ROUTING ISSUES IN MANETs


Book Description

This book gives a comprehensive overview of the challenges and possible solutions in Mobile Adhoc Networks with particular reference to Routing and other network topologies in order to improve the efficiency. When a routing protocol for MANET Networks (mobile and ad hoc networks) does a route discovery, it does not discover the shortest route but the route through which the route request flood traveled faster. In addition, since nodes are moving, a route that was the shortest one at discovery time might stop being so in quite a short period of time. This causes, not only a much bigger end-to-end delay, but also more collisions and faster power consumption. In order to avoid all the performance loss due to these problems, this paper develops a technique to periodically discover shortcuts to the active routes that can be used with any destination vector routing protocol. It also shows how the same mechanism can be used as a bidirectional route recovery mechanism. We consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV in detail and develop a security mechanism to protect its routing information. We also briefly discuss whether our techniques would also be applicable to other similar routing protocols and about how a key management scheme could be used in conjunction with the solution that we provide.




Performance Evaluation of Complex Systems: Techniques and Tools


Book Description

This book presents the tutorial lectures given by leading experts in the area at the IFIP WG 7.3 International Symposium on Computer Modeling, Measurement and Evaluation, Performance 2002, held in Rome, Italy in September 2002. The survey papers presented are devoted to theoretical and methodological advances in performance and reliability evaluation as well as new perspectives in the major application fields. Modeling and verification issues, solution methods, workload characterization, and benchmarking are addressed from the methodological point of view. Among the applications dealt with are hardware and software architectures, wired and wireless networks, grid environments, Web services, and real-time voice and video processing. This book is intended to serve as a state-of-the-art survey and reference for students, scientists, and engineers active in the area of performance and reliability evaluation.




Mobile Ad Hoc Networks


Book Description

Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, this book examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Leading researchers, industry professionals, and academics provide an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service.




Ad Hoc Mobile Wireless Networks


Book Description

The authoritative guide to the state of the art in ad hoc wireless networking. Reflects the field's latest breakthroughs Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much more Includes a complete narration of prototype implementation with communication performance results from practical field trials Introduces key applications for home, business, auto, and defense "Ad hoc" wireless networks eliminate the complexities of infrastructure setup and administration, enabling devices to create and join networks "on the fly"-anywhere, anytime, for virtually any application. The field is rapidly coming of age, reflecting powerful advances in protocols, systems, and real-world implementation experience. In Ad Hoc Mobile Wireless Networks, one of the field's leading researchers brings together these advances in a single consolidated and comprehensive archive. C.K. Toh covers all this, and more: Key challenges: device heterogeneity, diverse traffic profiles, mobility, and power conservation Routing protocols for ad hoc networks, including Associativity Based Routing (ABR) and other IETF MANET protocols Real-world implementation issues-including a complete prototype implementation Ad hoc wireless network performance: results obtained from the latest field trials Leading approaches to service discovery Addressing TCP over an ad hoc wireless network environment Support for multicast communications The role of Bluetooth and WAP Ad Hoc Mobile Wireless Networks introduces detailed application scenarios ranging from home and car to office and battlefield. C.K. Toh also introduces several of the field's leading projects, from Motorola's PIANO platform to UC Berkeley's "Smart Dust." Whether you're a researcher, scientist, implementer, consultant, technical manager, CTO, or student, you won't find a more authoritative and comprehensive guide to the new state of the art in ad hoc networking.




Design issues of routing protocols for MANETs


Book Description

This book provides about Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. A variety of routing protocols have been proposed and several of them have been extensively simulated or implemented as well. In this book, we compare and evaluate the performance of two types of on demand routing protocols- Ad-hoc On-demand Distance Vector (AODV) routing protocol, which is unipath and Adhoc On-demand Multipath Distance Vector (AOMDV) routing protocol. In this paper we note that on comparing the performance of AODV and AOMDV, AOMDV incurs more routing overhead and packet delay than AODV but it had a better efficiency when it comes to number of packets dropped and packet delivery. This also describes how to use the PUMA for sending message in the routing applications and to give maximum efficiency.




Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks


Book Description

Vehicular traffic congestion and accidents remain universal issues in today’s world. Due to the continued growth in the use of vehicles, optimizing traffic management operations is an immense challenge. To reduce the number of traffic accidents, improve the performance of transportation systems, enhance road safety, and protect the environment, vehicular ad-hoc networks have been introduced. Current developments in wireless communication, computing paradigms, big data, and cloud computing enable the enhancement of these networks, equipped with wireless communication capabilities and high-performance processing tools. Cloud-Based Big Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference source that provides vital research on cloud and data analytic applications in intelligent transportation systems. While highlighting topics such as location routing, accident detection, and data warehousing, this publication addresses future challenges in vehicular ad-hoc networks and presents viable solutions. This book is ideally designed for researchers, computer scientists, engineers, automobile industry professionals, IT practitioners, academicians, and students seeking current research on cloud computing models in vehicular networks.




Wireless Networks and Security


Book Description

“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.




AD HOC NETWORKS


Book Description

AD HOC NETWORKS: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network protocols. It reviews issues related to medium access control, scalable routing, group communications, use of directional/smart antennas, network security, and power management among other topics. The authors examine various technologies that may aid ad hoc networking including the presence of an ability to tune transmission power levels or the deployment of sophisticated smart antennae. Contributors to this volume include experts that have been active in ad hoc network research and have published in the premier conferences and journals in this subject area. AD HOC NETWORKS: Protocols and Technologies will be immensely useful as a reference work to engineers and researchers as well as to advanced level students in the areas of wireless networks, and computer networks.




Location Management and Routing in Mobile Wireless Networks


Book Description

Annotation The most common complaints of today's cell phone users are poor reception, a lost signal that cuts off a call, and the inability to put a call through. Today's wireless providers struggle to ensure these problems do not occur. This book is an in-depth examination of two of the hottest research areas relating to these challenges: location management and mobile wireless routing




Advances in Networks and Communications


Book Description

This volume constitutes the second of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 66 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on networks and communications; network and communications security; wireless and mobile networks.