Fault Tolerance in Mobile Ad hoc Networks

نویسندگان

  • Navroop Kaur
  • Neeraj Kumar
چکیده

Mobile Ad hoc Networks provide flexibility and scalability which was not taken into consideration by the existing distributed systems. These networks are distributed networks and do not require any existing infrastructure. But in these types of networks there occurs some problems among which one may be occurring of fault. This may occur due to link failure, failure of nodes or network. We illustrate the solution for maintaining link connectivity even if the links to be used fails. A modified fault tolerance global spanning subgraph algorithm is determined which proves k-connectivity. This algorithm helps to form the minimum spanning tree considering the probability distribution function as edge weights in case the minimum weight edge to be added fails. This paper illustrates the way to toleratefault using modified global spanning subgraph algorithm and tested the performance of the proposed algorithm using NS-2 simulation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fault Tolerance in Mobile ad hoc Network: A Survey

Fault-Tolerance is an important design issue to construct a reliable mobile ad hoc network. Many types of faults may occur in mobile network such as link failure, node failure, misbehaving nodes, network failure, power and energy consumption etc. This paper mainly aims in surveying the research articles by combining them together to find the fault tolerant research problem in mobile ad hoc netw...

متن کامل

Analysis on Checkpointing Scheme Paradigms for Mobile Ad-hoc Network: A Review

This paper reviews the performance of various earlier algorithms in Mobile Ad hoc network (MANET) strived to achieve effective fault tolerant technique and subsequently presents a new algorithm keeping in mind all the existing drawbacks which will ensure to have better failure free execution cost and recovery cost. We can’t emulate the fault tolerance strategy of general distributed mobile comp...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Asynchronous Checkpointing and Optimistic Message Logging for Mobile Ad Hoc Networks

In recent years the advancements in wireless communication technology and mobile computing fueled a steady increase in both number and types of applications for wireless networks. Wireless networks can roughly be classified into cellular networks which use dedicated infrastructure (like base stations) and ad hoc networks without infrastructure. A Mobile Ad Hoc Network (MANET) is a collection of...

متن کامل

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014