Mobile Metropolitan Ad hoc Networks

نویسندگان

  • Piergiorgio Cremonese
  • Veronica Vanni
چکیده

The aim of this deliverable is to provide the software that implements, on the Linux operating system, the functions required to set up a MobileMAN. Specifically, in addition to the revised version of the software modules already delivered in D11 -i) CORE watchdog mechanism, ii) ad hoc routing framework, iii) p2p Pastry platform, and iv) VoIP and whiteboard applications -we now also deliver: the CrossROAD and XL-plugin modules (which implement a subset of the MobileMAN cross-layer architecture), and the UDDI4m modules. The software modules are contained in the CD ROM associated with this deliverable and are also made available in the Software web site http://keskus.hut.fi/tutkimus/MobileMan . In addition, we deliver our Ad Hoc Proxy ARP daemon (AHPAd) that enables the interconnection of MobileMAN adhoc islands with the Internet. The AHPAd code is reported in the Appendix. Project funded by the European Community under the “Information Society Technologies” Programme (19982002) MOBILEMAN IST-2001-38113 August 2005 Deliverable D14 2 of 35 SUMMARY The aim of this deliverable is to provide the software modules that implements, on the Linux operating system, the functions required to set up a campus-wide MobileMAN, as identified in D5, D10 and D13. Indeed, by integrating the software modules we developed with existing code, we obtained a set of software architectures that enable us to test MobileMAN concepts and ideas. Specifically, we have: i) a legacy (layered) TCP/IP architecture on which we run a VoIP application; ii) a legacy (layered) p2p architecture on which we run Whiteboard and UDDI4m applications, and iii) a p2p cross-layer architecture on which we run both Whiteboard and UDDI4m applications. In this document we describe the main characteristics of the software modules we deliver. More details on our solutions can be found in Deliverables D5, D10 and D13. The software we are delivering is contained in the CD ROM associated with this deliverable and which is also made available in the Software web site http://keskus.hut.fi/tutkimus/MobileMan. In addition, in this deliverable, we also present our solution to interconnect MobileMAN ad hoc islands among themselves and with the Internet. To this end, we implemented an Ad Hoc Proxy ARP daemon (AHPAd). The AHPAd code is reported in the deliverable’s appendix. http://heim.ifi.uio.no/~paalee/ MOBILEMAN IST-2001-38113 August 2005 Deliverable D14 3 of 35 CONTENTS LIST

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005