manet-mobile ad-hoc network-42

Performance Degradation of IEEE 802.11 MANET due to Heavy Increase and Heavy Decrease in Contention Window
J Vikram ,International Journal of Computer Applications, 2011 ,
Abstract The primary Medium Access Control (MAC) technique of IEEE 802.11 is called
Distributed Coordination Function (DCF). This protocol adopts a Carrier Sense Multiple
Access with Collision Avoidance (CSMA/CA) with a binary exponential backoff (BEB) 

Optimized and Reliable AODV for MANET
S Sethi ,International Journal of Computer Applications , 2010 ,
Abstract In recent years, mobile and wireless networks have witnessed a tremendous rise in
technological advancement. Due to dynamic changing environment of MANET, it is
desirable to design effective routing algorithms that can adapt its behavior to rapid and 

W2LAN: Protocol that transforms a 802.11 Mobile Ad-Hoc Network (MANET) into an Ethernet LAN
F Burrull, FM Monzo-Sanchez ,Proc. of the IASTED , 2004 ,
ABSTRACT To overcome the partial visibility problem that Mobile Ad-Hoc Networks
(MANET) exhibit [1] data link-level (level 2 OSI) routing protocols must be considered.
Examples of protocols in use are the Ad Hoc On-Demand Distance Vector (AODV)[2] ..

Simulating MANET-hosted service-based systems
P Novotny, AL Wolf ,Proceedings Annual Conference of ITA, 2011 ,
Abstract—The emerging use of mobile ad hoc networks combined with current trends in the
use of service-based systems pose new challenges to accurate simulation of these systems.
Current network simulators lack the ability to replicate the complex message exchange 

A Newly Routing Protocol for MANET
MH Mamoun ,Journal of Convergence Information Technology, 2009 ,
Abstract The dynamic topology of Mobile ad hoc Network {MANET) allows nodes to join and
leave the network at any point of time. This dynamic property of MANET has rendered it
vulnerable to passive and active attacks by malicious nodes. In this paper we propose a 

Emulating small scale MANET topologies
G Valadon,   Proc. of OLSR Interop2005, 2005 ,
Abstract—While network simulators are commonly used to test MANET routing protocols, no
similar tool exist to perform evaluations of implementations with real hardware. In this paper,
a solution to emulate MANET topologies and to assist implementations debugging is 

Detecting Sleep Deprivation Attack over MANET Using a Danger Theory–Based Algorithm
M Abdelhaq, R Hassan, M Ismail, R Alsaqour ,International Journal on ,
ABSTRACT MANET is a collection of mobile, decentralized, and self organized nodes.
Securing MANET is a problem which adds more challenges on the research. This is
because MANET properties make it harder to be secured than the other types of static 

Performance analysis of DSR, AODV, FSR and ZRP routing protocols in MANET
S Sathish, K Thangavel , Conference on Information , 2011 ,
Abstract-Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that are arbitrarily
located so that the interconnections between nodes are dynamically changing. In MANET
mobile nodes forms a temporary network without the use of any existing network 

Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol
A Rajaram ,IJCSIT) International Journal of Computer , 2010 ,
Abstract—In this paper, we develop a trust based security protocol based on a cross-layer
approach which attains confidentiality and authentication of packets in both routing and link
layers of MANETs. In the first phase of the protocol, we design a trust based packet 

Ontology for MANET Security Threats
A Chandra ,Electronics and Telecommunication Engineering ,
Abstract MANET is a new paradigm in wireless revolution in terms of acceptability. The
technology is quite matured. Still practical implementation is rather difficult due to security
and other problems. As nomadic and ubiquitous computing reaches its full potential, 

A Novel Routing Algorithm for MANET
MH Mamoun ,computing, 2009 ,
Abstract In this paper, we propose a novel algorithm to routing called NRA, in mobile ad hoc
networks, that allows the network layer to adjust its routing protocol dynamically based on
SNR along the end-to-end routing path for each transmission link. The experimental .

Collaborative middleware on symbian os via bluetooth manet
F Gao ,WSEAS Trans. Commun, 2008 ,
Abstract:-In this paper we explore the possibility of using Bluetooth in the development of a
Mobile Ad-Hoc Network (MANET) suitable for transmitting data between Symbian OS based
Smartphone’s. We also analyse the problems that Bluetooth presents when considering 

Adaptive Forwarding Rate Control for Network Coding in the Tactical MANET
SY Oh ,Annual Conference of ITA (ACITA), 2009 ,
Abstract—In this paper, we propose a novel packet forwarding scheme based on network
coding that is resilience to jamming attack in a wireless ad hoc network. In a tactical field,
wireless communication is prevailed between military agents and vehicles, but it is fragile 

MANET routing with provably low complexity through constant density clustering and route request broadcast
HS Yang, L Ritchie, AW Richa ,Wireless Personal , 2007 ,Springer
Abstract As mobile ad hoc networks (MANETs) are emerging as important components in
critical and large-scale applications, it is crucial to develop MANET routing mechanisms with
provably low complexity. In this paper, we give a tutorial overview of the efficient use of 

A Performance Comparison of Multipath Multicast Routing Protocols for MANET
S Vijayaragavan, K Duraiswamy , journal of computer , 2009 ,
Summary Mobile ad hoc networks (MANETs) are characterized by dynamic topology, limited
channel bandwidth and limited power at the nodes. Because of these characteristics, paths
connecting to the source nodes with destinations may very unstable and go down at any 

Performance Analysis of Malicious Node Aware Routing for MANET using Two-Hop Authentication
R Sanjeev ,International Journal of Computer , 2011 ,
Abstract The inherent features of the MANET [1] make it vulnerable to a wide range of
attacks. There is no guarantee that a communication path is free from malicious and
compromised nodes which deliberately wish to disrupt the network communication. In this 

Testimony-based isolation: New approach to overcome packet dropping attacks in manet
D Djenouri ,The 7th Postgraduate Symposium on , 2006 ,
Abstract—Attackers could take advantage of the cooperative nature of MANET’s routing
protocols, by participating in the route discovery procedure to include themselves in routes,
then simply drop data packets during the forwarding phase, aiming at a DoS (Denial of 

HLMP: High Level MANET Protocol
J Rodríguez-Covili, SF Ochoa ,2009 ,
Abstract—Wireless communication infrastructure dependence is not always a suitable way
to achieve mobile collaboration and communication processes for various scenarios. In
those situations a MANET can take advantage of the independent signal range of every