Slinky: An Adaptive Protocol for Content Access in Disruption-Tolerant Ad Hoc Networks

نویسندگان

  • Vikas Kawadia
  • Niky Riga
  • Jeff Opper
  • Dhananjay Sampath
چکیده

The topology of tactical MANETs may vary from well connected to severely disconnected. Applications using the clientserver paradigm often do not perform well in such environments, because they rely on the underlying MANET routing protocols to provide connectivity between arbitrary endpoints, which is often infeasible in tactical MANETs. We consider content-based networking as an alternative paradigm to operate tactical MANETs. Content based networking causes information to flow based on its content rather than the identities of endpoints. The network assumes responsibility for positioning information so that it is easily accessible. This model, rather than the classical client–server model, is naturally suited to dynamic and disruption-tolerant tactical MANETs. We present Slinky, an adaptive protocol for content access in disruption-tolerant ad hoc networks, in particular tactical MANETs. Slinky relies on the community structure inherent in most networks. It consists of a distributed scheme to detect dynamic communities in the network, and a scheme to replicate content across the communities. Slinky does not use any underlying network-wide routing, global topology or geographical information that is often unavailable in tactical MANETs. Slinky is an adaptive and efficient content access protocol that can adapt to a wide range of mobility scenarios. We demonstrate the performance of Slinky in a few tactically relevant scenarios.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

پروتکل مسیریابی خودتطبیقی با محدوده تأخیر برای شبکه های موردی بین خودرویی

Abstract Vehicular Ad Hoc Network (VANET) is a particular type of mobile ad hoc network in which vehicles communicate between themselves using wireless antenna.  Due to unique characteristics of VANETs (e.g. high mobility of nodes and dynamic topology), routing is one of the challenging tasks in such networks. Consequently, delay tolerant networks which consider the disconnect nature of...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011