Result page:
1
2
3
4
5
6
7
8
9
10
>>
1
November 2015
MobiWac '15: Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 49, Downloads (Overall): 111
Full text available:
PDF
The better we understand human mobility the more capable we are to perform realistic simulations of human driven MANETs. By using this knowledge we can more accurately predict the performance that can be expected from real MANET implementations. In this paper we assess how recently discovered characteristics of human mobility ...
Keywords:
slaw, MANET
Title:
Studying the Effect of Human Mobility on MANET Topology and Routing: Friend or Foe?
Keywords:
MANET
Abstract:
... capable we are to perform realistic simulations of human driven MANETs. . By using this knowledge we can more accurately predict ... accurately predict the performance that can be expected from real MANET implementations. In this paper we assess how recently discovered characteristics ... connectivity and routing performance. Our main results indicate that human-driven MANETs exhibit higher connectivity levels and longer route duration lifetimes than ... waypoint simulations. These results encourage the development and implementation of MANET- -based services, which so far have been regarded as very ...
References:
F. Bai, N. Sadagopan, B. Krishnamachari, and A. Helmy. Modeling path duration distributions in manets and their impact on reactive routing protocols. IEEE Journal on Selected Areas in Communications, 22(7):1357--1373, Sept. 2004.
Z. Ismail and R. Hassan. A performance study of various mobility speed on AODV routing protocol in homogeneous and heterogeneous MANET. In 17th Asia-Pacific Conference on Communications (APCC, Sabah, Malaysia, October, 2008), pages 637--642. IEEE, 2011.
Liu Tie-yuan, Chang Liang, and Gu Tian-long. Analyzing the impact of entity mobility models on the performance of routing protocols in the MANET. In Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing (WGEC'09, Guilin, China, October, 2009), pages 56--59. IEEE, 2009.
F. Maan and N. Mazhar. MANET routing protocols vs mobility models: A performance evaluation. In Third International Conference on Ubiquitous and Future Networks (ICUFN, Dalian, China, June, 2011), pages 179--184. IEEE, 2011.
S. Rathore, M. Naiyar, and A. Ali. Comparative study of entity and group mobility models in MANETs based on underlying reactive, proactive and hybrid routing schemes. In 15th International Multitopic Conference (INMIC, Islamabad, Pakistan, December, 2012), pages 297--304. IEEE, 2012.
Shams-ul-Arfeen, A. W. Kazi, J. M. Memon, and S. I. Hyder. Performance evaluation of MANET routing protocols using scenario based mobility models. In Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications, pages 419--424. Springer Netherlands, 2007.
C. Tschudin, P. Gunningberg, H. Lundgren, and E. Nordström. Lessons from experimental MANET research. Ad Hoc Networks, 3(2):221--233, Mar. 2005.
Full Text:
Studying the Effect of Human Mobility on MANET Topologyand Routing: Friend or Foe?Ad n G.Medrano-Ch vez?Department of ElectricalEngineeringMetropolitan AutonomousUniversity - ... more accu-rately predict the performance that can be expected fromreal MANET implementations. In this paper we assess howrecently discovered characteristics of ... affectnetwork connectivity and routing performance. Our mainresults indicate that human-driven MANETs exhibit higherconnectivity levels and longer route duration lifetimes thanwhat was ... waypoint sim-ulations. These results encourage the development and im-plementation of MANET- -based services, which so far havebeen regarded as very difficult ... impossible to provide.Categories and Subject DescriptorsC.2.1 [Network Arquitecture and Design]: Wirelesscommunication?MANET ; I.6.6 [Simulation and Model-ing]: Simulation output analysis?SLAW ; C.2.2 ... the develop-ment of novel solutions based on mobile ad hoc networks(MANETs) ). These networks provide a self-organized com-munication infrastructure integrated only ... provide a self-organized com-munication infrastructure integrated only by mobile devices.In MANETs, , mobile devices act not only as simple hosts,?PhD candidate ... relay points allowing mutihop commu-nications among them.The biggest challenge that MANET networks face is mo-bility as it produces a continuously changing ... [9, 11, 13, 19, 20,23]. As a result of this, MANET protocols should be evalu-ated with the mobility model that better ... mobility model that better matches real-worldscenarios.A frequent implicit assumption in MANET research isthat humans carry the wireless radios and, for more ... trajectories in simulated scenarios and reli-ably predict the performance of MANET- -based services. Upto now, most of the performance evaluations have ... isa popular mobility model frequently used as a benchmarkto evaluate MANET protocols. The latter is a recently pro-posed model that incorporates ...
... 23], or are compared against RWP[7, 14]. Performance evaluations of MANET protocols gen-erally include RWP as one of the considered mobility ...
... out to assess theeffect of the selected mobility models on MANET topologyand routing performance are explained.We chose to study the effect ...
... because the remaining casesdid not provide additional insights.4.1 Analysis of MANET topologySimulation results regarding the connectivity ratio showthe level of likelihood ... showthe level of likelihood for establishing routes among nodesin the MANET under different mobility assumptions. Fig-ure 2(a) shows the connectivity ratio ... mobility assumptions. Fig-ure 2(a) shows the connectivity ratio of a MANET with 25nodes. In this figure it is clear that such ...
... models.Based on the results presented above, we state that cur-rent MANET networks are able to support protocols andapplications in a better ...
... neighbors located at dhops were measured. We found that the MANET topologyunder SLAW shows a high level of connectivity, whereas ran-dom ... that nodes move like humans, we mayalso assume that a MANET can provide more resources thanthe ones reported in several works ... Conti et al. [6] where it was mentioned thatpure general-purpose MANETs lack of applicability unlesswe relax some of the MANET features. By using the SLAWmodel (which takes into account real ... longer time under TLW.As a final remark we consider that MANET protocolsmust be redesigned in order to take advantage of networkresources ... redesigned in order to take advantage of networkresources that real MANETs can provide.6. ACKNOWLEDGMENTThe first author was supported by a CONACyT ... ofvarious mobility speed on AODV routing protocol inhomogeneous and heterogeneous MANET. . In 17thAsia-Pacific Conference on Communications (APCC,Sabah, Malaysia, October, 2008), ... entity mobility models on theperformance of routing protocols in the MANET.
... Transactions on Communications,63(6):2273?2287, June 2015.[13] F. Maan and N. Mazhar. MANET routing protocolsvs mobility models: A performance evaluation. InThird International Conference ... Kazi, J. M. Memon, and S. I.Hyder. Performance evaluation of MANET routingprotocols using scenario based mobility models. InInnovative Algorithms and Techniques ...
2
September 2008
WiNTECH '08: Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 5, Downloads (12 Months): 14, Downloads (Overall): 374
Full text available:
Pdf
Mobile Ad hoc NETworks (MANETs) are networks in which mobile routers are connected via wireless links forming dynamic topologies. An important function of network management in a MANET is to observe network conditions: at the node level, this may mean keeping track of the traffic load; at the network level, ...
Keywords:
monitoring, MANET, experimentation, management
Keywords:
MANET
Abstract:
<p>Mobile Ad hoc NETworks (MANETs) ) are networks in which mobile routers are connected via ... dynamic topologies. An important function of network management in a MANET is to observe network conditions: at the node level, this ... <i>A</i>d hoc <i>N</i>etworks, (MMAN) to address the challenges of monitoring MANETs. . We formulate an overall design structure and present an ... structure and present an implementation of our framework for a MANET running the Optimized Link State Routing (OLSR) protocol. The unobtrusive ... the system to adapt to the constantly changing nature of MANETs and to provide valuable network management, security assessment, and traffic ... The system is non-intrusive, generates no additional traffic in the MANET
Full Text:
... Tech Arlington, VA, USA ldasilva@vt.edu ABSTRACT Mobile Ad hoc NETworks (MANETs) ) are networks in which mobile routers are connected via ... dynamic topologies. An important function of network management in a MANET is to observe network conditions: at the node level, this ... Ad hoc Networks, (MMAN) to address the challenges of monitoring MANETs. . We formulate an overall design structure and present an ... structure and present an implementation of our framework for a MANET running the Optimized Link State Routing (OLSR) protocol. The unobtrusive ... the system to adapt to the constantly changing nature of MANETs and to provide valuable network management, security assessment, and traffic ... The system is non-intrusive, generates no additional traffic in the MANET it monitors, and requires only modest processing and storage resources. ... Network management General Terms: Design, Experimentation, Measurement Keywords: Monitoring, management, MANET, , experimentation 1. INTRODUCTION Wireless mobile ad hoc networks (MANETs) ) are self-organizing and autonomous networks, consisting of mobile nodes ... and collaborate with one another to form a network. A MANET may operate in standalone fashion or as a stub network. ... in standalone fashion or as a stub network. Use of MANETs is expected to increase substantially as personal computing becomes more ... technologies to provide widespread commercial Internet access in Paris. Since MANETs do not require the costly communication infrastructure of legacy wireless ... disaster sites, vehicular communication, etc. Some of the characteristics of MANETs include dynamic network topologies, high likelihood of network partitioning, undefined ... These characteristics pose a significant challenge to the management of MANETs. . In particular, designing and implementing a monitoring solution that ... of band. Our monitoring solution does not depend on the MANET to operate, hence it is robust to network partitioning, link ... link breaks, dead nodes, and node misbehavior in the monitored MANET. . The information provided by our monitoring system can be ...
... that MMAN was able to reflect the changes in the MANET with less than two seconds of delay. Also, when deployed ... ? A distributed framework for monitoring and performance assessment of MANETs; ; ? A monitoring solution for MANETs that is capable of producing an up-to-date picture of the ... neighbors, which helps identify selfish and malicious nodes in a MANET; ; and ? A proof-of-concept implementation of a MANET monitoring system based on the methods introduced in this paper. ... work in the area of monitoring and fault detection of MANETs. . Section 3 presents our proposed monitoring and assessment framework ... Section 3 presents our proposed monitoring and assessment framework for MANETs. ... . Section 4 describes the implementation of MMAN on a MANET that uses OLSR as its routing protocol. We present the ... WORK Our proposed solution for monitoring and performance assessment of MANETs can be linked to both MANET monitoring systems [6-9] and MANET behavior-based solutions [10-14]. In [6], Badonnel, Festor and State propose ... of [9] proposed DAMON, a hierarchical agent-sink architecture for monitoring MANETs. . In this scheme, nodes are equipped with a collector ... rely on a middle management layer to collect information from MANET nodes are scalable and can provide node and network-level information, ...
... Also, reporting status or responding to polls requires processing by MANET nodes and reduces battery life. Furthermore, these approaches fall short ... solution, we do not inject any traffic into the monitored MANET. . We employ promiscuous packet capture tools on independent Monitoring ... collect information passively and are not part of the monitored MANET, , and thus network partitioning does not affect the performance ... performance of our monitoring solution. Furthermore, we do not require MANET nodes to install new software or run any daemon, hence ... MANET?s deployment, but can increase as the size of the MANET increases. Table 1 shows a comparison of the various monitoring ... where a node or a group of nodes in a MANET refuses to forward their peers? packets, could significantly affect the ... their peers? packets, could significantly affect the performance of a MANET. .) These approaches tend to be suited to the self-organized ... tend to be suited to the self-organized nature of a MANET as nodes evaluate the behavior of their peers, share their ... power, and bandwidth, which are all scarce resources in a MANET. . Unlike behavior-based assessment systems, MMAN is unobtrusive; it does ... all nodes ? ? ? Injects management traffic into the MANET ? ? ? ? Places constraints on MANET resources (nodes? battery life and CPU consumption) ? ? ? ... under coverage ? ? ? ? ? Is robust to MANET partitioning ? Is cheat-proof against a group of malicious or ... to network partitioning and dynamic topology changes in the monitored MANET, , and low bandwidth consumption. The solution also had to ... A number of Monitoring Units (MUs) are deployed throughout the MANET. . These MUs are responsible for collecting information regarding network ... network interfaces. One wireless interface card collects packets of the MANET in promiscuous mode while the other interface (which can be ... MMAN does not inject any additional traffic in the monitored MANET and results in no overhead to the monitored network. MMAN ...
... represents a sample scenario for MMAN deployed to monitor a MANET. . MU3 plays the role of an MU as well ... following two settings, both using IEEE 802.11b/g: 1. A 10-node MANET deployed across a large residential house, covering an approximate area ... some outside the building (see Figure 3). 2. A 10-node MANET
(see Figure 4). MANET nodes in both experiments were running the NRL OLSR routing ... performance of our system for the following scenarios: 1. The MANET was monitored using only one MU, positioned to have partial ... have partial coverage of the network; and 2. The same MANET was monitored by two MUs, with 80%-90% total coverage. Our ... only a few MUs, as long as most of the MANET area is covered, was sufficient. The approximate coverage areas of ... Ability to produce a dynamic and up-to-date picture of the MANET topology. ? Ability to show traffic information (incoming and outgoing ... CPU processing requirements for management nodes. Figure 3: A 10-node MANET deployed across a 38,000 sq. ft. house. 5. EXPERIMENTAL RESULTS ... used iptables to force desired topologies and create a partitioned MANET, , and in other situations natural interference and distance caused ... understand the results of partial versus complete coverage of the MANET by the MUs, we examined the performance of MMAN in ... GUI component when one MU (MU1) covers half of the MANET nodes (Figure 5) showed incomplete traffic and cooperation details, but ... was able to produce a complete topology picture of the MANET with details of traffic and cooperation activity for nodes under ... unit using their out-of-band communication link. Figure 4: A 10-node MANET deployed in a typical office environment. 5.2 Assessing Traffic Load ... and when there was complete and partial coverage of the MANET. . Regardless of traffic rate (10 packets/sec to 210 packets/sec) ...
... design, implementation and experimental performance evaluation of MMAN, our distributed MANET monitoring system. We tested the performance of MMAN under varied ... (with different network densities, complete and partial coverage of the MANET, , altered node cooperation levels, and various traffic rates) in ... node cooperation levels, and various traffic rates) in a real MANET environment. In general, MMAN was capable of producing satisfactory results ... where multiple teams equipped with two laptops each form a MANET and compete to ensure delivery of their traffic while minimizing ... this completion. During the MANIAC Challenge two MUs monitored a MANET of 16 nodes and provided an up-to-date view of node ...
... of the network topology and node-level information for the entire MANET. . (Boxed areas are the coverage areas of the respected ...
3
October 2007
Q2SWinet '07: Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 7, Downloads (Overall): 270
Full text available:
PDF
MANETs (Mobile Ad hoc NETworks) allow to deploy networks without any preexisting infrastructure. They are appealing approach for battlefield and emergency networks since they permit to easily interconnect the units that are engaged on the field. An unit is a predefined group of trusted users working together to accomplish a ...
Keywords:
OLSR, predefined groups, MANET
Title:
Security of predefined groups in manets
Keywords:
MANET
Abstract:
<p>MANETs (Mobile Ad hoc NETworks) allow to deploy networks without any ... approach that allows to deal with such predefined groups in MANETs. . Our approach consists in dividing the MANET in groups of trusted nodes: the nodes of a given ...
Full Text:
... an approach that allows to dealwith such prede?ned groups in MANETs. . Our approachconsists in dividing the MANET in groups of trusted nodes:the nodes of a given group ... time ago and leads tothe development of what we call MANET (Mobile Ad hocNETwork). MANETs are built as wireless, self-organizingnetworks. The use of MANETs ranges from giving connec-tivity in developing countries to battle?elds or ... we ?rst focus on the impact that prede?nedgroups have into MANETs and the corresponding securityneeds. Then we present how to meet ... emergencysituations, the engaged forces are generally divided in units.When using MANETs, , this logical and organizational viewof the engaged forces implies ... More generally, we assert that in many situations,nodes of a MANET belong to predefined groups that corre-spond to some persistent logical ... re-lationship have to support the deployment of an autonomousand secure sub-MANET, , and only rely on nodes of unknowntrust when communicating ... of unknowntrust when communicating with distant trusted nodes.Basically, a secure MANET is a MANET
... by usurping the identity of other nodes. Thus, ina secure MANET, , if we know a route between the nodes Aand ... if such a route exists, itwill be discovered.In a secure MANET of nodes with trust relationship, wecan reasonably assume that the ... will be re-ceived. In other word, by deploying a secure sub-MANET, ,nodes with trust relationship can communicate through trustedroutes.Conversely, according to ... prede?ned groups in MANETis based on the deployment of secure sub-MANETs so asto ensure that the nodes of the same prede?ned ... with respect to these security issues.2.2 Related worksBringing security to MANET routing is an intensive ?eldof research and lot of solutions ... same pre-de?ned group and we also discuss trust routing in MANET. .2.2.1 Secure routing in MANETSecuring a MANET consists in authenticating the routinginformation. More speci?cally, when a routing ... suited. In [3], the proposed approach allows todeploy a secure MANET of a set of nodes that depend ona unique trusted ... multiple trusted authorities may exist,but, in this case, the resulting MANET is composed of a setof disjunct secure sub-MANETs: : the nodes that depend ondi?erent trusted authorities can not ... stated, the prede?ned groups de?ne trustrelationships between nodes of a MANET. . Our notion ofprede?ned group is thus very similar to ... proposed approachdoes not allow the trusted nodes to deploy an autonomoussub-MANET but simply to have a trust routing table. Inparticular, when ...
... these informations are used when the prede?nedgroups are in the MANET. .3.1 Cryptographic material of the predefinedgroupsEach node is given a ... prede?ned group, and withwhich it can form a secure autonomous sub-MANET. . Itsscattered group is the set of nodes that belong ... interconnected compactgroups, each compact group being an autonomous and se-cure sub-MANET of trusted nodes. The ?gure 1 illustratesthese notions of compact ... compact group is now fully operational, it forms asecure autonomous sub-MANET. . We then consider that thenetwork may be divided into ...
... a full connec-tivity of all the nodes and in a MANET we can not ensurethis. In the same way a distributed ... nodes do not desynchronize. This may be an hard taskin MANET has we can not rely on any time server. To ... proposed an approach that allowsto deal with prede?ned groups in MANET. . Our approachconsist in dividing the MANET according to the logical andorganizational view of the prede?ned groups. ... as much as possible, trusted nodes should deploy a se-cure sub-MANET so as to ensure that they only rely onthemselves to ... thecryptographic mechanisms that alllow us to build the au-tonomous secure sub-MANET as well as to secure the ex-changes between scattered trusted ...
4
December 2006
MUM '06: Proceedings of the 5th international conference on Mobile and ubiquitous multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3, Downloads (12 Months): 6, Downloads (Overall): 1,030
Full text available:
PDF
This paper presents a novel cross-layer design for providing service oriented architecture (SOA) in a mobile ad hoc network (MANET). In the design SOA service discovery is integrated into the ad hoc routing protocol underlying the MANET. We present a prototype implementation based on the optimized link state routing (OLSR) ...
Keywords:
MANET, OLSR, SOA
Keywords:
MANET
Abstract:
... service oriented architecture (SOA) in a mobile ad hoc network (MANET) ). In the design SOA service discovery is integrated into ... is integrated into the ad hoc routing protocol underlying the MANET. . We present a prototype implementation based on the optimized ...
Full Text:
... service oriented architecture (SOA) in a mobile ad hoc network (MANET) ). In the design SOA service discovery is integrated into ... is integrated into the ad hoc routing protocol underlying the MANET. . We present a prototype implementation based on the optimized ... Wireless communication General Terms Algorithms, Design, Experimentation, Performance Keywords SOA, MANET, , OLSR 1. INTRODUCTION This work is motivated by two ... without any static infrastructure support. A commonly used term is MANET (mobile ad hoc network), where the nodes are mobile. [1] ... aim of this study is to provide SOA in a MANET. . The ambition is to fully utilize the benefits offered ...
5
March 2007
SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1, Downloads (12 Months): 2, Downloads (Overall): 153
Full text available:
PDF
As mobile ad hoc networks (MANETs) become more present, new ways of data exchange become feasible. This paper presents the case of multidimensional querying in wireless ad hoc networks. New challenges both in comparison with querying of relational data in MANETs and respective multidimensional querying in infrastructure based wireless networks ...
Keywords:
subsumption, MANET, mOLAP
Keywords:
MANET
Abstract:
<p>As mobile ad hoc networks (MANETs) ) become more present, new ways of data exchange become ... challenges both in comparison with querying of relational data in MANETs and respective multidimensional querying in infrastructure based wireless networks are ...
Full Text:
... Beckerchbecker@zedat.fu-berlin.deFreie Universita t BerlinGarystr. 21, D-14195, GermanyABSTRACTAs mobile ad hoc networks (MANETs) ) become more present,new ways of data exchange become feasible. ... New challenges both in comparison withquerying of relational data in MANETs and respective mul-tidimensional querying in infrastructure based wireless net-works are ... Management]: Data ware-house and repositoryGeneral Terms: Design Management PerformanceKeywords: mOLAP, MANET, , Subsumption1. INTRODUCTIONMultidimensional data has been traditionally used in datawarehouses ... ourknowledge, there is no existing approach dealing with thisdomain in MANETs. . In comparison to multidimensionalquerying in infrastructure networks, several issues ... the presentation of the case of multidimen-sional data exchange in MANETs and the introduction ofa simple and robust query propagation and ...
6
June 2009
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 6, Downloads (Overall): 109
Full text available:
PDF
Clinical documentation systems are commonly used in hospitals to efficiently manage patient data. In areas of crises such as refugee camps, however, physicians are forced to resort to conventional paper-based documentation: The camps lack essential IT infrastructure, computers are regarded unreliable and complicated, and network cabling would restrict the users' ...
Keywords:
MANET, consistency, P2P, carawan
Keywords:
MANET
Full Text:
... June 21-24, 2009, Leipzig, GermanyCopyright 2009 ACM 978-1-60558-569-7/09/06 ...$5.00.KeywordsCarawan, Consistency, MANET, , P2P1. INTRODUCTIONMedical care in areas of environmental crises or ...
7
October 2005
PE-WASUN '05: Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2, Downloads (12 Months): 4, Downloads (Overall): 535
Full text available:
PDF
IPv6 Duplicate address Detection (DAD) process cannot be applicable for MANET without modification either because of the multi-hop problem or DAD time bound. In this paper, we propose a stateless auto-configuration that overcomes multi-hop problem. We solve the multi-hop problem by having some ad-hoc routable nodes doing DAD for the ...
Keywords:
MANET, auto-configuration
Keywords:
MANET
Abstract:
... IPv6 Duplicate address Detection (DAD) process cannot be applicable for MANET without modification either because of the multi-hop problem or DAD ...
References:
C.E. Perkins, J.T. Malinen, R. Wakikawa, E.M. Belding-Royer, and Y. Sun, IP Address Autoconfiguration for Ad Hoc Networks, draft-ietf-manet-autoconf-01.txt, IETF MANET Working Group, 2001.
Full Text:
... IPv6 Duplicate address Detection (DAD) process cannot be applicable for MANET without modification either because of the multi-hop problem or DAD ... and Design ? wireless communication. General Terms Performance, Standardization. Keywords MANET, , Auto-configuration. 1. INTRODUCTION Researches on IPv6 auto-configuration proceed in ... do not operate well in wireless single network, so called MANET, , in which the nodes are indirectly linked each other ... round trip bound time between two nodes. These characteristics prevent MANET from rapid auto-configuration or configuring itself. Even though we can ... configuring itself. Even though we can apply DHCP scheme in MANET, , since any node in MANET can move freely in, out of, and between MANET, , DHCP server can?t allocate addresses all the time. We ... server can?t allocate addresses all the time. We investigate a MANET topology that all the nodes in MANET want to connect to the Internet through a special node ... the Internet through Internet Gateways. Researches on IPv6 auto-configuration in MANET proceed in two ways; the stateless approach like as [1], ... Address Detection (DAD) for Link-local Addresses1 In our solution, a MANET node needs two addresses, a link-local address and a global ... and the global address is used for multi-hop communication in MANET and global communication to the Internet. The DAD for link-local ... neighbors must ignore the Neighbor Advertisement. Thus a node in MANET can be convinced that all nodes in its one-hop area ... address each other. 2.1 Ad-hoc Node Advertisements All nodes in MANET broadcast Ad-hoc Node Advertisement messages periodically or non-periodically. Ad-hoc Node ...
... of hop counts from the Internet Gateway. A node in MANET can obtain the Internet Gateway?s Router Advertisements from, if possible, ... The Internet Gateway of ad-hoc network has a table called MANET DAD Table. The MANET ... DAD Table includes global addresses of all nodes in a MANET and their associated lifetime. Internet Gateway collects this table information ... the Neighbor Solicitation is unique or not by scanning its MANET DAD table. Since this process looks similar to normal IPv6 ... for DAD, it checks whether an IP address in its MANET DAD table matches the target address in the Neighbor Solicitation. ... the Neighbor Solicitation. If there is no same address in MANET DAD table, Internet Gateway adds an entry with the requested ... Gateway adds an entry with the requested address information in MANET DAD table and does not send Neighbor Advertisement. If there ... there is a same address with the target address in MANET DAD table, the Internet Gateway sends Neighbor Advertisement using the ... by another node or not. IPv6 Neighbor Unreachability Detection or MANET routing protocol may be used to test whether other nodes ... by any other nodes, it deletes the corresponding entry in MANET DAD table. 4. Conclusions We have presented the method for ... and Y. Sun, IP Address Autoconfiguration for Ad Hoc Networks, draft-ietf-manet- -autoconf-01.txt, IETF MANET Working Group, 2001 [2] N. H. Vaidya, Weak duplicate address ...
8
June 2009
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 9, Downloads (Overall): 153
Full text available:
PDF
The integration of MANET into external networks is achieved by Internet Gateways. These Gateways are responsible for propagating the information necessary to make mobile nodes autoconfigure. This information can be generated on demand (reactively), periodically (proactively) or in a hybrid way. When a hybrid gateway discovery is used, the Gateway ...
Keywords:
MANET, adaptation, gateway discovery
Title:
Study on the need for adaptive gateway discovery in MANETs
Keywords:
MANET
Abstract:
<p>The integration of MANET into external networks is achieved by Internet Gateways. These Gateways ...
References:
A. Triviño-Cabrera, B. Ruiz Villalobos, E. Casilari, "Adaptive Gateway Discovery in MANETs", Proc. of ASWN 2007 --- Applications and Services in Wireless Networks, pp. 9--14, May 2007.
T. C. Huang, S. Y. Wu, "An Adaptive Gateway Discovery Algorithm for the Integrated Network of Internet and MANET", Lecture Notes in Computer Sciences, vol. 3619, pp. 911--920, 2005.
S. Corson, J. Macker, "Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations", IETF RFC 2501, January 1999
Full Text:
... in MANETSStudy on the Need for Adaptive Gateway Discovery in MANETs A. Trivi o, B. Ruiz-Villalobos, E. Casilari Dpto. Tecnolog a Electr nica Universidad ...
9
November 2011
PE-WASUN '11: Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 2, Downloads (Overall): 95
Full text available:
PDF
We develop a loss model for multi-hop wireless networks based on IEEE 802.11 MAC. Given a multi-hop network topology, connection demands and routes, we model the working of 802.11 MAC in DCF mode to find good approximations to average MAC layer losses, service times and carried load. The model is ...
Keywords:
manets, loss models
Keywords:
manets
10
June 2008
NOTERE '08: Proceedings of the 8th international conference on New technologies in distributed systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 14, Downloads (Overall): 242
Full text available:
Pdf
Mobile ad hoc networks offer new challenges for distributed applications designers, such as mobile and lightweight terminals, or the lack of a reliable network infrastructure. In this article we focus on the problem of data sharing in MANETs and we propose a peer to peer distributed shared memory for mobile ...
Keywords:
DSM, MANET, consistency, replication
Keywords:
MANET
Abstract:
... article we focus on the problem of data sharing in MANETs and we propose a peer to peer distributed shared memory ...
References:
S. Corson and J. Macker. Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations, 1999.
Full Text:
... June 23-27, 2008, Lyon, France.Copyright 2008 ACM 978-1-59593-937-1/08/0003 ...$5.00.NETworks ou MANETs) ) ou` les terminaux mobiles consti-tuent un re seau entre eux, ... e voque es plus haut ne prennent pas encompte les caracte ristiques des MANETs telles que leur to-pologie changeante et les limitations en ressources ... ensuite les diffe rentes solutions existantes permettantle partage de donne es sur MANET et verrons leurs avantageset leurs inconve nients. Dans la section 4, ... lestravaux qu?il nous reste a` re aliser.2. R SEAU MOBILE AD HOCUn MANET [4] est un re seau constitue spontane ment en-tre des terminaux mobiles ...
... stock-age sont plus e leve es. Ce n?est pas le cas des MANETs : ilest donc ne cessaire de de velopper de nouveaux algorithmesprenant en ... protocoles de routage prenant en compte la topolo-gie dynamique des MANETs, , tels que OLSR [3] et AODV[10], ont e te spe cifie s ... partage es re partie [11]ne prenant pas en compte les spe cificite s des MANETs, , onte te propose s par le passe . Des syste`mes de partages ...
... (olsr), 2003.[4] S. Corson and J. Macker. Mobile ad hoc networking(manet) ): Routing protocol performance issues andevaluation considerations, 1999.[5] H.D. Ha ...
11
October 2009
PM2HW2N '09: Proceedings of the 4th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 7, Downloads (Overall): 140
Full text available:
PDF
The broadcasting protocol can dramatically affect the performance of Mobile Ad Hoc Networks (MANETs). Proper use of a counter-based scheme can reduce the number of rebroadcasts and hence reduce the chance of contention and collision among neighboring nodes. While most previous studies have used a fixed counter-based threshold value irrespective ...
Keywords:
broadcast, counter-based, manets
Title:
Dynamic counter-based broadcast in MANETs
Keywords:
manets
Abstract:
... can dramatically affect the performance of Mobile Ad Hoc Networks (MANETs) ). Proper use of a counter-based scheme can reduce the ...
References:
Al-Humoud, S. O., Mackenzie, L. M., Ould-Khaoua, M.,&Abdulai, J. M. 2008. RAD Analysis of Adjusted Counter-Based Broadcast in MANETs. In The 24th UK Performance Engineering Workshop, (UKPEW'08). Imperial College London, UK.
Wei, L.,&Jie, W. 2003. A cluster-based backbone infrastructure for broadcasting in MANETs. In The International Parallel and Distributed Processing Symposium. Nice, France, 8 pp.
Full Text:
Microsoft Word - pm2hw31a-al-humoud.docDynamic Counter-Based Broadcast in MANETs Sarah O. Al-Humoud Lewis M. Mackenzie Wim Vanderbauwhede Department of ... can dramatically affect the performance of Mobile Ad Hoc Networks (MANETs) ). Proper use of a counter-based scheme can reduce the ... Architecture and Design]: Wireless communication. General Terms Measurement, Performance. Keywords MANETs, , Broadcast, Counter-Based. 1. INTRODUCTION A MANET (Mobile Ad hoc NETwork) is an autonomous system consisting of ... naming, addressing, and sometimes helping in multicasting [15]. In a MANET in particular, due to node mobility, broadcasting is expected to ...
... broadcast schemes with fixed threshold value. First, the topology of MANETs is often random and dynamic with varying degree of node ...
... has been used by many researchers for performance evaluation in MANETs research [3, 4, 8, 15]. The present study investigates the ...
... performance of the proposed Dynamic Counter-Based (DCB) broadcasting scheme in MANETs. . We investigated our algorithm under three different metrics: Saved ... Abdulai, J.M. 2008. RAD Analysis of Adjusted Counter-Based Broadcast in MANETs. . In The 24th UK Performance Engineering Workshop, (UKPEW'08). Imperial ...
... Jie, W. 2003. A cluster-based backbone infrastructure for broadcasting in MANETs. . In The International Parallel and Distributed Processing Symposium. Nice, ...
12
October 2008
WebMedia '08: Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 14, Downloads (Overall): 46
Full text available:
PDF
In this paper we present a performance study of BitTorrent for sharing a large multimedia file. The scenario we consider represents a classroom environment where participant's mobile devices form a MANET. The objective is to evaluate performance impacts caused by variation of BitTorrent's chunck size and nodes mobility. The simulation ...
Keywords:
performance, MANET, BitTorrent, P2P
Title:
BitTorrent sobre MANETs em áreas reduzidas: mobilidade, tamanho de peça e seus impactos
Keywords:
MANET
Abstract:
... represents a classroom environment where participant's mobile devices form a MANET. . The objective is to evaluate performance impacts caused by ...
Full Text:
rtoverhead_csize.epsBitTorrent sobre MANETs em reas Reduzidas:Mobilidade, Tamanho de Pe a e seus ImpactosNivia Cruz ... ExperimentationKeywordsP2P, BitTorrent, Performance, MANET1. INTRODU OAs redes ad hoc mo veis ou MANETs sa?o sistemasauto?nomos que podem ser empregados em cena -rios onde ha ... Exemplos in-cluem cena rios de resgate, operac o?es militares eaplicativos groupware. As MANETs possuem umanatureza P2P (Peer-to-Peer ou Par-a-Par), umavez que os no s ... tempo. As aplicac o?es P2P sa?o asmais adequadas no ambiente de MANET devidoa` maior flexibilidade na recuperac a?o de falhas doque aplicac o?es tradicionais ... [3] identificaram problemas ao se utilizar oprotocolo P2P Chord sobre MANETs devido a` difi-culdade deste em lidar com mudanc as de topologiada ...
... a seremexplorados para a melhoria do desempenho do Bit-Totrrent sobre MANETs. .3. BITTORRENT E MANETSAtualmente o BitTorrent [2] e um dos ... download em caso de particiona-mento na rede seria severamente prejudicada.Uma MANET pode tambe m contar com diversosprotocolos de roteamento capazes de lidar ... o no passa a ser somente um ro-teador para a MANET. . Objetivou-se com isso evi-tar que os pares esperassem indefinidamente ...
... nastransfere?ncias.5. CONCLUS ESEste artigo avaliou o desempenho do protocolo Bit-Torrent sobre MANETs em a reas reduzidas. Consi-derou-se o protocolo pro -ativo OLSR e o ... uma menor carga nas transfere?ncias. Otimi-zac o?es para o BitTorrent sobre MANETs devembuscar, portanto, uma reduc a?o no nu mero de co-nexo?es. Para trabalhos ... trabalhos futuros, pretende-se imple-mentar uma integrac a?o cross-layer eficiente entreBitTorrent e MANETs. . Assim, devem ser estuda-dos me todos de comunicac a?o direta entre ...
13
May 2008
MobiHoc '08: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2, Downloads (12 Months): 12, Downloads (Overall): 377
Full text available:
PDF
We propose a synthetic trace generator that, although based on a simple mobility model, generates traces with statistical properties (like inter-contact time and contact duration) resembling those of well-known real traces. The proposed model is based on a waypoint scheme, with some modifications: the introduction of two categories of nodes, ...
Keywords:
manet, mobility models
Keywords:
manet
Full Text:
... [Performanceof systems]: Modeling techniquesGeneral Terms: Algorithms, Human Factors.Keywords: Mobility models, MANET. .1. INTRODUCTIONThe increasingly capillary di?usion of portable wireless de-vices has ...
14
September 2005
VANET '05: Proceedings of the 2nd ACM international workshop on Vehicular ad hoc networks
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 5, Downloads (12 Months): 26, Downloads (Overall): 1,269
Full text available:
PDF
There are several technologies to connect vehicles to networks and the Internet such as Network Mobility~(NEMO) and Mobile Ad-hoc Networks (MANET). We investigate the use of both NEMO and MANET for efficient communication in vehicles. A Mobile Gateway manages both the NEMO connectivity and the MANET connectivity and switches path ...
Keywords:
MANET, NEMO, vehicle communication
Title:
Design of vehicle network: mobile gateway for MANET and NEMO converged communication
Keywords:
MANET
Abstract:
... the Internet such as Network Mobility~(NEMO) and Mobile Ad-hoc Networks (MANET) ). We investigate the use of both NEMO and MANET for efficient communication in vehicles. A Mobile Gateway manages both ... A Mobile Gateway manages both the NEMO connectivity and the MANET connectivity and switches path to a destination according to application ...
Full Text:
... the Internet such as Network Mobility (NEMO)and Mobile Ad-hoc Networks (MANET) ). We investigate theuse of both NEMO and MANET for e cient communicationin vehicles. A Mobile Gateway manages both the ... vehicles. A Mobile Gateway manages both the NEMOconnectivity and the MANET connectivity and switches pathto a destination according to application and ... vehicle networks.Categories and Subject Descriptors: C.2.2Network Op-erations:Network managementGeneral Terms: MANAGEMENTKeywords: MANET, , NEMO, Vehicle Communication1. INTRODUCTIONA vehicle can utilize various communication ... the NEMO basic sup-port protocol [1] and to be a MANET Router supporting aMANET routing protocol.Copyright is held by the author/owner.VANET?05, ... technology.In addition, the mobile gateway is at all times runninga MANET routing protocol at a MANET interface so thatit can acquire routes of adjacent vehicles (denoted ... Internet GatewayMNN: Mobile Network NodeHAHA MG MG MGMG: Mobile GatewayNon MANET PathFigure 2: Mobile GatewaysWhen an in-vehicle node starts to communicate ...
... the wireless WAN, MAN, or LAN interfaces. The secondpath has MANET paths between an internet gateway anda mobile gateway. However, the ... of its mo-bile network pre x with other vehicles by the MANET rout-ing protocol.A mobile gateway always maintains multiple paths to theInternet ... e ciency of a mobile gateway in termsof scalability of the MANET routing protocol and of thebandwidth for vehicle-vehicle communication.The OLSR routing ... the integration of the NEMO basic sup-port protocol and a MANET by the proposed mobile gate-ways enhancement to the NEMO basic ... gateway establishes ad-hoc con-nectivity with other mobile gateways by a MANET routingprotocol and utilizes an additional route only when it is ...
15
August 2014
AIRBORNE '14: Proceedings of the third ACM workshop on Airborne networks and communications
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6, Downloads (12 Months): 31, Downloads (Overall): 152
Full text available:
PDF
In this paper, we compare the proactive MANET routing schemes of OLSR and OSPF-MDR via high-fidelity simulation, and consider their suitability for large-scale airborne networks. A successful MANET routing scheme must be bandwidth efficient and robust to frequent topology changes. To assess the two protocols, we simulate them in networks ...
Keywords:
olsr, ospf-mdr, manet
Keywords:
manet
Abstract:
<p>In this paper, we compare the proactive MANET routing schemes of OLSR and OSPF-MDR via high-fidelity simulation, and ... and consider their suitability for large-scale airborne networks. A successful MANET routing scheme must be bandwidth efficient and robust to frequent ...
References:
R. Ogier and P. Spagnolo, "Mobile ad hoc network (manet) extension of ospf using connected dominating set (cds) ooding," IETF RFC 5614, August, 2009.
B.-N. Cheng and S. Moore, "A comparison of manet routing protocols on airborne tactical networks," in MILCOM 2012. IEEE, 2012, pp. 1--6.
Full Text:
... veytser, bcheng, scott.moore, arad}@ll.mit.eduABSTRACTIn this paper, we compare the proactive MANET routingschemes of OLSR and OSPF-MDR via high-fidelity simula-tion, and consider ... simula-tion, and consider their suitability for large-scale airbornenetworks. A successful MANET routing scheme must bebandwidth efficient and robust to frequent topology ... ar-chitecture is commonly referred to as a mobile ad-hoc net-work (MANET) ), where wireless nodes must be capable ofdynamically forming multi-hop ... there has been significant researchinto enabling routing and connectivity for MANETs, , there isstill a lack of understanding regarding the behavior ... solutions for larger-scale networks. In thispaper, we evaluate two proactive MANET routing schemes,Optimized Link State Routing (OLSR) [2] and Open Short-est ... State Routing (OLSR) [2] and Open Short-est Path First with MANET Extensions (OSPF-MDR) [3],via high-fidelity simulation, and consider their suitability forlarge-scale ... andunstable links due to mobile nodes. A successful routingscheme for MANETs must address these limitations by beingbandwidth efficient, and being robust ... the past two-decades, there have been many pro-posed protocols for MANET routing, with these approachesbeing either ?proactive? or ?reactive? [4]. In ... considered to have supe-rior performance [6, 7]. OSPF-MDR is a MANET exten-sion to the OSPF routing protocol, which is widely used ...
... thesecharacteristics, fixed infrastructure networks are infeasiblefor the airborne domain, and MANET is the most promis-ing solution. This evaluation of the two ... and offer suggestions for a next stepforward in designing appropriate MANET routing schemesfor large-scale networks.2. OVERVIEW OF OLSR AND OSPF-MDRIn this ...
... where the high speedand mobility of nodes necessitates a multi-hop MANET so-lution in order to interconnect all of the aircraft. For ... aircraft. For a rout-ing protocol to be successful in a MANET environment, itmust be bandwidth efficient and resilient to frequent topol-ogy ...
... paper, we compared and evaluated OLSR andOSPF-MDR for large-scale airborne MANETs. . We ran ahigh-fidelity simulation of the two protocols using ... 3626, 2003.[3] R. Ogier and P. Spagnolo, ?Mobile ad hoc network(manet) ) extension of ospf using connected dominatingset (cds) flooding,? IETF ...
16
February 2011
ACM Transactions on Autonomous and Adaptive Systems (TAAS): Volume 6 Issue 1, February 2011
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1, Downloads (12 Months): 12, Downloads (Overall): 399
Full text available:
PDF
Anycasting is a network service that selects the best one of service providers in an anycast group as a destination. While anycasting offers better service flexibility in mobile ad hoc networks (MANETs), it also incurs new problems. In MANETs, every node can move arbitrarily, and the routes from mobile nodes ...
Keywords:
k-anycast, Anycasting, MANET
Keywords:
MANET
Abstract:
... anycasting offers better service flexibility in mobile ad hoc networks (MANETs) ), it also incurs new problems. In MANETs, , every node can move arbitrarily, and the routes from ... their service providers would vary. Therefore, anycast service discovery in MANETs usually relies on network-layer message broadcasting, which leads to large ... leads to large traffic overhead for the scarce bandwidth of MANETs. . In this work, we present a traffic-control scheme for ... we present a traffic-control scheme for anycast service discovery in MANETs. . Our scheme can reduce the volume of query messages ... results demonstrate that our scheme is efficient and feasible for MANETs.
Full Text:
... anycasting offers better service flexibility in mobile ad hoc networks (MANETs) ), it also incursnew problems. In MANETs, , every node can move arbitrarily, and the routes from ... to theirservice providers would vary. Therefore, anycast service discovery in MANETs usually relies on network-layer message broadcasting, which leads to large ... leads to large traffic overhead for the scarce bandwidth of MANETs. . Inthis work, we present a traffic-control scheme for anycast ... we present a traffic-control scheme for anycast service discovery in MANETs. . Our scheme canreduce the volume of query messages and ... the anycast address.To search for the closest service provider in MANETs, , broadcast transmission isa favorable technique to serve the purpose ... request and reply packets, we propose a novel anycastingscheme for MANETs. . The client receives only one response message from its ... scheme can reducethe control overhead and is suitable for large-scale MANETs, , as demonstrated by ourexperimental results.The rest of this article ...
... andvirtual backbone are required to organize the nodes in a MANET. . Thus, we also brieflydescribe their construction procedures here.We adopt ...
... using GloMoSim [Zeng et al. 1998]. We randomly generate mul-tiple MANET topologies with different numbers of service providers. Each simulationis repeated ...
... division scheme.4. CONCLUSIONSThis work presents an efficient anycast scheme in MANETs. . We use the techniques ofnode clustering and virtual backbone ... and virtual backbone to construct an anycast tree in a MANET. . Withthe anycast tree, we propose a control-gate algorithm to ... our scheme from node clustering toprovide k-anycast service in a MANET. . In Figure 7, there are 30 nodes and their ...
17
June 2016
MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 9, Downloads (12 Months): 69, Downloads (Overall): 69
Full text available:
PDF
This paper proposes decentralized disaster recovery networks using beacon stuffing for simplifying the network establishment (DRN). It is designed to leverage wireless connections of mobile devices in disaster areas without additional hardware such as wireless network interface cards (WNICs). The simulation results show the feasibility of the proposed method for ...
Keywords:
manet, disaster recovery
Keywords:
manet
18
April 2006
SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 8, Downloads (Overall): 474
Full text available:
PDF
Connecting to the Internet through the nodes of an ad-hoc network is very challenging and necessary. We studied a MANET topology in which all nodes in this MANET need to be connected to the Internet through a special node called the Internet Gateway. Traditional IPv6 Duplicate address Detection(DAD) process cannot ...
Keywords:
auto-configuration, MANET
Keywords:
MANET
Abstract:
... ad-hoc network is very challenging and necessary. We studied a MANET topology in which all nodes in this MANET need to be connected to the Internet through a special ...
References:
S. Corson and J. Macker, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC 2501, IETF, 1999.
Full Text:
... ad-hoc network is very challenging and necessary. We studied a MANET topology in which all nodes in this MANET need to be connected to the Internet through a special ... Architecture and Design ? wireless communication. General Terms Standardization. Keywords MANET, , Auto-configuration. 1. INTRODUCTION Mobile ad-hoc networks(MANET) ) are envisioned to have dynamic, sometimes rapidly changing, random, ... the network. Thus, Auto-configuration is a desirable goal in implementing MANET[ ... [2]. In IPv6, stateless address auto-configuration[9] can be used in MANET. . This mechanism allows a node to pick a tentative ... the duplicate addresses go undetected [5]. Another challenging issue in MANET is connecting to the Internet through the nodes of an ... an ad-hoc network [10]. In this paper, we investigate a MANET topology that all the nodes in MANET want to connect to the Internet through a special node ... and we propose a new IPv6 address auto-configuration mechanism in MANET. . Our solution uses a stateful approach, but the solution ... of this standard. DAD based on the stateless auto-configuration in MANET is presented in [2], in which addresses are randomly selected. ...
... merging of partitions. 3. NEW STATEFUL IPv6 ADDRESS AUTO-CONFIGURATION IN MANET 3.1 Basic Idea Our proposal enables a node in MANET to auto-configure a unique IPv6 global address. The proposed approach ... be integrated with many different routing protocols. We consider a MANET topology in which all the nodes in MANET want to connect to the Internet through a special node ... The Internet Gateway acts as a default router for the MANET. . Internet Gateway allocates the addresses to other ad-hoc nodes ... Hence, a new node entering the network chooses a reachable MANET node that can perform an address allocation for itself. So, ...
... [7] S. Corson and J. Macker, Mobile Ad hoc Networking (MANET) ): Routing Protocol Performance Issues and Evaluation Considerations, RFC 2501, ...
19
November 2010
AINTEC '10: Proceedings of the Sixth Asian Internet Engineering Conference
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2, Downloads (12 Months): 13, Downloads (Overall): 426
Full text available:
PDF
Wireless Mobile Ad-hoc Networks (MANETs) are characterized by frequent and unpredictable disconnections, due to mobility, interference, power management or any other issues. Such disconnections result in the failure of MANET routing protocols that are designed to establish end-to-end paths between the communicating nodes. This work focuses on enhancing the performance ...
Keywords:
MANET, OLSR, DTN
Keywords:
MANET
Abstract:
<p>Wireless Mobile Ad-hoc Networks (MANETs) ) are characterized by frequent and unpredictable disconnections, due to ... any other issues. Such disconnections result in the failure of MANET routing protocols that are designed to establish end-to-end paths between ... communicating nodes.</p> <p>This work focuses on enhancing the performance of MANETs by integrating MANET routing using Optimized Link State Routing (OLSR) and Delay Tolerant ...
References:
Ott, J., Kutscher, D., and Dwertmann, C. 2006. Integrating DTN and MANET Routing. In SIGCOMM workshop on Challenged networks (New York, NY, USA: ACM, 2006), 221--228.
Yang G., Chen, L., Sun, T., Zhou, B. and Gerla, M. 2006. Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs. IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), 296--305.
Full Text:
... Institute of Technology, Thailand atunpan@ait.asia ABSTRACT Wireless Mobile Ad-hoc Networks (MANETs) ) are characterized by frequent and unpredictable disconnections, due to ... any other issues. Such disconnections result in the failure of MANET routing protocols that are designed to establish end-to-end paths between ... communicating nodes. This work focuses on enhancing the performance of MANETs by integrating MANET routing using Optimized Link State Routing (OLSR) and Delay Tolerant ... Descriptors C.2.2 [Network Protocols]: Routing protocols General Terms Algorithms Keywords MANET, , OLSR, DTN. 1. INTRODUCTION In the recent years, there ... gained popularity due to its self-organizing, self-addressing and self-routing nature. MANETs find wide applications in emergency rescue operations and vehicular communications. ... communication. This limitation has been overcome by integrating DTN and MANET routing using reactive routing protocol AODV [2]. The work accounts ... use Optimized Link State Routing (OLSR) [3] as the underlying MANET routing protocol due to its proactive nature and optimized flooding ... can easily adapt to topology changes in the underlying OLSR MANET. . We can further account for a flexible and scalable ...
... transfer. We demonstrate that with the use of SMON, any MANET node is able to route messages efficiently using OLSR protocol ... traditional OLSR. As OLSR is a proactive protocol, changes in MANET topology will be automatically reflected at the upper SMON overlay ... clients with very limited processing capabilities that allow only OLSR MANET multi-hop routing but do not allow a full DTN stack ... stack to be installed. They generally show up in OLSR MANET routing table but are not initially aware of any DTN ...
... are always available and updated periodically to reflect the changing MANET topology. The DTS-OLSR nodes appear as a subset of MANET nodes. SMON periodically inspects the routing table at each participating ... of our new super node based routing protocol for a MANET with heterogeneous nodes. We name our DTN routing protocol, Delay ...
... Hoc Network. 4.1 Empirical Experiment Setup We use a linear MANET topology consisting of five OLSR nodes. Each node is an ... when all the links are up (i.e. a single OLSR MANET partition with no disruptions). All the 5 nodes have the ... deviation (1-SD) on the top of each bar. When the MANET has no disruptions, it is clearly evident that the performances ...
... 10 trials) Third, we investigate the case where the OLSR MANET experiences a short disruption. All the nodes are DTS-OLSR nodes. ... an FTP session. When a short disruption occurs, the original MANET is separated into 2 partitions. After we resume the link, ... hops 4 hopsFTP vs. DTN Performance in Single-Partition, Multi-hop OLSR MANET( (Average time in seconds to transfer a 5MB bulk file ... (Passive) DTN (DTS-OLSR)Figure 6. FTP vs. DTS-OLSR Performance in Single-Partition MANET (no disruptions). Lower is better. N=10 trials 6135.82 37.0039.1742.96 43.84 ... Discussion We compare DTS-OLSR with those network deploying DTN on MANET without underlying MANET network layer protocol. A DTN node exchanges bundles with its ...
... able to discover multi-hop DTNs. However, DTLSR is not for MANET as it focusses on networks which are more predicatble with ... scheme. 5. RELATED WORK Most of the DTN efforts for MANETs focus on using controlled or uncontrolled flooding to deliver bundles ... The concept of overlay to deliver messages in DTN on MANET has also been explored by Yang et. al. [11]. They ... participate in an overlay that provides disruption-tolerant storage services in MANET. . However, they tend to create several replications of the ... a novel approach of enhancing the performance of OLSR based MANET routing by integrating DTN and OLSR. The approach comprised of ... J., Kutscher, D., and Dwertmann, C. 2006. Integrating DTN and MANET Routing. In SIGCOMM workshop on Challenged networks (New York, NY, ...
... 2006. Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs. . IEEE International Conference on Mobile Adhoc and Sensor Systems ...
20
October 2011
SPLASH '11 Workshops: Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE! 2011, AOOPES'11, NEAT'11, & VMIL'11
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3, Downloads (12 Months): 6, Downloads (Overall): 57
Full text available:
PDF
The purpose of this demo is to showcase the AmbientTalk programming language. AmbientTalk is intended to be a "scripting language for mobile phones". It's a dynamic, object-oriented, distributed programming language with a focus on deployment in so-called mobile ad hoc networks - networks composed of mobile devices that communicate peer-to-peer ...
Keywords:
events, manet, actor, asynchrony
Keywords:
manet
Full Text:
... Subject Descriptors D.3.2 [ProgrammingLanguages]: LanguageClassifications?Object-oriented lan-guagesGeneral Terms Design, LanguagesKeywords Actor, MANET, , Asynchrony, Events1. IntroductionAmbientTalk is a modern (born 2006) actor-based ...
Result page:
1
2
3
4
5
6
7
8
9
10
>>