Academia.eduAcademia.edu

Ad-Hoc Network

description30 papers
group137 followers
lightbulbAbout this topic
An ad-hoc network is a decentralized wireless network that enables devices to communicate directly with each other without relying on a pre-existing infrastructure or centralized management. These networks are typically formed spontaneously and can dynamically configure themselves to accommodate changing network conditions.
lightbulbAbout this topic
An ad-hoc network is a decentralized wireless network that enables devices to communicate directly with each other without relying on a pre-existing infrastructure or centralized management. These networks are typically formed spontaneously and can dynamically configure themselves to accommodate changing network conditions.

Key research themes

1. How do routing protocols adapt to dynamic topology and resource constraints in mobile ad hoc networks?

This research area investigates routing protocol designs that effectively handle the inherent characteristics of ad hoc networks such as dynamic and volatile topologies, limited battery power, bandwidth constraints, and the lack of centralized infrastructure. Efficient routing is vital for maintaining network connectivity, minimizing overhead, and conserving energy in highly mobile scenarios.

Key finding: Introduces the Dynamic Source Routing (DSR) protocol tailored for ad hoc networks that dynamically discovers routes only when needed and uses source routing to explicitly list the nodes in the packet header. Simulation... Read more
Key finding: Evaluates the performance of the AODV routing protocol, a reactive routing approach that discovers routes on-demand combined with maintaining loop-free, up-to-date routes through sequence numbers. The paper experimentally... Read more
Key finding: Compares proactive routing protocol DSDV and reactive protocol DSR to establish the impact of routing strategies on routing overhead, delay, and packet delivery ratios in MANETs. Findings highlight that proactive protocols... Read more
Key finding: Investigates the interaction of P2P applications running over MANETs using DSDV, DSR, and AODV protocols. The study reveals that while all protocols have strengths, their performance varies by scenario and metric, confirming... Read more
Key finding: Develops and experimentally evaluates a Multipath Source Routing (MSR) protocol extending DSR by enabling simultaneous use of multiple disjoint paths with selection metrics based on delay and path independence. Real testbed... Read more

2. What are the fundamental challenges and emerging solutions for managing network resources and ensuring QoS in infrastructure-less ad hoc networks?

This theme focuses on addressing critical issues such as energy consumption, bandwidth limitations, network congestion, and quality of service provisioning in ad hoc networks. It covers cross-layer design considerations and proposes architectural models and protocols that incorporate context awareness, hierarchical organization, and congestion control mechanisms to optimize network performance and resource utilization.

Key finding: Provides a comprehensive overview of cross-layer challenges in ad hoc networks including antenna design, routing, security, and energy management, emphasizing the necessity for new solutions tailored for volatile topologies... Read more
Key finding: Proposes BEAD, a beacon-assisted discovery protocol operating between MAC and network layers to efficiently form topology in three-tier hierarchical ad hoc networks. Simulation results demonstrate that BEAD significantly... Read more
Key finding: Develops a network and application layer architecture integrating context-awareness into ad hoc networking that enables dynamic service discovery and adaptability to changing environments. The proposed Context Based Service... Read more
Key finding: Implements ConZone, a congestion control mechanism designed to mitigate packet loss and routing overhead in MANETs by rerouting congested packets through alternative paths and prioritizing critical data. Experimental results... Read more
Key finding: Presents a generic routing framework balancing energy-efficient broadcast schemes with connectivity maintenance in wireless ad hoc networks. The study's simulation demonstrates that optimized broadcast and routing algorithms... Read more

3. How can ad hoc networks be structured and evaluated to support emerging applications requiring multi-hop connectivity and extended range?

This research stream explores practical implementations, system prototypes, and real-world experimental evaluations of ad hoc networks designed for applications such as video streaming, emergency response, and mobile multimedia. It assesses network configuration, multi-hop routing protocols, and their capability to handle dynamic topologies and maintain quality in application-driven scenarios.

Key finding: Develops a multi-hop ad hoc network prototype using Raspberry Pi 3 devices and OLSR protocol to extend the communication range of Quad-Copters for video streaming. Experimental evaluations confirm the capability of the... Read more
Key finding: (also relevant here) Demonstrates via packet-level simulations in varied host density and mobility scenarios that DSR performs well with minimal routing overhead and near-optimal path lengths, making it suitable for... Read more
Key finding: (also relevant here) Through simulation of P2P file sharing over MANETs, evaluates routing protocols' influence on distributed application performance, highlighting the need for integrated protocol and application design in... Read more
Key finding: (also relevant here) Provides an experimental demonstration that multipath source routing improves network throughput and reliability in real wireless testbeds, illustrating practical enhancements for multi-hop ad hoc... Read more

All papers in Ad-Hoc Network

Nowadays, the cross-layer design approach is the most relevant concept in mobile ad hoc networks which is adopted to solve several open issues. It aims to overcome ad hoc networks performance problems by allowing protocols belonging to... more
by beei iaes and 
1 more
The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in web security. XSS attacks continue to be a prevalentand severe threat to web applications, making the need for robust detectionsystems more... more
Traditional internet QoS protocols like RSVP cannot be easily migrated to the wireless environment due to the error-prone nature of wireless links and the high mobility of mobile devices. The Internet Engineering Task Force (IETF), the... more
Traditional internet QoS protocols like RSVP cannot be easily migrated to the wireless environment due to the error-prone nature of wireless links and the high mobility of mobile devices. The Internet Engineering Task Force (IETF), the... more
Wireless Ad-Hoc Sensor Networks A Mobile Ad-hoc Network (MANET) is a self-ruling gathering of versatile clients that convey over generally transfer speed obliged remote connections. Following the hubs are versatile, the system topology... more
The working range of Ad-hoc network will spread in coming future due to dynamic nature. However, there will be the risk of spreading wrong routing information, packet dropping and selective forwarding in the network which further leads to... more
Cloud and Internet of things application are growing day by day. Most of the organization are using the cloud storage services for own application. IOT application are building under the 5G wireless communication technologies. Security is... more
Recently there is a huge interest in designing and implementing systems that can be used in surveillance and emergency situations. These systems are designed and implemented using two main technologies that are: Mobile Adhoc Networks... more
Recently there is a huge interest in designing and implementing systems that can be used in surveillance and emergency situations. These systems are designed and implemented using two main technologies that are: Mobile Adhoc Networks... more
A wireless network node with the Omni antenna tends to cause problems called "Hidden Node" and "Exposed Node". RTS/CTS mechanism has been introduced to mitigate Hidden Node and most of existing researches assume that RTS and CTS are sent... more
the nodes in the network act as router. The router forwards data packets from one node to another. A router is connected to at least two networks, commonly two LANs or WANs. Routers are located at gateways, the places where two or more... more
Home range and habitat selection of Grey francolin (Francolinus francolinus) using radiotelemetry.
Purpose-Scalability is a fundamental problem in mobile ad hoc networks (MANETs), where network topology includes large number of nodes and demands a large number of packets in network that characterized by dynamic topologies, existence of... more
The Internet of Things (IoT) is a cutting-edge technology that was created with the goal of connecting and integrating all items globally. This technology makes it possible to be incredibly intelligent, which benefits humans in many ways.... more
In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organizations... more
Ad hoc mobile devices are set of consistent heterogeneous devices that move in an independent fashion and communicate with one another over a wireless channel. These devices are presumed to have a non-deterministic mobility pattern.... more
Decentralized wireless networks that may connect without a central hub are named Mobile Ad-hoc Networks (MANET). Attacks and threats of the most common kind can easily penetrate MANETs. Malware, APTs, and Distributed Denial of Service... more
In mobile ad-hoc networks, nodes have to transmit HELLO or Route Maintenance messages at regular intervals, and all nodes residing within its radio range, reply with an acknowledgment message informing their node identifier, current... more
In MANETs (Mobile Ad Hoc Networks) communication at the mobile nodes can be achieved by using multihop wireless links. The architecture of such network is based not on a centralized base station but on each node which acts as a router and... more
The fifth era (5G) will overwhelm in the brilliant urban areas where 5G gives every one of the offices most extreme security and privacy. As to administrations, superfluous mishap rates are expanding with digital assaults also, dangers.... more
Mobile ad hoc network (MANET) is characterized as a dynamic, multi-hop wireless self-organized distributed ad hoc network. Because of node mobility and power limitation, the network topology changes frequently which leads to path... more
Mobile computing has achieved lots of attention in recent times as a variety of mobile terminals & convenient wireless connections are available. A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes which interact over... more
The implementation of MANET for commercial purposes is not an easy task. Unlike other wireless technologies such as cellular networks, MANET face more difficult problems concerning management functions, routing and scalability. As a... more
Abstract. The implementation of MANET for commercial purposes is not an easy task. Unlike other wireless technologies such as cellular networks, MANET face more difficult problems concerning management functions, routing and scalability.... more
Mobile Ad-hoc Network (MANET) is a wireless network that comes with a few routing protocols which have varied mechanisms. Studies show that routing operations consume energy while current research focuses more on MANET routing protocol... more
In mobile ad-hoc networks, nodes have to transmit HELLO or Route Maintenance messages at regular intervals, and all nodes residing within its radio range, reply with an acknowledgment message informing their node identifier, current... more
This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing... more
Sentiment analysis in the most general sense refers to the classification of a piece of text into either of the three classes-positive, negative or neutral-according to its polarity. The text may be an entire document, a paragraph, a... more
Mobile Ad-hoc Network (MANET) is a collection of mobile nodes forming short lived or temporary networks without having any centralized infrastructure. Due to high mobility of the nodes the topology of the Ad-hoc network is highly dynamic.... more
Mobile ad hoc networks (MANETs) are an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority. The network nodes in MANET are... more
The fifth era (5G) will overwhelm in the brilliant urban areas where 5G gives every one of the offices most extreme security and privacy. As to administrations, superfluous mishap rates are expanding with digital assaults also, dangers.... more
With the increase of various applications in the domain of wireless sensor networks, the tendency to use wireless sensors has gradually increased in different applications. On the other hand, diverse traffic with different priorities... more
Merging of MANET with IOT utilized in inevitable knowledge situations opens new possibility in checking and makes another communication stage for various applications in Internet of Things (IoT). Sensors utilized for IoT applications,... more
wireless sensor network is fastly growing network used in surveillance, military, and other emergency applications. It provides a very fast and low cost data transmission, but due to battery constraint in sensor nodes used to collect or... more
Remote Network incorporates a bigger favorable position in the present correspondence application like ecological, movement, military and wellbeing perception. To understand these applications it's important to have a solid directing... more
The RTS/CTS mechanism is widely used in wireless networks in order to avoid packet collisions and, thus, achieve high throughput. In ad hoc networks, however, the current implementation of the RTS/CTS mechanism may lead to... more
Your article is protected by copyright and all rights are held exclusively by Springer Science+Business Media, LLC, part of Springer Nature. This e-offprint is for personal use only and shall not be self-archived in electronic... more
We discuss a few problems introduced by the RTS/CTS mechanism of collision avoidance and focus on the virtual jamming problem, which allows a malicious node to effectively jam a large fragment of a wireless network at a minimum expense of... more
Wireless technology is the one that provide the ability of roaming with diversity level of transmission power in mobile devices. Power availability is countered as the most important factor that constrains all of ad hoc wireless networks.... more
A MANET can be defined as an autonomous system of nodes or MSs(also serving as routers) connected by wireless links, the union of which forms a communication network modeled in the form of an arbitrary communication graph. The self... more
A MANET can be defined as an autonomous system of nodes or MSs(also serving as routers) connected by wireless links, the union of which forms a communication network modeled in the form of an arbitrary communication graph. The self... more
Nowadays heterogeneous gadgets are associated out and out through web. Such endless commitments may be benefitted and begun from the hand-held gadgets. You can ee-advanced book tickets, banking, explore the traffic, clean your obligation,... more
Wireless sensor networks usually comprise of a large number of nodes which are geographically distributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit... more
Purpose -Scalability is a fundamental problem in mobile ad hoc networks (MANETs), where network topology includes large number of nodes and demands a large number of packets in network that characterized by dynamic topologies, existence... more
Mobile ad-hoc networks (MANETs) are a specific kind of wireless networks that can be quickly deployed without preexisting infrastructures. They are used in different contexts such as collaborative, medical, military or embedded... more
The recent rapid growth of cities, the evolution of wireless/mobile technologies and diverse demanding applications, the world is becoming more and more urban. Today, wireless and mobile networks as well multimedia applications play an... more
Purpose -Scalability is a fundamental problem in mobile ad hoc networks (MANETs), where network topology includes large number of nodes and demands a large number of packets in network that characterized by dynamic topologies, existence... more
Mobile ad-hoc networks (MANETs) are a specific kind of wireless networks that can be quickly deployed without preexisting infrastructures. They are used in different contexts such as collaborative, medical, military or embedded... more
The spontaneous ad hoc network is made by a situated of nodes set together in the nearby locale for some agreeable action. A complete masterminded toward oneself protected convention utilizes the human communications related with the... more
Download research papers for free!