Dead reckoning in mobile ad hoc networks

نویسندگان

  • Aarti Agarwal
  • Samir Ranjan Das
چکیده

A predictive model-based mobility tracking method, called dead reckoning, is proposed for mobile ad hoc networks. It disseminates both location and movement models of mobile nodes in the network so that every node is able to predict or track the movement of every other node with a very low overhead. This technique is applied to solve the unicast routing problem by modeling link costs using both link lifetime and geographic distance from the destination to the link egress point. This method presents a much superior routing performance compared to either DSR or AODV, two other popular routing protocols, particularly in terms of delivery fraction and routing load.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance of dead reckoning-based location service for mobile ad hoc networks

A predictive model-based mobility tracking method, called dead reckoning, is developed for mobile ad hoc networks. It disseminates both location and movement models of mobile nodes in the network so that every node is able to predict or track the movement of every other node with a very low overhead. The basic technique is optimized to use “distance effect,” where distant nodes maintain less ac...

متن کامل

On the Average Course Length in Mobility Models for Mobile Ad Hoc Networks

In simulations of Manets, mobile nodes usually move in a random direction until they reach their target, then stop and start heading to another direction. We propose in this paper to study the average course length of mobile nodes, from the moment they start moving to their respective destinations, and the time they stop. Since the knowledge of the time nodes keep on heading to their targets he...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Multicast Routing Protocol (puma) Security Issues in Mobile Ad Hoc Networks

Security in multicast routing in Mobile Ad Hoc Networks (MANET) is crucial in order to enable effective and efficient multicast based group communication. The security issues of MANET’s in group communications is more challenging due to presence of multiple senders and multiple receivers. In this paper, we analyze the vulnerabilities in a mesh based multicast routing protocol, PUMA (Protocol fo...

متن کامل

Enhancement in QoS for Hybrid Networks Using IEEE 802.11e HCCA with Extended AODV Routing Protocol

The mobile ad hoc network (MANET) with infrastructure networks (hybrid networks) has several practical uses. The utility of hybrid network is increased in real time applications by providing some suitable quality of service. The quality thresholds are imposed on parameters like end-toend delay (EED), jitter, packet delivery ratio (PDR) and throughput. This paper utilizes the extended ad hoc on-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003