Opportunistic and Cooperative Forwarding in Mobile Ad-hoc Networks with Light-Weight Proactive Source Routing

نویسنده

  • Zehua Wang
چکیده

The multi-hop wireless network has drawn a great deal of attention in the research community. Within the long period after it was proposed, the routing and forwarding operations in the multi-hop wireless network remain to be quite similar to those in the multi-hop wired network or the Internet. However, all the data transmission over the wireless medium in the wireless networks is by broadcasting in nature, which is different from the Internet. Because of the broadcast nature, many opportunities based on overhearing can be used to enhance the data transmission ability in wireless network. ExOR is the first practical data forwarding scheme which tries to promote the data transmission ability by utilizing the broadcast nature in wireless mesh networks, and the opportunistic data forwarding becomes a well-known term given by ExOR to name this kind of new data forwarding scheme. The basic idea in ExOR has triggered a great deal of derivations. However, almost all these derivations are proposed for wireless mesh networks or require the positioning service to support opportunistic data forwarding in the Mobile Ad-hoc Networks (MANETs). In this thesis, we propose a series of solutions to implement opportunistic data forwarding in more general MANETs, which is called Cooperative Opportunistic Routing in Mobile Ad-hoc Networks (CORMAN). CORMAN includes three following important components. First, a new light-weight proactive source routing scheme PSR is proposed to provide source routing information in MANETs for both opportunistic data forwarding

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proactive Source Routing Protocol for Mobile Ad Hoc Networks Using BFST Algorithm

Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking, with most research conducted for stationary wireless networks. One of the reasons why opportunistic data forwarding has not been widely utilized in mobile ad hoc networks (MANETs) is the lack of an efficient lightweight proactive routing scheme with strong source routing capability....

متن کامل

Opportunistic Data Forwarding In MANETS through Proactive Source Routing

In multi hop wireless networking, Opportunistic data forwarding has drawn much attention, with most research conducted for stationary wireless networks. Opportunistic data forwarding has not been widely utilized in mobile ad hoc networks (MANETs),the reason behind this is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. In this paper, proposed...

متن کامل

Analysing the Behaviour and Performance of Opportunistic Routing Protocols in Highly Mobile Wireless Ad Hoc Networks

Recent advances in wireless networks have enabled us to deploy and use mobile ad hoc networks for communication between the rescue officers in disaster recovery and reconstruction operations. This highly dynamic network does not require any infrastructure or centralized control. As the topology of the network remain dynamic, severe performance limitations incur with traditional routing strategi...

متن کامل

Cclaeeo: Clustering Based Cross- Layer Aided Energy-efficient Opportunistic Routing Scheme in Mobile Ad Hoc Networks

The major features of CCLAEEO Routing scheme are centralized recovery process, deterministic (as opposed to probabilistic) peer-to-peer recovery, and ability to trade off recovery with latency. The link excellence similarity of wireless channels has been a difficult issue in data connections until current plain investigation in utilizes this characteristic. The matching broadcast communication ...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011