Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "MANET" wg kryterium: Temat


Tytuł:
Minimizing Delay Using Dynamic Blocking Expanding Ring Search Technique for Ad Hoc Networks
Autorzy:
Mhatre, Kavita
Khot, Uday
Powiązania:
https://bibliotekanauki.pl/articles/1844446.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
AODV
BERS
ERS
BERS+
DBERS
MANET
latency
energy efficiency
routes discovery
Opis:
Energy and latency are the significant Quality of Service parameters of ad hoc networks. Lower latency and limited energy expenditure of nodes in the ad hoc network contributes to a prolonged lifetime of the network. Reactive protocols determine the route to the destination using a route discovery process which results in increased delay and increased energy expenditure. This paper proposes a new technique of route discovery, Dynamic Blocking Expanded Ring Search (DBERS) which minimizes time delay and energy required for route discovery process. DBERS reduces energy expenditure and time delay occurring in the existing route discovery techniques of reactive protocols. The performance of DBERS is simulated with various network topologies by considering a different number of hop lengths. The analytical results of DBERS are validated through conduction of extensive experiments by simulations that consider topologies with varying hop lengths. The analytical and simulated results of DBERS are evaluated and compared with widely used route discovery techniques such as BERS, BERS+. The comparison of results demonstrates that DBERS provides substantial improvement in time efficiency and also minimizes energy consumption.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 723-728
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A novel approach to enhance the performance of mobile ad hoc network (manet) through a new bandwidth optimization technique
Autorzy:
Rahman, Md. Torikur
Powiązania:
https://bibliotekanauki.pl/articles/117738.pdf
Data publikacji:
2019
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
MANET
leaky bucket
token bucket
delay
bandwidth optimization
komunikacja mobilna
opóźnienie
optymalizacja przepustowości
Opis:
Now is the age of information technology. World is advancing day by day. At present in this progressing world communication from one place to another has become so easy, less costly, and faster. This modern life is almost impossible with the help of these communication technologies. People need to talk, need to share data, need to express their emotion from long distance. So they need to use technologies to communicate with one another. Nowadays the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. Mobile Ad Hoc Network (MANET) is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses. Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to the end users. But these communication services of Mobile Ad Hoc Network (MANET) use high capacity of bandwidth and a big amount of internet speed. Bandwidth optimization is indispensable in various communications for successful acceptance and deployment of such a technology. Thinking of this, I propose a New Bandwidth Optimization Technique that Enhance the Performance of Mobile Ad Hoc Network (MANET). The new Bandwidth optimization technique which is more efficient in terms of time delay in Mobile Ad Hoc Network (MANET) can redirect a new way towards optimization development in network communication and device junction technology.
Źródło:
Applied Computer Science; 2019, 15, 2; 42-52
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance Analysis of the Cognitive Radio Network with Opportunistic Spectrum Access
Autorzy:
Chęciński, R.
Kaszuba-Chęcińska, A.
Kryk, M.
Łopatka, J.
Malon, K.
Skokowski, P.
Powiązania:
https://bibliotekanauki.pl/articles/226072.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
MANET
cognitive radio
dynamic spectrum access
USRP
RF switch matix
real time demonstrator
Opis:
Efficient access to the spectral resources becomes a challenge for future military wireless communication systems. It requires spectral situation awareness, knowledge of current regulations, local policies and hardware platform limitations. It can be achieved by cognitive radios, realizing cognitive cycle, consisting typically of continuous observation, orientation, reasoning and decision making. All these elements must be realized in parallel and shouldn't interfere with each other. Even more difficult issue is related with cooperation between different nodes, especially in wireless domain, in harsh propagation conditions. Unpredictable phenomena create hard conditions for all deterministic behavior models, and their reproduction is a key element for efficient operation of the network. Very popular computer simulations are always simplified, and real time implementation gives an opportunity to make the next step in system elaboration. This paper presents a real-time demonstrator of cognitive radio network. It can work both in wired mode, using radio channel emulator and in mobile mode, to verify influence of real conditions on proposed cognitive solutions and assess their effectiveness.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 1; 51-56
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Improved Greedy Forwarding Scheme in MANETs
Autorzy:
Mishra, P.
Gandhi, C.
Singh, B.
Powiązania:
https://bibliotekanauki.pl/articles/308279.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
MANET
distance-based routing
direction-based routing
greedy forwarding
Opis:
Position-based routing protocols are widely accepted efficient solution for routing in MANETs. The main feature of position-based routing protocols is to use greedy forwarding methods to route data. The greedy forwarding methods select a node, either having maximum progress towards destination (distance-based principle) or minimum deviation with line between source and destination (direction-based strategy). The first method minimizes the hopcount in a path and on the other hand, second method minimizes the spatial distance between source and destination. The distance-based routing has a great impact on the selection of reliable node and the direction based routing plays a major role to increase the stability of route towards destination. Therefore, in this paper authors propose a weighted forwarding method, which combines both the selection, schemes to select an optimal next forwarding node in a range. The simulation results show that the proposed scheme performs better than existing position-based routing protocols.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 1; 50-55
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
RBCP-WSN : The Reliable Biderectional Control Protocol for Wireless Sensor Networks
Autorzy:
Golański, M.
Schoeneich, R. O.
Zgid, D.
Franciszkiewicz, M.
Kucharski, M.
Powiązania:
https://bibliotekanauki.pl/articles/226928.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
routing protocols
MANET
WSN
Opis:
This paper presents the Reliable Bidirectional Control Protocol (RBCP) protocol, which is a transport protocol for Wireless Sensor Networks (WSN), focused on managing sensors' behaviour. It aims to be a utility for reliable control data transferring from source to destination unit in the network. Considering the related studies on transport protocols, which are mostly dedicated to a single-direction reliable data transport, RBCP is the answer for the lack of control mechanisms in WSNs based on bidirectional communication. The first part of this paper is focused on general presentation of the proposed solution. In the next part, evaluation of the idea and final functionality are discussed. It will finally show the results of undergone testing stage.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 201-207
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The channel for hidden data transmission in WSN
Autorzy:
Schoeneich, R. O.
Golański, M.
Kucharski, M.
Franciszkiewicz, M.
Zgid, D.
Powiązania:
https://bibliotekanauki.pl/articles/226093.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
aggregation
message hidding
MANET
WSN
Opis:
This paper describes an idea and realisation of hidden data transmision using Tiny Aggregation Covert Channel (TAGCC) in Wireless Sensor Networks. Our solution uses data aggregation mechanism called Tiny Aggregation (TAG). The protocol is based on idea of hidden messages sending without generate additional data packets and encryption. The paper describes details of proposed algorithm and simulation results obtained during testing of the sensor networks with hidden channel TAGCC.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 209-216
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An octopus-inspired intrusion deterrence model in distributed computing system
Autorzy:
Olajubu, E. A.
Akinwale, A.
Ogundoyin, K. I.
Powiązania:
https://bibliotekanauki.pl/articles/305521.pdf
Data publikacji:
2016
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
CIDM
MANET
intrusion detection
mobility
routing load
throughput
1-hop neighbors
wireless
malicious
injection
Opis:
The study formulated and evaluated a model for effective management of ma- licious nodes in mobile Ad-hoc network based on Ad-Hoc on- demand distance vector routing protocol. A collaborative injection model called Collaborative Injection Deterrence Model (CIDM) was formulated using stochastic theory. The definition of the model was presented using graph theory. CIDM was simulated using three different scenarios. The three scenarios were then compared using packets delivery ratio (PDR), routing load, throughput and delay as performance metrics. The simulation result showed that CIDM reduce considerably the rate of packets dropped caused by malicious nodes in MANET network. CIDM did not introduce additional load to the network and, yet produce higher throughput. Lastly, the access delay in CIDM is minimal compared with convectional OADV. The study developed a model to mete out a punitive measure to rogue nodes as a form of intrusion deterrence without degrading the overall performance of the network. The well known CRAWDAD dataset was used in the simulation.
Źródło:
Computer Science; 2016, 17 (4); 483-501
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analyze the Performance of Routing Protocols in Clustered Ad Hoc Networks: A Survey
Autorzy:
Parameswaran, T.
Palanisamy, C.
Bhagya devi, P.
Powiązania:
https://bibliotekanauki.pl/articles/1192154.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
MANET
Clustering
Routing Protocol
Quality of Service
Clustering algorithms
Opis:
A Mobile ad hoc network is a continuously self-forming, infrastructure-less network of mobile devices connected without wire. Routing protocols for Mobile ad hoc network are responsible for maintaining the routes in the network and have to ensure the reliable multi-hop communication. Many existing routing protocol approaches measures the performance of ad hoc networks. In ad hoc network faces some challenges like Qos, network congestion, data collision. Using clustering in MANET to avoid packet transmission delay, network congestion and packet loss, etc. This paper aims to provide a comprehensive study of the routing protocol performance in clustered ad hoc network.
Źródło:
World Scientific News; 2016, 45, 2; 252-263
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detection of wormhole attack using cooperative bait detection scheme
Autorzy:
Rajkumar, M. Newlin
Shiny, M. U.
Rani, R. Amsa
Powiązania:
https://bibliotekanauki.pl/articles/1182916.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
index terms-cooperative bait detection scheme (cbds)
dynamic source routing (dsr)
mobile adhoc network (manet)
wormhole attacks
Opis:
Mobile Ad-Hoc Network is an wireless systems it supports mobile communication in a network. MANETs are affected by several security attacks but it affects the features that are like open medium, dynamical changes in topology, lack of central monitoring and management and it not obtain the clear defence mechanism to MANETs. To prevent or detect malicious nodes launching collaborative wormhole attacks is a challenge. The existing system designs a dynamic source routing (DSR)-based routing mechanism, but it is also referred to as the cooperative bait detection scheme (CBDS) to detect the wormhole attacks effectively. Here we describes the various wormhole attacks and prevention methods for wormhole attack.
Źródło:
World Scientific News; 2016, 49, 2; 78-89
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heavy Gas Cloud Boundary Estimation and Tracking using Mobile Sensors
Autorzy:
Krzysztoń, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309177.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
deployment strategies
heavy gas cloud boundary tracking
MANET
mobile ad hoc network
mobility models
sensor networks
Opis:
This paper addresses issues concerned with design and managing of monitoring systems comprised of mobile wireless sensing devices (MANETs). The authors focus on self-organizing, cooperative and coherent networks that maintain a continuous communication with a central operator and adopt to changes in an unknown environment to achieve a given goal. The attention is focused on the development of MANET for heavy gas clouds detection and its boundary estimating and tracking. Two strategies for constructing the MANET are described, in which sensors explore the region of interest to detect the gas cloud, create temporary network topology and finally, cover the cloud boundary, and track the moving cloud. The utility and efficiency of the proposed strategies has been justified through simulation experiments.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 38-49
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved MCBDS for defending against gray hole and black hole attacks in MANETs
Autorzy:
Haghighi, A.
Mizanian, K.
Mirjalily, G.
Powiązania:
https://bibliotekanauki.pl/articles/102490.pdf
Data publikacji:
2016
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
mobile ad hoc network
cooperative bait detection scheme (CBDS)
modified CBDS (MCBDS)
black hole
gray hole
MANET
Opis:
Mobile Ad-hoc Networks (MANETs) are widely used nowadays. Because of their characteristics as open media, dynamic topology, being infrastructure-less and lack of centralized monitoring, MANET is vulnerable to a wide range of attacks like blackhole and grayhole. Blackhole and grayhole attacks refer to the attacks that breach the security by performing packet forwarding and routing misbehavior and cause denial of service in MANETs. In this paper we improved our previous work on MCBDS, we reduced false-positive rate more than before and on average it dropped to zero. The proposed method employs Network Simulator-2 (NS-2) to validate the effectiveness under different scenarios. Simulation results show that improved MCBDS has same performance as CBDS in terms of throughput and end-to-end delay and as much as the presence of malicious nodes increased, improved MCBDS performs better than CBDS.
Źródło:
Advances in Science and Technology. Research Journal; 2016, 10, 30; 1-8
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Link Quality and Energy Aware Geographical Routing in MANETs using Fuzzy Logics
Autorzy:
Mishra, P.
Gandhi, C.
Singh, B.
Powiązania:
https://bibliotekanauki.pl/articles/308336.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
GPSR
LAR
MANET
RSSI
SINR
SNR
Opis:
In literature, varieties of topology and geographical routing protocols have been proposed for routing in the MANETs. It is widely accepted that the geographical routings are a superior decision than topological routings. Majority of geographical routing protocols assume an ideal network model and choose the route that contains minimum number of hops. However, in reality, nodes have limited battery power and wireless links are additionally unreliable, so they may highly affect the routing procedure. Thus, for reliable data transmission, condition of the network such as link quality and residual energy must be considered. This paper aims to propose a novel multi-metric geographical routing protocol that considers both links-quality and energy metric along with progress metric to choose the next optimal node. The progress is determined by utilizing greedy as well as compass routing rather than pure greedy routing schemes. To combine these metrics, fuzzy logics are used to get the optimal result. Further, the protocol deals with “hole” problem and proposes a technique to overcome it. Simulations show that the proposed scheme performs better in terms of the packet delivery ratio, throughput and residual energy than other existing protocols.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 5-17
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance of IP address auto-configuration protocols in Delay and Disruptive Tolerant Networks
Autorzy:
Schoeneich, R. O.
Sutkowski, P.
Powiązania:
https://bibliotekanauki.pl/articles/227276.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
address assignment
auto configuration
MANET
DTN
Opis:
At this moment there is a lack of research respecting Mobile Ad-hoc Networks (MANET) address assignment methods used in Delay Tolerant Networks (DTN). The goal of this paper is to review the SDAD, WDAD and Buddy methods of IP address assignment known from MANET in difficult environment of Delay and Disruptive Tolerant Networks. Our research allows us for estimating the effectiveness of the chosen solution and, therefore, to choose the most suitable one for specified conditions. As a part of the work we have created a tool which allows to compare these methods in terms of capability of solving address conflicts and network load. Our simulator was created from scratch in Java programming language in such a manner, that implementation of new features and improvements in the future will be as convenient as possible.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 2; 173-178
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
SocialRouting : The social-based routing algorithm for Delay Tolerant Networks
Autorzy:
Schoeneich, R. O.
Surgiewicz, R.
Powiązania:
https://bibliotekanauki.pl/articles/963900.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
routing protocols
MANET
DTN
Opis:
Delay and Disruptive Tolerant Networks (DTN) are relatively a new networking concept that could provide a robust communication in wide range of implementations from the space to battlefield or other military usage. However in such dynamic networks, which could be considered as a set of intermittently connected nodes, message forwarding strategy is a key issue. Existing routing solutions concentrate mainly on two major routing families flooding and knowledge based algorithms. This paper presents SocialRouting - the social-based routing algorithm designed for DTN. The use of the social properties of wireless mobile nodes is the novel way of message routing that is based on message ferrying between separated parts of the network. Proposed idea has been extensively tested using simulation tools. The simulations were made based on especially designed for measurements in DTN scenarios and compared with popular solutions.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 2; 167-172
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance comparision of different routing protocols with fuzzy inference system in manet
Autorzy:
Goswami, S
Joardar, S
Das, C B
Powiązania:
https://bibliotekanauki.pl/articles/101870.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
MANET
AODV
DSDV
DSR
expert system
control overhead
delay
PDR
NS-2 software
Opis:
An ad hoc wireless network consists of mobile networks which create an underlying architecture for communication without the help of traditional fixed-position routers. There are different protocols for handling the routing in the mobile environment. Routing protocols used in fixed infrastructure networks cannot be efficiently used for mobile ad-hoc networks (MANET), so it requires different protocols. The node moves at different speeds in an independent random form, connected by any number of wireless links, where each node is ready to pass or forward both data and control traffic unrelated to its own use ahead (routing) to other nodes in a flexible interdependence of wireless communication in between. In contrast to infrastructure wireless networks, where the communication between network nodes is take place by a special node known as an access point. It is also, in contrast to wired networks in which the routing task is performed by special and specific devices called routers and switches. In this paper, we consider fuzzy inference system, an attempt has been made to present a model using fuzzy logic approach to evaluate and compare three routing protocols i.e. AODV, DSDV and DSR using effective factor of the number of nodes based on 3 outputs of control overhead, delay and PDR (totally fuzzy system with 4 outputs) in order to select one of these two routing protocols properly under different conditions and based on need and goal. To show efficiency and truth of fuzzy system, three protocols have been evaluated equally using NS-2 simulator and attempt has been made to prove efficiency of the designed fuzzy system by comparing results of simulation of fuzzy system and NS-2 software.
Źródło:
Advances in Science and Technology. Research Journal; 2015, 9, 27; 149-156
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies