Secure routing in Mobile Ad hoc Networks (MANETs) has emerged as an important MANET research area. Existing works in MANET focused mainly on the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering the security of the routing process. This work proposes a secure routing protocol after an in-depth evaluation and performance analysis of MANET protocols, and security.
Over the last few years, the use of the internet services and applications such as phone calls, e-mails, video conferencing, catch up TV, audio and video streaming in general, which heavily rely on the network communications has increased. Reliable connections between the end users are vital for providing such internet services. In such networks, link or node failures can occur suddenly and without any notifications which will make more interruptions for the data transmission between source and destination. Hence, the network performance will be reduced significantly since more time is needed to reroute the traffic, which can create sever interruptions for delay sensitive services such as voice and video. A pre-computed backup path in advance can provide a valuable solution to reroute the data packets during the network recovery time. In this book, we study several factors to compute the backup path between source and destination such as (network design, Bandwidth, Shortest path). We show results of several efficient algorithms that have been implemented to compute the best backup route until the routing protocol re-updates the new routing table.
The book presents the audio signals transmission over the fixed and mobile wireless networks. Also, it focus on the mobility effects on the amount of lost packet and the quality of the received audio signals. The mobility effects on the audio signals is studied with different velocity using the Jakes model. There are many the proposed approaches are presented for combating the mobility bad effects and enhancing the traditional techniques of the sender-based packet loss error recovery. an inefficient error recovery based on weak FEC scheme can be converted to efficient sender based error recovery if merged with powerful data randomizing tool.
MANET field is one of the most vibrant and active research fields in wireless communications networking. MANET can be built around any wireless technology. Wireless communication networks have witnessed recently the introductory of a promising transmission technology called UWB. In MANET, routing protocols are needed to establish and maintain connections between nodes. The main goal of this thesis is to design efficient routing protocols for MANET based on UWB technology in a production line in a factory which is an industrial indoor application. The production line network scenario was defined and simulated in ns-2 simulator as basis for the investigations. In these investigations, AODV, DSR, and OLSR were considered. In addition, closed-form formulas were found for the channel capacity of MANET as a tool for benchmarking and validation. Based on the investigations, two approaches were proposed to design efficient routing protocols for the production line scenario. Based on the first approach, a new routing protocol was designed and it was called Ad-Hoc On-Demand Multipath Source Routing protocol.
This book provides up to date coverage of the basics of ATM and internet protocols, and characteristics of satellite networks and internetworking between satellite and terrestrial networks Satellite Networking: Principles and Protocols, Second Edition provides up to date information of the original topics in satellite networking and protocols focusing on Internet Protocols (IP) over satellites, broadband over satellites, next generation IP (IPv6) over satellites, new generation of DVB-S/S2 and DVB-RCS next generations and new services and applications. It also includes some analytical techniques for evaluation of end to end IP performance and QoS over satellite, reflecting the recent convergence of telecommunication, Internet, broadcasting and mobile networks. Topics new to this edition: Internetworking with MANET, DVB-S/S2 and DVB-RCS/RCS2 (including TCP/IP over DVB-S/RCS), recent developments in broadband satellite systems, convergence of services and network technologies (including Internet, telecom, mobile, TV, etc.), radio resource management, PEP, I-PEP, SCPS, traffic modelling and engineering with analysis and examples, and future developments of satellite networking. Provides up to date coverage of the basics of ATM and internet protocols, and characteristics of satellite networks and internetworking between satellite and terrestrial networks (e.g. mobile ad hoc networks), including coverage of new services and applications (e.g. Internet, telecom, mobile and TV) Discusses the real-time protocols including RTP, RTCP and SIP for real-time applications such as VoIP and MMC, and explains TCP/IP over satellite and evolution of IPv6 over satellite and beyond
Wireless Sensor Networks is an emerging technology in the field of Information and Communication Technology.The emergence of compact, low-power, wireless communication sensors and actuators in the Technology supporting the ongoing miniaturization of processing and storage, allows for entirely new kind of embedded system. Wireless Sensor Networks involve small, energy-efficient devices, hardware/software co-design and networking support. The need of the hour is to make these networks energy-efficient. The book would be useful for the researchers as well as practitioners working in the field of Computer Networks.
Congestion management in multistage interconnection networks is a serious problem not completely solved. In order to avoid the degradation of network performance when congestion appears, several congestion management mechanisms have been proposed. Most of these mechanisms are based on explicit congestion notification. For this purpose, switches detect congestion and depending on the applied strategy, packets are marked to warn the source hosts. In response, source hosts apply some corrective actions to adjust their packet injection rate. Although these proposals seem quite effective, they either exhibit some drawbacks or are partial solutions. Some of them introduce some penalties over the flows not responsible for congestion, whereas others can cope only with congestion situations that last for a short time. We present different strategies to detect and correct congestion in multistage interconnection networks, and propose new mechanisms targeted to this kind of lossless networks, and based on more refined packet marking strategies combined with a fair set of corrective actions, that makes the mechanisms able to effectively manage congestion regardless of the congestion degree.
Recently, many researchers have become interested in MANET (Mobile Ad-hoc NETworks) to create a self-configurable network without an existing communication infrastructure. This type of networks could be widely deployed in our society for inter-vehicle communication, rescue operations or entertaining applications. One of the most important points in a MANET is to decide the best routing protocol to handle its applications. The performances of a routing protocol are strongly connected with the environmental characteristics making its choice a challenging task. In this research, the results of a detailed performance evaluation on several MANET routing protocols working under realistic environments are presented. The routing protocols, mobility models and other aspects are explained and discussed in order to accurately use them to represent real-life conditions.
Wireless local area networks (WLANs) have traditionally been used to transport only data, but are now being used to carry voice traffic as well as provided new combined voice and data services. Voice over WLANs also offers more flexibility than wired networks (changes to a WLAN don't require changes to installed wiring) and greater capacity than wired networks. This book provides a solid overview of voice over WLANs/VoIP (voice over internet protocol) technology, including voice coding, packet loss, delay and jitter, and echo control. It shows how to combine both WLAN and VoIP technology to create effective voice over WLAN systems. Gives complete details on integrating voice and data services on WLANs, including wide area networks. Explores quality of service (QoS) and security issues. Step-by-step descriptions of how to plan and implement voice over WLAN networks.
Recent advances in communication technology are enabling implementation of different types of network in various environments. One such network is Mobile Ad-Hoc Network (MANET). The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic which is done by several routing protocols. The design problem of such a routing protocol is not simple since an ad-hoc environment introduces new challenges that are not present in fixed networks. With the advent of the scenarios seeking infrastructure-less network with wireless nodes, security concerns have made the required personnel to mull over the MANET configuration using different protocols for various sized networks. This work is carried out to simulate the MANET using GloMoSim and to propose the enhancement in the quality of service by addressing the security concerns that loom on this specific network.The project discusses various categories of protocols proposed for the MANET, applications that are found out of this network, overview of the AODV protocol and most importantly the simulations that are carried out.
Wireless communication between mobile users is becoming more popular these days due to advances in hardware and software techniques like mobile computers and wireless data communication devices such as wireless modems and wireless LANs.Infrastructure independence of Mobile Ad-hoc Networks gives them an edge over the cellular networks. Mobile Ad-hoc Network (MANET) is still under development.Ad hoc On Demand Distance Vector Routing (AODV) is one of the most important protocols for MANET because of its relatively low overhead & route convergence property. As AODV being the most successful MANET routing protocol, it has been further enhanced by many researchers by working on its different aspects. This work focuses on one important parameter of routing protocols i.e. ‘Routing Overhead’, which directly affects Energy Efficiency & Scalability of networks. Two of the AODV processes, Route Discovery and Hello load adds the most to routing overhead of AODV. Enhanced AODV (EAODV) performs better in terms of routing overhead, hello load end to end delay than classic AODV. The simulation is done through Network Simulator-2 (NS-2) from Berkeley.
Mobile ad hoc networks (MANETs)are collections of mobile nodes, dynamically forming a temporary network without centralized administration. These nodes can be arbitrarily located and are free to move randomly at any given time, thus allowing network topology and interconnections between nodes to change rapidly and unpredictably. Transmission control protocol provides reliability, end-to-end congestion control mechanism, byte stream transport mechanism, flow control, and congestion control. There has been significant research activity over the past year into performance of such networks with the view to develop more efficient and robust TCP variants. so over aim is to find best TCP variants in Mobile Adhoc Networks.
Mobile opportunistic networks are formed by mobile users who share similar interests and connect with one another by exploiting Bluetooth and/or WiFi connections. Such networks not only re-assemble the real-world interaction between people, but also can effectively propagate data among mobile users. This book focuses on QoS-aware data query and transmission in mobile opportunistic networks. This book consists of six chapters. Chapter 1 provides an introduction to the mobile opportunistic networks. Chapter 2 discusses the background, related work and motivation of this book. Chapter 3 presents efficient data query in mobile opportunistic networks. Chapter 4 introduces efficient quality-of-service (QoS) support in mobile opportunistic networks. Delay-constrained least-cost multicasting in mobile opportunistic networks is discussed in Chapter 5. Finally, Chapter 6 concludes the book.
Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies without communication infrastructure. This network may change rapidly and unpredictably. Application of ad hoc networks includes Academic Environment Applications, Health Care Applications, Military Applications, Bluetooth, and Personal Area Network. A service can be any tangible or intangible thing that can be useful for someone, a service can be a hardware service like a printer that can be used by a mobile device to print a file. Service discovery is defined by using one or two of Pull and Push Mechanisms. Security is a main challenge in MANETs. We propose a Secure Service Discovery Protocol for ad hoc networks (SPDPh). Simulation results of (SPDPh) and (PDP) using simulator (Ns-2) shows the extent of efficient secure service discovery protocol for ad hoc networks.