• Title/Summary/Keyword: Mobile ad hoc networks

Search Result 700, Processing Time 0.029 seconds

Efficient Distributed Allocation Method of Data Replica in VANET (VANET에서 효율적인 분산적 데이터 복제본 할당 기법)

  • Shim, Kyu-Sun;Lee, Myong-Soo;Lee, Sang-Keun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.2
    • /
    • pp.87-95
    • /
    • 2010
  • A Vehicular Ad-Hoc Network (VANET) is form of the Mobile Ad-hoc Network (MANET) to provide temporary communication among vehicles via wireless links. In VANET, the vehicle is one of the nodes in networks and communicates with each other. However, the wireless links disconnect very frequently, because vehicles have mobility and move freely. The reason why data accessibility degrades is that disconnection occurs frequently. To improve data accessibility, data replica allocation methods that made group to allocate data replica have proposed in MANET. However, those are not suitable because it is difficult to maintain stable links among the nodes moving fast by centralized group. In this paper, we proposed TBG (Tree Based Grouping) to allocate data replica with the distributed grouping method. Each node has own TBG and allocates data replica based on stability of links to improve data accessibility. The experiment demonstrates that the proposed method outperforms traditional methods in term of data accessibility.

Analysis of Link Error Effects in MANET Address Autoconfiguration Protocols

  • Kim, Sang-Chul;Chung, Jong-Moon
    • Journal of Communications and Networks
    • /
    • v.11 no.1
    • /
    • pp.84-93
    • /
    • 2009
  • This paper focuses on message complexity performance analysis of mobile ad hoc network (MANET) address autoconfiguration protocols (AAPs) in reference to link errors generated by mobile wireless nodes. An enhancement was made using a proposed retransmission limit, S, to be computed for error recovery (based on the link error probability), to measure message complexity of AAPs in reference to the link error probability, $P_e$. The control procedures for the retransmission limit have been included for each of the AAPs. Retransmission limit control is critical for efficient energy consumption of MANET nodes operating on limited portable energy. O-notation has been applied to analyze the upper bound of the number of messages generated by a MANET group of nodes. The AAPs investigated in this paper are strong duplicate address detection (DAD), weak DAD with proactive routing protocol (WDP), weak DAD with on-demand routing protocol (WDO), and MANETConf. Each AAP reacts different to link errors, as each AAP has different operational procedures. The required number of broadcasting, unicasting, relaying, and received messages of the nodes participating in a single-node joining procedure is investigated to asymptotically calculate the message complexity of each AAP. Computer simulation was conducted and the results have been analyzed to verify the theoretical message complexity bounds derived. The message complexity of WDP was lowest, closely followed byWDO, based on the simulation results and analysis of the message complexity under nominal situations. The message complexity of MANETConf was higher than WDO, and strong DAD resulted to be most complex among the four AAPs.

Time Slot Exchange Protocol in a Reservation Based MAC for MANET

  • Koirala, Mamata;Ji, Qi;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.181-185
    • /
    • 2009
  • Recently, much attention to a self-organizing mobile ad-hoc network is escalating along with progressive deployment of wireless networks in our everyday life. Being readily deployable, the MANET (mobile ad hoc network) can find its applications to emergency medical service, customized calling service, group-based communications, and military purposes. In this paper we investigate a time slot exchange problem found in the time slot based MAC, that is designed for IEEE 802.11b interfaces composing a MANET. The paper provides a method to maintain the quality of voice call by providing a new time slot when the channel assigned for that time slot gets noisy with interferences induced from other nodes, which belong to the same and/or other subgroups. In order to assess the performance of the proposed algorithm, a set of simulations using the OPNET modeler has been performed assuming that the IEEE 802.11b interfaces are operating under a modified MAC, which is a time slot based reservation MAC implemented in the PCF part of the superframe. In a real-time voice call service over a MANET of a size 500 ${\times}$ 500 meter squares with the number of nodes up to 100, the simulation results are collected and analyzed with respect to the packet loss rate and packet delay. The results show us that the proposed time slot exchange protocol improves the quality of voice call over that of plain DCF.

  • PDF

Efficient New Routing Protocol for Mobile Ad Hoc Networks (이동 애드혹 네트워크을 위한 새로운 라우팅 프로토콜 기법)

  • Ngo, Van-Vuong;Jang, Jaeshin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.815-818
    • /
    • 2015
  • AODV routing protocol, one of the most studied routing protocols for the Mobile Ad hoc Network (MANET), uses the number of hops as the metric to choose a path from a source node to a destination node. If the path is deteriorated, it will cause many problems to the communication. In order to improve the performance of the network, we propose AuM-AODV routing protocol that contains an auxiliary metric besides the number of hops. Nodes using AuM-AODV use control packets such as Route Request (RREQ), Route Reply (RREP), and HELLO to exchange information about network topology like AODV routing protocol. AuM-AODV routing protocol is implemented in NS-3 for performance evaluation. We use three performance metrics, that is to say, throughput, packet delivery ratio, and average end-to-end delay. According to numerical results, the new AuM-AODV routing protocol has better performance over three performance metrics than AODV routing protocol.

  • PDF

A Technique to Exploit Cooperation for Packet Retransmission in Wireless Ad Hoc Networks

  • Kim, Hae-Soo;Buehrer, R. Michael
    • Journal of Communications and Networks
    • /
    • v.10 no.2
    • /
    • pp.148-155
    • /
    • 2008
  • In wireless data communication systems, retransmission of an erroneous packet is inevitable due to the harsh communication environment. In this paper, an efficient retransmission scheme using cooperation from neighboring nodes is investigated. In the cooperative retransmission scheme, an erroneous packet is transmitted to the destination by cooperative nodes which have favorable channels. This cooperative retransmission scheme requires no a priori information of neighboring nodes and has no limitation on the number of cooperating nodes. Distributed beamforming is used to accommodate multiple cooperating nodes. Phase and frequency offsets of cooperating signals are extracted from the NACK message and used to co-phase retransmitted data packets. The outage probability of the cooperative retransmission scheme is analyzed for the case of perfect synchronization and when the offsets are estimated. To reduce the impact of the residual phase and frequency offsets in cooperating signals, a low-rate feedback scheme is also investigated. It is shown that improved outage probability and reduced packet error rate (PER) performance can be achieved even for long data packets. The proposed cooperative retransmission scheme is found to outperform simple retransmission by the source as well as decode-and-forward cooperation.

A Routing Scheme based on Normalized Location and Transmission Characteristics (NLTCR) for Multi-Carrier MANETs at Sea (다중캐리어 해상자율망을 위한 위치와 전송특성 정규값 기반 경로배정방식)

  • Son, Joo-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.36 no.2
    • /
    • pp.302-308
    • /
    • 2012
  • Self-configuration network model is to overcome the limits of data communications at sea. As a research for enhancing the connectivity and scalability of data networks at sea using the diversity and heterogeneity of the data networks on land, in this paper, a routing scheme (NLTCR) based on not conventional hop counts but distances to destination ships is introduced. The NLTCR seeks an optimal route by normalized distances to a destination, and transmission characteristics of applications and carriers. Performance is evaluated and compared with those of the max-win (MWR) and the normalized transmission characteristics (NTCR) based schemes.

Efficient and Secure Routing Protocol forWireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms

  • Ganesh, Subramanian;Amutha, Ramachandran
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.422-429
    • /
    • 2013
  • Advances in wireless sensor network (WSN) technology have enabled small and low-cost sensors with the capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. In the WSN, the sensor nodes have a limited transmission range and their processing and storage capabilities as well as their energy resources are limited. A triple umpiring system has already been proved for its better performance in WSNs. The clustering technique is effective in prolonging the lifetime of the WSN. In this study, we have modified the ad-hoc on demand distance vector routing by incorporating signal-to-noise ratio (SNR) based dynamic clustering. The proposed scheme, which is an efficient and secure routing protocol for wireless sensor networks through SNR-based dynamic clustering (ESRPSDC) mechanisms, can partition the nodes into clusters and select the cluster head (CH) among the nodes based on the energy, and non CH nodes join with a specific CH based on the SNR values. Error recovery has been implemented during the inter-cluster routing in order to avoid end-to-end error recovery. Security has been achieved by isolating the malicious nodes using sink-based routing pattern analysis. Extensive investigation studies using a global mobile simulator have shown that this hybrid ESRP significantly improves the energy efficiency and packet reception rate as compared with the SNR unaware routing algorithms such as the low energy aware adaptive clustering hierarchy and power efficient gathering in sensor information systems.

FADA: A fuzzy anomaly detection algorithm for MANETs (모바일 애드-혹 망을 위한 퍼지 비정상 행위 탐지 알고리즘)

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.6
    • /
    • pp.1125-1136
    • /
    • 2010
  • Lately there exist increasing demands for online abnormality monitoring over trajectory stream, which are obtained from moving object tracking devices. This problem is challenging due to the requirement of high speed data processing within limited space cost. In this paper, we present a FADA (Fuzzy Anomaly Detection Algorithm) which constructs normal profile by computing mobility feature information from the GPS (Global Positioning System) logs of mobile devices in MANETs (Mobile Ad-hoc Networks), computes a fuzzy dissimilarity between the current mobility feature information of the mobile device and the mobility feature information in the normal profile, and detects effectively the anomaly behaviors of mobile devices on the basis of the computed fuzzy dissimilarity. The performance of proposed FADA is evaluated through simulation.

Design of Mobile Phone Middleware based on Integrated Context Provisioning Strategy (통합 상황 프로비저닝 전략을 기반으로 한 모바일 폰 미들웨어의 설계)

  • Jeong, Hyun-Jin;Won, You-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.89-98
    • /
    • 2007
  • In these days, the use of context in application running on mobile devices such as PDAs and smart Phone has become a crucial requirement for several research areas, including ubiquitous computing. mobile computing. Previous middlewares which support context provisioning uses single strategy. But, this paper proposed middleware integrated multiple strategies for context provisioning, namely internal sensors-based, external infrastructure-based, and distributed provisioning in ad hoc networks. Applications can query needed context items using SQL like context query language and require context information to use different provisioning mechanisms depending on resource availability and presence of external infrastructures.

  • PDF

A Study on Hierarchical Overlay Multicast Architecture in Mobile Ad Hoc Networks (Mobile Ad Hoc 네트워크를 위한 계층적 오버레이 멀티캐스트 구조 연구)

  • Kim, Kap-Dong;Park, Jun-Hee;Lee, Kwang-Il;Kim, Hag-Young;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.627-634
    • /
    • 2006
  • Overlay network eliminates the need to change the application-layer tree when the underlying network changes and enables the overlay network to survive in environments where nonmember nodes do not support multicast functionality. An overlay protocol monitors group dynamics, while underlying unicast protocols track network dynamics, resulting in more stable protocol operation and low control overhead even in a highly dynamic environment. But, if overlay multicast protocols does not know the location information of node, this makes it very difficult to build an efficient multicasting tree. So, we propose a Hierarchical Overlay Multicast Architecture (HOMA) with the location information. Because proposed architecture makes static region-based dynamic group by multicast members, it is 2-tired overlay multicasts of application layer that higher layer forms overlay multicast network between members that represent group, and support multicast between multicast members belonging to region at lower layer. This use GPS, take advantage of geographical region, and realizes a region-sensitive higher layer overlay multicast tree which is impervious to the movements of nodes. The simulation results show that our approach solves the efficiency problem effectively.