Integration of On-Demand Service and Route Discovery in Mobile Ad Hoc Networks


Book Description

This thesis studies the idea of adding on-demand service discovery to on-demand routing protocols for mobile ad hoc wireless networks. When on-demand service discovery is used, the service discovery process is initiated only when a node requires access to a service. The address of the service provider is returned to the initiator of the service discovery process. However, the initiator still has to discover a route to the service provider. By integrating service and route discovery, both the identity of the node providing the service and the route to the service are discovered together. This approach differs from related work on service discovery in ad hoc networks which perform service discovery at the application layer and do not discover a route to the service. A combined process for service provider identification and discovery of a route to this provider saves additional message transmissions and reduces the delay incurred if the two processes were done separately at the application and network layers respectively. The idea of adding on-demand service discovery to on-demand routing protocols for mobile ad hoc networks was earlier proposed in an Internet-Draft and simulated using Ad Hoc On-Demand Distance Vector Protocol (AODV) as the routing protocol. In this thesis, we propose modifications and extensions to the Internet-Draft. We discuss solutions to the problem of notifying the nodes in the network when a service provider terminates its service. We also present a modified simulation of the integration of service discovery with AODV (we discovered a number of bugs in the original simulation). We then present a simulation of the integration of service discovery with the Dynamic Source Routing Protocol (DSR). Lastly, we compare the performance of service discovery with AODV and DSR. We find that integrating service discovery with AODV gives better results in terms of service route acquisition latency. In terms of path length and the ratio of the path length to.




A Study of Black Hole Attack Solutions


Book Description

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. - Elaborates on the basics of wireless networks, MANETs - Explains the significance behind the need of wireless networks and MANET security - Understand MANET routing protocols, namely the ADOV method




Mobile Ad Hoc Networking


Book Description

From physical issues up to applications aspects, Mobile Ad Hoc Networking comprehensively covers all areas of the technology, including protocols and models, with an emphasis on the most current research and development in the rapidly growing area of ad hoc networks. All material has been carefully screened for quality and relevance and reviewed by the most renowned and involved experts in the field. Explores the most recent research and development in the rapidly growing area of ad hoc networks. Includes coverage of ad hoc networking trends, possible architectures, and the advantages/limits for future commercial, social, and educational applications. Ad hoc networks have been an intense area of research and development but many products that fully utilize this technology are only now being widely deployed throughout the world.







Computer And Network Technology - Proceedings Of The International Conference On Iccnt 2009


Book Description

ICCNT is the main annual computer and network research conference in Chennai that presents cutting edge research work. It will act as a platform for scientists, scholars, engineers and students from universities all around the world to present ongoing research and hence foster better research relations between universities and the computer and networking industry.




The Handbook of Ad Hoc Wireless Networks


Book Description

A relative newcomer to the field of wireless communications, ad hoc networking is growing quickly, both in its importance and its applications. With rapid advances in hardware, software, and protocols, ad hoc networks are now coming of age, and the time has come to bring together into one reference their principles, technologies, and techniques. The Handbook of Ad Hoc Wireless Networks does exactly that. Experts from around the world have joined forces to create the definitive reference for the field. From the basic concepts, techniques, systems, and protocols of wireless communication to the particulars of ad hoc network routing methods, power, connections, traffic management, and security, this handbook covers virtually every aspect of ad hoc wireless networking. It includes a section that explores several routing methods and protocols directly related to implementing ad hoc networks in a variety of applications. The benefits of ad hoc wireless networks are many, but several challenges remain. Organized for easy reference, The Handbook of Ad Hoc Wireless Networks is your opportunity to gain quick familiarity with the state of the art, have at your disposal the only complete reference on the subject available, and prepare to meet the technological and implementation challenges you'll encounter in practice.







Communication, Management and Information Technology


Book Description

Communication, Management and Information Technology contains the contributions presented at the International Conference on Communication, Management and Information Technology (ICCMIT 2016, Cosenza, Italy, 26-29 April 2016, organized by the Universal Society of Applied Research (USAR). The book aims at researchers, scientists, engineers, and scholar students interested or involved in Computer Science and Systems, Communication, and Management.