This website uses cookies to ensure you have the best experience. Learn more

Adhoc Networks Essay

3058 words - 12 pages

Reliable Broadcasting in Mobile Ad-Hoc Networks


In a mobile ad-hoc network, providing a reliable broadcast is one of the most important requirements. In broadcasting, a source node sends a message to all the other nodes in the network. Broadcasting operation is expected to be executed more frequently in mobile ad-hoc networks MANETs. So the number of retransmissions in the broadcast has to be minimized. The reliable broadcast service ensures that all the hosts in the network deliver the same set of messages to the upper layer. The protocols that are used in wired networks are unsuitable for deployment on MANETs, as these do not take into account the node mobility, network load and congestion. There have been a lot of protocols which are proposed for reliable broadcasting in MANETs. A straight forward way is by Simple Flooding [1, 2] which is very costly and very inefficient. The other protocols are Probability based methods [3], Area Based Methods [3] and Neighbor Knowledge Methods [4, 5, 6 and 7]. Also, efficiency and reliability conflict with each other. Hence it is hard to achieve both at a time with just one scheme. This paper will aim at proposing improvements for reliable broadcasting in MANETs.


The drastic improvements in the wireless communications and portable wireless devices have made mobile computing a reality. Recently, Mobile Ad Hoc Networks (MANETs) has attracted a lot of attention and research. MANETs are made of a group of independent mobile hosts which communicate with each other. A mobile host may not be able to communicate directly with all the other hosts. So, the packets traverse various intermediate nodes before reaching the destination. All the nodes in the network assist in routing. The ad-hoc networks are created dynamically on the fly. The hosts are allowed to move around in the network. Routing protocols in ad-hoc networks should provide means to deliver packets to destination nodes given these dynamic topologies.

Applications of MANETs occur in battle-fields, major disaster and some business environments where networks need to be deployed immediately without any base stations or fixed networks.

Broadcasting is process by which a source node sends a message to all the other nodes in the entire network. Broadcasting operation is expected to be executed more frequently in mobile ad-hoc networks MANETs. Ad hoc On-Demand Distance Vector (AODV) [10] and Dynamic Source Routing (DSR) [9] are the two most widely studied unicast on-demand ad-hoc routing protocols which use broadcasting. These broadcasts use flooding which is inefficient and very costly. The other protocols that use broadcasting are Probability based methods [3], Area Based Methods [3] and Neighbor Knowledge Methods [4, 5, 6 and 7]. Since broadcasting is the most basic operation in ad-hoc networks, the reliability of the broadcast is one of the most important requirements. This...

Find Another Essay On Adhoc Networks

SHARP: A Joint Spectrum Allocation, Handover and Routing Protocol for Cognitive Radio Ad Hoc Networks

1647 words - 7 pages • Mobility • Agility In the reactive routing algorithms proposed for adhoc multi-hop networks, hop-count and ETX are key measures for route selection in DSR and AODV algorithms [??]. The expected number of transmissions (ETX) required for achieving success is a commonly used metric for routing in wireless multi-hop, ad¬hoc networks, especially when they suffer from instability in link quality [9, 38, 4, 15]. The ETX is based on measuring the loss

Detecting and Responding to Malicious Misbehavior in MANETs

2485 words - 10 pages in MANET some nodes are unwilling to forward the nodes to the next node. Such kinds of nodes are called the Selfish Nodes. Selfish nodes are unwilling to forward the packets in order to save their battery power, memory and CPU time.As, a selfish node will not cooperate in the transmission of packets which affects the network performance very badly. Watchdog detects this kind of selfish nodes in the mobile adhoc networks. Collaborative watchdog

Wireless Mobile Ad Hoc Mobile Networks Help Security

1502 words - 7 pages residualenergy, path stability and estimated energy for datatransmission. It also maintain alternate path, whichcan be used before link break occurs to reduce thepath breakage. Control overhead is greatly reduceddue to constrained flooding and maintenance ofalternate path. In [12], an efficient secure routing protocol(ASRP) to ensure the routing security in adhoc networks is proposed. ASRP provides powerful security extensions to the reactive AODV protocol

Case Study: Akamai Technologies

2429 words - 10 pages generally two types of topologies one is AD-HOC network and the another one is Infrastructure network. ADHOC network is used for temporary purposes and Infrastructure are used with permanent Networks. (Forouzan, 2010) Wireless Network Wireless networking is a topology which allows or enable multiple wireless devices to communicate using some standards set of rules or protocols designed by the standard organization, but without the caballing

Probabilistic Detection of the Flood Attackers in Disruption Tolerant Networks

2481 words - 10 pages scheme is effective to detect flood attacks. The scheme works in a distributed manner, not relying on any infrastructure or online central authority, which well suits the environment of DTNs. 7. REFERENCES Amin Vahdat and David Becker, ‘Epidemic Routing for Partially Connected AdHoc Networks’, Technical Report on CS-200006, Duke University, 2000. Bryan Parno, Adrian Perrig, and Virgil Gligor, ‘Distributed Detection of Node Replication

Cuban Collection Plan

1877 words - 8 pages . It is likely that the Chinese will task there satellites in order to acquire this information. However, Cuban intelligence services do not have a location to provide to the Chinese for collection. This will remain an adhoc requirement based on cueing from open source intelligence, human intelligence, or imagery intelligence. The External Counterintelligence Division will be responsible for HUMINT operations. The DGI will continue to actively

IT matters!

4208 words - 17 pages , invoices and shipping notifications electronically via electronic data interchange (EDI) over private communication networks called value-added networks (VANs).By 1990s, the use of the Internet for procurement purposes brings further benefits such as lower transmission costs relative to EDI and VANs and wider scope of doing business electronically with new suppliers.Companies will have to find new ways of extending customer loyalty because the shift

A successful Enterprise Resource Planning (ERP) system implementation requires integration of technology with business strategy and assessing the impact of the system on all aspects of the business;

9755 words - 39 pages -house. Outsourcing is really two types of service: ITO - IT Outsourcing, involves a third party who is contracted to manage a particular application, including all related servers, networks, and software upgrades". (ERP Systems: Glossary)ASP It is another term that refers to "Application Service Provider" and provides applications to individuals or organizations across the Internet or other network connections. Hosted applications can vary, but

A Comparative study On HDFC Bank v/s SBI Bank services

9239 words - 37 pages commercial banks of about 25% in deposits and advances.State Bank of India has often acted as guarantor to the Indian Government, most notably during Chandra Shekhar's tenure as Prime Minister of India. With more than 10000 branches and a further 6500+ associate bank branches, the SBI has extensive coverage. State Bank of India has electronically networked all of its branches under Core Banking System(CBS). The bank has one of the largest ATM networks in

When the Bubble Burst

1539 words - 6 pages By the time I arrived state side from my second tour in the Middle East the housing bubble had already burst. I noticed a drastic change in the way that many of my friends and family were living. Several of my friends that worked in real estate had sold their boats and seconds houses. My own stock portfolio had lost a third of its value. My sister and her husband had defaulted on their home mortgage leaving them scrambling for a place to live. I

phase diagram

4456 words - 18 pages Introduction: Chemical equilibrium is a crucial topic in Chemistry. To represent and model equilibrium, the thermodynamic concept of Free energy is usually used. For a multi-component system the Gibbs free energy is a function of Pressure, Temperature and quantity (mass, moles) of each component. If one of these parameters is changed, a state change to a more energetically favorable state will occur. This state has the lowest free energy

Similar Essays

An Advanced Grammatical Evolution Approach For Intrusion Detection In Manet

1347 words - 6 pages mobile adhoc networks. In Proceedings of the ACM wireless security(wisi’09) pp.95-102, ACM, 2009. [2] Y. Huang and W. Lee. A cooperative intrusion detection system for ad hoc networks. In In Proc. Of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003. [3] B. Sun, K. Wu, and U. Pooch. Zone-based intrusion detection for mobile ad hoc networks. Int. Journal of Ad Hoc and Sensor Wireless Networks, 2(3), 2003. [4] T. D. Garvey and T

The History Of Communication Leading Up To The 4 G

832 words - 4 pages one further step to 3G technology networks. wireless service providers are upgraded the 2G networks to 2.5 networks because of the subscribers demand and the 2G architecture remains same to give better voice and data applications. Many users will not wait until the final 3G technology so that in 2.5 G like IS-54 , IS -136 , IS-95 , IS-95A , IS - 95B technologies were launched. GPRS technology is a midway of 2G and 3G. It uses packet switching

Wireless Technology Essay

1670 words - 7 pages of other layers [20]. However, these congestion control techniques do not apply directly to adhoc networks because the ad hoc network is challenged by limited wireless bandwidth, power constraints, route failures due to node mobility and limited buffer size. The final result is high packet-loss rate, re-routing instability, loss of energy, bandwidth and retransmission of lost packets, which means that even more packets are sent into the network

Refining Tcp´S Rtt Dependent Mechanisms With An Advent Of Link Retransmission Delay Measurement In Wireless Lan

3133 words - 13 pages -TCP) for multi-hop wireless networks, EURASIP Journal on Wireless Communications and Networking, (2013), 2013:149, DOI:10.1186/1687-1499-2013-149. [8] F. Foukalas, V. Gazis and N. Alonistioti., Cross-layer design proposals for wireless mobile networks: a survey and taxonomy, IEEE Communication Surveys and Tutorials, 10(1), (2008), pp: 70–85. [9] AM Al-Jubari, M Othman, BM Ali, NAWA Hamid., TCP performance in multi-hop wireless adhoc networks