intTypePromotion=1
ADSENSE

Mobile ad hoc network

Xem 1-20 trên 113 kết quả Mobile ad hoc network
  • In research topics to improve the performance of the mobile ad hoc networks (MANET), the load balancing routing has attracted many research groups because it is an effective solution to reduce traffic congestion. However, to balance the traffic load, the routing algorithm often has to choose some long routes. These routes pass through many hops and intermediate nodes, so the accumulated noise along with the route increases.

    pdf13p nguathienthan9 08-12-2020 2 0   Download

  • The research object of the thesis focuses on the load balancing routing algorithms and QoT aware routing in MANET. The research scope of the thesis is the DSR and AODV routing protocols.

    pdf27p gaocaolon6 30-07-2020 10 3   Download

  • With the rapid development of mobile operating systems and mobile networks, Vietnamese people are more and more attached to mobile phones in their work and life. Therefore, in order to reach more customers at a lower cost, marketers should create mobile ads that are entertaining, useful and avoid annoying and annoying interactions. The model proposes the premise of attitudes (entertainment, stimulation, and usefulness) and its effect on ad acceptance and intent to purchase.

    pdf18p nanhankhuoctai7 01-07-2020 14 0   Download

  • In this paper, we study the throughput performance in a content-centric mobile ad hoc network, where each node moves using multihop according to the random walk mobility model and requests a file from the library independently at random, according to a Zipf popularity distribution.

    pdf7p vishizuka2711 07-04-2020 10 0   Download

  • In this paper, we present a distributed and scalable evolutionary game played by autonomous mobile ad hoc network (MANET) nodes to place themselves uniformly over a dynamically changing environment without a centralized controller. A node spreading evolutionary game, called NSEG, runs at each mobile node, autonomously makes movement decisions based on localized data while the movement probabilities of possible next locations are assigned by a forced-based genetic algorithm (FGA).

    pdf12p kethamoi1 20-11-2019 19 0   Download

  • Mobile Ad Hoc wireless Networks (MANETs) is defined as a multi-hop infrastructureless wireless network which is self-organized and connects two or more stations spontaneously in the absence of central point or any access point. It allows peer-to-peer connections between devices that are operating in ad-hoc mode and are within the wireless range. They can form standalone groups of wireless nodes and can be connected to a cellular or fixed network. Nodes in a mobile adhoc network are free to move and organize themselves in an arbitrary fashion.

    pdf4p kethamoi1 20-11-2019 11 0   Download

  • It is well known that neighbor discovery is a critical component of proactive routing protocols in wireless ad hoc networks. However there is no formal study on the performance of proposed neighbor discovery mechanisms. This paper provides a detailed model of key performance metrics of neighbor discovery algorithms, such as node degree and the distribution of the distance to symmetric neighbors. The model accounts for the dynamics of neighbor discovery as well as node density, mobility, radio and interference.

    pdf13p kethamoi1 20-11-2019 7 0   Download

  • In this paper, we will provide a survey of the various approaches to deal with power control management in mobile ad-hoc wireless networks. We will classify these approaches into five main approaches: (a) Node-Degree Constrained Approach, (b) Location Information Based Approach, (c) Graph Theory Approach, (d) Game Theory Approach and (e) Multi-Parameter Optimization Approach.

    pdf8p kethamoi1 20-11-2019 11 0   Download

  • Peer-to-peer (P2P) networks existing on a MANET are a natural evolution since both are decentralized and have dynamic topologies. As MANETs grow in use due to the increasing popularity of wireless mesh and 4G networks, it is expected that P2P applications will remain as a popular means of obtaining files. Network coding has been shown as an efficient means of sharing large files in a P2P network. With network coding, all file blocks have the same relative importance.

    pdf15p kethamoi1 20-11-2019 8 0   Download

  • Bài viết này nghiên cứu ảnh hưởng của kiểu tấn công lỗ đen (Blackhole Attack) đối với mạng MANET thông qua việc đánh giá các thông số như tỉ lệ mất gói tin trong mạng. Bài báo cũng đề xuất một giải pháp phòng chống tấn công lỗ đen trên giao thức AODV và trình bày những kết quả thực nghiệm để kiểm chứng.

    pdf10p vihasaki2711 13-11-2019 7 0   Download

  • In this paper, a new strategy of cross layer algorithm is proposed based on the characteristics of reactive routing and multi-hop jumping. In addition, artificial bee colony algorithm is performed to calculate the contention window of the nodes along the routing path over MAC layer

    pdf7p vititan2711 13-08-2019 7 0   Download

  • Over the recent few years, most of network service providers have tried to expand their services all around by newly emerged technologies in network, especially mobile cloud computing. Most emerging cars and vehicles with powerful computers and storages, can be equipped with such new technologies such as vehicular ad hoc network radio, a new wireless technology.

    pdf11p vithanos2711 09-08-2019 9 0   Download

  • This paper mentions a hierarchical clustered based routing K-Means algorithm. K-Means is a typical clustering algorithm that has been proved to use for clustering any undetermined dataset very effectively with some K is a predefined number of clusters, for example in image processing.

    pdf13p viengland2711 23-07-2019 8 0   Download

  • In this paper we discuss various types of vulnerabilities in MANET. Different types of attacker attempts different approaches to decrease the network performance, throughput. In this paper the principle focus is on various types of attacks in MANETs.

    pdf4p hongnhan878 12-04-2019 28 0   Download

  • This paper describes the different types of attacks that are very common i.e. the Distributed Denial of Service attack, the Blackhole attack and the Wormhole attack, also provide the mechanism to detect these attacks using the different techniques and the relative comparison between these three attacks.

    pdf8p hongnhan878 12-04-2019 31 1   Download

  • In this paper we deal with the problem of packet forwarding misbehavior and study the effect of different attacks on AODV (Ad-hoc On-demand Distance Vector) routing since it is a mostly accepted network routing protocol for Mobile Adhoc Network (MANET).

    pdf5p hongnhan878 12-04-2019 24 1   Download

  • Advanced Encryption Standard and message authentication code based message digest 6 (MAC-MD6) algorithms for secure transmission of data over the MANET with AODV routing protocol.This proposed model will provide better performance in terms of Throughput, packet delivery ratio (PDR) and minimizes routing overhead as well as effective bandwidth utilization.

    pdf6p hongnhan878 12-04-2019 12 0   Download

  • The existing intrusion detection system has gives more network overhead to MANET. Here, we analyze and find a new efficient intrusion detection system Hybrid Cryptography Technique (BECDH) for reducing network overhead and enhance the security level of MANET.

    pdf6p hongnhan878 12-04-2019 20 0   Download

  • In Mobile Ad-hoc Network (MANET) is a Self-configuring network of mobile routers (and associated hosts) connected by wireless links. This MANET forms a random topology and routers move randomly free. Topology changes rapidly and unpredictably .Nowadays we are using so many protocols for maximizing the network bandwidth but, we can not attain the best throughout using protocols in MANET.

    pdf5p byphasse043256 24-03-2019 16 0   Download

  • In this paper we propose an adaptive congestion control algorithm using cross layer design, which out-performs even during constrained situation. For analyzing the performance we have chosen four popular routing protocols such as AODV, DSR, DSDV and TORA. We also observe through simulation in NS2 that AODV out-performs other routing protocols in normal situation and DSR out-performs in constraint environment.

    pdf8p byphasse043256 24-03-2019 13 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

p_strKeyword=Mobile ad hoc network
p_strCode=mobileadhocnetwork

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2