oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Novel QoS-aware Multipath DYMO Routing Protocol in Mobile Ad Hoc Networks
一种新的QoS感知的Ad Hoc网络多径DYMO路由协议

HAN Bing-qing,CHEN Wei,ZHANG Hong,
韩冰青
,陈伟,张宏

计算机科学 , 2010,
Abstract: DYMO is a dynamic on-demand routing protocol in mobile ad hoc networks,which is a single-path routing protocol.But multi-path routing can support QoS better than single-path routing.Firstly,the advantages and problems of DYMO protocol were analyzed.Then a novel QoS-aware multi-path DYMO routing protocol(QA-DYMO) was proposed to provide QoS and multi-path routing which establishes and utilizes multiple routes of link-disjoint paths to send data packets concurrently.Finally,a QoS-aware routing algorithm was p...
Enhanced Anomaly Detection IDS-Based Scheme for Dynamic MANET on-Demand (DYMO) Routing Protocol for MANETS  [PDF]
Anand Nayyar
International Journal of Computer Science and Mobile Computing , 2013,
Abstract: Mobile Ad hoc network (MANET) is a kind of wireless network which has no infrastructure.Security is an essential requirement in mobile ad hoc network to provide protected communication betweenmobile nodes. Due to unique characteristic of MANETs, it creates a number of consequential challenges toits security design. In this paper, we propose a new anomaly-detection scheme for Dynamic MANET Ondemand(DYMO) Routing protocol based on dynamic learning process that allows IDS system to monitor thenetwork and updating the training data at particular time interval. In the dynamic environment, a trustablenode (IDS system) in the network will do monitor process of each node in the network using dynamictraining data. The dynamic learning process involves calculating the projection distances based onmultidimensional statistics using weighted coefficients. For maintaining security the data packet are send inthe encrypted format using RSA algorithm.
Performance evaluation aodv, dymo, olsr and zrpad hoc routing protocol for ieee 802.11 mac and 802.11 dcf in vanet using qualnet  [PDF]
Manish Sharma,Gurpadam Singh
Computer Science , 2012,
Abstract: In VANET high speed is the real characteristics which leads to frequent breakdown, interference etc. Therefore Performance of adhoc routing protocols is helpful to improve the Quality of Service (QOS). In this paper we studied various adhoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration parameters like speed, altitude, mobility etc in real VANET scenario. The AODV and DYMO (Reactive), OLSR (Proactive) and ZRP (hybrid) protocols are compared for IEEE 802.11(MAC) and IEEE 802.11(DCF) standard using Qualnet as a Simulation tool. Since IEEE 802.11, covers both physical and data link layer. Hence performance of the protocols in these layers helps to make a right selection of Protocol for high speed mobility. Varying parameters of VANET shows that in the real traffic scenarios proactive protocol performs more efficiently for IEEE 802.11 (MAC) and IEEE 802.11(DCF).
An Implementation Possibilities For Aodv Routing Protocol In Real World
Nitiket N Mhala,N K Choudhari
International Journal of Distributed and Parallel Systems , 2010,
Abstract: Most of the adhoc routing protocol research work has been done using simulation only because of the difficulty of creating real implementation. In simulation the developer controls the whole system, which is in effect only a single component. An Implementation, on the other hand, needs to interoperate with a large complex system and the system components. In this paper we focus on working implementation of AODV routing protocol by means of certain design possibilities and possible opportunities for obtaining needed AODV events. We discuss the socket based mechanism particularly when AODV routing daemon communicates changes to the IP route table. The paper suggests the need of implementation of Generic Netlink Family.
PGBR Protocol for Cloud Routing Implementation in NS-3
Mr.Tushar Kailas Mendhe,Miss. P.A. Kamble,Mr. Sagarkumar S. Badhiye
International Journal of Electronics and Computer Science Engineering , 2013,
Abstract: The current internet infrastructure is fronting a number of boundaries that is not suitable to meet the growing number of services and users. In particular, one aspect that requires enhancement is routing, where original routing concepts were designed for static traffic patterns with minimal variations and supporting mainly low through put traffic (e.g. Data). As the number of users as well as services supporting the user grows, the current routing mechanisms will not be feasible. In this paper we present a gradient based distributed routing technique that is based on discovering routes through a gradient field created in the topology. The gradient calculation is based on weighted sum of a number of components, which modifies the gradient field as the network load changes. An improved version of a fully distributed routing protocol that is applicable for cloud computing infrastructure, also an implementation of the PGBR routing protocol within the ns-3 simulator. Broadband convergence networks can offer a solution for multiple service classes through integrated heterogeneous networks. However, to prepare this for the future variability in traffic demand, a dynamic routing protocol that boosts scalability, QoS awareness, and easy roadmap to deployment if necessary. The implementation using ns-3 simulator can ensure this capability.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS  [PDF]
Theodore Zahariadis,Helen Leligou,Panagiotis Karkazis,Panagiotis Trakadas
International Journal of Network Security & Its Applications , 2010,
Abstract: The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years.As this new type of networking is characterized by severely constrained node resources, limited networkresources and the requirement to operate in an ad hoc manner, implementing security functionality toprotect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware,location-based routing protocol which protects the WSN against routing attacks, and also supportslarge-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoidmalicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. Thiswork focuses on the assessment of the implementation cost and on the lessons learned through the design,implementation and validation process.
IMPLEMENTATION OF ADAPTIVE ZONE ROUTING PROTOCOL FOR WIRELESS NETWORKS
T. RAVI NAYAK,SAKE POTHALAIAH,Dr. K ASHOK BABU
International Journal of Engineering Science and Technology , 2010,
Abstract: Mobile Ad hoc wireless Networks (MANETs) that do not need any fixed infrastructure. They are characterized by dynamic topology due to node mobility, limited channel bandwidth, and limited battery power of nodes. The key challenge in the design of ad hoc networks is the development of dynamic routing protocols that can efficiently findroutes between two communicating nodes. Thus, many ad hoc routing protocols have been proposed in recent years. All these routing protocols attempt to provide a high data packet delivery ratio and low routing control traffic at the same time. These routing protocols can be classified into three categories: proactive, reactive and hybrid routing protocols.
Implementation Study of a Centralized Routing Protocol for Data Acquisition in Wireless Sensor Networks  [PDF]
Trung Hieu Pham, Xue Jun Li, Wai Yee Leong, Peter Han Joo Chong
Wireless Sensor Network (WSN) , 2011, DOI: 10.4236/wsn.2011.35019
Abstract: Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency are the main concerns when designing a routing protocol for WSNs with low complexity. There are various existing design approaches, such as data-centric approach, hierarchical approach and location-based approach, which were designed for a particular application with specific requirements. In this paper, we study the design and implementation of a routing protocol for data acquisition in WSNs. The designed routing protocol is named Centralized Sensor Protocol for Information via Negotiation (CSPIN), which essentially combines the advertise-request-transfer process and a routing distribution mechanism. Implementation is realized and demonstrated with the Crossbow MicaZ hardware using nesC/TinyOS. It was our intention to provide a hand-on study of implementation of centralized routing protocol for WSNs.
Implementation and Test of a Secure Mechanism's Modules in Routing Protocol of MANETs with the Theory of Games  [PDF]
Karim KONATE,Abdourahime GAYE
International Journal of Network Security & Its Applications , 2012,
Abstract: The present work is dedicated to the implementation of a secure mechanism’s modules in routing protocol of MANET with the theory of games. First we are doing an introduction to what the Mobile Ad hoc Networks (MANETs) and a presentation of some various attacks in MANETs pertaining to fail routing protocols. We study these attacks and the mechanisms which the secured routing protocols use to counter them. In the second hand we also study a reputation mechanism and we also propose a secure algorithm based on the reputation. Our work ends with a proposal analytical model by the theorical games and an implementation to the modules of our mechanism..
Timeserving Routing Protocol Implementation to accomplish best throughput and fairness  [cached]
Narasimha Rao V L Potta,B. Sarath Kumar
International Journal of Computer & Electronics Research , 2012,
Abstract: The latest technology for next generation Wireless networking is Wireless Mesh Networks (WMNs), with low cost and easy deploying. The WMNs are desirable for communication paradigm. The WMNs are more advantageous over other wireless networks. The existing routing protocols which transmits the traffic through pre-determined path which don’t provide security. This paper proposes a routing protocol called simplistic constructive routing protocol (SPRP) which supports multiple flows in wireless mesh networks. There are four major components in the SPRP which provides fairness and high throughput: 1) To minimize the multiple data transmissions Constructive forwarding path selection to provide multiple paths while minimizing duplicate transmissions, 2) Constructive rate control to determine an appropriate transfer rate according to the current network conditions. 3) Inter node loss recovery to efficiently find and resend lost packets, and 4) clock-based forwarding to let only the priority node to forward the traffic. Our result shows that SPRP significantly performs existing routing and a pivotal time serving routing protocol.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.