68,695 research outputs found

    Effect of real video streaming over virtual MANET environment

    Get PDF
    Wireless Ad hoc Network is promising in solving many challenging real-world communication problems. Examples of these are: military field operation, emergency response system, and oil drilling and mining operation. However, the wide deployment of this type of network is still a challenging task. It is very difficult to manage quality of services for real time applications like video transmission over mobile nodes. Mobile ad hoc networks are not so resilient and reliable because of their dynamic topology due to the mobile nodes and impact of environmental circumstances. However, it provides multiple routes from the source to the destination, which gives extra redundancy for video and data transmission. In this research work, I will analyze the effect of real video streaming in virtual simulation environment using mobile ad hoc network, terrain modeling module and the System-in-the-loop modules from the OPNET modeling tool

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Get PDF
    The increasing autonomy of Mobile Ad Hoc Networks (MANETs) has enabled a great many large-scale unguided missions, such as agricultural planning, conservation and similar surveying tasks. Commercial and military institutions have expressed great interest in such ventures; raising the question of security as the application of such systems in potentially hostile environments becomes a desired function of such networks. Preventing theft, disruption or destruction of such MANETs through cyber-attacks has become a focus for many researchers as a result. Virtual Private Networks (VPNs) have been shown to enhance the security of Mobile Ad hoc Networks (MANETs), at a high cost in network resources during the setup of secure tunnels. VPNs do not normally support broadcast communication, reducing their effectiveness in high-traffic MANETs, which have many broadcast communication requirements. To support routing, broadcast updates and efficient MANET communication, a Virtual Closed Network (VCN) architecture is proposed. By supporting private, secure communication in unicast, multicast and broadcast modes, VCNs provide an efficient alternative to VPNs when securing MANETs. Comparative analysis of the set-up overheads of VCN and VPN approaches is provided between OpenVPN, IPsec, Virtual Private LAN Service (VPLS), and the proposed VCN solution: Security Using Pre-Existing Routing for MANETs (SUPERMAN)

    Virtual Router Approach For Wireless Ad Hoc Networks

    Get PDF
    Wireless networks have become increasingly popular in recent years. There are two variations of mobile wireless networks: infrastructure mobile networks and infrastructureless mobile networks. The latter are also known as mobile ad hoc network (MANET). MANETs have no fixed routers. Instead, mobile nodes function as relay nodes or routers, which discover and maintain communication connections between source nodes and destination nodes for various data transmission sessions. In other words, an MANET is a self-organizing multi-hop wireless network in which all nodes within a given geographical area participate in the routing and data forwarding process. Such networks are scalable and self-healing. They support mobile applications where an infrastructure is either not available (e.g., rescue operations and underground networks) or not desirable (e.g., harsh industrial environments). In many ad hoc networks such as vehicular networks, links among nodes change constantly and rapidly due to high node speed. Maintaining communication links of an established communication path that extends between source and destination nodes is a significant challenge in mobile ad hoc networks due to movement of the mobile nodes. In particular, such communication links are often broken under a high mobility environment. Communication links can also be broken by obstacles such as buildings in a street environment that block radio signal. In a street environment, obstacles and fast moving nodes result in a very short window of communication between nodes on different streets. Although a new communication route can be established when a break in the communication path occurs, repeatedly reestablishing new routes incurs delay and substantial overhead. To address this iv limitation, we introduce the Virtual Router abstraction in this dissertation. A virtual router is a dynamically-created logical router that is associated with a particular geographical area. Its routing functionality is provided by the physical nodes (i.e., mobile devices) currently within the geographical region served by the virtual router. These physical nodes take turns in forwarding data packets for the virtual router. In this environment, data packets are transmitted from a source node to a destination node over a series of virtual routers. Since virtual routers do not move, this scheme is much less susceptible to node mobility. There can be two virtual router approaches: Static Virtual Router (SVR) and Dynamic Virtual Router (DVR). In SVR, the virtual routers are predetermined and shared by all communication sessions over time. This scheme requires each mobile node to have a map of the virtual routers, and use a global positioning system (GPS) to determine if the node is within the geographical region of a given router. DVR is different from SVR with the following distinctions: (1) virtual routers are dynamically created for each communication sessions as needed, and deprecated after their use; (2) mobile nodes do not need to have a GPS; and (3) mobile nodes do not need to know whereabouts of the virtual routers. In this dissertation, we apply Virtual Router approach to address mobility challenges in routing data. We first propose a data routing protocol that uses SVR to overcome the extreme fast topology change in a street environment. We then propose a routing protocol that does not require node locations by adapting a DVR approach. We also explore how the Virtual Router Approach can reduce the overhead associated with initial route or location requests used by many existing routing protocols to find a destination. An initial request for a destination is expensive v because all the nodes need to be reached to locate the destination. We propose two broadcast protocols; one in an open terrain environment and the other in a street environment. Both broadcast protocols apply SVR. We provide simulation results to demonstrate the effectiveness of the proposed protocols in handling high mobility. They show Virtual Router approach can achieve several times better performance than traditional routing and broadcast approach based on physical routers (i.e., relay nodes

    An evolutionary approach to routing in mobile AD HOC networks using dominating sets.

    Get PDF
    This thesis presents a new approach to routing in ad-hoc wireless networks using virtual backbones that may be approximated by the graph theoretic concept of dominating sets. · Ad hoc wireless networks provide a flexible and quick means of establishing wireless peer-to-peer communications. Routing remains the main challenging problem in an ad hoc network due to its multihop nature and dynamic network topology. Several protocols based on virtual backbones in ad hoc wireless networks have been proposed that may be used to simplify the routing process. However, little is known about the network routing performance of these protocols and no attempt has previously been made to directly compare them. This thesis is the first research effort to implement, analyze and compare the routing performance of dominating-set-based routing protocols. In this study, we examine four existing routing approaches using a virtual backbone, or spine , imposed on the ad­hoc network. We then propose an evolutionary approach to constructing a stable minimum connected dominating set in an ad hoc wireless network: this employs the use of a genetic algorithm. Since the mobile· nodes that constitute an ad hoc wireless network are constantly in motion, the network configuration is subject to constant change in a manner that resembles the biological process of mutation. This evolution of networks over time lends itself naturally to a model based on genetic algorithms. As part of an in-depth study of the application of genetic algorithms in the field of wireless networks, a scatternet formation protocol for Bluetooth networks was designed, developed and evaluated. This helped to build the knowledge base required to implement new routing protocols using the network simulator ns-2. Simulation studies were then conducted using ns-2 to compare the performance of previously proposed dominating­set-based routing approaches. In this thesis, we analyze the performance of our evolutionary routing approach and compare it with the previous approaches. We present our simulation results and show that our evolutionary routing approach outperforms the other routing algorithms with respect to end-to-end packet delay, throughput, packet delivery ratio and routing overhead· across several different scenarios. Thus, we demonstrate the advantages of utilizing a genetic algorithm to construct a backbone that is · used to effectively route packets in an ad-hoc wireless network

    Localization Enhanced Mobile Networks

    Get PDF
    The interest in mobile ad-hoc networks (MANETs) and often more precisely vehicular ad-hoc networks (VANETs) is steadily growing with many new applications, and even anticipated support in the emerging 5G networks. Particularly in outdoor scenarios, there are different mechanisms to make the mobile nodes aware of their geographical location at all times. The location information can be utilized at different layers of the protocol stack to enhance communication services in the network. Specifically, geographical routing can facilitate route management with smaller overhead than the traditional proactive and reactive routing protocols. In order to achieve similar advantages for radio resource management (RRM) and multiple access protocols, the concept of virtual cells is devised to exploit fully distributed knowledge of node locations. The virtual cells define clusters of MANET nodes assuming a predefined set of geographically distributed anchor points. It enables fast response of the network to changes in the nodes spatial configuration. More importantly, the notion of geographical location can be generalized to other shared contexts which can be learned or otherwise acquired by the network nodes. The strategy of enhancing communication services by shared contexts is likely to be one of the key features in the beyond-5G networks

    Reliable communication across ad hoc networks

    Get PDF
    This paper presents a fully decentralised peer-topeer voice communication tool intended for use across mobile ad hoc networks (MANET) by distributed groups who desired collaboration. We examined the synergy between MANETs and peer-to-peer virtual overlay networks which allowed the creation of ad hoc applications. One style of communication considered suitable for task oriented distributed group collaboration was push-to-talk. This research was focused on providing a push-to-talk communication platform suitable for deployment across MANETs. The research methodology employed was a proof of concept approach within a classical experimental computer science paradigm. We developed a prototype which used JXTA, a peer-to-peer virtual overlay network, to provide push-to-talk functionality across MANETs. Guaranteed delivery of messages was provided via a peer-to-peer voicemail delivery system. While the system did what intended we show that JXTA had a problem with the efficient delivery of voice samples.Telkom, Cisco, THRI

    Scalable wide area ad-hoc networking

    Get PDF
    The scalability problem of routing algorithms in Mobile Ad-hoc networks (MANET) has conventionally been addressed by introducing hierarchical architectures, clusters, and neighborhood zones. In all of these approaches, some nodes are assigned different routing related roles than others. Examples include cluster heads, virtual backbones and border nodes. The selection of these nodes on a fixed or dynamic basis adds complexity to the routing algorithm, in addition to placing significant demands on mobility and power consumption of these nodes. Furthermore, the scalability achieved with hierarchical architectures or partitions is limited. This thesis demonstrates that location awareness can greatly aid in MANET routing and proposes an enhancement to location management algorithm used by the Terminodes System. This thesis makes use of geographic packet forwarding, geocasting and virtual home area concepts. It draws from the analogy between ad hoc networks and social networks. The Scalable Wide Area ad hoc network (SWAN), nodes update their location information with a geocast group whose area is given by a well-known function. A source node queries the geocast group of the destination and obtains up to date location information. Then, packets are geographically routed to the destination. The SWAN algorithm also optimizes the control overhead and obtains location information with minimal delay. This thesis also presents the results of our comparative performance study

    Seamless roaming and guaranteed communication using a synchronized single-hop multi-gateway 802.15.4e TSCH network

    Get PDF
    Industrial wireless sensor networks (WSNs) are being used to improve the efficiency, productivity and safety of industrial processes. An open standard that is commonly used in such cases is IEEE 802.15.4e. Its TSCH mode employs a time synchronized based MAC scheme together with channel hopping to alleviate the impact of channel fading. Until now, most of the industrial WSNs have been designed to only support static nodes and are not able to deal with mobility. In this paper, we show how a single-hop, multi-gateway IEEE 802.15.4e TSCH network architecture can tackle the mobility problem. We introduce the Virtual Grand Master (VGM) concept that moves the synchronization point from separated Backbone Border Routers (BBRs) towards the backbone network. With time synchronization of all BBRs, mobile nodes can roam from one BBR to another without time desynchronization. In addition to time synchronization, we introduce a mechanism to synchronize the schedules between BBRs to support fast handover of mobile nodes.Comment: Short paper version of a paper submitted to Ad-Hoc Networks Journal by Elsevie
    corecore