Academic literature on the topic 'MANET(Mobile Adhoc Network)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MANET(Mobile Adhoc Network).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "MANET(Mobile Adhoc Network)"

1

Dr., Opinder Singh. "A NOVEL MECHANISM FOR DETECTING DENIAL OF SERVICE ATTACKS IN MOBILE ADHOC NETWORKS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 1 (2019): 50–56. https://doi.org/10.5281/zenodo.2537886.

Full text
Abstract:
A mobile adhoc network (MANET) is a type of network, which contains number of mobile devices with wireless network interconnections. In MANET, each node can act as transmitter, router and data sink. MANET has dynamic topology which allows nodes to join and leave the adhoc network at any point of time. MANETs are more vulnerable than wired networks due to its characteristics like dynamic topology, distributed cooperation and open medium. Security issues in mobile adhoc networks are veiled by various techniques that were introduced in past decade. Due to decentralized nature of MANET, the security issues cultivate resulting in welcoming various lethal vulnerabilities. Out of various Denial of Service (DoS) attacks in MANET, Flooding attackis considered most challenging adversarial modules that tremendously affect the communication system in MANET. In this paper, various previously used techniques are discussed for mitigating Flooding attacks in MANET. The uniqueness of this article is that it presents a comparative study of existing techniques for detecting Flooding attacks in MANET. Finally, we proposed a new technique based on threshold value for detecting Flooding attacker nodes in MANET.
APA, Harvard, Vancouver, ISO, and other styles
2

Deepa, S., Kamal Raj S, and Sridhar K.P. "Development of mobile adhoc network using leader Selection algorithm." International Journal of Engineering & Technology 7, no. 2.9 (2018): 6. http://dx.doi.org/10.14419/ijet.v7i2.9.9929.

Full text
Abstract:
Mobile ad-hoc network (MANET) is an interconnection of mobile devices without preexisting topology which form a communication network. QOS parameters like congestion control, confidentiality, output, delay, energy consumption, jitter, have to be improved based on the development of transmission technology, and real-time applications. MANETs are totally different from distributed COMPUTING systems. They are dynamic and self-organizing networks. A leader is needed to coordinate and organize tasks in MANET. The challenge is to own the proper election algorithm that chooses the correct leader based on numerous factors in MANET. The task of the leader is to keep up the quality of service (QOS) in the MANET. This paper explores QoS in MANET by using the leader of the network by correct election algorithm by improving the network lifetime, path stability, and reduce end to end delay.
APA, Harvard, Vancouver, ISO, and other styles
3

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
4

Dr., M. Pushpavalli, and Janani G. "A Survey: Trust Based Task Assignment in Service Oriented ADHOC Networks with Energy Efficient Optimization." Journal of Control System and Control Instrumentation 1, no. 1 (2019): 1–8. https://doi.org/10.5281/zenodo.2575420.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is an Infrastructure less network where mobile devices are connected without wires. Each device in MANET can move independently on its own. Thus MANET can change the location and configure by itself. Nowadays Energy Efficiency (EE) of the ADHOC nodes and Trust management becomes an essential aspect, as it is not possible to give sufficient power to the mobile devices of the ADHOC networks. This type of problem in ADHOC networks is a globally optimal problem where some customized branch and bound (BB) algorithm are effectively and efficiently used to solve it. In this paper a survey is done on the trust management protocol with energy efficient optimization.
APA, Harvard, Vancouver, ISO, and other styles
5

Divakara, Madhurya Kodialbail, and A. R. Abdul Rajak. "Throughput analysis in mobile adhoc network: a literature survey." MATEC Web of Conferences 167 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201816701004.

Full text
Abstract:
A rapid advancement in the area of mobile networks has been observed over the recent years due to the spread of reasonable, existing wireless devices. Hence it has given way to numerous opportunities to many researchers to work on Mobile Adhoc Networks. There are several key challenges in implementing the MANETS. It does not use any existing infrastructure or centralized administration. Each mobile node acts as a router. Due to its dynamic features, they are endangered. This paper provides a detailed study and throws light on the MANETS Topology in Wireless Adhoc Networks and focusses on performance parameters throughput, end to end delay and network load, its effect on the performance of the MANET network depending upon the number of users.
APA, Harvard, Vancouver, ISO, and other styles
6

Dhiman, Samita, and Manish Kumar. "Trust-Based Security: Advancement towards Protection of the Adhoc Network." CGC International Journal of Contemporary Technology and Research 4, no. 1 (2021): 240–47. http://dx.doi.org/10.46860/cgcijctr.2021.12.31.240.

Full text
Abstract:
MANET (mobile ad hoc network) is a collection of mobile nodes that interact without the need for a fixed physical foundation. MANETs have grown in popularity as a result of characteristics like dynamic topology, quick setup, multi-hop data transfer, and so on. MANETs are well-suited to various real-time applications, including environmental monitoring, disaster management, and covert and military operations, because of their distinguishing characteristics. MANETs may also be used in conjunction with new technologies like cloud computing, IoT, and machine learning algorithms to help realize the vision of Industry 4.0. Secure and reliable data transfer is essential for any MANET-based sensitive real-time applications that must achieve the requisite QoS. It is challenging to provide safe and efficient data transfer with MANET. As a result, this article examines different Trust-based Approaches that take a step forward in providing secure transmission while simultaneously improving MANET performance. Furthermore, the study's analysis based on many aspects exposes the inadequacies of existing techniques and provides future directions for improvement.
APA, Harvard, Vancouver, ISO, and other styles
7

Mittal, Samridhi. "Optimal Node Routing Layouts in Mobile Adhoc Network." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34963.

Full text
Abstract:
Mobile Adhoc Network (MANET) is a self-organizing network of various network devices responsible for communication. In MANET, new layouts are adopted for energy optimization, security implementation, traffic minimization and overhead reduction. MANET are aggressive in nature. This requires modification in network routing protocols for performance enhancement. This paper presents the detailed survey of different layouts involved in the implementation of network routing protocols in MANET. The survey is classified into four phases involved in MANET routing applications namely- routing protocols, neighborhood discovery, distributed or centralized hash tables, and bloom filter. Firstly, the classification of routing protocols based on various traffic models presents the MANET configuration. Secondly, a neighborhood discovery mechanism conveys the enhancement in the routing configurations. Thirdly, application of hash table operation (distributed/ centralized) to MANET to improve the matching efficiencies and computational speed. Finally, the application of bloom filter concept to improve service discovery rate and reduce the fake identities. Traditionally, the unpredictability occurs during the prediction of optimal node routing due to the dynamic nature of the MANET. Moreover, the presence of ejected malicious node in another cluster disgraced the link stability. This survey conveys the problems such as storage overhead, mobility nature, malicious nodes, and false positive rates in the traditional methods. The detailed survey leads to the stone of integration of Distributed Hash Table (DHT) with a bloom filter to reduce the problems in traditional research works. Index Terms – Performance Optimization, Bloom Filter, Centralized Hash Table (CHT), Distributed Hash Table (DHT), Energy Consumption, Mobile Ad- hoc Network (MANET), Quality of Service (QoS), Routing.
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Gurpreet, Amanpreet Kaur, Aashdeep Singh, and Rohan Gupta. "Ant Based Zonal Routing in Mobile Adhoc Networks." International Journal of Engineering & Technology 7, no. 3.1 (2018): 46. http://dx.doi.org/10.14419/ijet.v7i3.1.16795.

Full text
Abstract:
Mobile Ad hoc network (MANET) is a collection of moving wireless nodes which form a temporary network topology without using any pre-existing network infrastructure. One of the challenges in MANET is to identify a path between the source and the destination nodes. MANET is highly deployable, self-organizing, autonomous and self-configuring network with the ability of rapid deployment. Nodes movement imposes high challenges to routing in MANET due to dynamically changing of topologies, low transmission power and asymmetric links. So well-organized routing is very critical task due to highly dynamic environment. Route instability occurs due to node mobility and leads to frequent change in topologies; therefore routing becomes one of the core issues. Many researchers are working on the expansion of routing protocols in MANET.
APA, Harvard, Vancouver, ISO, and other styles
9

R., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
APA, Harvard, Vancouver, ISO, and other styles
10

Srividya, R., and B. Ramesh. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (2019): 4266–76. https://doi.org/10.11591/ijece.v9i5.pp4266-4276.

Full text
Abstract:
Mobile Adhoc network is the most advanced emerging technology in the field of wireless communication. MANETs mainly have the capacity of self-forming, self-healing, enabling peer to peer communication between the nodes, without relying on any centralized network architecture. MANETs are made applicable mainly to military applications, rescue operations and home networking. Practically, MANET could be attacked by several ways using multiple methods. Research on MANET emphasizes on data security issues, as the Adhoc network does not befit security mechanism associated with static networks. This paper focuses mainly on data security techniques incorporated in MANET. Also this paper proposes an implementation of Advanced Encryption Standard using biometric key for MANETs. AES implementation includes, the design of most robust Substitution-Box implementation which defines a nonlinear behavior and mitigates malicious attacks, with an extended security definition. The key for AES is generated using most reliable, robust and precise biometric processing. In this paper, the input message is encrypted by AES powered by secured nonlinear S-box using finger print biometric feature and is decrypted using the reverse process.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "MANET(Mobile Adhoc Network)"

1

Bulut, Gulsah. "Service Discovery Oriented Clustering For Mobile And Adhoc Networks." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611889/index.pdf.

Full text
Abstract:
Adhoc networks do not depend on any fixed infrastructure. The most outstanding features of adhoc networks are non-centralized structure and dynamic topology change due to high mobility. Since mentioned dynamics of mobile adhoc networks complicate reaching the resources in the network, service discovery is significantly an important part of constructing stand-alone and self-configurable mobile adhoc networks. The heterogeneity of the devices and limited resources such as battery are also load up more difficulty to service discovery. Due to the volatile nature of the adhoc networks, service discovery algorithms proposed for mobile and adhoc networks suffer from some problems. Scalability becomes a problem when the service discovery is based on flooding messages over the network. Furthermore, the high traffic which occurs due to the message exchange between network nodes makes the communication almost impossible. Partitioning a network into sub-networks is an efficient way of handling scalability problem. In this thesis, a mobility based service discovery algorithm for clustered MANET is presented. The algorithm has two main parts. First one is for partitioning the MANET into sub-networks, named &ldquo<br>clustering&rdquo<br>. Second part is composed of an efficient discovery of services on overall network. Clustering algorithm used in this study is enhanced version of DMAC (Distributed Mobility Adaptive Clustering, which is one of the golden algorithms of the wireless network clustering area). To be fast and flexible in service discovery layer, a simple and fastresponding algorithm is implemented. Integration of two algorithms enables devices to be mobile in the network
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Kavitha. "Intrusion Detection in Mobile Adhoc Networks." Connect to full text in OhioLINK ETD Center, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1260232844.

Full text
Abstract:
Thesis (M.S.)--University of Toledo, 2009.<br>Typescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Bibliography: leaves 80-84.
APA, Harvard, Vancouver, ISO, and other styles
3

Almajnooni, Saad M. "Mobile ad hoc network (MANET) for inter-vehicle communications." Thesis, University of Newcastle Upon Tyne, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raška, Martin. "Mobile IP v sítích MANET." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218096.

Full text
Abstract:
This thesis discuss about the problem with mobility of stations in IP networks, concretely protocol Mobile IP and about the problems with this protocol in MANET networks, with the scope on Motorola MESH. First part is about design integration of protocol Mobile IP in this networks with usage Tropos 5210 MetroMesh routers and Cisco components (router, switch) to design and configure wireless MESH network, than connect this network with Cisco components and try to implement Mobile IP into this network. Second part is about design and configure wireless network from Cisco Wireless Access Points and about succesfully implementation of Mobile IP protocol into this network. In the last part is some tests of the function and quality of this topology.
APA, Harvard, Vancouver, ISO, and other styles
5

Alghamdi, Raid Abdullah. "Movement Generator For Mobile Network Simulation." Thesis, Fredericton: University of New Brunswick, 2012. http://hdl.handle.net/1882/44597.

Full text
Abstract:
The simulation of mobile networks relies on a reliable movement generation. Random movement patterns are frequently used in simulators. In this report, the performance of the popular setdest movement generator, which is built into the ns2 open source simulator, is investigated using two statistical tests: quadrat count test and the variance to mean ratio (VMR) test. The results show a non-uniform distribution of nodes during the simulation with a bias towards placing the nodes in the center of the simulated area. We propose and implement a di erent method for random movement generation in the ns2 simulator and show that our movement generator improves the randomness of the node distribution during the simulation. The new generator was successfully tested with the ns2 simulator.
APA, Harvard, Vancouver, ISO, and other styles
6

Holland, Gavin Douglas. "Adaptive protocols for mobile ad hoc networks." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1445.

Full text
Abstract:
Recent advances in low-power technologies have resulted in the proliferation of inexpensive handheld mobile computing devices. Soon, just like the Internet empow- ered a whole new world of applications for personal computers, the development and deployment of robust ubiquitous wireless networks will enable many new and exciting futuristic applications. Certain to be an important part of this future is a class of networks known as "mobile ad hoc networks." Mobile ad hoc networks (or simply "ad hoc networks") are local-area networks formed "on the spot" between collocated wireless devices. These devices self-organize by sharing information with their neigh- bors to establish communication pathways whenever and wherever they are. For ad hoc networks to succeed, however, new protocols must be developed that are capable of adapting to their dynamic nature. In this dissertation, we present a number of adaptive protocols that are designed for this purpose. We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match the channel conditions perceived by the receiver. We also investigate routing protocols that adapt route selection according to network characteristics. In particular, we present two on-demand routing protocols that are designed to take advantage of the presence of multirate links. We then investigate the performance of TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses explicit feedback messages from the link layer about link failures to adapt TCP's behavior. Finally, we show how link failures in heterogeneous networks containing links with widely varying bandwidth and delay can cause repeated "modal" changes in capacity that TCP is slow to detect. We then present a modifed version of TCP that is capable of more rapidly detecting and adapting to these changes.
APA, Harvard, Vancouver, ISO, and other styles
7

Saeed, Nagham. "Intelligent MANET optimisation system." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/5674.

Full text
Abstract:
In the literature, various Mobile Ad hoc NETwork (MANET) routing protocols proposed. Each performs the best under specific context conditions, for example under high mobility or less volatile topologies. In existing MANET, the degradation in the routing protocol performance is always associated with changes in the network context. To date, no MANET routing protocol is able to produce optimal performance under all possible conditions. The core aim of this thesis is to solve the routing problem in mobile Ad hoc networks by introducing an optimum system that is in charge of the selection of the running routing protocol at all times, the system proposed in this thesis aims to address the degradation mentioned above. This optimisation system is a novel approach that can cope with the network performance’s degradation problem by switching to other routing protocol. The optimisation system proposed for MANET in this thesis adaptively selects the best routing protocol using an Artificial Intelligence mechanism according to the network context. In this thesis, MANET modelling helps in understanding the network performance through different contexts, as well as the models’ support to the optimisation system. Therefore, one of the main contributions of this thesis is the utilisation and comparison of various modelling techniques to create representative MANET performance models. Moreover, the proposed system uses an optimisation method to select the optimal communication routing protocol for the network context. Therefore, to build the proposed system, different optimisation techniques were utilised and compared to identify the best optimisation technique for the MANET intelligent system, which is also an important contribution of this thesis. The parameters selected to describe the network context were the network size and average mobility. The proposed system then functions by varying the routing mechanism with the time to keep the network performance at the best level. The selected protocol has been shown to produce a combination of: higher throughput, lower delay, fewer retransmission attempts, less data drop, and lower load, and was thus chosen on this basis. Validation test results indicate that the identified protocol can achieve both a better network performance quality than other routing protocols and a minimum cost function of 4.4%. The Ad hoc On Demand Distance Vector (AODV) protocol comes in second with a cost minimisation function of 27.5%, and the Optimised Link State Routing (OLSR) algorithm comes in third with a cost minimisation function of 29.8%. Finally, The Dynamic Source Routing (DSR) algorithm comes in last with a cost minimisation function of 38.3%.
APA, Harvard, Vancouver, ISO, and other styles
8

Christman, Michael Edward. "Extensions for Multicast in Mobile Ad-hoc Networks (XMMAN): The Reduction of Data Overhead in Wireless Multicast Trees." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/34525.

Full text
Abstract:
Mobile Ad hoc Network (MANET) routing protocols are designed to provide connectivity between wireless mobile nodes that do not have access to high-speed backbone networks. While many unicast MANET protocols have been explored, research involving multicast protocols has been limited. Existing multicast algorithms attempt to reduce routing overhead, but few, if any, attempt to reduce data overhead. The broadcast nature of wireless communication creates a unique environment in which overlaps in coverage are common. When designed properly, a multicast algorithm can take advantage of these overlaps and reduce data overhead. Unlike a unicast route, in which there is one path between a sender and receiver, a multicast tree can have multiple branches between the sender and its multiple receivers. Some of these paths can be combined to reduce redundant data rebroadcasts. The extensions presented in this thesis are a combination of existing and original routing techniques that were designed to reduce data rebroadcasts by aggregating multicast data flows. One such optimization takes advantage of the multipoint relay (MPR) nodes used by the Optimized Link State Routing (OLSR) unicast protocol. These nodes are used in unicast routing to reduce network broadcast, but can be used to help create efficient multicast data flows. Additionally, by listening to routing messages meant for other nodes, a host can learn a bit about its network and may be able to make routing changes that improve the multicast tree. This protocol was implemented as a software router in Linux. It should be emphasized that this is a real implementation and not a simulation. Experiments showed that the number of data packets in the network could be reduced by as much as 19 percent. These improvements were accomplished while using only a small amount of routing overhead.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
9

Biswas, Kamanashis, and Md Liakat Ali. "Security Threats in Mobile Ad Hoc Network." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5926.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to their certain unique properties, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration, security challenges has become a primary concern to provide secure communication. In this thesis, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have made comparative study to address the threats in different layers. Finally, we have identified the challenges and proposed solutions to overcome them. In our study, we have found that necessity of secure routing protocol is still a burning question. There is no general algorithm that suits well against the most commonly known attacks such as wormhole, rushing attack etc. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.
APA, Harvard, Vancouver, ISO, and other styles
10

Mondal, Sharup Barua &amp Ratan Chandra. "Impact of Node Mobility on the Voice Quality in Mobile Ad-hoc Network (MANET)." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4156.

Full text
Abstract:
Enormous developing electronic technology has brought telecommunication to the sky inspiring popularity. Wireless Network (WN) technology will be emerging so far human. Presently users give the impression loving be connected all the time (everywhere) to the network or Internet through diverse access system, e.g., Universal Mobile Telecommunications System, Mobile Ad-hoc Network (MANET) [9] and Worldwide Interoperability for Microwave Access [30]. In telecommunication; MANET is considered as self-configured unlike nodes creating infrastructure-less network connected by means of WN, as nodes can exchange data packets without a central control [18]. Choosing beyond line of sight (BLOS) communication, MANET can be an intelligent selection, which is flexible for using and cost saving. However, to maintain quality of service (QoS), more or less challenges still have to be resolved [18]. Multimedia as well as VoIP (Voice over Internet Protocol) gaining more popularity as the internet world favored by the huge use of WN (access technologies) [20]. To maintain persistent services in different MANET situation unlike routing protocols (RP) are employed. In this thesis known (MANET) routing protocols OLSR (Optimized Link State Routing) [20], DSR (Dynamic Source Routing) [30] and TORA (Temporally Ordered Routing Algorithm) [14] have been considered for voice traffic as they maintaining dissimilar characteristics in the dissimilar situations as WN factors (like; bandwidth, signal strength, network traffic or load, network size) influencing the voice quality [9]. This thesis work focusing on the impact of node mobility influencing voice quality in unlike RPs in MANET. To decide the best suit RP in the MANET, the OPNET (Optimized Network Engineering Tool) Simulator 16.0 has been brought into play. OLSR is proposed to be best fitting RP for MANETs running VoIP appliance.<br>Enorma utveckla elektroniska tekniken har fört telekommunikation till himlen inspirerande popularitet. Trådlöst nätverk (WN) teknik kommer att utvecklas så långt mänsklig. För närvarande användare ger intryck kärleksfulla vara ansluten hela tiden (överallt) till nätverket eller Internet via olika system för tillträde, till exempel, Universal Mobile Telecommunications System, Mobil Ad-hoc-nätverk (Manet) [9] och Worldwide Interoperability för Microwave Access-[30 ]. I telekommunikation, är Manet betraktas som själv-konfigurerade skillnad noder skapa infrastruktur mindre nätverk som är anslutet via WN, som noder kan utbyta datapaket utan central styrning [18]. Välja bortom synfältet (Blos) kommunikation, kan Manet vara ett intelligent val, som är flexibel för att använda och kostnadsbesparande. Men för att upprätthålla service (QoS), mer eller mindre problem återstår att lösas [18]. Multimedia samt VoIP (Voice over Internet Protocol) allt mer populärt eftersom internet världen gynnas av den enorma användningen av WN (accesstekniker) [20]. För att behålla ihållande tjänster i olika Manet situationen skillnad routing protokoll (RP) är anställda. I denna kända avhandling (Manet) routingprotokoll OLSR (Optimerad Routing Link State) [20], DSR (Dynamic Source Routing) [30] och Tora (Tidsmässigt ordnad routing algoritm) har [14] ansetts för taltrafik som de upprätthålla olika egenskaper i olika situationer som WN faktorer (som, bandbredd, signalstyrka, nätverkstrafik eller last, nätverkets storlek) Att påverka ljudkvaliteten [9]. Detta examensarbete fokuserar på effekterna av nod rörlighet påverka röstkvalitet i motsats till RPS i Manet. För att avgöra det bäst passar RP i Manet, den OPNET (Optimerad Network Engineering Tool) Simulator 16,0 har kommit in i bilden. OLSR föreslås bli bäst passar RP för MANETs köra VoIP-apparaten.<br>Bergvägen 18 5tr 196 31 Kungsängen Sweden Mob: 0046(0)737106987
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "MANET(Mobile Adhoc Network)"

1

Cichoń, Jacek. Ad-hoc, Mobile, and Wireless Network: 12th International Conference, ADHOC-NOW 2013, Wrocław, Poland, July 8-10, 2013. Proceedings. Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jaiswal, Anurag Kumar. Malicious Behavior in Mobile Adhoc Networks: An Scheme to detect Misbehaving Nodes in Mobile Ad-Hoc Network MANET. LAP Lambert Academic Publishing, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmad, Mir Shahnawaz. Defence System for MANETs. Mobile Adhoc Networks. GRIN Verlag GmbH, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Security Management for Mobile Ad hoc Network of Networks (MANoN): Mobile Ad hoc Networks (MANET), Security Management, Security Architecture. VDM Verlag Dr. Müller, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "MANET(Mobile Adhoc Network)"

1

Adoni, Kirti Aniruddha, and Radhika D. Joshi. "Multipath OLSR with Energy Optimization in Mobile Adhoc NETwork (MANET)." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27317-9_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Leite, J. R. E., Paulo S. Martins, and Edson L. Ursini. "A Validation Method for AdHoc Network Simulation Including MANETs, VANETs and Emergency Scenarios." In Ad-Hoc, Mobile, and Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31831-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Patel, Suchita, Priti Srinivas Sajja, and Samrat Khanna. "Enhancement of Security in AODV Routing Protocol Using Node Trust Path Trust Secure AODV (NTPTSAODV) for Mobile Adhoc Network (MANET)." In Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 2. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63645-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mahiddin, Nor Aida, and Nurul I. Sarkar. "Advances in MANETs for Disaster Recovery." In Gateway Routing Selection Schemes for Post-Disaster Recovery in Mobile AdHoc Networks. Chapman and Hall/CRC, 2024. https://doi.org/10.1201/9781032700571-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kumari, Parveen, Gaurav Aggarwal, and Sugandha Singh. "Clustering in Mobile Adhoc Network: WCA Algorithm." In International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03146-6_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vidhate, Deepak, Anita Patil, and Supriya Sarkar. "Bandwidth Estimation Scheme for Mobile Adhoc Network." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mane, Sayali N., and A. R. Nigvekar. "Internet Connectivity between Mobile Adhoc Network Using Mobile IP." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25734-6_76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chetna, Shikha, Sunil Gupta, and Tejinder Kaur. "Integration of IoT for MANET Network Security." In Mobile Radio Communications and 5G Networks. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-7982-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gandhewar, Nisarg, and Rahila Patel. "Review on Sinkhole Detection Techniques in Mobile Adhoc Network." In Advances in Intelligent and Soft Computing. Springer India, 2012. http://dx.doi.org/10.1007/978-81-322-0487-9_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Hongqi, Oliver Yang, and Jiying Zhao. "VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network." In Ad Hoc Networks. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "MANET(Mobile Adhoc Network)"

1

Irawan, Dedy, A. A. N. Ananda Kusuma, Mohammad Hamdani, Christian Wisnu Purnaadi, Toto Bachtiar Palokoto, and Arky Artasari. "Mobile Adhoc Network (MANET) Protocol Performance with Mobility and Tx Power Variations." In 2024 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET). IEEE, 2024. https://doi.org/10.1109/icramet62801.2024.10809023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shifani, S. Agnes, G. Vinoth Rajkumar, Muppudathi Sutha S, S. Maheshwari, A. Antony Mary, and M. I. Mary Metilda. "MANET: A Secured and Logical Routing Protocol Development Over Mobile AdHoc Networks for Intelligent Data Communication." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10689925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kadhiravan, T., S. Harshavardhan, G. Jeevith, K. R. Mahesh Kumar, and S. Nivas. "Hybrid Adhoc Routing Protocol Implementation in Mobile Adhoc Network Using Firefly Algorithm." In 2024 7th International Conference on Circuit Power and Computing Technologies (ICCPCT). IEEE, 2024. http://dx.doi.org/10.1109/iccpct61902.2024.10673233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thapa, Sneha, Anjan Bandyopadhyay, Mahendra Kumar Gourisaria, Satyendr Singh, and Sudhansu Shekhar Patra. "Securing Mobile Adhoc Network with Quantum Key Distribution: An Experimental Analysis." In 2024 4th International Conference on Sustainable Expert Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63445.2024.10763155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Aqui, Jedidiah, and Michael Hosein. "Mobile Adhoc Networks - Establishing MANET and Network Risk Profiles." In 2023 3rd International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2023. http://dx.doi.org/10.1109/icmnwc60182.2023.10435940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Manmohan, Mohanjeet Singh, Kirti Walia, and Kanwalpreet Kaur. "Comprehensive Study of Routing Protocols in Adhoc Network: MANET." In 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2019. http://dx.doi.org/10.1109/iemcon.2019.8936135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Aravind, Maya C., C. P. Sangeetha, and C. D. Suriyakala. "Enhanced dynamic MANET on-demand(En-DYMO) routing protocol for mobile adhoc networks." In 2015 Global Conference on Communication Technologies (GCCT). IEEE, 2015. http://dx.doi.org/10.1109/gcct.2015.7342721.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bagwari, Ashish, Raman Jee, Rahul Tiwari, and Ashish Kumar. "Comparative study of Directional antenna gain for MANET Nodes and Cluster Head Gateway in Integrated Mobile Adhoc Network." In 2011 IEEE International Conference on Image Information Processing (ICIIP). IEEE, 2011. http://dx.doi.org/10.1109/iciip.2011.6108895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shamsi, Jawwad, S. Ali Raza, Hassan Farid, Taha Munir, and Abbas Mehdi. "MACNET: Mobile Adhoc Collaborative NETworks." In 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. ICST, 2014. http://dx.doi.org/10.4108/icst.collaboratecom.2014.257322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, K. Dinesh, I. Ramya, and M. Roberts Masillamani. "Queue Management in Mobile Adhoc Networks (Manets)." In Int'l Conference on Cyber, Physical and Social Computing (CPSCom). IEEE, 2010. http://dx.doi.org/10.1109/greencom-cpscom.2010.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "MANET(Mobile Adhoc Network)"

1

Clausen, T., C. Dearlove, J. Dean, and C. Adjih. Generalized Mobile Ad Hoc Network (MANET) Packet/Message Format. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chakeres, I. IANA Allocations for Mobile Ad Hoc Network (MANET) Protocols. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Clausen, T., C. Dearlove, and J. Dean. Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dearlove, C. Identity-Based Signatures for Mobile Ad Hoc Network (MANET) Routing Protocols. RFC Editor, 2016. http://dx.doi.org/10.17487/rfc7859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Acosta, Jaime C., and Yadira Jacquez. An Analysis Platform for Mobile Ad Hoc Network (MANET) Scenario Execution Log Data. Defense Technical Information Center, 2016. http://dx.doi.org/10.21236/ad1001060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dearlove, C., T. Clausen, and P. Jacquet. Link Metrics for the Mobile Ad Hoc Network (MANET) Routing Protocol OLSRv2 - Rationale. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dearlove, C., and T. Clausen. An Optimization for the Mobile Ad Hoc Network (MANET) Neighborhood Discovery Protocol (NHDP). RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dearlove, C., and T. Clausen. TLV Naming in the Mobile Ad Hoc Network (MANET) Generalized Packet/Message Format. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ogier, R., and P. Spagnolo. Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding. RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cole, R., J. Macker, and B. Adamson. Definition of Managed Objects for the Mobile Ad Hoc Network (MANET) Simplified Multicast Framework Relay Set Process. RFC Editor, 2014. http://dx.doi.org/10.17487/rfc7367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography