0% found this document useful (0 votes)
55 views16 pages

WANET's Performance and Mobility Management

This document discusses performance and mobility management in wireless ad hoc networks (WANETs). It begins with an introduction to WANETs and their dynamic topology. It then discusses routing protocols, quality of service models, and mobility management solutions for WANETs. Finally, it considers trust and security management issues. The document aims to provide an overview of key topics regarding WANET performance, routing, QoS, mobility, and security.

Uploaded by

Deepak Aggarwal
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views16 pages

WANET's Performance and Mobility Management

This document discusses performance and mobility management in wireless ad hoc networks (WANETs). It begins with an introduction to WANETs and their dynamic topology. It then discusses routing protocols, quality of service models, and mobility management solutions for WANETs. Finally, it considers trust and security management issues. The document aims to provide an overview of key topics regarding WANET performance, routing, QoS, mobility, and security.

Uploaded by

Deepak Aggarwal
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 16

WANET’s Performance and

Mobility Management
Contents
• Wireless Ad Hoc Networks(WANET)
• Forwarding Mechanism
• Routing Protocols
• Quality of Service (QoS) and QoS Models
• Mobility Management and Solutions
• Trust and Security Management
• Conclusion
• Bibliography
Wireless Ad Hoc Networks
• Introduction
• Dynamic Topology
• Can be build very fast
• They are very resilient
Forwarding Mechanism
• Spatial Uniformity
• Nodal Uniformity
• Random Walk Dissemination (RWD)
• Random Direction Dissemination(RDD)
WANET Routing Protocols
• DESTINATION-SEQUENCED DISTANCE-
VECTOR ROUTING (DSDV)
• AD HOC ON -DEMAND DISTANCE
VECTOR (AODV)
• DYNAMIC SOURCE ROUTING (DSR)
• OPTIMUM LINK STATE ROUTING
(OLSR)

Source: Arun Kumar B. R., Lokanatha C. Reddy, Prakash.S.Hiremath, “Performance Comparison of Wireless Ad-Hoc
Network Routing Protocols”, IJCSNS International Journal of Computer Science and Network Security, VOL.8
No.6, June 2008
Load Observations

Figure: Routing Overload v/s Pause Time (ms.)


Load Observations(Cont.)

Figure: Delivery Ratio v/s Pause Time (ms.)


Load Observations(Cont.)

Figure: Routing Overhead v/s No. of Nodes


Load Observations(Cont.)

Figure: Delivery ratio v/s No. of Nodes


Load Observations(Cont.)

Figure: Routing Overload v/s Burst Time (ms.)


Load Observations(Cont.)

Figure: Delivery Ratio v/s Burst Time (ms.)


Quality of Service (QoS)
• Integrated Services (IntServ)
• Differentiated Services (DiffServ)
• QoS Models for MANET
– Ad hoc QoS on-demand routing (AQOR)
– Flexible QoS Model for MANET (FQMM)
– State Wide Area Network (SWAN)
– INSIGNIA

Source: Xuefei Li, “Multipath Routing and QoS Provisioning in Mobile Ad Hoc Networks”, Doctor of
Philosophy thesis, Dept. of Electrical Engineering, Queen Mary, University of London, April 2006
Mobility Management
• What is Mobility Management?
• Hierarchical Mobility Model
– Micro Mobility
– Macro Mobility
Mobility Management Solutions
• Macro Mobility Solution
– Mobile IP

• Micro Mobility Solution


– Hierarchical Mobile IP
– Cellular IP
– HAWAII
Trust and Security Management
• What is Trust?
• Characteristics of Trust
• Security
– Availability
– Integrity
– Confidentiality
– Authenticity
– Key Management

Source: H. Li and M. Singhal, “Trust Management in Distributed Systems,” Computers, vol. 40, no.2,
Feb. 2007, pp. 45-53.
Conclusion

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy