Integration of Cluster based routing and Mobile Service Discovery Protocol for MANETs: A Novel Approach
نویسندگان
چکیده
-Service discovery technologies enable services to advertise their existence in a dynamic way, and can be discovered, configured and used by other devices with minimum manual efforts.In order to achieve efficient service discovery in large scale Mobile Ad hoc Networks (MANETs) we have proposed a scheme that integrates service discovery with cluster based routing by piggybacking service information into routing layer messages. Thus, service discovery does not generate additional messages and a node requesting a service, in addition to discovering that service; it is simultaneously informed of the route to the service provider. The proposed Service Discovery Protocol uses a dynamic clustering algorithm to group nodes in a MANET into clusters, and utilizes Distributed Hash Tables (DHTs) called Service Table to efficiently cache service information in a peer-to-peer manner. This paper proposes a scheme that greatly enhances service discovery in terms of efficiency, minimizes the traffic and energy consumption.
منابع مشابه
Below Cross-Layer: An Alternative Approach to Service Discovery for MANETs
Service discovery protocols for mobile ad hoc networks attempt to overcome the inability to locate resources presented by networks in which prior knowledge of node identity and capability is not available. Existing approaches continue to rely on underlying address-based routing protocols in order to communicate with discovered services. These two-tier approaches generate routing overheads which...
متن کاملBeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملComparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET
Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....
متن کاملCluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کامل