol to meet delay and bandwidth requirements while optimizing network throughput. Since in TDMA-based ad hoc networks, slot reservation impacts two-hops neighbors, our routing protocol selects paths with the lowest number of neighbors. To show the effectiveness of our protocol, we present simulations using NS-2

    Bandwidth Estimation for IEEE 802.11-based Ad Hoc Networks

    Get PDF
    International audienceSince 2005, IEEE 802.11-based networks have been able to provide a certain level of quality of service (QoS) by the means of service differentiation, due to the IEEE 802.11e amendment. However, no mechanism or method has been standardized to accurately evaluate the amount of resources remaining on a given channel. Such an evaluation would, however, be a good asset for bandwidth-constrained applications. In multihop ad hoc networks, such evaluation becomes even more difficult. Consequently, despite the various contributions around this research topic, the estimation of the available bandwidth still represents one of the main issues in this field. In this paper, we propose an improved mechanism to estimate the available bandwidth in IEEE 802.11-based ad hoc networks. Through simulations, we compare the accuracy of the estimation we propose to the estimation performed by other state-of-the-art QoS protocols, BRuIT, AAC, and QoS-AODV

    Dynamic Bandwidth Management in IEEE 802.11-Based Multihop Wireless Networks

    Get PDF
    International audienceIn this paper, we propose a new protocol named DRBT (Dynamic Regulation of Best Effort Traffic) which supports QoS throughput guarantees and provides a distributed regulation mechanism for Best Effort traffic in multihop wireless networks. By adapting dynamically the rate of Best Effort traffic at the link layer, DRBT increases the acceptance ratio of QoS flows and provides a good use of the remaining resources through the network. Our protocol also provides an accurate method to evaluate the available bandwidth in IEEE 802.11-based ad hoc networks which is able to differentiate QoS applications from Best Effort traffic. Through extensive simulations, we compare the performance of our proposal scheme with some others protocols like QPART for instance
    • 

    corecore