Multi-Tier Mobile Ad Hoc Networks: Architecture, Protocols, and Performance

نویسندگان

  • Bo Ryu
  • Tim Andersen
  • Tamer Elbatt
  • Yongguang Zhang
چکیده

While mobile ad-hoc networking (MANET) research has received a considerable attention in recent years, the majority of them have focused on single-tier (e.g., ground) and homogeneous (e.g., same radio for every node) MANET. Few have investigated the potential implications of multi-tier and heterogeneous natures of MANET on the design and performance of MANET protocols in a systematic manner. For example, one of the stark differences between single-tier and multi-tier MANET environments is that the multi-tier MANET naturally creates “coverage asymmetry” due to the much larger coverage area by airborne nodes compared to ground nodes. Consequently, the number of “neighbors” an airborne node sees can be potentially several orders of magnitude larger than that of a ground node. Treating this airborne node same as any ground node will adversely affect the performance of medium access control (MAC) and/or routing MANET protocols. In this paper, we present a detailed multi-tier MANET architecture, associated issues, and protocols developed. Our novel protocols and simulation tools designed for multi-tier MANET are described with preliminary performance results. Keywords-mobile ad hoc networks; Multi-tier MANET; virtual dynamic backbone; Airborne Communication Node.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks

Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...

متن کامل

Multi-Tier Mobile Ad Hoc Routing

We present a new approach for routing in multi-tier heterogeneous wireless mobile ad hoc networks. This protocol, namely multi-virtual backbone protocol (MVP), naturally addresses key challenges arising from multi-tier wireless networks such as the coverage asymmetry and node heterogeneity. It also supports various QoS needs by constructing and maintaining QoS-specific virtual backbone infrastr...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003