Academic literature on the topic 'MANETs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MANETs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "MANETs"

1

Sirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.

Full text
Abstract:
Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET’s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET’s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
2

Eltahlawy, Ahmed M., Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. "A Survey on Parameters Affecting MANET Performance." Electronics 12, no. 9 (April 22, 2023): 1956. http://dx.doi.org/10.3390/electronics12091956.

Full text
Abstract:
A mobile ad hoc network (MANET) is an infrastructure-less network where mobile nodes can share information through wireless links without dedicated hardware that handles the network routing. MANETs’ nodes create on-the-fly connections with each other to share information, and they frequently join and leave MANET during run time. Therefore, flexibility in MANETs is needed to be able to handle variations in the number of existing network nodes. An effective routing protocol should be used to be able to route data packets within this dynamic network. Lacking centralized infrastructure in MANETs makes it harder to secure communication between network nodes, and this lack of infrastructure makes network nodes vulnerable to harmful attacks. Testbeds might be used to test MANETs under specific conditions, but researchers prefer to use simulators to obtain more flexibility and less cost during MANETs’ environment setup and testing. A MANET’s environment is dependent on the required scenario, and an appropriate choice of the used simulator that fulfills the researcher’s needs is very important. Furthermore, researchers need to define the simulation parameters and the other parameters required by the used routing protocol. In addition, if the MANET’s environment handles some conditions where malicious nodes perform network attacks, the parameters affecting the MANET from the attack perspective need to be understood. This paper collects environmental parameters that might be needed to be able to set up the required environment. To be able to evaluate the network’s performance under attack, different environmental parameters that evaluate the overall performance are also collected. A survey of the literature contribution is performed based on 50 recent papers. Comparison tables and statistical charts are created to show the literature contribution and the used parameters within the scope of the collected papers of our survey. Results show that the NS-2 simulator is the most popular simulator used in MANETs.
APA, Harvard, Vancouver, ISO, and other styles
3

Divya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.

Full text
Abstract:
MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. )e main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2.
APA, Harvard, Vancouver, ISO, and other styles
4

Debnath, Sumon Kumar, Mousumi Saha, Md Manowarul Islam, Prodip Kumar Sarker, and Ileas Pramanik. "Evaluation of Multicast and Unicast Routing Protocols Performance for Group Communication with QoS Constraints in 802.11 Mobile Ad-hoc Networks." International Journal of Computer Network and Information Security 13, no. 1 (February 8, 2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.01.01.

Full text
Abstract:
In Mobile Ad-hoc Network (MANET), portable devices like smartphones, or laptop PC can join together to make provisional networks without any infrastructure The objective of multicast or unicast protocols is to ensure an efficient route formation and flow control mechanism which is a very challenging issue for many group computing services in MANETs. MANETs can support several real-time applications like emergency rescue, and disaster relief operations which require minimum Quality of Service (QoS) to handle high traffic. Providing QoS for multimedia and group-oriented computing in MANETs becomes a real challenge due to the wireless medium and the mobility of operating nodes. Therefore, an investigation of routing protocols for one-to-many or many-to-many computing is important that supports acceptable QoS in MANETs. Numerous QoS metrics have been considered for the assessment like packet delivery ratio, latency, packet loss rate, control overhead, and throughput. By considering different network topologies and scenarios with different performance parameters, the primary goal of this study is to explore the challenges and factors for QoS services in MANET’s multicast communication. The outcomes of investigation can be used to design the future MANET protocol for multimedia applications. The performance results indicate that the increasing number of sending/receiving nodes may increase the overhead or latency of the network but capable of providing higher network throughput, carried out in NS-2. The results also indicate although MANETs can induce errors and packets are lost as part of the normal operating context, multicast AODV practice superior to the unicast protocol to various QoS in a wide range of scenarios with less overhead.
APA, Harvard, Vancouver, ISO, and other styles
5

Kurni, Muralidhar, and Saritha K. "‘Power-as-a-Service’ – A Hierarchical On-Demand Charging Model for Recharging the Mobile Nodes of MANETs." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (June 18, 2021): 170. http://dx.doi.org/10.3991/ijim.v15i12.23081.

Full text
Abstract:
Battery energy is a crucial issue that limits battery-powered mobile devices’ operational efficiency in Mobile Ad hoc Networks (MANETs). Failure of a node affects both the lifetime and connectivity of a MANET, which has to initiate finding a new route from source to destination. This initiation causes more energy consumption in nodes. Failure of a node also causes network partitions, thereby resulting in sparse networks being formed. Existing energy-efficient strategies only defer the end of a node’s battery lifetime; they could not guarantee the MANET’s nonstop functioning. To address the issues caused by battery depletion, this paper proposes a “Cloud” oriented approach called Power-as-a-Service (PaaS), a hierarchical on-demand charging model for recharging the mobile nodes of the MANET. In PaaS, the MANET is alienated into non-overlapping disjoint zones, and for each zone, one Zone Charging Cloud Node (ZccN) is deployed to recharge the mobile nodes of that particular zone wirelessly. A High-power Charging Cloud Node (HccN) is deployed to wirelessly recharge the ZccNs in the MANET for the entire network. In PaaS, the ZccN recharges both the selected node for recharge and other nodes around the selected node that requested recharge and has higher power transfer efficiency. This strategy of PaaS improves the charging efficiency of cloud chargers by minimizing the urgent charging requests in the future, and thus the operational efficiency of the MANET improves. Extensive simulations indicate that the proposed PaaS model with a hierarchy of cloud chargers improves the operational efficiency of MANETs in terms of reducing the death rate of mobile nodes, thereby improving the lifetime and connectivity probability of MANETs.
APA, Harvard, Vancouver, ISO, and other styles
6

Kanellopoulos, Dimitris N. "Congestion Control for NDN-Based MANETs." Journal of Organizational and End User Computing 33, no. 5 (September 2021): 111–34. http://dx.doi.org/10.4018/joeuc.20210901.oa6.

Full text
Abstract:
A mobile ad hoc network (MANET) has several intrinsic features that create unique queuing dynamics, and thus congestion control inside a MANET must be achieved under time-critical conditions. Meanwhile, the Named Data Networking (NDN) architecture ensures traffic optimization and has attracted renewed attention as part of the future internet. The synergy between NDN and MANETs can be exploited in order to improve the performance of dynamic content routing and congestion control mechanisms. This overview identifies the key concepts involved in congestion control for NDN-based MANETs. It also proposes some criteria for categorising existing congestion control solutions for NDN-based MANETs and discusses the advantages and disadvantages of each category. Future challenges regarding congestion control for NDN-based MANETs are also highlighted.
APA, Harvard, Vancouver, ISO, and other styles
7

Nourildean, Shayma Wail, Yousra Abd Mohammed, and Abdulkreem Mohammed Salih. "Mobile Ad Hoc Network Improvement against Jammers for Video Applications Using Riverbed Modeler (v17.5)." Webology 19, no. 1 (January 20, 2022): 1446–59. http://dx.doi.org/10.14704/web/v19i1/web19096.

Full text
Abstract:
MANETs (Mobile Ad hoc Networks) had become the most important next generation wireless network technologies. It is made up of self-configurable mobile nodes, Intruders mieght decrease MANET functionality due to the dispersed and wireless nature of MANETs, and therefore they were vulnerable to numerous attacks at different levels. The important challenges for MANET were the security and routing protocols. This paper examined the impact of Jammer which it was a kind of DoS attack which interfere with the normal operation of network and show how the Jammer increased the delay and data dropped and decreased the throughput which they were the important parameters for the measurements of network performance. This performance could be improved using routing protocols (AODV, DSR, OLSR and GRP). Riverbed Modeler Academic Edition (17.5) was utilized for this study in number of modeled scenarios for video applications. The results address the impact of Jammers and show that the MANET's Routing Protocols could improve the throughput and data dropped of the network but on the expense of increasing the delay.
APA, Harvard, Vancouver, ISO, and other styles
8

Al Sharah, Ashraf, Taiwo Oyedare, and Sachin Shetty. "Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/4289176.

Full text
Abstract:
Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.
APA, Harvard, Vancouver, ISO, and other styles
9

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Full text
Abstract:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Deeptha, R. "A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs." Webology 18, Special Issue 04 (December 8, 2021): 1479–98. http://dx.doi.org/10.14704/web/v18si04/web18286.

Full text
Abstract:
Mobile Ad Hoc NETwork (MANET) is the most desired topic of research amidst researchers mainly because of its flexibility and independent nature of network infrastructures. MANET's unique characteristics, like the dynamic behaviour related to network topology, limited bandwidth and battery resources, make routing a challenging task. Currently, several efficient routing protocols based on topology and geographical information have been proposed for MANET. However, most of them assume a trusted and cooperative oriented environment. With the influence of adversaries, the MANET routing protocols are vulnerable to various kinds of attacks. Recently, several research efforts have been made to counter these adversarial activities. This survey investigates the latest and on demand security concerns in MANET. This paper comprehensively discusses the existing attacks in the network layer, various categories of defense mechanisms in the literature, and their benefits and defects when applying to MANET. This paper also classifies the attacks and defense mechanisms based on the routing nature, such as topological and geographical. It also discusses intrusion detection systems as well as anonymous routing in MANETs. Finally, it discusses the challenges and future directions in routing security over the MANET environment.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "MANETs"

1

Krichène, Mohamed Foued. "Contacts in MANETs." [S.l.] : Universität Stuttgart / Fakultät Informatik, Elektrotechnik und Informationstechnik, 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11144239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ur-Rehman, Shoaib, and Irshan Ullah. "Analysis of Black Hole attack on MANETs Using different MANET routing protocol." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1151.

Full text
Abstract:
ABSTRACT Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. The scope of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc on Demand Distance Vector (AODV). Comparative analysis of Black Hole attack for both protocols is taken into account. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay and network load. Simulation is done in Optimized Network Engineering Tool (OPNET). Previously the works done on security issues in MANET were based on reactive routing protocol like Ad-Hoc on Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANET.
APA, Harvard, Vancouver, ISO, and other styles
3

ULLAH, IRSHAD, and SHOAIB UR REHMAN. "Analysis of Black Hole Attack on MANETs Using Different MANET Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2505.

Full text
Abstract:
Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc Networks (MANET). Black hole attack is one of the security threat in which the traffic is redirected to such a node that actually does not exist in the network. It’s an analogy to the black hole in the universe in which things disappear. The node presents itself in such a way to the node that it can attack other nodes and networks knowing that it has the shortest path. MANETs must have a secure way for transmission and communication which is quite challenging and vital issue. In order to provide secure communication and transmission, researcher worked specifically on the security issues in MANETs, and many secure routing protocols and security measures within the networks were proposed. Previously the works done on security issues in MANET were based on reactive routing protocol like Ad-Hoc On Demand Distance Vector (AODV). Different kinds of attacks were studied, and their effects were elaborated by stating how these attacks disrupt the performance of MANET. The scope of this thesis is to study the effects of Black hole attack in MANET using both Proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocol Ad-Hoc On Demand Distance Vector (AODV). Comparative analysis of Black Hole attack for both protocols is taken into account. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The measurements were taken in the light of throughput, end-to-end delay and network load. Simulation is done in Optimized Network Engineering Tool (OPNET).
APA, Harvard, Vancouver, ISO, and other styles
4

Gironés, Quesada Luis. "A Routing Protocol for MANETs." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9513.

Full text
Abstract:

In this master thesis there has been a description of what MANETs are and why they are so interesting. Because of its characteristics, the tradicional routing protocols for wired networks are not advisable for them. A specific routing protocol for MANETs is necessary. In this thesis the main groups of these protocols have been explained and some of the most commonly used of them were studied. We saw that each protocol is better in a specific environment. None of them are perfect for all the ranges of nodes mobility, traffic, number of nodes, etc. The two main groups of protocols studied are the proactive and the reactive ones. The main characteristic of the proactive is that each node maintains a route to every node in the network. Besides, it periodically updates this information. No matter if there is communication between the nodes or not. As representative examples of proactive protocols, OLSR and DSDV were described here. On the other hand, in the reactive ones the nodes only calculate the routes between those nodes that want to communicate. This kind of protocols perform in a more efficient usage of the bandwith (which is very limited in the MANETs medium) and the resources of the nodes. However, as a drawback, when the route is not available yet, the delay to achieve it can be great. The reactive protocols choosen here to be studied were AODV and DSR. In the reactive, the main problem is the delay to achieve a new route. In the proactive, it is the high usage of resources and bandwith when it is not necessary. Both, reactive and proactive also have the problem of the scalability. To solve these problems, a new kind of protocols appeared: the hybrid ones. A hybrid routing protocol combines both, the proactive and reactive to achieve better performance. The most popular of them is ZRP and its operation was described here too. None of the existing protocols are suitable for a MANET with a large number of nodes, each one of them with a different velocity and traffic. ZRP solves in part the problem of the scalabilty, but under different patterns of traffic and nodes velocity performs worse than the OLSR, DSR and AODV. Understanding the strengths and weaknesses of each protocol, a new one was proposed. The objective of this new protocol was to be suitable to MANETs with nodes moving freely, with different ranges of speed and traffic. Also, another objective was to improve the scalability of the reactive and proactive protocols. The protocol proposed here was called Penaguila. As ZRP and other hybrid routing protocols, it is based on having some nodes working in proactive mode creating areas, and comunicating this areas with other nodes working in reactive mode. The difference between Penaguila and ZRP, is that Penaguila takes into acount the speed and traffic of each node. Therefore, Penaguila tries to have each node working in the mode more suitable for itself. Also, an evaluation of the OLSR, AODV, DSR, ZRP and Penaguila has been done. Since it was not possible to program Penaguila in NS-2 because of the short time to write the thesis, it was only feasible to do a qualitative study. In this study the advantages and disadvantages of each protocol were exposed and the concluision was that Penaguila can outperform the existing protocols when: A) The network is large, since it is a hierarchical routing protocol. B) The nodes have very different speeds and amount of traffic.

APA, Harvard, Vancouver, ISO, and other styles
5

Pham, Vinh. "Performing Gateway Load Balancing in MANETs." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15131.

Full text
Abstract:
During the last decades, the advances in Information Technology have formed the basis for increased interest and research activity in the field of ad hoc wireless multihop networks or simply ad hoc networks. This emerging technology enables internetworking between wireless nodes that are deployed in an ad hoc and temporary manner. All nodes in an ad hoc network take the role as both hosts in an end-to-end communication session, or as routers to collaboratively relay data traffic in a multihop fashion on behalf of other nodes. Furthermore, ad hoc networks are highly dynamic in nature, i.e. nodes can join or leave the network at any time, and additionally, the nodes have also the flexibility to move around while being in the network. The fact that ad hoc networks can be rapidly deployed with minimal prior planning, cost, and without the need of any pre-existing infrastructure makes this technology very attractive and suitable in a number of applications, including emergency and rescue operations, and military operations. Although ad hoc networks represent a promising technology that offers a broad range of potential useful applications, this technology is still in an immature phase. There are yet many issues and challenges that need to be resolved, which mainly arise from the inherent unreliability of wireless communication, the dynamic nature of these networks, the limited availability in resources with respect to bandwidth, processing capacity, battery power, and from the possibly large scale of these networks. These challenges require that the networking protocols at all layers in the network stack, that in many cases were originally designed for wired networks, must be modified or optimized, in order to adapt to the characteristic of the wireless environment. The focus of this thesis has been devoted to the investigation of two specific issues within the field of ad hoc networking, i.e. node mobility and load balancing. The aim is to provide solutions in order to improve the overall performance in ad hoc networks. Node mobility is one of the most important features in ad hoc networks, however, it is also the reason for frequent link breaks and the constant change in the topology. An ongoing data transmission that is interrupted by a link break, must be rerouted to alternative paths in order to circumvent the broken link. However, this process of rerouting traffic takes a certain amount of time, which is referred to as the rerouting time. Minimizing the rerouting time is essential in order to reduce packet loss and improve network performance. In this thesis we investigate the factors that affect the rerouting time in proactive routing protocols and propose solutions for minimizing it. Load balancing refers to the process of distributing traffic load more evenly in the network in order to minimize congestion and to optimize the usage of network resources. Performing load balancing in ad hoc networks is generally very challenging due to the inherently interfering nature of the wireless medium. In this thesis we therefore investigate the feasibility and the potential benefits of performing load balancing in ad hoc networks. We consider two scenarios, i.e. load balancing for intradomain and interdomain traffic. Intradomain traffic is traffic between nodes inside an ad hoc network. Performing load balancing on intradomain traffic can be done in two ways. The first is referred to as multipath load balancing where a traffic flow between a source and destination pair is distributed over multiple alternative disjoint/semi-disjoint paths. The aim is to maximize throughput and reduce the risk for packet loss. However, a number of previous work has investigated and reported that this type of load balancing can only provide a rather limited improvement in performance due to the interference between the paths [1] [2]. Due to this reason, multipath load balancing is therefore not considered in this thesis. Instead we focus on the second way which is referred to as transit routing. Transit routing is about routing part of the local traffic over a backbone network in order to relief the traffic load in the ad hoc network. The assumption behind this concept is a network architecture similar to a Wireless Mesh Network (WMN), where a high capacity backbone network is an integrated part of the Mobile Ad hoc Network (MANET). This backbone network is commonly used to provide Internet-connectivity services, but can also be exploited to alleviate the traffic load in the MANET. In addition, for certain source and destination pairs, performing transit routing can considerably increase the throughput compared to if the traffic is routed within the ad hoc network. Interdomain traffic refers to traffic between a node inside the ad hoc network and a remote node outside of the ad hoc network. Load balancing for interdomain traffic considers the potential of distributing interdomain traffic among multiple gateways in order to avoid congestion at the gateways and maximize the capacity for interdomain traffic. This type of load balancing is commonly referred to as gateway load balancing in the literature. Furthermore, interdomain can either be inbound or outbound traffic. The work in this thesis mainly focuses on performing load balancing for outbound traffic. However, we believe that the results in our work are also applicable to inbound traffic as well. The main contributions in this thesis are the investigation and the proposals of different solutions for intradomain and interdomain load balancing.
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Sanlin, and SanlinXu@yahoo com. "Mobility Metrics for Routing in MANETs." The Australian National University. Faculty of Engineering and Information Technology, 2007. http://thesis.anu.edu.au./public/adt-ANU20070621.212401.

Full text
Abstract:
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without the need for base stations or any other pre–existing network infrastructure. In a peer-to-peer fashion, mobile nodes can communicate with each other by using wireless multihop communication. Due to its low cost, high flexibility, fast network establishment and self-reconfiguration, ad hoc networking has received much interest during the last ten years. However, without a fixed infrastructure, frequent path changes cause significant numbers of routing packets to discover new paths, leading to increased network congestion and transmission latency over fixed networks. Many on-demand routing protocols have been developed by using various routing mobility metrics to choose the most reliable routes, while dealing with the primary obstacle caused by node mobility. ¶ In the first part, we have developed an analysis framework for mobility metrics in random mobility model. Unlike previous research, where the mobility metrics were mostly studied by simulations, we derive the analytical expressions of mobility metrics, including link persistence, link duration, link availability, link residual time, link change rate and their path equivalents. We also show relationships between the different metrics, where they exist. Such exact expressions constitute precise mathematical relationships between network connectivity and node mobility. ¶ We further validate our analysis framework in Random Walk Mobility model (RWMM). Regarding constant or random variable node velocity, we construct the transition matrix of Markov Chain Model through the analysis of the PDF of node separation after one epoch. In addition, we present intuitive and simple expressions for the link residual time and link duration, for the RWMM, which relate them directly to the ratio between transmission range and node speed. We also illustrate the relationship between link change rate and link duration. Finally, simulation results for all mentioned mobility metrics are reported which match well the proposed analytical framework. ¶ In the second part, we investigate the mobility metric applications on caching strategies and hierarchy routing algorithm. When on-demand routing employed, stale route cache information and frequent new-route discovery in processes in MANETs generate considerable routing delay and overhead. This thesis proposes a practical route caching strategy to minimize routing delay and/or overhead by setting route cache timeout to a mobility metric, the expected path residual time. The strategy is independent of network traffic load and adapts to various non-identical link duration distributions, so it is feasible to implement in a real-time route caching scheme. Calculated results show that the routing delay achieved by the route caching scheme is only marginally more than the theoretically determined minimum. Simulation in NS-2 demonstrates that the end-to-end delay from DSR routing can be remarkably reduced by our caching scheme. By using overhead analysis model, we demonstrate that the minimum routing overhead can be achieved by increasing timeout to around twice the expected path residual time, without significant increase in routing delay. ¶ Apart from route cache, this thesis also addresses link cache strategy which has the potential to utilize route information more efficiently than a route cache scheme. Unlike some previous link cache schemes delete links at some fixed time after they enter the cache, we proposes using either the expected path duration or the link residual time as the link cache timeout. Simulation results in NS-2 show that both of the proposed link caching schemes can improve network performance in the DSR by reducing dropped data packets, latency and routing overhead, with the link residual time scheme out-performing the path duration scheme. ¶ To deal with large-scale MANETs, this thesis presents an adaptive k-hop clustering algorithm (AdpKHop), which selects clusterhead (CH) by our CH selection metrics. The proposed CH selection criteria enable that the chosen CHs are closer to the cluster centroid and more stable than other cluster members with respect to node mobility. By using merging threshold which is based on the CH selection metric, 1-hop clusters can merge to k-hop clusters, where the size of each k-hop cluster adapts to the node mobility of the chosen CH. Moreover, we propose a routing overhead analysis model for k-hop clustering algorithm, which is determined by a range of network parameters, such as link change rate (related to node mobility), node degree and cluster density. Through the overhead analysis, we show that an optimal k-hop cluster density does exist, which is independent of node mobility. Therefore, the corresponding optimal cluster merging threshold can be employed to efficiently organise k-hop clusters to achieve minimum routing overhead, which is highly desirable in large-scale networks. ¶ The work presented in this thesis provides a sound basis for future research on mobility analysis for mobile ad hoc networks, in aspects such as mobility metrics, caching strategies and k-hop clustering routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
7

Lüthy, Michael. "Bild und Blick in Manets Malerei /." Berlin : Gebr. Mann, 2003. http://catalogue.bnf.fr/ark:/12148/cb38990881x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xu, Sanlin. "Mobility metrics for routing in MANETs /." View thesis entry in Australian Digital Theses Program, 2007. http://thesis.anu.edu.au/public/adt-ANU20070621.212401/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shariat, Shahin. "Spectrum-aware routing in cognitive radio MANETs." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/845510/.

Full text
Abstract:
Cognitive Radio (CR) provides a promising means to the more efficient use of available spectrum. Routing in multi-hop wireless networks remains challenging and introduction of CR technology has created additional demands on routing within Cognitive Radio Mobile Ad-hoc Networks (CR-MANETs). To address these challenges, spectrum-aware routing protocols aiming at dynamic utilization of the so-called spectrum opportunities have been developed recently to improve end-to-end performance of the network for example in terms of Delay, Packet Loss and Throughput. One of the bottlenecks in the performance of ad hoc networks has been the lack of a load balancing mechanism. With the addition of potential routing opportunities introduced by CR technology, a load balanced routing protocol which can utilize SOPs into the load balancing mechanism is a missing puzzle in the problem of routing in CR-technology. Quantum game theory provides a framework to utilize entangled particles with the aim of affecting decision-making process of distant players. Hence, this theory has the potential to be used as a framework to target the load balancing problem in ad hoc networks. First, a novel spectrum-aware routing protocol based on OLSR as the basis of implementation is proposed in this research. The proposed algorithm utilizes ETX as the link quality estimation metric and provides the best weigh end-to-end paths based on generalization of Dijkstra’s algorithm to multigraphs. The results demonstrate that the proposed algorithm outperforms the existing baseline OLSR routing algorithm. Due to the instability in the end-to-end delay performance of the proposed algorithm, backpressure algorithm is identified as a potential solution to stabilize queues in the network and target the shortcoming of the proposed algorithm. Hence, a novel spectrum-aware routing algorithm based on backpressure load balancing mechanism is proposed and compared against the baseline OLSR and the proposed spectrum-aware OLSR algorithm. The OLSR backpressure spectrum-aware (OLSR-BSA) routing algorithm not only optimizes route computation based on the predefined cost metric but also incorporates the queue gradients of backpressure algorithm to perform load balancing. The results proof that the backpressure algorithm can efficiently utilize the SOPs in the load balancing optimization problem and results a performance and stability gain both in terms of end-to-end delay and packet delivery ratio. The instability resulted by inaccuracy of queue information in the proposed OLSR-BSA algorithm motivated our research to explore the problem of load balancing from a completely new perspective of quantum game theory. We have formulated the problem of load balancing in ad hoc networks using quantum game theory and proposed a novel routing algorithm so called Quantum Load Balanced OLSR (QLB-OLSR). The simulation results demonstrate a significant load balancing stability gain against the baseline OLSR routing algorithm.
APA, Harvard, Vancouver, ISO, and other styles
10

Jazyah, Yahia Hasan. "Modified location aided routing protocol for UWB MANETs." Thesis, University of Salford, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.543508.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "MANETs"

1

Söntgen, Beate. Manets Pathos. Berlin: August, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stefan, Barmann, ed. Zeitgenossenschaft: Zur Malerei Edouard Manets. München: Sieveking, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

1832-1883, Manet Edouard, ed. Bild und Blick in Manets Malerei. Berlin: Gebr. Mann, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zelinsky, Barbara. Pablo Picassos Paraphrasen auf Edouard Manets "Frühstück im Grünen": Tableau eines künstlerischen Prozesses. Ilmtal-Weinstrasse: VDG als Imprint von arts + science weimar GmbH, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Giōrgos kai Helenē Maneta: Yiorgos and Eleni Manetas. Athēna: Mouseio Benakē, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Manets neue Kleider: Zur künstlerischen Rezeption der "Olympia", des "Frühstücks im Grünen" und der "Bar in den Folies-Bergère". Hildesheim: Olms, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weiss, Stefan Arriaga. El manati (Trichechus manatus) en Tabasco: Informe técnico. Villahermosa, Tabasco, México: Universidad Juárez Autónoma de Tabasco, División Académica de Ciencias Biológicas, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Manet: The paintings of Manet. London: Hamlyn, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Manet. Tunbridge Wells: Ticktock, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manet. Mankato, MN: Newforest Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "MANETs"

1

Li, Wenjia, James Parker, and Anupam Joshi. "Security through Collaboration in MANETs." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 696–714. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03354-4_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhai, Jian, Qing Li, and Xiang Li. "Data Caching in Selfish MANETs." In Networking and Mobile Computing, 208–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11534310_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yuste, Antonio J., Alicia Triviño, Fco David Trujillo, Eduardo Casilari, and Antonio Díaz-Estrella. "Connectivity Gateway Discovery in MANETs." In Wireless Systems and Mobility in Next Generation Internet, 128–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89183-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Obaid, Abdellatif, and Azzedine Khir. "Service Discovery Protocols for MANETs." In Wireless Ad Hoc and Sensor Networks, 143–63. London, UK: ISTE, 2010. http://dx.doi.org/10.1002/9780470610893.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oliveira, Carlos A. S., and Panos M. Pardalos. "Power-Aware Routing in MANETs." In Springer Optimization and Its Applications, 163–75. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0311-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Dongsheng, and James P. G. Sterbenz. "Modelling Critical Node Attacks in MANETs." In Self-Organizing Systems, 127–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-642-54140-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ghassemi, Fatemeh, Saeide Ahmadi, Wan Fokkink, and Ali Movaghar. "Model Checking MANETs with Arbitrary Mobility." In Fundamentals of Software Engineering, 217–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40213-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tschudin, Christian, Henrik Lundgren, and Erik Nordström. "Embedding MANETs in the Real World." In Personal Wireless Communications, 578–89. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39867-7_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gohs, Rasmus Sidorovs, Sigurður Rafn Gunnarsson, and Arne John Glenstrup. "Beddernet: Application-Level Platform-Agnostic MANETs." In Distributed Applications and Interoperable Systems, 165–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21387-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chandrakant, N. "Administrating MANETs Via Brain Computer Interface." In Advances in Intelligent Systems and Computing, 259–65. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1771-8_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "MANETs"

1

Lee, Seung-Hoon, Starsky H. Y. Wong, Chi-Kin Chau, Kang-Won Lee, Jon Crowcroft, and Mario Gerla. "InterMR: Inter-MANET routing in heterogeneous MANETs." In 2010 IEEE 7th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). IEEE, 2010. http://dx.doi.org/10.1109/mass.2010.5663948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Flores, Hector, Stephan Eidenbenz, Rudolf Riedi, and Nick Hengartner. "Describing MANETS." In the 3rd ACM international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1163610.1163630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amin, Rahul, and Greg Kuperman. "PIM-MANET: Extension to PIM for multicast routing in MANETs." In MILCOM 2015 - 2015 IEEE Military Communications Conference. IEEE, 2015. http://dx.doi.org/10.1109/milcom.2015.7357428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kargl, Frank, and Elmar Schoch. "Simulation of MANETs." In the 1st international workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1247721.1247730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Baccelli, E., and J. Schiller. "Towards scalable MANETs." In 2008 8th International Conference on ITS Telecommunications (ITST). IEEE, 2008. http://dx.doi.org/10.1109/itst.2008.4740243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fossa, C. E., and T. G. Macdonald. "Internetworking tactical MANETs." In MILCOM 2010 - 2010 IEEE Military Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/milcom.2010.5680456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Bharti, Rabinder Singh Bhatia, and Awadhesh Kumar Singh. "DMX in MANETs." In the International Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2007052.2007063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sadeghi, Mohammad, and Saadiah Yahya. "Analysis of Wormhole attack on MANETs using different MANET routing protocols." In 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2012. http://dx.doi.org/10.1109/icufn.2012.6261716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Suresh, Gaurav Pruthi, Ashwani Yadav, and Mukesh Singla. "Security Protocols in MANETs." In Communication Technologies (ACCT). IEEE, 2012. http://dx.doi.org/10.1109/acct.2012.101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Prateek K., Koushik Kar, and Charles Kamhoua. "Reputation Routing in MANETs." In 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). IEEE, 2017. http://dx.doi.org/10.1109/vtcfall.2017.8288226.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "MANETs"

1

Clausen, T., C. Dearlove, and B. Adamson. Jitter Considerations in Mobile Ad Hoc Networks (MANETs). RFC Editor, February 2008. http://dx.doi.org/10.17487/rfc5148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Clausen, T., and C. Dearlove. Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cardenas, Alvaro A., Vahid Ramezani, and John S. Baras. HMM Sequential Hypothesis Tests for Intrusion Detection in MANETs Extended Abstract. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada439785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peacock, Brent A. Connecting the Edge: Mobile Ad-Hoc Networks (MANETs) for Network Centric Warfare. Fort Belvoir, VA: Defense Technical Information Center, April 2007. http://dx.doi.org/10.21236/ada497761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Herberg, U., and T. Clausen. Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs). RFC Editor, May 2012. http://dx.doi.org/10.17487/rfc6622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Herberg, U., T. Clausen, and C. Dearlove. Integrity Check Value and Timestamp TLV Definitions for Mobile Ad Hoc Networks (MANETs). RFC Editor, April 2014. http://dx.doi.org/10.17487/rfc7182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Frazier, Gregory. The Common MANET Framework. Fort Belvoir, VA: Defense Technical Information Center, September 2008. http://dx.doi.org/10.21236/ada486164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Aguilar Aguilar, Paula Andrea, Carlos Enrique Velásquez Arroyo, Cristian Dominguez Pulgarín, Michael Ángel Latorre Gonzalez, and Rosa Helen Mira Herrera. Manejo fitosanitario: Manejo de plagas. Corporación colombiana de investigación agropecuaria - AGROSAVIA, 2022. http://dx.doi.org/10.21930/agrosavia.infografia.2022.44.

Full text
Abstract:
Control oportuno de arvenses que pueden servir como hospederos alternos y conservación de benéficos. Uso de entomopatógenos como Bacillus thuringiensis para el control de larvas. Uso de control químico bajo la recomendación de un especialista.
APA, Harvard, Vancouver, ISO, and other styles
9

Aguilar Aguilar, Paula Andrea, Carlos Enrique Velásquez Arroyo, Cristian Dominguez Pulgarín, Michael Ángel Latorre Gonzalez, and Rosa Helen Mira Herrera. Manejo fitosanitario: Manejo de arvenses. Corporación Colombiana de Investigación Agropecuaria - AGROSAVIA, 2022. http://dx.doi.org/10.21930/agrosavia.infografia.2022.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aguilar Aguilar, Paula Andrea, Carlos Enrique Velásquez Arroyo, Cristian Dominguez Pulgarín, Michael Ángel Latorre Gonzalez, and Rosa Helen Mira Herrera. Manejo fitosanitario: Manejo de enfermedades. Corporación Colombiana de Investigación Agropecuaria - AGROSAVIA, 2022. http://dx.doi.org/10.21930/agrosavia.infografia.2022.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography