manet-mobile ad-hoc network-42



Performance Degradation of IEEE 802.11 MANET due to Heavy Increase and Heavy Decrease in Contention Window
FREE DOWNLOAD [PDF] 
J Vikram ,International Journal of Computer Applications, 2011 ,ijcaonline.org
Abstract The primary Medium Access Control (MAC) technique of IEEE 802.11 is called
Distributed Coordination Function (DCF). This protocol adopts a Carrier Sense Multiple
Access with Collision Avoidance (CSMA/CA) with a binary exponential backoff (BEB) 

Optimized and Reliable AODV for MANET
FREE DOWNLOAD [PDF] 
S Sethi ,International Journal of Computer Applications , 2010 ,ijcaonline.org
Abstract In recent years, mobile and wireless networks have witnessed a tremendous rise in
technological advancement. Due to dynamic changing environment of MANET, it is
desirable to design effective routing algorithms that can adapt its behavior to rapid and 

W2LAN: Protocol that transforms a 802.11 Mobile Ad-Hoc Network (MANET) into an Ethernet LAN
FREE DOWNLOAD [PDF] from upct.es
F Burrull, FM Monzo-Sanchez ,Proc. of the IASTED , 2004 ,labit501.upct.es
ABSTRACT To overcome the partial visibility problem that Mobile Ad-Hoc Networks
(MANET) exhibit [1] data link-level (level 2 OSI) routing protocols must be considered.
Examples of protocols in use are the Ad Hoc On-Demand Distance Vector (AODV)[2] ..

Simulating MANET-hosted service-based systems
FREE DOWNLOAD [PDF] from usukita.org
P Novotny, AL Wolf ,Proceedings Annual Conference of ITA, 2011 ,usukita.org
Abstract—The emerging use of mobile ad hoc networks combined with current trends in the
use of service-based systems pose new challenges to accurate simulation of these systems.
Current network simulators lack the ability to replicate the complex message exchange 

A Newly Routing Protocol for MANET
FREE DOWNLOAD [PDF] from aicit.org
MH Mamoun ,Journal of Convergence Information Technology, 2009 ,aicit.org
Abstract The dynamic topology of Mobile ad hoc Network {MANET) allows nodes to join and
leave the network at any point of time. This dynamic property of MANET has rendered it
vulnerable to passive and active attacks by malicious nodes. In this paper we propose a 

Emulating small scale MANET topologies
FREE DOWNLOAD [PDF] from lip6.fr
G Valadon,   Proc. of OLSR Interop2005, 2005 ,www-rp.lip6.fr
Abstract—While network simulators are commonly used to test MANET routing protocols, no
similar tool exist to perform evaluations of implementations with real hardware. In this paper,
a solution to emulate MANET topologies and to assist implementations debugging is 

Detecting Sleep Deprivation Attack over MANET Using a Danger Theory–Based Algorithm
FREE DOWNLOAD [PDF] from sdiwc.info
M Abdelhaq, R Hassan, M Ismail, R Alsaqour ,International Journal on ,sdiwc.info
ABSTRACT MANET is a collection of mobile, decentralized, and self organized nodes.
Securing MANET is a problem which adds more challenges on the research. This is
because MANET properties make it harder to be secured than the other types of static 

Performance analysis of DSR, AODV, FSR and ZRP routing protocols in MANET
FREE DOWNLOAD [PDF] from 220.227.128.112
S Sathish, K Thangavel , Conference on Information , 2011 ,220.227.128.112
Abstract-Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that are arbitrarily
located so that the interconnections between nodes are dynamically changing. In MANET
mobile nodes forms a temporary network without the use of any existing network 

Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol
FREE DOWNLOAD [PDF] from ijcsit.com
A Rajaram ,IJCSIT) International Journal of Computer , 2010 ,ijcsit.com
Abstract—In this paper, we develop a trust based security protocol based on a cross-layer
approach which attains confidentiality and authentication of packets in both routing and link
layers of MANETs. In the first phase of the protocol, we design a trust based packet 

Ontology for MANET Security Threats
FREE DOWNLOAD [PDF] from freewebs.com
A Chandra ,Electronics and Telecommunication Engineering ,freewebs.com
Abstract MANET is a new paradigm in wireless revolution in terms of acceptability. The
technology is quite matured. Still practical implementation is rather difficult due to security
and other problems. As nomadic and ubiquitous computing reaches its full potential, 

A Novel Routing Algorithm for MANET
FREE DOWNLOAD [PDF] from ijens.org
MH Mamoun ,computing, 2009 ,ijens.org
Abstract In this paper, we propose a novel algorithm to routing called NRA, in mobile ad hoc
networks, that allows the network layer to adjust its routing protocol dynamically based on
SNR along the end-to-end routing path for each transmission link. The experimental .

Collaborative middleware on symbian os via bluetooth manet
FREE DOWNLOAD [PDF] 
F Gao ,WSEAS Trans. Commun, 2008 ,wseas.us
Abstract:-In this paper we explore the possibility of using Bluetooth in the development of a
Mobile Ad-Hoc Network (MANET) suitable for transmitting data between Symbian OS based
Smartphone’s. We also analyse the problems that Bluetooth presents when considering 

Adaptive Forwarding Rate Control for Network Coding in the Tactical MANET
FREE DOWNLOAD [PDF] from usukita.org
SY Oh ,Annual Conference of ITA (ACITA), 2009 ,usukita.org
Abstract—In this paper, we propose a novel packet forwarding scheme based on network
coding that is resilience to jamming attack in a wireless ad hoc network. In a tactical field,
wireless communication is prevailed between military agents and vehicles, but it is fragile 

MANET routing with provably low complexity through constant density clustering and route request broadcast
FREE DOWNLOAD [PDF] from asu.edu
HS Yang, L Ritchie, AW Richa ,Wireless Personal , 2007 ,Springer
Abstract As mobile ad hoc networks (MANETs) are emerging as important components in
critical and large-scale applications, it is crucial to develop MANET routing mechanisms with
provably low complexity. In this paper, we give a tutorial overview of the efficient use of 

A Performance Comparison of Multipath Multicast Routing Protocols for MANET
FREE DOWNLOAD [PDF] 
S Vijayaragavan, K Duraiswamy , journal of computer , 2009 ,paper.ijcsns.org
Summary Mobile ad hoc networks (MANETs) are characterized by dynamic topology, limited
channel bandwidth and limited power at the nodes. Because of these characteristics, paths
connecting to the source nodes with destinations may very unstable and go down at any 

Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication
FREE DOWNLOAD [PDF] 
R Sanjeev ,International Journal of Computer , 2011 ,ijcaonline.org
Abstract The inherent features of the MANET [1] make it vulnerable to a wide range of
attacks. There is no guarantee that a communication path is free from malicious and
compromised nodes which deliberately wish to disrupt the network communication. In this 

Testimony-based isolation: New approach to overcome packet dropping attacks in manet
FREE DOWNLOAD [PDF]
D Djenouri ,The 7th Postgraduate Symposium on , 2006 ,cms.livjm.ac.uk
Abstract—Attackers could take advantage of the cooperative nature of MANET’s routing
protocols, by participating in the route discovery procedure to include themselves in routes,
then simply drop data packets during the forwarding phase, aiming at a DoS (Denial of 

HLMP: High Level MANET Protocol
FREE DOWNLOAD [PDF] 
J Rodríguez-Covili, SF Ochoa ,2009 ,swp.dcc.uchile.cl
Abstract—Wireless communication infrastructure dependence is not always a suitable way
to achieve mobile collaboration and communication processes for various scenarios. In
those situations a MANET can take advantage of the independent signal range of every 


CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER