Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Manet" wg kryterium: Temat


Tytuł:
Load-balanced route discovery for mobile ad hoc networks
Autorzy:
Abolhasan, M.
Lipman, J.
Wysocki, T. A.
Powiązania:
https://bibliotekanauki.pl/articles/309094.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc routing
MANET
load balancing
on-demand routing
protocols
Opis:
This paper presents flow-aware routing protocol (FARP), a new routing strategy designed to improve load balancing and scalability in mobile ad hoc networks. FARP is a hop-by-hop routing protocol, which introduces a flow-aware route discovery strategy to reduce the number of control overheads propagating through the network and distributes the flow of data through least congested nodes to balance the network traffic. FARP was implemented in GloMoSim and compared with AODV. To investigate the load distribution capability of FARP new performance metrics were introduced to measure the data packet flow distribution capability of the each routing protocol. The simulation results obtained illustrate that FARP achieves high levels of throughput, reduces the level of control overheads during route discovery and distributes the network load more evenly between nodes when compared to AODV. This paper also describes a number of alternative strategies and improvements for the FARP.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 1; 38-45
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A static test-bed for the evaluation and optimization of multihop wireless network protocols
Autorzy:
Bongartz, H. H.-J.
Bachran, T.
Powiązania:
https://bibliotekanauki.pl/articles/308216.pdf
Data publikacji:
2008
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
MANET
mobile ad hoc network
multihop wireless network
multicast
wireless test-bed
simulation
explicit multicast
Opis:
We investigate the performance of multicast transmissions in a simple stationary wireless multihop ad hoc network test-bed. We compare several methods for MANET multicast using implementations for the protocols MOLSR, SMOLSR and SMF with an approach that uses explicit multicast and link-layer retries for reliable multicast. Results from the test-bed are compared with simulation results. We find that implementing a combination of explicit multicast with a retry mechanism gives the most promising results in test-bed and simulation compared with other approaches.
Źródło:
Journal of Telecommunications and Information Technology; 2008, 2; 62-69
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Gwarantowanie jakości usług multimedialnych w sieciach o niskiej przepustowości
The QoS provisioning for multimedia services in low bandwidth networks
Autorzy:
Łubkowski, P.
Powiązania:
https://bibliotekanauki.pl/articles/209538.pdf
Data publikacji:
2008
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
multimedia
QoS
WLAN
MANET
Opis:
Technologia transferu danych głosowych i wideo, a więc danych multimedialnych, jest aktualnie jedną z najszybciej rozwijających się technologii internetowych. Kluczowym problemem związanym z realizacją usług multimedialnych w sieci IP jest równocześnie zapewnienie odpowiedniego poziomu jakości usług Quality of Service (QoS). Problem ten jest szczególnie widoczny w odniesieniu do mobilnych bezprzewodowych sieci IP, które z uwagi na oferowane możliwości znalazły się na przestrzeni ostatnich lat w centrum zainteresowania producentów, dostawców usług, użytkowników oraz projektantów sieci komputerowych. W artykule przedstawiono problematykę zapewnienia jakości QoS realizacji usług multimedialnych w sieciach o niskiej przepustowości ze szczególnym uwzględnieniem sieci standardu 802.11. W zasadniczej części zaprezentowano analizę mechanizmów wspierania jakości opracowanych w ramach rozszerzenia podstawowej wersji standardu 802.11 oraz mechanizmów związanych z modyfikacją parametrów strumienia danych wideo. Na tym tle przedstawiono koncepcję gwarantowania jakości usług wideo w sieci WLAN.
Implementation of the IEEE 802.11 technology for wireless local area networks (WLANs) has created a new opportunity to support real time and multimedia applications. The varying nature of WLAN channel over time can degrade the QoS level of multimedia service, which calls for elaboration of advanced QoS mechanism supporting multimedia services. The research works applied to video transmission over WLAN mostly concentrate on using link adaptation techniques or optimization of video stream by cross-layer signaling. It appears to be not sufficient as far as a provision of QoS for multimedia services is considered. The paper focuses on evaluation of cross-layer QoS architecture that enables the provision of QoS for multimedia services in military WLAN network. A general description of this architecture is presented with special emphasize on new approach to the multimedia rate control as well as implementation of cross-layer signaling. The paper covers the verification of the proposal by simulation method as well as a discussion of some selected results of simulation.
Źródło:
Biuletyn Wojskowej Akademii Technicznej; 2008, 57, 4; 355-367
1234-5865
Pojawia się w:
Biuletyn Wojskowej Akademii Technicznej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Energy Aware MPR Selection Mechanism in OLSR-based Mobile Ad Hoc Networks
Mechanizm selekcji węzłów z ograniczeniami energii w sieciach mobilnych Ad hoc oparty na protokole OLSR
Autorzy:
Wardi, Mr.
Higami, Y.
Kobayashi, S.
Hirata, Kouji
Powiązania:
https://bibliotekanauki.pl/articles/972141.pdf
Data publikacji:
2010
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
MANET
OLSR
wybór węzłów MPR
MPR selection
Opis:
OLSR is a proactive routing protocol for mobile ad hoc networks (MANETs). OLSR uses the concept of MPR selection mechanism to reduce broadcast packets. Because mobile nodes in MANETs are powered by batteries, MPR nodes often run out of energy. This paper introduces a residual energy-based OLSR (REOLSR) protocol. REOLSR selects MPR nodes based on residual energy of their symmetric 1-hop neighbor nodes. The aim is to avoid selecting nodes with lower residual energy as MPR nodes in order that the protocol minimizes the MPR nodes run out of their energy faster. The simulation results show that REOLSR increases network throughput efficiently.
OLSR jest proaktywnym protokołem routingu dla mobilnych sieci ad hoc (MANETs). Wykorzystuje on ideę mechanizmu selekcji węzłów do transmisji wielopunktowej (MPR) w celu zredukowania liczby transmitowanych pakietów. Węzły MPR są bardzo obciążone, a więc ich źródła energii powinny być oszczędzane. Ponieważ węzły mobilne w sieci MANET są zasilane z baterii, zatem węzły MPR często rozładowują swoje źródła zasilania. W artykule zaproponowano modyfikację protokołu OLSR (REOLSR) opartą na analizie energii resztkowej. Protokół REOLSR wybiera węzły MPR w oparciu o kryterium ich energii resztkowej ich symetrycznych sąsiednich węzłów typu 1-hop. Protokół uwzględnia także liczbę węzłów będących w zasięgu i stopień każdego węzła. Celem jest minimalizacja wyboru węzłów zużywających szybciej swoje źródło energii. Protokół ma zminimalizować używanie węzłów o wyładowanych źródłach zasilania. Wyniki symulacji pokazują, że REOLSR zwiększa wydajność osiągów sieci.
Źródło:
Pomiary Automatyka Kontrola; 2010, R. 56, nr 11, 11; 1382-1385
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protokoły trasowania w sieciach AD HOC
Routing protocols in ad hoc networks
Autorzy:
Smolarek, A.
Malinowski, T.
Powiązania:
https://bibliotekanauki.pl/articles/91469.pdf
Data publikacji:
2012
Wydawca:
Warszawska Wyższa Szkoła Informatyki
Tematy:
protokoły routingu
sieci ad-hoc
Manet
symulacja
routing protocols
ad hoc networks
simulation
Opis:
W artykule dokonano charakterystyki protokołów trasowania stosowanych w bezprzewodowych sieciach Ad Hoc, a także zilustrowano na drodze symulacji komputerowej zachowanie wybranych protokołów trasowania. Badania porównawcze zrealizowane zostały w środowisku symulacyjnym ns-2.
The article presents the characteristics of routing protocols used in wireless ad hoc networks, and is illustrated through computer simulation of the behavior of some routing protocols. Comparative studies were carried out in an ns-2 simulation environment.
Źródło:
Zeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki; 2012, 6, 8; 47-60
1896-396X
2082-8349
Pojawia się w:
Zeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication architecture using threshold cryptography in Kerberos for mobile ad hoc networks
Autorzy:
Gharib, H
Belloulata, K
Powiązania:
https://bibliotekanauki.pl/articles/103196.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
authentication
attacks
Kerberos
MANET
threshold cryptography
Opis:
The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 12-18
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On IPv6 Experimentation in Wireless Mobile Ad Hoc Networks
Autorzy:
Grajzer, M.
Głąbowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/309525.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
IPv6 simulation
IPv6 wireless testbed
MANET experimentation
MANET protocols evaluation
Neighbor Discovery ++ (ND++)
NS-3
Opis:
With the growing interest towards the Internet of Things IPv6-based mobile ad hoc networks (MANETs) become a key enabling technology offering the possibility of automated, unsupervised network configuration and operation. Such a functionality calls for an accurate and reliable testing of the newly proposed solutions, which is challenging due to the dynamic, decentralized and ad hoc nature of MANETs. In this work selected topics are presented on performing IPv6 protocols experimentation in wireless, IPv6-only mobile ad hoc networks – including both simulation – and testbed-based evaluation. Based on the authors experience with the evaluation of the extended IPv6 Neighbor Discovery protocol (ND++) proposed during the course of research, the selection of an opensource simulation environment is presented and a comparison between simulation and emulation experimentation methods is provided. Benefits and drawbacks of both these methodologies for testing IPv6 solutions are depicted. Moreover, the important aspects of topology and mobility considerations are considered. Finally the authors pro.ose a testing approach that would allow for a detailed and accurate evaluation by means of open-source, easily accessible and low-cost methodologies.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 3; 71-81
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
With using fuzzy logic in the MANET
Autorzy:
Jelodar, H
Aramideh, J
Powiązania:
https://bibliotekanauki.pl/articles/102997.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
AODV routing protocol
DSDV routing protocol
fuzzy expert system
MANET
Opis:
Mobile ad hoc networks have consisted of the nodes which are freely displaced. In other words, this network has dynamic topology. Routing protocols find route of forwarding data packets from the source node to the destination node. A routing protocol plays important role in finding the shortest time and the route path. In this paper, considering significance of the subject, attempt has been made to present a model using fuzzy logic approach to evaluate and compare two routing protocols i.e. AODV DSDV using effective factor of the number of nodes based on 2 outputs of delay and throughput rate (totally fuzzy system with four outputs) in order to select one of these two routing protocols properly under different conditions and based on need and goal. To show efficiency and truth of fuzzy system, two protocols have been evaluated completely equally using NS-2 simulator and attempt has been made to prove efficiency of the designed fuzzy system by comparing results of simulation of fuzzy system and NS-2 software.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 19-25
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance comparision of different routing protocols with fuzzy inference system in manet
Autorzy:
Goswami, S
Joardar, S
Das, C B
Powiązania:
https://bibliotekanauki.pl/articles/101870.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
MANET
AODV
DSDV
DSR
expert system
control overhead
delay
PDR
NS-2 software
Opis:
An ad hoc wireless network consists of mobile networks which create an underlying architecture for communication without the help of traditional fixed-position routers. There are different protocols for handling the routing in the mobile environment. Routing protocols used in fixed infrastructure networks cannot be efficiently used for mobile ad-hoc networks (MANET), so it requires different protocols. The node moves at different speeds in an independent random form, connected by any number of wireless links, where each node is ready to pass or forward both data and control traffic unrelated to its own use ahead (routing) to other nodes in a flexible interdependence of wireless communication in between. In contrast to infrastructure wireless networks, where the communication between network nodes is take place by a special node known as an access point. It is also, in contrast to wired networks in which the routing task is performed by special and specific devices called routers and switches. In this paper, we consider fuzzy inference system, an attempt has been made to present a model using fuzzy logic approach to evaluate and compare three routing protocols i.e. AODV, DSDV and DSR using effective factor of the number of nodes based on 3 outputs of control overhead, delay and PDR (totally fuzzy system with 4 outputs) in order to select one of these two routing protocols properly under different conditions and based on need and goal. To show efficiency and truth of fuzzy system, three protocols have been evaluated equally using NS-2 simulator and attempt has been made to prove efficiency of the designed fuzzy system by comparing results of simulation of fuzzy system and NS-2 software.
Źródło:
Advances in Science and Technology. Research Journal; 2015, 9, 27; 149-156
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An octopus-inspired intrusion deterrence model in distributed computing system
Autorzy:
Olajubu, E. A.
Akinwale, A.
Ogundoyin, K. I.
Powiązania:
https://bibliotekanauki.pl/articles/305521.pdf
Data publikacji:
2016
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
CIDM
MANET
intrusion detection
mobility
routing load
throughput
1-hop neighbors
wireless
malicious
injection
Opis:
The study formulated and evaluated a model for effective management of ma- licious nodes in mobile Ad-hoc network based on Ad-Hoc on- demand distance vector routing protocol. A collaborative injection model called Collaborative Injection Deterrence Model (CIDM) was formulated using stochastic theory. The definition of the model was presented using graph theory. CIDM was simulated using three different scenarios. The three scenarios were then compared using packets delivery ratio (PDR), routing load, throughput and delay as performance metrics. The simulation result showed that CIDM reduce considerably the rate of packets dropped caused by malicious nodes in MANET network. CIDM did not introduce additional load to the network and, yet produce higher throughput. Lastly, the access delay in CIDM is minimal compared with convectional OADV. The study developed a model to mete out a punitive measure to rogue nodes as a form of intrusion deterrence without degrading the overall performance of the network. The well known CRAWDAD dataset was used in the simulation.
Źródło:
Computer Science; 2016, 17 (4); 483-501
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analyze the Performance of Routing Protocols in Clustered Ad Hoc Networks: A Survey
Autorzy:
Parameswaran, T.
Palanisamy, C.
Bhagya devi, P.
Powiązania:
https://bibliotekanauki.pl/articles/1192154.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
MANET
Clustering
Routing Protocol
Quality of Service
Clustering algorithms
Opis:
A Mobile ad hoc network is a continuously self-forming, infrastructure-less network of mobile devices connected without wire. Routing protocols for Mobile ad hoc network are responsible for maintaining the routes in the network and have to ensure the reliable multi-hop communication. Many existing routing protocol approaches measures the performance of ad hoc networks. In ad hoc network faces some challenges like Qos, network congestion, data collision. Using clustering in MANET to avoid packet transmission delay, network congestion and packet loss, etc. This paper aims to provide a comprehensive study of the routing protocol performance in clustered ad hoc network.
Źródło:
World Scientific News; 2016, 45, 2; 252-263
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detection of wormhole attack using cooperative bait detection scheme
Autorzy:
Rajkumar, M. Newlin
Shiny, M. U.
Rani, R. Amsa
Powiązania:
https://bibliotekanauki.pl/articles/1182916.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
index terms-cooperative bait detection scheme (cbds)
dynamic source routing (dsr)
mobile adhoc network (manet)
wormhole attacks
Opis:
Mobile Ad-Hoc Network is an wireless systems it supports mobile communication in a network. MANETs are affected by several security attacks but it affects the features that are like open medium, dynamical changes in topology, lack of central monitoring and management and it not obtain the clear defence mechanism to MANETs. To prevent or detect malicious nodes launching collaborative wormhole attacks is a challenge. The existing system designs a dynamic source routing (DSR)-based routing mechanism, but it is also referred to as the cooperative bait detection scheme (CBDS) to detect the wormhole attacks effectively. Here we describes the various wormhole attacks and prevention methods for wormhole attack.
Źródło:
World Scientific News; 2016, 49, 2; 78-89
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heavy Gas Cloud Boundary Estimation and Tracking using Mobile Sensors
Autorzy:
Krzysztoń, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309177.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
deployment strategies
heavy gas cloud boundary tracking
MANET
mobile ad hoc network
mobility models
sensor networks
Opis:
This paper addresses issues concerned with design and managing of monitoring systems comprised of mobile wireless sensing devices (MANETs). The authors focus on self-organizing, cooperative and coherent networks that maintain a continuous communication with a central operator and adopt to changes in an unknown environment to achieve a given goal. The attention is focused on the development of MANET for heavy gas clouds detection and its boundary estimating and tracking. Two strategies for constructing the MANET are described, in which sensors explore the region of interest to detect the gas cloud, create temporary network topology and finally, cover the cloud boundary, and track the moving cloud. The utility and efficiency of the proposed strategies has been justified through simulation experiments.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 38-49
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved MCBDS for defending against gray hole and black hole attacks in MANETs
Autorzy:
Haghighi, A.
Mizanian, K.
Mirjalily, G.
Powiązania:
https://bibliotekanauki.pl/articles/102490.pdf
Data publikacji:
2016
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
mobile ad hoc network
cooperative bait detection scheme (CBDS)
modified CBDS (MCBDS)
black hole
gray hole
MANET
Opis:
Mobile Ad-hoc Networks (MANETs) are widely used nowadays. Because of their characteristics as open media, dynamic topology, being infrastructure-less and lack of centralized monitoring, MANET is vulnerable to a wide range of attacks like blackhole and grayhole. Blackhole and grayhole attacks refer to the attacks that breach the security by performing packet forwarding and routing misbehavior and cause denial of service in MANETs. In this paper we improved our previous work on MCBDS, we reduced false-positive rate more than before and on average it dropped to zero. The proposed method employs Network Simulator-2 (NS-2) to validate the effectiveness under different scenarios. Simulation results show that improved MCBDS has same performance as CBDS in terms of throughput and end-to-end delay and as much as the presence of malicious nodes increased, improved MCBDS performs better than CBDS.
Źródło:
Advances in Science and Technology. Research Journal; 2016, 10, 30; 1-8
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Link Quality and Energy Aware Geographical Routing in MANETs using Fuzzy Logics
Autorzy:
Mishra, P.
Gandhi, C.
Singh, B.
Powiązania:
https://bibliotekanauki.pl/articles/308336.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
GPSR
LAR
MANET
RSSI
SINR
SNR
Opis:
In literature, varieties of topology and geographical routing protocols have been proposed for routing in the MANETs. It is widely accepted that the geographical routings are a superior decision than topological routings. Majority of geographical routing protocols assume an ideal network model and choose the route that contains minimum number of hops. However, in reality, nodes have limited battery power and wireless links are additionally unreliable, so they may highly affect the routing procedure. Thus, for reliable data transmission, condition of the network such as link quality and residual energy must be considered. This paper aims to propose a novel multi-metric geographical routing protocol that considers both links-quality and energy metric along with progress metric to choose the next optimal node. The progress is determined by utilizing greedy as well as compass routing rather than pure greedy routing schemes. To combine these metrics, fuzzy logics are used to get the optimal result. Further, the protocol deals with “hole” problem and proposes a technique to overcome it. Simulations show that the proposed scheme performs better in terms of the packet delivery ratio, throughput and residual energy than other existing protocols.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 5-17
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies