SLGP Header

Distributed Client Tracker in Manet

IJCSEC Front Page

Abstract
Mobile adhoc networks (MANETs) are ideal for situations where a fixed infrastructure is unavailable or infeasible. This limitation makes MANETs unsuitable for applications such as crisis management and battlefield communications. In battlefield team members might need to work in groups or scattered in the terrain. In such terrain, intergroup communication is crucial to the team collaboration. To address this weakness, I introduce in this paper a new class of adhoc network called SAODV. Unlike conventional networks, SAODV protocol is used for the clients in the terrain, and organizing themselves into a suitable network topology to ensure good connectivity for both intra- and intergroup communications. I propose a distributed client tracking solution to deal with the dynamic nature of client mobility and present techniques for dynamic topology adaptation in accordance with the mobility pattern of the clients. Simulation results indicate that AMMNET is robust against network partitioning and capable of providing high relay throughput for the mobile clients.
INDEX DREAMS:MANET, AODV, AMMNET,SAODV.
INTRODUCTION
Ad hoc wireless networks are interconnected sets of mobile nodes that are self-organizing, self-healing, survivable, and instantaneously available, without any need for prior infrastructure. Since Internet Protocol (IP) suite is now recognized as the universal interface or “glue” for interconnecting dissimilar networks, an IP-based ad hoc network has the potential to solve the interoperability problems faced by various conventional stovepipe networks that are designed for specific usage cases. A multi-hop mesh network can be defined as a communications network that has two or more paths to any node, providing multiple ways to route data and control information between nodes by “hopping” from node to node until a connection can be established. Mobile mesh networks enable continuous efficient updates of connections to reconfigure around blocked or changed paths. The need for and value of autonomous mobile mesh networks for broadband applications is described later. This is followed by an overview of technical challenges that need to be addressed in designing autonomous mobile mesh networks and for providing useful multimedia peer-to-peer services over such networks. Emphasis is placed on describing generic system level challenges rather than on specific solutions for component subsystems, some of which are only beginning to evolve.
OBJECTIVE:
As autonomous mobile users move about in a MANET, the network topology may change rapidly and unpredictably over time and portions of the network may intermittently become partitioned. This condition is undesirable, particularly for mission-critical applications such as crisis management and battlefield communications.

References:

  1. K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B. Viollet, “Which wireless technology for industrial wireless sensor networks? The development of OCARI technol,”IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009.
  2. R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile Ad hoc Network Security,” inLecture Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666.
  3. R. H. Akbani, S. Patel, and D. C. Jinwala, “DoS attacks in mobile ad hoc networks: A survey,” inProc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541.
  4. T. Anantvalee and J. Wu, “A Survey on Intrusion Detection in Mobile Ad Hoc Networks,” in Wireless/Mobile Security. New York: SpringerVerlag, 2008.
  5. L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007.
  6. D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher, and L. Benini, “Modeling and optimization of a solar energy harvester system for self-powered wireless sensor networks,”IEEE Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008.
  7. V.C.Gungor and G.P.Hancke, “Industrial wireless sensor networks: Challenges, design principles, and technical approach,”IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009.
  8. Y. Hu, D. Johnson, and A. Perrig, “SEAD: Secure efficient distance vectorrouting for mobile wireless ad hoc networks,” inProc. 4th IEEE Workshop Mobile Comput. Syst. Appl., 2002, pp. 3–13.
  9. Y. Hu, A. Perrig, and D. Johnson, “ARIADNE: A secure on-demand routing protocol for ad hoc networks,” inProc. 8th ACM Int. Conf. MobiCom, Atlanta, GA, 2002, pp. 12–23.
  10. G. Jayakumar and G. Gopinath, “Ad hocmobile wireless networks routing protocol—A review,” J. Comput. Sci., vol. 3, no. 8, pp. 574–582, 2007.