Figure 1 - available via license: Creative Commons Attribution 4.0 International
Content may be subject to copyright.

Classifications of wireless networks.
Source publication
Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection
of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct
its topology and routing table information for the exchange of data packets on the joining
and leaving of each node on ad-hoc basis. This paper is base...
Context in source publication
Context 1
... networks not only offer connection flexibility among users at different places they also help in the ex- tension of the network to any building or area without a physical-wired connection. Such connections are of two types; Substructure networks and Ad-Hoc networks as shown in Figure 1. ...
Citations
... With the development of wireless networks, one of the most prominent areas of research in the modern era is MANETs. Mobile ad hoc Networks (MANETs) are some of the most popular wireless communication networks, consisting of multiple mobile nodes interacting with other nodes using a decentralized infrastructure [1]. This type of network does not rely on a fixed infrastructure. ...
... Particle Swarm Optimization is a search technique that is inspired by flocks of birds. The population-based algorithm was proposed in 1995 by Eberhart [1]. The traditional PSO algorithm contains many populations of particles, and each of them is a candidate solution. ...
... Table 1 explains the path selection steps. The path obtained by the first particle is [8,3,4,1,7,2] and its fitness value is 703.39. The global best is the path with the minimum fitness value. ...
A Mobile ad hoc Network (MANET) is a collection of wireless mobile nodes that temporarily establish a network without centralized administration or fixed infrastructure. Designing the routing of adequate routing protocols is a major challenge given the constraints of battery, bandwidth, multi-hop, mobility, and enormous network sizes. Recently, Swarm Intelligence (SI) methods have been employed in MANET routing due to similarities between swarm behavior and routing. These methods are applied to obtain ideal solutions that ensure flexibility. This paper implements an enhanced Particle Swarm Optimization (EPSO) algorithm that improves MANET performance by enhancing the routing protocol. The proposed algorithm selects the stable path by considering multiple metrics such as short distance, delay of the path, and energy consumption. The simulation results illustrate that the EPSO outperforms other existing approaches regarding throughput, PDR, and number of valid paths.
... WSNs are a specific kind of ad-hoc networks [3,4].The most striking feature of a WSN is that it is a data-centric/query-driven network; that is, location-based queries can be given in a WSN, wherein nodes only in the specific region of interest forward their data towards the BS. The data may be sent directly by each node to the BS or, in a multi-hop fashion, critical consideration in the development of WSNs. ...
Wireless Sensor Networks (WSN) and Internet of Things assisted networks have entered almost all domains of human life in the recent years, and as a result of their wide variety of uses, they are still a popular focus of research. A key problem in the development of WSNs is energy efficiency. A useful technique to preserve energy in a WSN is clustering. However, it has an issue of hot spots. The hot-spot concern can be handled by using unequal clustering, wherein clusters of different sizes are created depending on distance from the sink/base station. In this article, a brief of the recent unequal clustering methods and trends in WSNs is presented. The classification of uneven clustering techniques in WSNs is presented, and future research directions in the field are recommended.
... Uma rede móvel ad hoc apresenta características específicas que devem ser consideradas no desenvolvimento de seus protocolos. Exemplos incluem: topologia dinâmica, enlaces com largura de banda limitada, necessidade de conservação de energia, perdas de pacotes por estouro de buffer, altas taxas de erros de bits e enlaces intermitentes de curta duração (Paranjothi;Zeadally, 2020;Raza et al., 2016). Por outro lado, essas redes oferecem vantagens, como mobilidade dos equipamentos, flexibilidade de instalação, redução de custos com infraestrutura, escalabilidade, possibilidade de instalação em áreas de difícil acesso, além de segurança, confiabilidade e robustez (Agrawal et al., 2023). ...
Este artigo apresenta o SimDTN, um novo simulador para redes móveis sem fio tolerantes a atrasos e desconexões. O objetivo principal é disponibilizar à comunidade científica um simulador alternativo, de código aberto, capaz de implementar alguns dos principais algoritmos de roteamento, modelos de mobilidade, regras de borda e métricas de conectividade. O SimDTN possibilita a simulação do comportamento de dispositivos móveis dentro de uma área pré-definida, cujos movimentos dos nós podem ser gerados por meio de modelos de mobilidade previamente estabelecidos ou por movimentações reais capturadas via GPS. As simulações permitem o uso dos seguintes modelos de mobilidade sintéticos: Random Waypoint, Random Walk e Smooth Random. Quando os nós alcançam os limites da área de simulação, as regras de borda disponíveis incluem Bounce, Delete and Replace e Wrap Around. O simulador implementa protocolos de roteamento como Primeiro Contato, Prophet, Epidêmico e Spray and Wait, os quais têm como objetivo maximizar a taxa de entrega de dados na rede, minimizar o atraso de transmissão fim a fim e limitar a sobrecarga de dados. Após o término das simulações, com base na topologia da rede, são gerados resultados referentes às seguintes métricas de conectividade: grau médio, quantidade de nós isolados, coeficiente de clusterização médio, número de componentes conexas e duração média dos enlaces. Além disso, o SimDTN gera automaticamente representações gráficas a partir dos dados obtidos nas simulações. Os resultados apresentados neste estudo derivam da análise de desempenho dos protocolos de roteamento implementados em uma topologia de rede veicular, cujos movimentos foram obtidos a partir de traços reais capturados via GPS na cidade de Muriaé, no estado de Minas Gerais, sudeste do Brasil. Por fim, destaca-se que o SimDTN permite a inclusão de novos protocolos de redes e a abertura direta de traços capturados de movimentações reais, tornando-o adequado para a avaliação de topologias de movimentação e novos algoritmos. Com base em pesquisas realizadas com alunos, professores e pesquisadores que utilizam o simulador, concluiu-se que ele apresenta uma interface simples, intuitiva e didática, sendo bem aceito pela comunidade acadêmica.
... The nodes frequently change the entire network's topology as they move randomly and connect to any of the other nodes residing in the network [1]. MANET nodes usually can act as both routers and hosts [2]. Mobile nodes that randomly surf the network automatically connect to other mobile stations, requiring little human intervention. ...
... The Chaotic map-based Diffie Hellman problem states that in (2), it is impossible to compute the value of T X , given the values of T x , X, N, and T X . ...
The need for Mobile Ad hoc Networks (MANETs) has expanded with the development of mobile computing and wireless sensor network technologies. However, this increase has also led to a rise of the attacks on these networks. In order to ensure high Quality of Service (QoS) and maintain connectivity, MANETs require careful consideration of factors, such as power, connectivity, secure transmissions, authentication, and handovers. Handovers are necessary for seamless network connectivity and require quick authentication to ensure uninterrupted service. Although RSA (Rivest Shamir Adleman) and ECC (Elliptic Curve Cryptography) algorithms are commonly used for authentication due to their fast asymmetric key encryption-decryption and exchange, they are less effective against black hole attacks. Chaos algorithms provide a faster authentication process and are efficient against false behavior black hole attacks. This study demonstrates that the chaos algorithm is a viable option for providing fast authentication and preventing malicious nodes from disrupting the network.
... Nodes are organized into networks and manage the network independently and in a distributed manner without centralized intervention. Each node acts as both the user and router [1]. ...
... Peer network. Nodes of ad hoc networks are equal and perform the same functions [1]. 3. ...
... Limited resources. Ad hoc networks usually consist of portable devices with low computing power, memory, and battery charge [1]. 4. ...
The OSI model used to be a common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear delineation of layers (physical, channel, network, transport, application) to the cross-layer approach. The layers of the network model in ad hoc networks strongly influence each other. Thus, the cross-layer approach can improve the performance of an ad hoc network by jointly developing protocols using interaction and collaborative optimization of multiple layers. The existing cross-layer methods classification is too complicated because it is based on the whole manifold of network model layer combinations, regardless of their importance. In this work, we review ad hoc network cross-layer methods, propose a new useful classification of cross-layer methods, and show future research directions in the development of ad hoc network cross-layer methods. The proposed classification can help to simplify the goal-oriented cross-layer protocol development.
... Nodes are organized into network and manage the network independently and in a distributed manner without centralized intervention. Each node acts as both user and router [1]. ...
... Peer network. Nodes of ad hoc networks are equal and perform the same functions [1]. 3. ...
... Limited resources. Ad hoc networks usually consist of portable devices with low computing power, memory, battery charge [1]. 4. ...
OSI model used to be common network model for years. In the case of ad hoc networks with dynamic topology and difficult radio communications conditions, gradual departure is happening from the classical kind of OSI network model with a clear delineation of layers (physical, channel, network, transport, application) to the cross-layer approach. The layers of the network model in ad hoc networks strongly influence each other. Thus, the cross-layer approach can improve the performance of an ad hoc network by jointly developing protocols using interaction and collaborative optimisation of multiple layers. The existing cross-layer methods classification is too complicated, because it’s based on the whole manifold of network model layers combinations, regardless their importance. In this work, we review ad hoc networks cross-layer methods, propose the new useful classification of cross-layer methods, and show future research directions in ad hoc networks cross-layer methods development. The proposed classification can help to simplify the goal-oriented cross-layer protocol development.
... When people have been pulled from crashed cars, a traffic accident investigation is a process that involves identifying, disclosing, and documenting any civil or criminal violations of laws that may have led to the accident. Each hop can be either a source or a destination dependently [10][11][12]. People who believe that Mobile Ad hoc Networks are not a defective design and that we cannot utilize them in practice since most of their applications Conceptually, the context-related and middlewarerelated aspects of the middleware platform that will allow and act upon context awareness in a MANET environment may be separated. ...
Mobile wireless Ad-hoc has become more popular because it forms quickly, has an easy setup, and has easy extensibility. The mobile ad-hoc wireless networks can be further classified according to their applications as follows: Regular user ad-hoc networks are commercial communication that applies to vehicles to help avoid collisions and accidents and live connections to transfer data from car to car. Another application is disaster rescue ad-hoc networking, usually used when a normal infrastructure network is destroyed by storms, earthquakes, tsunamis, etc. Nowadays, a lot of applications, particularly those related to the military and emergency situations, rely on mobile ad hoc wireless networks, where security needs are more challenging to provide than in regular networks. We present the tactical network needs for the military. This platform attempts to assess the possible advantages of mobile ad hoc networks in tactical military applications. This work proposes route discovery using reactive (on-demand) routing protocols where nodes need to just transfer data. This eliminates the requirement for each node to store and maintain any routing tables. This study presents and contrasts the benefits and drawbacks of two fundamental mobile ad hoc routing systems (AODV and DSR). Both protocols are On-Demand routing techniques, and when data needs to be sent, the discovery phase begins. The results of the simulation, the AODV routing approach outperforms the DSV routing method under identical simulated conditions.
... To choose the optimum way, an energy-aware fuzzy controllable route is proposed to select the optimum way. The primary goal is to estimate latency and enhance residual energy by evaluating route stability [3]. ...
Wirelessly connected mobile devices with self-configuration need to have reliable communication. The deployment of routing techniques in dynamic Ad-Hoc networks has enhanced traffic management. In mobile Ad-Hoc networks (MANETs), each node freely moves from one place to another and acts as a router. However, mobile networks are also considered Ad-Hoc wireless networks. Wireless technologies are merged in MANETs to improve communication among the nodes. MANETs can be easily installed in civil and military applications. This paper presents a survey study on MANETs using fuzzy logic-based techniques based on reviewed literature. Also, some applications are discussed, which include forestry, search and rescue operations, and digital libraries. In addition, different types of routing protocols are incorporated, like proactive, reactive, hybrid, swarm intelligence, and fuzzy logic-based routing. However, a brief overview of fuzzy systems and different real-time applications that use fuzzy technology as a controller are given preference. Besides, investigating fuzzy logic in MANETs, especially in routing protocols, has attracted researchers to this field of study. KeywordsAODVDSDVVANETsFuzzy Logic
... It is applicable in areas such as smart cities, traffic management, waste management, fire disaster management, rescue operations, healthcare, etc. [2]. Some of the well-known problems facing MANET include mobility-induced packet losses, security due to the wireless environment, quality of services, and battery constraints [3]. Studies over the years have shown that establishing minimal energy consumption in mobile nodes has been a very important problem that must be considered. ...
... It is formed by the self-organization of mobile nodes, and each node in the ad hoc network has both router and host functions. In the related research of MANETs, the mobility model is the basis for studying the simulation of ad hoc network, and currently it mainly faces several difficulties [2,3]: First, the mobility of network nodes is regarded as the The main obstacle to be faced by control and management; secondly, the network node mobility model is widely used in the performance evaluation of various network protocols and algorithms, and the node mobility caused by different mobility models will have an impact on the performance of the ad hoc network Great impact. Finally, due to the complexity of ad hoc network technology, it is difficult to deploy on a large scale under realistic conditions, and the cost of networking is high, and the experiment is difficult. ...
Most of the existing mobility models use simple, linear motion to describe node movement, and there are few studies on curve movement patterns based on multiple obstacles in real scenes. How to describe the avoidance and curve movement patterns of nodes in multivariate obstacle scenes has become a key difficulty in mobility modeling. To address this, this paper proposes a mobility model based on Hermite curves, which fills the gap in curve mobility models for complex, multivariate obstacle scenes in mobility modeling. Firstly, the paper analyzes the demands of mobile patterns in real scenes, and then theoretically models the Hermite curve direction, combining node movement with Hermite curves to achieve curve movement, and adding perception parameters to avoid obstacles. To study the model's performance in practical scenes, this paper researches the spatial probability distribution of nodes and the spatio-temporal dynamic characteristics of network topology under the model's action, and defines the evaluation indicators of the model. To demonstrate the model's application performance, it is compared with the curve mobility model SRMM and the classic RWPM model. The results show that the model not only adapts to the obstacle avoidance application scenes with multiple obstacles, but also has a more uniform spatial probability distribution of nodes, better spatial coverage, and better spatio-temporal dynamic characteristics of the network topology composed of nodes than the SRMM and RWPM models. This model can provide a more realistic application scenes for the simulation of MANET.