Addressing Scalability in Mobile Ad hoc Networks

نویسنده

  • Warren Kenny
چکیده

Mobile Ad hoc Networks (MANETs) are wireless networks comprised of nodes which exhibit varying mobility and availability. Such networks are highly volatile, with network membership changing unpredictably over time. As Wifi-enabled mobile devices such as smartphones have become more ubiquitous and powerful, new applications which utilize ad hoc networking have emerged such as mobile multiplayer games and data sharing applications. Such applications currently work within single-hop distances, however, in the future multi-hop connections may be required in order to enable communication at increased distances. In such a scenario, routing protocols which can operate at high device densities and cope with large networks will be needed. The provision of routing information can, however, have a detrimental effect on application throughput and network scalability due to medium access limitations and radio interference. Attempting to provide relevant routing information without negatively impacting MANET usability represents a significant challenge. Existing approaches to routing in MANETs attempt to reduce these effects through the use of intelligent forwarding algorithms, flood propagation restrictions, dependence on geographical information or combinations of these approaches. These approaches are based upon wired network routing protocols which attempt to route packets to nodes with specific and unique identities or addresses. In a MANET, however, the identities of nodes may not be known in advance. Thus address or identity-based routing makes little sense in a MANET context. Additionally, the overheads generated by existing protocols when distributing routing information for every node or flooding queries throughout the network can have a significant negative impact on application throughput and network scalability. In recent years, new communication approaches have emerged, such as protocols designed to dynamically discover services and resources in the network. These protocols attempt to provide information regarding available services to interested clients. This function is necessary as uncertainties regarding network membership and node capability caused by mobility and limited battery capacity make the use static associations between services and specific node

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013