Spelling suggestions: "subject:"Ad coc network"" "subject:"Ad ooc network""
81 |
Implementation and Experimental Evaluation of Wireless Ad hoc Routing ProtocolsLundgren, Henrik January 2005 (has links)
<p>A <i>wireless ad hoc network </i>consists of a number of mobile nodes that temporarily form a dynamic infrastructure-less network. New routing protocols that can adapt to the frequent topology changes induced by node mobility and varying link qualities are needed. During the last decade dozens of different ad hoc routing protocols have been proposed, optimized and partially compared, mainly through simulation studies.</p><p>This thesis takes an experimental approach to the evaluation of ad hoc routing protocols. We argue that real world experiments are needed in order to complement simulation studies, and to gain practical experience and insights that can provide feedback to routing protocol design and existing simulation models. For example, we discovered a performance discrepancy for the AODV protocol between real world experiments and corresponding simulation studies. This so called ``communication gray zone'' problem was explored and countermeasures were implemented. As a result we could eliminate this performance problem to a large extent. </p><p>We have implemented a software-based testbed called APE to carry out efficient and systematic experimental evaluation of ad hoc routing protocols. Experiments with up to 37 participating ad hoc nodes have demonstrated APE's ability to scale efficiently and assess repeatability between test runs. APE is part of our methodology for test repeatability in a real world ad hoc routing protocol testbed. It addresses the repeatability issue induced by stochastic factors like the radio environment and node mobility. Using APE, we have performed a systematic experimental evaluation of three ad hoc routing protocols (AODV, OLSR and LUNAR). Our results show that TCP does not work satisfactorily even in very small networks with limited mobility.</p>
|
82 |
Security Mechanisms for Mobile Ad Hoc and Wireless Sensor NetworksCHENG, YI 19 September 2008 (has links)
No description available.
|
83 |
An Exposition of Performance-Security Trade-offs in RANETs Based on Quantitative Network ModelsMiskeen, Guzlan M.A., Kouvatsos, Demetres D., Habib Zadeh, Esmaeil January 2013 (has links)
No / Security mechanisms, such as encryption and authentication protocols, require extra computing resources and therefore, have an adverse effect upon the performance of robotic mobile wireless ad hoc networks (RANETs). Thus, an optimal performance and security trade-off should be one of the main aspects that should be taken into consideration during the design, development, tuning and upgrading of such networks. In this context, an exposition is initially undertaken on the applicability of Petri nets (PNs) and queueing networks (QNs) in conjunction with their generalisations and hybrid integrations as robust quantitative modelling tools for the performance analysis of discrete flow systems, such as computer systems, communication networks and manufacturing systems. To overcome some of the inherent limitations of these models, a novel hybrid modelling framework is explored for the quantitative evaluation of RANETs, where each robotic node is represented by an abstract open hybrid G-GSPN_QN model with head-of-line priorities, subject to combined performance and security metrics (CPSMs). The proposed model focuses on security processing and state-based control and it is based on an open generalised stochastic PN (GSPN) with a gated multi-class 'On-Off' traffic and mobility model. Moreover, it employs a power consumption model and is linked in tandem with an arbitrary QN consisting of finite capacity channel queues with blocking for 'intra' robot component-to-component communication and 'inter' robot-to-robot transmission. Conclusions and future research directions are included.
|
84 |
Development of a Monte Carlo ad hoc routing protocol for connectivity improvementPerold, Philippus Rudolf 03 1900 (has links)
Thesis (MScEng (Electrical and Electronic Engineering))--University of Stellenbosch, 2010. / Please refer to full text for abstract.
|
85 |
Design and evaluation of security mechanism for routing in MANETs : elliptic curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET)Almotiri, Sultan H. January 2013 (has links)
Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount importance. A key exchange cryptography technique is one such protocol. Trust relationship between mobile nodes is essential. Without it, security will be further threatened. The absence of infrastructure and a dynamic topology changing reduce the performance of security and trust in mobile networks. Current proposed security solutions cannot cope with eavesdroppers and misbehaving mobile nodes. Practically, designing a key exchange cryptography system is very challenging. Some key exchanges have been proposed which cause decrease in power, memory and bandwidth and increase in computational processing for each mobile node in the network consequently leading to a high overhead. Some of the trust models have been investigated to calculate the level of trust based on recommendations or reputations. These might be the cause of internal malicious attacks. Our contribution is to provide trustworthy communications among the mobile nodes in the network in order to discourage untrustworthy mobile nodes from participating in the network to gain services. As a result, we have presented an Elliptic Curve Diffie-Hellman key exchange and trust framework mechanism for securing the communication between mobile nodes. Since our proposed model uses a small key and less calculation, it leads to a reduction in memory and bandwidth without compromising on security level. Another advantage of the trust framework model is to detect and eliminate any kind of distrust route that contain any malicious node or suspects its behavior.
|
86 |
Intelligent MANET optimisation systemSaeed, Nagham January 2011 (has links)
In the literature, various Mobile Ad hoc NETwork (MANET) routing protocols proposed. Each performs the best under specific context conditions, for example under high mobility or less volatile topologies. In existing MANET, the degradation in the routing protocol performance is always associated with changes in the network context. To date, no MANET routing protocol is able to produce optimal performance under all possible conditions. The core aim of this thesis is to solve the routing problem in mobile Ad hoc networks by introducing an optimum system that is in charge of the selection of the running routing protocol at all times, the system proposed in this thesis aims to address the degradation mentioned above. This optimisation system is a novel approach that can cope with the network performance’s degradation problem by switching to other routing protocol. The optimisation system proposed for MANET in this thesis adaptively selects the best routing protocol using an Artificial Intelligence mechanism according to the network context. In this thesis, MANET modelling helps in understanding the network performance through different contexts, as well as the models’ support to the optimisation system. Therefore, one of the main contributions of this thesis is the utilisation and comparison of various modelling techniques to create representative MANET performance models. Moreover, the proposed system uses an optimisation method to select the optimal communication routing protocol for the network context. Therefore, to build the proposed system, different optimisation techniques were utilised and compared to identify the best optimisation technique for the MANET intelligent system, which is also an important contribution of this thesis. The parameters selected to describe the network context were the network size and average mobility. The proposed system then functions by varying the routing mechanism with the time to keep the network performance at the best level. The selected protocol has been shown to produce a combination of: higher throughput, lower delay, fewer retransmission attempts, less data drop, and lower load, and was thus chosen on this basis. Validation test results indicate that the identified protocol can achieve both a better network performance quality than other routing protocols and a minimum cost function of 4.4%. The Ad hoc On Demand Distance Vector (AODV) protocol comes in second with a cost minimisation function of 27.5%, and the Optimised Link State Routing (OLSR) algorithm comes in third with a cost minimisation function of 29.8%. Finally, The Dynamic Source Routing (DSR) algorithm comes in last with a cost minimisation function of 38.3%.
|
87 |
Performance Evaluation of Opportunistic Routing Protocols for Multi-hop Wireless NetworksGuercin, Sergio Rolando 15 March 2019 (has links)
Nowadays, Opportunistic Routing (OR) is widely considered to be the most important
paradigm for Multi-hop wireless networks (MWNs). It exploits the broadcast nature of
wireless medium to propagate information from one point to another within the network.
In OR scheme, when a node has new information to share, it rst needs to set its forwarding
list which include the IDs and/or any relevant information to its best suited neighboring
nodes. This operation is supported by the use of appropriate metrics. Then, it executes
a coordination algorithm allowing transmission reliability and high throughput among the
next-hop forwarders. In this paper, we provide a comprehensive guide to understand the
characteristics and challenges faced in the area of opportunistic routing protocols in MWNs.
Moreover, since the planet we live on is largely covered by water, OR protocols have
gained much attention during the last decade in real-time aquatic applications, such as
oil/chemical spill monitoring, ocean resource management, anti-submarine missions and
so on. One of the major problems in Underwater Wireless Sensor Network (UWSNs) is
determining an e cient and reliable routing methodology between the source node and the
destination node. Therefore, designing e cient and robust routing protocols for UWSNs
became an attractive topic for researchers. This paper seeks to address in detail the key
factors of underwater sensor network. Furthermore, it calls into question 5 state-of-the-art
routing protocols proposed for UWSN: The Depth-Based Routing protocol (DBR), the
Energy-E cient Depth-Based Routing protocol (EEDBR), the Hydraulic-pressure-based
anycast routing protocol (Hydrocast), the Geographic and opportunistic routing protocol
with Depth Adjustment for mobile underwater sensor networks (GEDAR), and the Void-
Aware Pressure Routing for underwater sensor networks (VAPR). Finally, it covers the
performance of those protocol through the use of the R programming language.
|
88 |
Patient Monitoring via Mobile Ad Hoc Network: Power Management, Reliability, and DelaysSneha, Sweta 13 June 2008 (has links)
ABSTRACT PATIENT MONITORING VIA MOBILE AD HOC NETWORK - MAXIMIZING RELIABILITY WHILE MINIMIZING POWER USAGE AND DELAYS BY SWETA SNEHA May 22nd, 2008 Committee Chair: Dr. Upkar Varshney Major Department: Computer Information Systems Comprehensive monitoring of patients based on wireless and mobile technologies has been proposed for early detection of anomalies, provision of prompt medical attention, and corresponding reduction in healthcare expenses associated with unnecessary hospitalizations and treatment. However the quality and reliability of patient monitoring applications have not been satisfactory, primarily due to their sole dependence on infrastructure-oriented wireless networks such as wide-area cellular networks and wireless LANs with unpredictable and spotty coverage. The current research is exploratory in nature and seeks to investigate the feasibility of leveraging mobile ad hoc network for extending the coverage of infrastructure oriented networks when the coverage from the latter is limited/non-existent. Although exciting, there are several challenges associated with leveraging mobile ad hoc network in the context of patient monitoring. The current research focuses on power management of the low-powered monitoring devices with the goal to maximize reliability and minimize delays. The PRD protocols leveraging variable-rate transmit power and the PM-PRD scheme are designed to achieve the aforementioned objective. The PRD protocols manage power transmitted by the source and intermediate routing devices in end to end signal transmission with the obejective to maximize end to end reliability. The PM-PRD scheme operationalizes an appropriate PRD protocol in end to end signal transmission for diverse patient monitoring scenarios with the objective to maximize reliability, optimize power usage, and minimize delays in end to end signal transmission. Analytical modeling technique is utilized for modeling diverse monitoring scenarios in terms of the independent variables and assessing the performance of the research artifacts in terms of the dependent variables. The evaluation criterion of the research artifacts is maximization of reliability and minimization of power usage and delays for diverse monitoring scenarios. The performance evaluation of the PRD protocols is based on maximization of end to end reliability in signal transmission. The utility of the PM-PRD scheme is associated with operationalizing an appropriate protocol for a given monitoring scenario. Appropriateness of a protocol for a given scenario is based on the performance of the PRD protocols with respect to the dependent variables (i.e., end to end reliability, end to end power usage, and end to end delays). Hence the performance evaluation of the PRD protocols in terms of the dependent variables is utilized to (a) discover the best protocol and (b) validate the accuracy and utility of the PM-PRD scheme in allocating the best protocol for diverse monitoring scenarios. The results validate the effectiveness of the research artifacts in maximizing reliability while minimizing power usage and delays in end to end signal transmission via a multi-hop mobile ad hoc network. Consequently the research establishes the feasibility of multi-hop mobile ad hoc network in supplementing the spotty network coverage of infrastructure oriented networks thereby enhancing the quality and dependability of the process of signal transmission associated with patient monitoring applications.
|
89 |
Performance Evaluation Of Routing Protocols In Wireless Ad Hoc Networks With Service DifferentiationYilmaz, Semra 01 January 2003 (has links) (PDF)
An ad hoc network is a collection of wireless mobile nodes dynamically forming a
temporary network without the use of any fixed network infrastructure or centralized
administration. Due to the limitations in the wireless environment, it may be
necessary for one mobile host to enlist the aid of other hosts in forwarding a packet
to its destination. In order to enable communication within the network, a routing
protocol is needed to discover routes between nodes. The primary goal of ad hoc
network routing protocols is to establish routes between node pairs so that messages
may be delivered reliably and in a timely manner.
The basic access method in IEEE 802.11 ad hoc networks is the Distributed
Coordination Function (DCF), which provides a fair medium access. Enhanced
Distributed Coordination Function (EDCF) has been developed to provide service
differentiation among different traffic flows. In this thesis, we investigate the performance of the EDCF with routing protocols / Direct Sequenced Distance Vector (DSDV) and Dynamic Source Routing (DSR) by
simulations.
|
90 |
Mobility And Power Aware Data Interest Based Data Replication For Mobile Ad Hoc NetworksArslan, Secil 01 September 2007 (has links) (PDF)
One of the challenging issues for mobile ad hoc network (MANET) applications is data replication. Unreliable wireless communication, mobility of network participators and limited resource capacities of mobile devices make conventional replication techniques useless for MANETs. Frequent network divisions and unexpected disconnections should be handled. In this thesis work, a novel mobility and power aware, data interest based data replication strategy is presented. Main objective is to improve data accessibility among a mission critical mobility group. A clustering approach depending on mobility and data interest patterns similarities is introduced. The investigated replica allocation methodology takes care of data access frequency and data correlation values together with mobile nodes&rsquo / remaining energy and memory capacities. Performance of the proposed approach is analyzed in terms of data accessibility / cache hit ratio and traffic metrics. Improvements are observed by data interest based clustering in addition to mobility awareness over sole mobility aware clustering. Advantages of power aware replica allocation are demonstrated by experimental simulations.
|
Page generated in 0.0484 seconds