• Title/Summary/Keyword: MANET MAC

Search Result 34, Processing Time 0.017 seconds

TCP Performance Improvement Considering ACK Loss in Ad Hoc Networks

  • Kim, Dong-Kyun;Yoo, Hong-Seok
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.98-107
    • /
    • 2008
  • In mobile ad hoc networks, packet loss is unavoidable due to MAC contention, link failure or the inherent characteristics of wireless link. Since TCP relies on the timely reception of TCP ACK packets to progress the transmission of the TCP DATA packets, ACK loss obviously affects the performance due to two main problems: (a) Frequent occurrence of spurious retransmissions caused by timeout events and (b) impairment of the fast retransmit mechanism caused by the lack of a sufficient number of duplicate ACK packets. In particular, since most reactive routing protocols force the packets buffered over a path to be discarded while performing a route recovery, the performance degradation becomes more serious due to such ACK loss. In this paper, therefore, TCP with two piggybacking schemes (called TCP-pgy) is proposed in order to resolve the above-mentioned problems over reactive routing protocols. Through extensive simulations using the ns-2 simulator, we prove that our proposed schemes contribute to TCP performance improvements.

Virtual Topology Control System for Evaluating Semi-infrastructured Wireless Community Networks (준-인프라 기반 무선 커뮤니티 네트워크 시험을 위한 가상 토폴로지 제어 시스템)

  • Kang, Nam-Hi;Kim, Young-Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.275-281
    • /
    • 2012
  • Community network is a communication environment where heterogeneous devices can access and communicate with each other at any time and at any space to share information. To do so, mobile devices are required to be self-configured even in absence of communication infrastructures. Semi-infrastructured wireless ad-hoc network is a promising solution to meet with such a requirement. This paper proposes the VTC(virtual topology coordinator) system as an evaluation tool for examining network protocols that are intended to be deployed in the semi-infrastructured ad-hoc networks. VTC emulates multi-hops wireless network topology virtually using a mechanism of selective receiving MAC frame in a small area, where only a single hop communication is available. VTC system cannot consider all properties introduced in real wireless network, but do more wireless properties than verification through simulation.

Performance Evaluation of Network Coding in MANETs for Bidirectional Traffic (MANETs에서 양방향 트래픽에 대한 네트워크 코딩기법의 성능 평가)

  • Kim, Kwan-Woong;Kim, Yong-Kab;Bae, Sung-Hwan;Kim, Dae-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.3
    • /
    • pp.491-497
    • /
    • 2012
  • Network coding is that the nodes can combine and mix the packets rather than merely forward them. Therefore, network coding is expected to improve throughput and channel efficiency in the wireless network. Relevant researches have been carried out to adapt network coding to wireless multi-hop network. In this paper, we designed the network coding for bidirectional traffic service in routing layer and IP layer of Ad-hoc network. From the simulation result, the traffic load and the end to end distance effect the performance of the network coding. As end to end distance and the traffic load become larger, the gain of network coding become more increased.

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.