6 research outputs found
A Study of Cross Layer Design compare with Layer Design for MANET
Mobile Ad β hoc networks (MANET) are becoming increasingly popular in wireless technology, especially for providing services in disaster area. Mobile users are looking forward to new technologies that allow them to communicate anytime, anywhere, and using any communication device. Mobile ad β hoc networks suffer from several performance limitations, especially related to excessive burden deriving from the layering approach for the TCP / IP protocol stack design. In fact, TCP / IP protocol stack originally designed for wired networks and it is not suitable for wireless and mobile ad hoc networks. In this paper, it focuses on cross layer network design which is especially for wireless and mobile ad hoc networks. The main objective is to how cross layer differ from layered design, cross layer design approaches, challenges of cross layer design and implementation of cross layer design based MANET. And also this article brief the readers an overview of cross layer concept while discussing different cross layer proposals given by researchers
A Study of Cross Layer Design compare with Layer Design for MANET
Mobile Ad β hoc networks (MANET) are becoming increasingly popular in wireless technology, especially for providing services in disaster area. Mobile users are looking forward to new technologies that allow them to communicate anytime, anywhere, and using any communication device. Mobile ad β hoc networks suffer from several performance limitations, especially related to excessive burden deriving from the layering approach for the TCP / IP protocol stack design. In fact, TCP / IP protocol stack originally designed for wired networks and it is not suitable for wireless and mobile ad hoc networks. In this paper, it focuses on cross layer network design which is especially for wireless and mobile ad hoc networks. The main objective is to how cross layer differ from layered design, cross layer design approaches, challenges of cross layer design and implementation of cross layer design based MANET. And also this article brief the readers an overview of cross layer concept while discussing different cross layer proposals given by researchers
Improved CLC Routing Protocol with Node Classification Algorithm for MANET
Mobile ad hoc networks (MANETs) are the group of mobile nodes that communicate without using fixed infrastructures. Most of the routing protocols in MANETs are designed without analyzing the behaviour of the intermediate node. In such a case, it cannot identify the best intermediate node when over one route is available. It degrades the performance of routing protocol. Analysing the attributes of the intermediate node and identify the best node for transmitting packets is the challenging task inMANET. In this paper we have designed node classification algorithm which helps to analyze various attributes of the intermediate node and select the best node as a router. The node classification algorithm has been adopted into the existing CLC (Cross Layer with Clump) routing protocol. The simulation results show that in terms of packet delivery ratio, throughput and energy consumption are the node classification-based CLC routing protocol which have better performance than traditional AODV, existing CLC, quality of service, oriented distributed (QOD) routing protocols
Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs
Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively