Simulation of Ad Hoc routing protocol by opnet Research Papers (original) (raw)

In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing... more

In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic source routing (DSR) protocol.

MANET environment was represented by a combination of node position, mobility speed, node type, and number of nodes. In this paper, a novel system for MANET environment evaluation is proposed by involving fuzzy multi-criteria decision... more

MANET environment was represented by a combination of node position, mobility speed, node type, and number of nodes. In this paper, a novel system for MANET environment evaluation is proposed by involving fuzzy multi-criteria decision maker (FMCDM) to reflect the importance of the MANET environment on the overall protocols performance. The proposed system combined with another system that previously suggested for MANET protocol evaluation. the outputs of these systems are merged to produce one single crisp value in interval [0 1]. Then, a case study for an office is implemented using OPNET 14.5 simulator to test the proposed system. results proved that MANET environment could be used to enhance the QoS of the protocol. in another world, factors along with inherent characteristics of Ad-hoc networks may result in unpredictable variations in the overall network performance.

Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast... more

Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast growing industrial activities on the island, the problem of air pollution is becoming a major concern for the health of the population. We proposed an innovative system named Wireless Sensor Network Air Pollution Monitoring System (WAPMS) to monitor air pollution in
Mauritius through the use of wireless sensors deployed in huge numbers around the island. The proposed system makes use of an Air Quality Index (AQI) which is presently not available in Mauritius. In order to improve the efficiency of WAPMS, we have designed and implemented a new data aggregation algorithm named Recursive Converging Quartiles (RCQ). The algorithm is used to merge data to eliminate
duplicates, filter out invalid readings and summarise them into a simpler form which significantly reduce the amount of data to be transmitted to the sink and thus saving energy. For better power management we used a hierarchical routing protocol in WAPMS and caused the motes to sleep during idle time.

Communication is an essential part of human existence which enables us reach friends and relatives at distant or different geographical locations and boundaries. This communication is however based on certain rules and procedures without... more

Communication is an essential part of human existence which enables us reach friends and relatives at distant or different geographical locations and boundaries. This communication is however based on certain rules and procedures without which communication would be unsuccessful. Protocol defines a set of rules that enables communication with 99.99 efficiency and effectiveness. Therefore one protocol that enables real time communication between devices and computers is the User Datagram protocol located in the transport section of the Open System Interconnection (OSI) model. On other hand, UDP has not performed well in the transport of short messages between devices especially when same messages are sent to different devices and ports through Application Programming Interfaces (APIs) and sockets that enable programmers to harness the full power of transport protocol. Therefore this paper seeks to identify the various limitations of the UDP and proposes a new UDP protocol known as UDP-RT, and that is User Datagram Protocol for Real Time communication. This protocol is an extension of UDP that is robust and has the capacity to manage and control message communication in real time that ensures the best delivery and security at all times and also proposes reliable protocol UDP over UDP protocol layer that gains one millisecond average round trip time (RTT).

The varieties of studies in the literature have been addressed by the researchers to solve security dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific characteristics of MANETs, the radio... more

The varieties of studies in the literature have been addressed by the researchers to solve security
dilemmas of Mobile Ad-Hoc Networks (MANET). Due to the wireless nature of the channel and specific
characteristics of MANETs, the radio interference attacks cannot be defeated through conventional
security mechanisms. An adversary can easily override its medium access control protocol (MAC) and
continually transfer packages on the network channel. The authorized nodes keep sending Request-to-
Send (RTS) frames to the access point node in order to access to shared medium and start data transfer.
However, due to jamming attacks on the network, the access point node cannot assign authorization
access to shared medium. These attacks cause a significant decrease on overall network throughput,
packet transmission rates and delay on the MAC layer since other nodes back-off from the
communication. The proposed method applied for preventing and mitigating jamming attacks is
implemented at the MAC layer that consist of a combination of different coordination mechanisms. These
are a combination of Point Controller Functions (PCF) that are used to coordinate entire network
activities at the MAC layer and RTS/CTS (Clear-To-Send) mechanisms which is a handshaking process
that minimizes the occurrence of collisions on the wireless network. The entire network performance and
mechanism is simulated through OPNET simulation application.

A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific... more

A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific characteristics as complexity of wireless communication and lack of infrastructure. Hence security is an important requirement in mobile ad hoc networks. One of the attacks against network integrity in MANETs is the Black Hole Attack. In this type of attack all data packets are absorbed by malicious node, hence data loss occurs. In this paper we investigated the impacts of Black Hole attacks on the network performance. We have simulated black hole attacks using Network Simulator 2 (NS-2) and have measured the packet loss in the network without and with a black hole attacks. Also, we measured the packet loss when the number of black hole attacks increases.

14 th International Conference on Networks & Communications (NeCoM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications.... more

14 th International Conference on Networks & Communications (NeCoM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications. The conference looks for significant contributions to the Computer Networks & Communications for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, Network Protocols and Wireless Networks, Data communication Technologies, and Network Security. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.

The importance of IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), also called RPL, has motivated in the development of a robust and quality of service (QoS) oriented Multi-Constraints Adaptive Link Quality Index (MALQI)... more

The importance of IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), also called RPL, has motivated in the development of a robust and quality of service (QoS) oriented Multi-Constraints Adaptive Link Quality Index (MALQI) based routing protocol. Unlike classical RPL protocols, MALQI enables mobile-RPL while ensuring fault-resilient, reliable and QoS communication over LLNs. MALQI protocol exploits key novelties such as signal strength based mobile node positioning, average received signal strength indicator (ARSSI) and ETX based objective function for fault tolerant best forwarding path selection. The functional architecture of MALQI enables it to be used as the parallel to the link layer RPL that even in the case of link failure can assist efficient data delivery over LLNs. Once detecting link outage, MALQI can execute node discover and best forwarding path selection to assist QoS delivery. Contiki-Cooja based simulation reveals that MALQI based mobile-RPL outperforms other state-of-art routing protocols.

In the mobile ad hoc network (MANET) update of link connectivity is necessary to refresh the neighbor tables in data transfer. A existing hello process periodically exchanges the link connectivity information, which is not adequate for... more

In the mobile ad hoc network (MANET) update of link connectivity is necessary to refresh the neighbor tables in data transfer. A existing hello process periodically exchanges the link connectivity information, which is not adequate for dynamic topology. Here, slow update of neighbour table entries causes link failures which affect performance parameter as packet drop, maximum delay, energy consumption, and reduced throughput. In the dynamic hello technique, new neighbour nodes and lost neighbour nodes are used to compute link change rate (LCR) and hello-interval/refresh rate (r). Exchange of link connectivity information at a fast rate consumes unnecessary bandwidth and energy. In MANET resource wastage can be controlled by avoiding the re-route discovery, frequent error notification, and local repair in the entire network. We are enhancing the existing hello process, which shows significant improvement in performance.

Low power and limited processing are characteristics of nodes in Wireless sensor networks. Therefore, optimal consumption of energy for WSN protocols seems essential. In a number of WSN applications, sensor nodes sense data periodically... more

Low power and limited processing are characteristics of nodes in Wireless sensor networks. Therefore, optimal
consumption of energy for WSN protocols seems essential. In a number of WSN applications, sensor nodes sense data
periodically from environment and transfer it to the sink. Because of limitation in energy and selection of best route,
for the purpose of increasing network remaining energy a node with most energy level will be used for transmission
of data. The most part of energy in nodes is wasted on radio transmission; thus decreasing number of transferred
packets in the network will result in increase in node and network lifetimes. In algorithms introduced for data
transmission in such networks up to now, a single route is used for data transmissions that results in decrease in
energy of nodes located on this route which in turn results in increasing of remaining energy. In this paper a new
method is proposed for selection of data transmission route that is able to solve this problem. This method is based
on learning automata that selects the route with regard to energy parameters and the distance to sink. In this method
energy of network nodes finishes rather simultaneously preventing break down of network into two separate parts.
This will result in increased lifetime. Simulation results show that this method has been very effective in increasing of
remaining energy and it increases network lifetime.

The paper presents the results of a detailed packet-level simulation comparing four multi-hop wireless ad hoc network routing protocols under the load of different probability distributions, that cover a range of design choices having... more

The paper presents the results of a detailed packet-level simulation comparing four multi-hop
wireless ad hoc network routing protocols under the load of different probability distributions,
that cover a range of design choices having different protocol viz. Dynamic Source Routing
Protocol (DSR), Ad-hoc On Demand Vector (AODV), Optimized Link State Routing (OLSR)
and Global State Routing (GSR). We have extended the OPNET network simulator to
accurately model the MAC and physical-layer behavior of the IEEE 802.11 wireless LAN
standard, including a realistic wireless transmission channel model. Simulation of 100 mobile
nodes has been carried out and the performance optimization is determined.

Our environments are being gradually occupied with an abundant number of digital objects with networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities... more

Our environments are being gradually occupied with an abundant number of digital objects with networking and computing capabilities. After these devices are plugged into a network, they initially advertise their presence and capabilities in the form of services so that they can be discovered and, if desired, exploited by a user or other networked device. With the increasing number of these devices attached to networks the complexity to configure and control them increases which may lead to major processing and communication overheads. Hence, the devices are no longer expected to just act as primitive stand-alone appliances which only provide the facilities and services to the user they are designed for, rather they can offer complex services from unique combinations of devices; which in turn creates the necessity for these devices to be equipped with some sort of intelligence and self-awareness which enables them to be self configuring and self programming. Intelligence in devices is obtained by embedding intelligent agents into them which provides them with proactive control and learning capabilities. Self-awareness within agents enables capabilities to operate in with a minimum of cognitive loading of the user, thereby supporting the vision for cognitive disappearance or ambient intelligence. This paper present a novel intelligent embedded agent technique for reducing the number of associations and interconnections between various agents operating within an AIE in order to minimize the processing latency and overhead caused by message flooding in a Pub/Sub middleware whilst reducing the cognitive load of configuringthese associations to personalize themselves to the user needs. The main goal of the proposed fuzzy based intelligent embedded agents includes learning and adapting the network configuration and the system functionality to meet the user’s needs based on monitoring the user behaviors in a lifelong non intrusive mode to pre-emptively control the environment on his behalf. In addition, the F-IAS agent aimed at reducing the agent associations and interconnections to the most relevant set in order to reduce its processing overheads and thus implicitly improving the system overall efficiency. Moreover, we employ ambassador agents which limit the number of messages reaching the societies by performing an analysis and filtering routine to determine if the propagated events mat ch the desired criteria of the member agents of the societies. Ambassadors are also utilized with novel characteristics to discover and select associations among agent pairs residing in separate societies based on a concurrence analysis of published events. In order to validate the efficiency of the proposed methods we will present two set of unique experiments. The first experiments described the obtained results carried out within the intelligent Dormitory (iDorm) which is a real world test bed for AIE research. Here we specifically demonstrate the utilization of the F-IAS agents and discuss that by optimizing the set of associations, the agents increases efficiency and performance. The second set of experiments is based on emulation of an iDorm-like large scale multi society based AIE environment. The results illustrate how ambassadors discover strongly correlated agent pairs and cause them to form associations so that relevant agents of separate societies can start interacting with each other.

Two-ray ground reflection model has been widely used as the propagation model to investigate the performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A more realistic model namely shadowing... more

Two-ray ground reflection model has been widely used as the propagation model to investigate the performance of an ad hoc network. But two-ray model is too simple to represent a real world network. A more realistic model namely shadowing propagation model has been used in this investigation. Under shadowing propagation model, a mobile node may receive a packet at a signal level that is below a required threshold level. This low signal level affects the routing protocol as well as the medium access control protocol of a network. An analytical model has been presented in this paper to investigate the shadowing effects on the network performance. The analytical model has been verified via simulation results. Simulation results show that the performance of a network becomes very poor if shadowing propagation model is used in compare to the simple two-ray model. Two solutions have also been proposed in this paper to overcome the effects of shadowing. One solution is a physical layer solution and the other one is a Medium Access Control (MAC) layer solution. Simulation results show that these two solutions reduce the shadowing effect and improve network performance.