Science topic

Mobile Ad Hoc Networks - Science topic

Members having interest and pursuing research in Mobile Ad hoc Networks can be a part of this group
Questions related to Mobile Ad Hoc Networks
  • asked a question related to Mobile Ad Hoc Networks
Question
8 answers
How to design mathematical model for AODV routing protocol? I have developed a new routing protocol, I would like to design or write the mathematical model for this routing protocol? is there any book I can read it. Thank you in Advance.
Relevant answer
Answer
Designing a mathematical model for the Ad hoc On-Demand Distance Vector (AODV) routing protocol involves formalizing the behavior, performance metrics, and operational characteristics of the protocol. Below are steps on how to approach the design of such a model:
Step 1: Define the Network Environment
  1. Network Topology: Specify the type of ad hoc network, including the number of nodes (N), mobility models (random waypoint, RWP, etc.), and node distribution (random, grid).
  2. Node Characteristics: Define node attributes, such as transmission range (R), energy constraints, and communication capabilities.
Step 2: Understand AODV Operation
AODV can be understood through its key operational phases:
  • Route Discovery: Nodes broadcast Route Request (RREQ) messages when they need a route.
  • Route Maintenance: Established routes are maintained as long as they are needed; if a link breaks, Route Error (RERR) messages are sent.
  • Route Reply: A Route Reply (RREP) is sent back to the source upon receiving an RREQ from a destination node.
Step 3: Establish Key Performance Metrics
Define the metrics you are interested in analyzing, including:
  1. Route Discovery Time (T_rd): Time taken to establish a route.
  2. End-to-End Delay (T_e2e): Time taken for a packet to travel from source to destination.
  3. Throughput (Th): Amount of data delivered over time.
  4. Packet Delivery Ratio (PDR): Ratio of delivered packets to the total packets sent.
  5. Network Overhead (O): Control packets generated (RREQ, RREP, RERR).
  6. Energy Consumption (E): Used energy per route discovery and maintenance.
Step 4: Mathematical Formulation
  1. Model Route Discovery:Let TRREQTRREQ​ be the time taken to receive RREQ and TRREPTRREP​ the time taken to send RREP. The route discovery time can be modeled as:
Trd=TRREQ+TRREPTrd​=TRREQ​+TRREP
  1. Calculate End-to-End Delay:If LL is the packet length, RR the transmission rate, and DD the number of hops, the delay can be modeled as:
Te2e=∑i=1D(LR+Tpropagation+Tqueue)Te2e​=i=1∑D​(RL​+Tpropagation​+Tqueue​)
Where TpropagationTpropagation​ is the propagation delay, and TqueueTqueue​ is the queuing delay at each node.
  1. Throughput:Define throughput as:
Th=PDR⋅LTtotalTh=TtotalPDRL
Where TtotalTtotal​ is the total time for communication.
  1. Packet Delivery Ratio:
PDR=NdeliveredNsentPDR=NsentNdelivered​​
Where NdeliveredNdelivered​ is the number of packets successfully delivered and NsentNsent​ is the total packets sent.
  1. Network Overhead:This can be calculated as the ratio of control packets to data packets:
O=NcontrolNdataO=NdataNcontrol​​
  1. Energy Consumption:If EtxEtx​ is the energy used to transmit and ErxErx​ for receiving:
E=NRREQ⋅Etx+NRREP⋅Erx+NRERR⋅EtxE=NRREQ​⋅Etx​+NRREP​⋅Erx​+NRERR​⋅Etx
Step 5: Simulate and Validate
  1. Simulation: Use a network simulator (like ns-3 or OMNeT++) to validate the mathematical model against real-world scenarios.
  2. Data Collection: Collect data for different simulations to compare with theoretical predictions.
  3. Parameter Sensitivity Analysis: Analyze how sensitive your model is to changes in parameters (e.g., node density, mobility patterns).
Step 6: Refine the Model
Based on validation results, refine your model to improve accuracy, considering factors like dynamic changes in network topology, varying traffic patterns, or more realistic mobility models.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
I am doing a research on Improving the efficiency and fairness on Mobile Ad Hoc Network and I need help
Relevant answer
Answer
I would recommend the following paper:
'Dynamic Time Slot Allocation for Mobile Ad Hoc Networks using Directional Antennas' Isaac Frank Agidi
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
Where else do Selective Forwarding Attacks exists aside from Routing for Low Power and Lossy Network (RPL), Mobile Ad Hoc Network (MANET) and Wireless Sensor Network (WSN)?
Relevant answer
Answer
I think selective forwarding attacks existed only for RPL, MANET, and Wireless Sensor Network
  • asked a question related to Mobile Ad Hoc Networks
Question
18 answers
What is the best network simulator to implement new routing protocol for mobile ad hoc networks that support directional antennas and beamforming?
Relevant answer
Answer
Thanks so much for your answer Ritakshi Negi
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
In Mobile Ad Hoc Network I had a security issue, that is already identified by IDS.
Relevant answer
Answer
There are projects available in https://tetcos.com/file-exchange.html covering IDS
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
The Architecture of Mobile Ad Hoc Network (MANET) is grouped into three main classifications which are :Enabling Technologies, Networking and Middleware and applications.
Relevant answer
Answer
I do not see a reason why their layered architecture would be affected. The mobility and capabilities of nodes will certainly be affected, mainly affecting the details of the physical (PHY) layer. This in turn may affect the applicable algorithms and protocols at the link and network layer. I do not think any higher layers should be affected.
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
I want to monitor the data rate of each wireless link at runtime in Network Simulator 3. Is there a way to do it? The data rate class is just used to set it, but I cannot get the current data rate of any wireless interface at any time in the simulation.
Relevant answer
Answer
  • asked a question related to Mobile Ad Hoc Networks
Question
2 answers
Hello!
I am very interested in your work on ad hoc social networks because I too work in this field. I read your article entitled "Profile-Based Ad Hoc Social Networking Using Wi-Fi Direct on the Top of Android" and found that you have a prototype ad hoc social network application that you developed using Wifi direct. Your source code could make things easier for me because I too am developing such a prototype to implement a publish/subscribe protocol for mobile ad hoc networks.
Relevant answer
Answer
Hi.,
Is it illegal to copy source code..
Some sites use code released under an open-source license; those sites may be copied. However, if the code is NOT released under open-source, it is definitely illegal to take it and use it directly for your own site. This is a copyright violation, no questions about it..
For software this means it is illegal to copy or distribute software, or its documentation, without the permission of the copyright holder. If you have a legal copy of software you are allowed to make a single archival copy of the software for backup purposes.
  • asked a question related to Mobile Ad Hoc Networks
Question
13 answers
I need to add the field of annulus number (area in which sensor is located from sink)  which is depend up on the hop count present in HELLO list.  So in which file the modifications has to be done, to add the field.
Relevant answer
Answer
I use ns 2.35
what about that?
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
Improved AODV with route discovery using scheduling
Relevant answer
Answer
Dear Jateni Halake
Well there could be multiple possibility for that for example ,
1- you may assigned some selected trusted nodes only to participate in route discover
2- clustering with cluster head can also reduced the route discovery braodcast packets
etc
I have several paper related to secure routing for MANET in highly cited journals , look at my RG profile to view the papers
Dr Adnan Nadeem
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
I want to fetch some parameters related to battery level and power consumption on AODV.
Relevant answer
Answer
Dear Abhishek Bajpai
You may use castalia package of OMENT simulator has support of power management of the sensors used in AdHoc and Sensor Networks.
Dr Adnan Nadeem
  • asked a question related to Mobile Ad Hoc Networks
Question
2 answers
I hope to generate application traffic in MANET(Mobile Ad-hoc NETwork).
Thus, I maked wireless subnet be made up only wlan_wkstn and task, application and profile for CBR.
I finished basic task, application and profile config but it doesn't work.
I think problem is Application: Destination Preference.(I attach image1)
If server was exist in topology, server was appeared (like Wireless Subnet_0.Server) but node was not.
thus I modified Name value to Wireless Subnet_0.Mobile_20 but it doesn't work.
Does Explicit traffic only support server?
please word if you have good method.
Additionaly, How can make 2-hop relationship between node to node??
Relevant answer
Answer
I dont know that much about OPNET, but if you have NetSim, I can explain how to do set-up traffic, and do the 2-hops, in a few simple steps
  • asked a question related to Mobile Ad Hoc Networks
Question
16 answers
Related to simulation
Relevant answer
Answer
which simulator is best for simulating VANET with 5G communication capabilities ? NS2 or NS3??
  • asked a question related to Mobile Ad Hoc Networks
Question
21 answers
Which simulator is best suited to simulate VANETs?
Relevant answer
Answer
I agree with Wahyu Pamungkas, that no single simulator is best for all the use-cases in VAENTS. However, you opt to choose traffic and network simulators simultaneously for most of the parameters. You have to choose traffic simulator first hand to get mobility traces that you can import further to perform network simulations for several parameters. VanetmobiSIM, SUMU, nctuNS are to name the few for first catagory. Similarly, Opnet, Omnet++ and Matlab are the good examples of the later categories. I hope, it helps
  • asked a question related to Mobile Ad Hoc Networks
Question
7 answers
I'm doing a long term research on the coverage problem in case of sensors are mobile.
The aspects to be simulated are as follow :
- network topologies and coverage
- energy consumption
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
Mobile ad-hoc networks
Relevant answer
Answer
For me,
Integration of MANETs node with UAVs.
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
What is the main difference between Wireless Ad-hoc Networks(WANET) and Mobile Ad-hoc Networks (MANET)?
Relevant answer
Answer
MANET is pretty well defined as an Internet Protocol scheme. A MANET is built at layer 3, in short. You can go to the IETF site and find multiple RFCs written about MANET, including a version of OSPF routing protocol for MANET, and other routing protocols such as DSDV, OADV, and DSR developed for MANET. Layer 3 schemes, all of them. They work with IP addresses.
Wireless ad-hoc networking is a more generic term. It can apply to layer 2 schemes, such as the use of IEEE 802.11 (WiFi) in so-called "ad hoc" mode, as opposed to the more typical use of WiFi in "infrastructure " mode. For example, for vehicular ad-hoc networks, or VANET, I don't think it's clear that a layer 3 MANET scheme is the future. And there are any number of wireless ad-hoc network concets out there - such as wireless sensor networks (WSNs) often mentioned in IoT discussions. Any type of self-organizing wireless system, not dependent on a base station or other single infrastructure device, would be considered wireless ad-hoc. I'd say that MANET is a subset, because it is specifically an IP-based concept.
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
I am a beginner using NS3. I know there is not a cognitive radio module in ns3 library at present, but I read some papers that simulate in ns3 for cognitive radio networks. Can anyone give me an example or study information?
Relevant answer
Answer
I think you have support for this is NetSim. The MAC/PHY are based on 802.22 and you have AODV, DSR, OLSR and ZRP routing protocols
  • asked a question related to Mobile Ad Hoc Networks
Question
29 answers
Kindly guide me about choosing best simulator for dynamic routing in Adhoc networks.
Can we use Opnet simulation for high level work?
Thanks
Relevant answer
Answer
NS2 is no longer used and active development stopped 7 years ago. So its best you use NS3 or NetSim or OPNET. And like you say you need to have lots of time and be very good at programming (in multiple languages) for Ns3.
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
What is the main difference between OLSR and DOLSR? Why we need DOLSR?
I want to implement these protocols in MANETs.
Relevant answer
Answer
Yes..Sure
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
Is there any support for goodput in NS-2 simulator?
Relevant answer
Answer
yes infact i am ready with article related to performance analysis of tcp variants in security attacks
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
Whether it creates effect on QOS parameter thoroughput and goodput?
Relevant answer
Answer
Yes selfish node will reduce qos parameters
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
I want to create a 2x4 grid in ns2 in which sensor nodes are deployed uniformly in each grid. Now the only function of sensor nodes sense data and communicate it to data mules(mobile nodes) To ensure equal node on every mobile node, the sensor nodes are uniformly placed. I am using 8 mobile nodes(one node in each grid) and 100 sensing nodes. So far I have completed my grid and introduce mobile nodes in it as well. Now what i need to do is to attach the mobile nodes with sensor nodes so that when a sensor nodes comes in radius of mobile node, it sends data to it. Can someone please tell me how I can attach mobile agent(data mules) with sensor node. I am not asking for any code, please tell me any document which can help me in this matter. Thanks
Relevant answer
Answer
 i ll be waiting aitizaz ali!
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
I want make two malicious nodes where one node encapsulates packets and the other node decapsulates packets. I want to ensure that hop counts do not increase between these two nodes whether or not there are colluding nodes between them and that they originally have more hop counts but due to Encapsulation hop counts do not count. The RREP packet will be delivered to the shortest hops in which malicious nodes reside so they form Wormhole Attack. Ultimately, I want to know how to make a logical link or packet encapsulation in NS2.
Relevant answer
Answer
can you help me that define a wormhole  tunnel between two wormhole nodes in tcl code ?
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
i want to print 1hop neighbors of any node.. pls tell me how to access 1-hop neighbors?
Relevant answer
Answer
Hi,
you can go to header file of your protocol for example AODV.h if you are working with AODV. in header file you can find code related to routing table. you have to identify members which stores information of the neighbors. after identifying you simply have to print them in AODV.cc
also go to aodv_rtable.cc find nb_lookup() function it can be used to print neighbour list
  • asked a question related to Mobile Ad Hoc Networks
Question
2 answers
I have a question about the article “efficient and multi-level privacy-preserving communication protocol for VANET” by H. Xiong et al. I need the ID of malicious vehicle, but i could not prove how I can get its public key from the equation given in the part of OBU fast tracing on page 3. How do I prove if this equation is right?
(Ci)q.B0=pki
Relevant answer
Answer
You're right Dr Yung. group signatures are perfectly suited for this purposeو but privacy level is not adjustable.
Tracing part is implemented in some protocols that have used ring signatures, such as "Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications" by Hu Xiong et al. It's using trusted party private key. 
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
Relevant answer
Answer
Which fading are you talking about? When you say channel model, it seems you are interested in small scale fading. But RSSI has nothing to do with the small scale fading, it is related to large scale fading only.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
My research problem is about resource searching in mobile ad-hoc networks. I would like to design a soft computing based resource discovery model for this problem.
I want to draft a GA-like method but am stuck further.
GA way algorithm:
1. randomly guess 100 x and y values (population size is 100)
2. for each generations
3. find fitness y=f(x,y) for each pair of x and y. - you will have 100 y values.
4. take two x,y pairs for which you got highest y values (this is the fitness function here - highest amplitude is the fitness)
5. So, the selected two location may be near to a local maxima or global maxima.
6. using that two x,y pairs, generate another 99 x,y pairs (by keeping one previous best solution)
7. find fitness y=f(x,y) for each pair of x and y.
8. if the maximum y of previous generation is almost equal to present generation, then terminate here else go to step 4 for N generations.
9. At the end of the above N generations or at the terminating condition at 8, the GA will possibly find the global maxima (by randomly jumping here and there and linearly traversing the surface with logic)
(I am stuck up here as i am unable to fit any logical way of finding this y using some x in a GA like manner).
(Further i am unable to express a fitness function with the following design variables).
Note:- At each node, we will only have two information i.e., the neighbor list and neighbor count(number of neighbors). Further at each node, we can also estimate its local parameters such as mobility and remaining battery energy etc., - but a node do not know the mobility and remaining battery energy of other nodes. 
Firstly, i would like to know whether it is feasible & correct to apply GA here -- if the search landscape change within the time-range of the search (i.e., after you started the heuristic but before you decide to stop and consider its result)
If i can apply GA kindly help me to fit a fitness function here.
Kindly give me some suggestions and feedback.
Thanking you in advance.
Your's truly,
ajay
Relevant answer
Answer
Your problem statement is not clear. I do not understand what the (x,y) pair is supposed to represent (a node in the network?) and I do not understand what you mean by "fitness" of the node. Fit for what, exactly? What "resource" are we trying to find? What makes one (x,y) location better than another one?
A genetic algorithm is not good for finding a needle in a haystack; it needs some sort of relatively smooth and mostly connected landscape, such that it can start at a random place and then feel its way in a random fashion to take steps uphill to a peak (or in an inverted landscape downhill to a lowest point).
You need to describe your landscape before you start devising your algorithm. Figuring out how to make your landscape suitable for a GA will tell you what your fitness algorithm is: In fact, every GA should begin there, with a landscape that gives you a fitness metric as a single floating point number, and then you can figure out the specifics of the mating and generational dynamics.
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
Traffic Signals and Intersections control.
Relevant answer
for fixed time control you may use Webster algorithm or the method presented in HCM (Highway Capacity Manual). if the traffic flow variation is significant in a time period, actuated or semi-actuated control are useful where the data on flows are obtained by sensors and timing is determined according to these data and some rules, same as martin explained above. new mathematical methods such as fuzzy programming can also be incorporated in the process as well.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
In MANETs I have to create obstacles so that nodes move to their destinations by avoiding obstacles. So how to create obstacles please help me in that ?
Relevant answer
Answer
Hi,
I think NS2 does not provide an API to create obstacles. You can instead modify the mobility model you're using to "avoid" certain areas in the scenario. Such areas would be the obstacles.
Hope it helps.
Best regards
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
I am trying to create random traffic-patterns for 20 nodes. When I execute the following ns cbrgen.tcl [-type cbr] [-nn 20] [-seed 0.0] [-mc 8][-rate rate 4.0] >cbr-test-20.tcl, I get an error as "Permission denied."
Relevant answer
Answer
Hi,
If you install and validate your Network Simulator 2.35, you can use "$HOME/ns-allinone-2.35/ns-2.35/indep-utils/cmu-scen-gen/ns cbrgen.tcl" file with no problem.
You can find detailed usage of cbr traffic generator TCL script as
#ns cbrgen.tcl
#usage: cbrgen.tcl [-type cbr|tcp] [-nn nodes] [-seed seed] [-mc connections] [-rate rate]
ns cbrgen.tcl -type cbr -nn 20 -seed 1 -mc 5 -rate 5.0
If you had an error about cbrgen.tcl file permission, you can change your file permission with "chmod 777 cbrgen.tcl" with using your teminal in linux based operating system.
++ I attached a zip file that contains traffic.sh (shell script), and traffic folder (contains cbrgen.tcl and cbr-25-0,cbr-25-10,cbr-25-20). You can use shell script to generate traffic patterns for 0 / 10 / 20 nodes.
I hope that examples will helpful for you. I wish you good luck.
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
I have to compare performance of different routing protocols under the selfish attack. How can I implement selfish attack in routing protocols i.e AODV, DSR, DSDV
Relevant answer
Answer
Define the term SELFISH and accordingly set the behaviour of a node. For example, a cooperative node forwards other node's messages and non-cooperative nodes drop other node's messages.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
I want to know how wifi works for upstream (device to wifi AP), whether its TDMA in the same channel as downstream or it uses any other channel. Also the frame duration for both upstream and downstream showing inter-frame intervals.
Relevant answer
Answer
IEEE 802.11 uses the ISM band. More precisely, (possibly overlapping) channels are defined.
The AP and the stations MUST select and use the same channel to transmit and receive their frames. The devices implement CSMA-CA with a half-duplex radio.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
Hi
I am in the field of FANET (Flying Ad-Hoc Networks) attack research. I want to know can anyone help me in this regard.
Thanks
Relevant answer
Answer
Hi Mohammad
See this new published paper on VANET hacking. It discusses various attack scenarios in a practical context. I hope it helps.
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
Relevant answer
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
Hi ,
I am planning for a new book on WSN, anybody interested to become co-author?
Please come up with your Table of contents, then we can talk on that.
Thanks
Chandrakant
Relevant answer
Answer
Sir I am interested, if still some topics are available
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
I'm interested in the fusion of GPS and WiFi for outdoor and indoor localization. i need the data set of GPS signals (longitude , latitude and altitude) in outdoor area, and the RSSI data set of WiFi access points in indoor environments.
Relevant answer
Answer
Hi Marwan,
you can find several traces as datasets in my publications list. I have several papers on a mixed indoor-outdoor environment with associated datasets. Feel free to contact me for more information. As an example, see publications attached to this post. Critical can be the fact that we never recorded the elevation/altitude since we are doing 2D localization. However, you can simply add the altitude as 2 m yourself to the traces since the UAV, we used to sense and record data, was keeping the altitude constant at  2m. Good luck.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
Good morning,
 
Could you please tell how to calculate transmission range in meters based on transmission power, sensitivity and pahtlossalpha in omnet++, for example if i have this parameters :
**.wlan[*].radio.transmitterPower = 2mW
**.wlan[*].radio.thermalNoise = -100dBm
**.wlan[*].radio.sensitivity = -85dBm
**.wlan[*].radio.pathLossAlpha = 2
**.wlan[*].radio.snirThreshold = 4dB
what is the transsmion range in meters?
best regards,
Relevant answer
Answer
Hello,
i want to calculate the transmission range of a node in castalia-3.2. But i do not understand how can i do. Pleae can someone help me?
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
through continuity in Develop and improvement of Routing protocols for this networks . and go ahead to build a new routing approaches to make sure that digitization of services will be in context of QOS and agree with it
  • asked a question related to Mobile Ad Hoc Networks
Question
7 answers
Scheduling management in Mobile Ah-hoc Networks to improve QoS in Real-Time Traffic
Relevant answer
Answer
Please refer to EDCA in IEEE 802.11e/p.
  • asked a question related to Mobile Ad Hoc Networks
Question
7 answers
Ad-hoc On-demand with Distance Vectors QoS in Real-Time application
Relevant answer
Answer
I think that you need review different types of queue for service of traffic.
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
What do you suggest According to your experience?
Thank You.
Relevant answer
Answer
First, it depends on the mobility trace (movement pattern) of the nodes in question. Some mobility models more realistically represent some mobility patterns than others. So choosing a realistic mobility model for your scenario is equally important. Second, understanding the difference between on demand and table driven protocols will make a huge difference. So my suggestion is this - study the difference between the two classes of protocols and setup your simulation (preferably with ns-2 or 3) with different scenarios using different protocols and comparing your results.
That is, run the same simulation severally with different protocols (and with even different mobility models if you like) and compare the results. Two of my papers looked into similar area
  • asked a question related to Mobile Ad Hoc Networks
Question
9 answers
Hi Folks,
I am working on Ad hoc network protocol performance enhancement and security. Right now my primary concern is to analyze the performance effect on ad hoc network due to presence of selfish node. Please guide me to how can i simulate this selfish node behavior in NS-2 tcl script. Thanks in advance.
Relevant answer
Answer
If it is a blackhole attack and you are doing it on NS2, pl check this link:
If simulation is done on NS3, check this:
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
Any suggestions?
Relevant answer
I had the same problem. Initially I had the NS2 folder mounted a NTFS directory. Next I moved my NS2 folder to ~/ and it fixed. 
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
interleaved Reed-Solomon codes are defined as time interleaved codes in order to benefit from the time diversity. An interleaved Gabidulin code is the direct sum of ℓ Gabidulin codes. 
Relevant answer
Answer
thank you.
I read the document you provided me and I understand that they used the
"collaborative" technique for decoding interleaved Gabidulin codes.
But there is also the conventional Reed-Solomon decoding for
interleaved RS codes, why not use this technique, this is my question.
Is here a difficulty or inconsistency, to decode the Gabidulin codes
not in a "collaborative fashion" ?
Best regards,
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
I am working on reputation in MANETs and would like to simulate an environment with some kind of reputation. Can I implement this using the existing modules in NS2 or would I have to change the inbuilt modules for this purpose? If so, how do I do it?
Relevant answer
Answer
It is more easy for you to change them in the underlying files. TCL alone is not enough.
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
There should be a minimum limit on the cell size if a mobile user is allowed to move at a speed ranging from 40 KM/Hour to 100 KM/Hour. Handover delay should be a major constraint apart from other secondary activities such as setting of TX power, modulation level, carrier frequency, etc.
Is there any information on cell size versus mobile speed?
Relevant answer
Answer
Minimum cell size can be any value, depending on type of application, service, transmit power, number of user, user QoS and bandwidth. The size of cell varies from Macrocell (5 km) to Attocell (1 m) or may be less. The minimum cell size is limited in different network by different parameter. In case of cellular, inter carrier interference (frequency reuse), speed of mobile (eventually number of handover) are the two main parameters, whereas data rate and transmit power in WiFi, and SE (8 bps/Hz), interference in femtocell etc. 
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
How interference signal is estimated at the cell edge? Since mobile phones are continuously moving, the interference signal level also keep changes with time.
What should be the periodicity of estimation ? Is this information used in handover process ?
Relevant answer
Answer
With 4G LTE, some services will run on the 800 MHz spectrum band. This band is close to the frequency used by certain Freeview services. Because of this proximity, viewers who watch Freeview and live close to a new 4G mast, could experience interference. Symptoms for those affected might include a loss of sound, pixelated images or even the loss of all channels. Uplink interference in 4G is another form of interference. Co-channel interference (CCI) and inter symbol interference (ISI) shall be the other forms.  If 4G cell phones move into the newly available lower frequencies at around 600 MHz cable TV will experience interference.
A recent study demonstrated that electrified rail arcing on pantographs could interfere with trackside signalling and control. The emissions were remarkable in the upper UHF to at least 1500 MHz. This suggests that LTE systems in the vicinity of electrified rail may be at risk for uplink interference in the 600 - 900 MHz bands.
4G LTE  Interference may threaten the GPS timing input as well
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
Where can I find the source code or any guidelines to the MANETs protocols MP-OLSR and AOMDV in order to measure some statistics in OPNET 14.5.
Relevant answer
Answer
You can download source code of http://www.wsnlab.org/downloads
  • asked a question related to Mobile Ad Hoc Networks
Question
7 answers
Hello,
When we talk about CRN, the first thing that comes to my mind is the spectrum scanning (or sensing). It is the first step done by the base station to detect any unused channel(s). This latter, if found, is allocated to secondary user.
If the antenna(s) of the terminal of SUs is (are) narrow-band, what concerns on interferences between SU and PU are to be considered?
Relevant answer
Answer
Spectrum sensing, spectrum sharing and interference mitigation are one of the defining features of any Cognitive Radio Network. Spectrum sensing is not exhaustive when it comes to interference mitigation in CR. There are many spectrum sensing methods for Cognitive Radio with certain pros and cons, to name a few are energy detection, matched filtering, cyclostationary sensing, wavelet-based sensing, eigenvalue and variance reduction based sensing etc...In principle CR can decide independently whether particular band is free and can be used under specified limitations i.e. sensitivity, tolerable interference etc. However, because of  noise uncertainty in case of energy detection based sensing a CR may not effectively locate the prospective band of interest. Therefore, we resort on cooperation where N cognitive radio cooperatively send their decision to fusion center or base station which based on the decisions of CR and its own decision declares a global decision whether particular band is vacant or not. 
These days almost every standard with CR capability is designed keeping in view the white space database which contains the list of vacant channels based on the information provided by the primary user or secondary user from adjacent CR network. This keeps the CR terminals regulated effectively with negligible interference. 
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
Hello everyone, 
I'm trying to create a new project to compare the performance of both DSR and AODV protocols after adding some features to the protocol. I'm not sure how to start, so this is what I tried:
I'm trying to simulate AODV with the modifications first..
1- I created a new node type (ned file) that extends the AODVRouter.ned. Haven't added the modifications yet, I just wanted to make sure this will work first. The modification that I want to do is to do an extra check to the msg if it receives one ( the normal msg, NOT one of the control msgs: RERR, RREQ..). I know this has to be in the .h and .cc files, but do they have to have the same name as the ned file? ( not sure if there's another approach to this)
2- Created a new network (ned file) and copied the code of AODV network then pasted it there and renamed the host type to the modified node I created in step 1.
3- I tried to run a primary simulation but the simulation crashed.
I'm intending to do the same modification to msg handling in DSR protocol, but I started with AODV because I could not point out which module in inet that represents the DSR node or network :/
I just need to add an extra step in both protocols when a node receives a msg, and then compare the performance of both.
Your help is most appreciated.
Thanks in advance.
Relevant answer
  • asked a question related to Mobile Ad Hoc Networks
Question
7 answers
using multiple paths simultaeneously in aodv protocol
Relevant answer
Answer
In a radio environment, simultaneous multipath routing doesn't have sense if the nodes don’t support multiples interfaces in orthogonal frequencies.
You can send a two packets to the same destination but for different paths, but this doesn’t guarantee that a packet doesn’t interfere with the transmission of the other because the medium is shared. If the different paths use orthogonal frequencies, in this case exist a benefit.
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
I have to find the area difference in the voronoi cell in the adhoc network.I have attached the link of the paper.Can someone please help me in understanding the fitness function in the given paper which is finding the area difference in the voronoi cells in adhoc network.(Page 3: Fitness function)
Relevant answer
I can think of two relatively simple ways to calculate the area of a Voronoi cell.
First, if you know the vertices of the Voronoi cell in cyclic order, you can always use Gauss's Theorem to convert the area (which is integral of 1 over the cell) to a path integral around the cell.  You could also use Green's Theorem to do the same thing, with a different formal result, but the same mathematical result.
Second, you can do the same procedure edge-by-edge in the Voronoi diagram.  Each Voronoi cell can be decomposed into triangles, each associated with a Voronoi edge. Find the length of the Voronoi edge and the length of the (perpendicular) line between the dual nodes, and use this to calculate the area of the triangle associated with this edge; its the same for both Voronoi cells, and you can accumulate these as you loop over the Voronoi edges.
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
How a particle filter works in Cellular network for Mobile user localization and Which are the techniques used in particle filtering?
Relevant answer
Answer
Particle fiter work as follows:
  1. seed randomly area with N particles.
  2. calculate the weight of every particle as probability to have current signal value.
  3. particles with weight less then some are removed from model.
  4. Repeat.
Difference can be in seed, and weght estimation algorithms.
  • asked a question related to Mobile Ad Hoc Networks
Question
9 answers
A lot of research is going on in the field of interfacing Internet of Things(IoT) and other small ad-hoc networks such as Wireless Sensor Networks. As far as MANETs are concerned, they are already IPv6 enabled and can be integrated with IoT environment. What will be the research issues in interfacing IoT with MANETs?
Relevant answer
Answer
Hi.
There are challenges for an eventual convergence of IoT into the Radio Access Network (RAN) as part of LTE (5G or whatever comes next).
IoT main requirement is energy efficiency, as end nodes are typically energy constrained. While RAN is typically optimised for throughput and mobility. There is no trivial solution for this but several attempts instead. Weightless (from Neul, see: http://goo.gl/Tp24IT) is one road. There are others, e.g. SigFox's ultra-narrow band proposal (see: http://goo.gl/yAVBt8) and LoRa (from Semtech, see: http://goo.gl/OnKmDN).
I'd say main challenges are not in routing. Instead, security and privacy, virtualisation and cloud computing are active research areas related to IoT.
Moreover, the novelty in those existing solutions include: (i) new business models, (ii) operation in unlicensed spectrum, which is free (big savings compared to spectrum leasing) but requires special attention to interference and coexistence in the design of the PHY and DATA LINK layers, and (iii) large radio range and low-bandwidth provides for a relatively much smaller number of base stations to cover a given area, compared to "traditional" LTE RAN.
Hope it helps.
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
Is it possible for a LTE UE to obtain the accurate local or UTC time/date from the L1/L2/L3 of LTE network?  
I am sure that a LTE UE can obtain the local or UTC time/date from either MME or L4 servers, e.g., NTP servers.  However, as I know, the accuracy of these mechanisms is only about in the unit of seconds or even minutes.  
Is there any approach for a LTE UE to obtain/sync its clock at the accuracy of milli-seconds?
Thank you very much,
Shu 
Relevant answer
Answer
SIB16 (36.331-c41) provides UTC
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
Please, someone give me scenario described failed RTS/CTS to solve hidden and exposed problem.
Relevant answer
Answer
Hi,  
Read this info as well as the attachment paper. 
my be useful to u. 
IEEE 802.11 RTS/CTS mechanism helps to solve this problem only if the nodes are synchronized and packet sizes and data rates are the same for both the transmitting nodes.
When a node hears an RTS from a neighboring node, but not the corresponding CTS, that node can deduce that it is an exposed node and is permitted to transmit to other neighboring nodes. 
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
MANET Protocols in NetSim
Relevant answer
Answer
Download source code of OLSR protocol in NS2, all right reserved by Wireless Sensor Networks Laboratory of Iran. Zip and PDF
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
i want to model a LEO satellite network on opnet.the main feature of this network is a rapid dynamically topology but predictable.if we consider each satellite as a node,the RF inter satellite links connect nodes together.my problem is that i don't know how model a network with this features on opnet.i need some help.your help can guide me a lot.
Relevant answer
Answer
You can very easily do it using the Satellite toolkit (stk)  sotware. You can simulate LEO constellation and do all types of necessary simulation and analysis on inter satellite link. There is also some linkage possible with STK and OPNET you can find details with AGI.
  • asked a question related to Mobile Ad Hoc Networks
Question
12 answers
I connect serial tx pin no 18 to RS232 converter and give it to PC. Hyperterminal should display transmitted string but it is not coming. RS232 is working as I checked loopback. Atmega is also working as I check LED blinking code in it and its working. I check my code for string transmission in other platform and its working so code is also correct. I changed all baud rate settings and I also change crystals but unfortunately its not working.
Relevant answer
Answer
same answer like Mr Younes. com port used address in 3E8. it is used 9600 bps for speed. if you not synchronize data sampling want to send the data  
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
In MANETs, there are towers for a particular region and if we move out of range of a particular tower while moving we get connected to another tower.
How to implement similar scenario in ns2 if a moving node gets out of range of a particular TCPSINK , then node's sink changes to nearest TCPSINK ?
Relevant answer
Answer
I agree with you , but all I  want is how to implement MANET in ns2?
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
Hi All,
Say, in some cases a genuine  node can be compromised with malicious behavior, in such cases if we could make it inactive indirectly/directly, it is safe for communication? How many ways we can invalidate a node in WSN?
Relevant answer
Answer
We may use data outliers to detect the abnormal behaviour of a node. 
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
Hello everyone,
I am working a small project which is all about the traffic in Omnet++ (INET framework). I want to simulate 10% load on a link of 100mbps (Please note its bits per second). If the size of my one frame is 1024 bytes then how many messages should I transmit to get 10% load? Or does it not depend on number of messages but different factors? Thank you in advance for answering
Kind regards,
Satendrasingh Chahar
Relevant answer
Answer
with 10% load on 100 Mbps link  the throughput would reach upto 10 Mbps and as load or traffic per unit time would be 10,000 packets(frames) per second since each frame of around 1000 bytes.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
When using AODV , interface queue type is CMUPriQueue, no. of node 10; the
Segmentation Core dumped occured. But when using DSR, interface queue type is CMUPriQueue, no.of node 10, then it simulates sucessfully.
Therefore I have code my tcl script to use different interface queque:
AODV using Queue/DropTail/PriQueue
DSR using CMUPriQueue
Does any body know what is the reason for this?
What is the difference between these two queues?
Relevant answer
Answer
In fact, DSR can also use PriQueue queue, you need to modify only a few code on it.
DropTaiqueue drops the packets when queue is full. CMU priqueue manages packet at priority manner. 
  • asked a question related to Mobile Ad Hoc Networks
Question
8 answers
I'm searching for references and links related to above mentioned topic.
Relevant answer
Answer
We did a case study on AODV. Details of the paper as follows:
Journal of Network and Computer Applications
July 2012, Vol.35(4):1249–1259, doi:10.1016/j.jnca.2012.01.019
Intelligent Algorithms for Data-Centric Sensor Networks
Review
Security threats and solutions in MANETs: A case study using AODV and SAODV
Jan von Mulert Ian WelchWinston K.G. Seah
Show more
Abstract
Mobile ad hoc network (MANET) security has become the focus of prolific research efforts. Driven by the unique and considerable difficulties of providing security arising from the dynamic nature of MANETs, many security schemes have been proposed. Rather than trying to encompass the entire field of MANET security, this paper focuses on networks using the popular Ad-hoc On-demand Distance Vector (AODV) protocol and a secure extension to AODV, the Secure AODV (SAODV) protocol. SAODV is representative of a number of secure versions of the AODV protocol in that it relies upon the use of cryptographic mechanisms to protect the routing control messages of AODV from being forged and/or altered by attackers. We conduct a vulnerability analysis of SAODV to identify unresolved threats to the algorithm, such as medium access control layer misbehaviour, resources depletion, blackholes, wormholes, jellyfish and rushing attacks. We then compare this vulnerability analysis to schemes that have been proposed to combat the identified threats. These proposals include multipath routing, incentive schemes, directional antennae, packet leashes, randomized route requests, localized self-healing communities and a reactive intrusion detection node blacklisting scheme.
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
What is the granularity of MANET?
Relevant answer
Answer
The "G" flag in an RREQ in AODV has nothing to do with "Granularity", but rather governs certain aspects of "*G*ratuitous" RREPs, i.e., how an intermediate router with a (valid, fresh) path to the destination behaves when receiving a RREQ.
You should look at RFC3561 section 6.3, third paragraph for the "G" flag, and section 6.6.3 for details on "Gratuitous" RREPs. See attached links.
  • asked a question related to Mobile Ad Hoc Networks
Question
16 answers
please help me to find suitable simulation using windows operating system that simulate VANET using wsm protocol and not TCP
Relevant answer
Answer
Yes, you can try with Veins + Sumo + Omnetpp.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
what is discrete adaptive modulation and coding (AMC) lookup table? can you please suggest any reference for that?
Thanks :)
Relevant answer
Digital communications systems can adapt the transmit data rates based on channel state. We call this 'link adaptation' or 'adaptive modulation and coding (AMC)'. For example, if the communication channel is experiencing severe fading, the transmission can be done with robust modulation, e.g., BPSK that offers protection to data in poor channel state in terms of bit error rate; and a channel coding scheme with a low coding rate, i.e., many redundant bits in order to protect the information bits. If the channel state is good, the transmission can be done with 16 QAM and high coding rate that can transmit more bits.
Lookup table is a table that shows the signal to noise ratio (SNRs) ranges in which each modulation and coding scheme (MCS) can be used. There are many types of link adaptation. The lookup table depends on the kind of system you are considering. What is the system?
  • asked a question related to Mobile Ad Hoc Networks
Question
15 answers
Suggest any GUI tool which will operate in the same lines as NS2 to stimulate moblie adhoc network 
Relevant answer
Answer
OPNET supports well know MANET protocols as well as has GUI. However, it requires a license. 
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
I am working on CRCN patch and NS2.31. I need help to make changes to the AODV protocol, like adding new fields in RREQ and making decisions on that field for path selection.
I will be thankful if anyone can help.
I know information about fields is in rreq_packet.h 
Relevant answer
Answer
  • asked a question related to Mobile Ad Hoc Networks
Question
2 answers
.
Relevant answer
Answer
What does RED stand for here?
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
I have created mobility model using BonnMotion, can any one help me in modifying code for default_settings.txt?
I want to use different mobility model for different groups. 
Relevant answer
Answer
Now go to location
bonnmotion-2.1a/bin/
and type the following line it will display all available model
[root@localhost bin]# ./bm -hm
BonnMotion 2.1a
Available models:
+ Boundless v1.0 Application to construct Boundless mobility scenarios
+ ChainScenario v1.0 Application which links different scenarios
+ Column v1.0 Application to create movement scenarios according to the Column model
+ DisasterArea v1.0 Application to create extended catastrophe scenarios according to the Disaster Area model
+ GaussMarkov v1.0 Application to construct GaussMarkov mobility scenarios
+ ManhattanGrid v1.0 Application to construct ManhattanGrid mobility scenarios
+ MSLAW v1.0 Application to construct MSLAW mobility scenarios
+ Nomadic v1.0 Application to create movement scenarios according to the Nomadic community Mobility model
+ OriginalGaussMarkov v1.0 Application to construct mobility scenarios according to the original Gauss-Markov model
+ ProbRandomWalk v1.0 Application to construct Probabilistic Random Walk mobility scenarios
+ Pursue v1.0 Application to create movement scenarios according to the Pursue Mobility model
+ RandomDirection v1.0 Application to construct Random Direction mobility scenarios
+ RandomStreet v1.0 Application to construct RandomStreet mobility scenarios
+ RandomWalk v1.0 Application to construct RandomWalk mobility scenarios
+ RandomWaypoint v1.0 Application to construct RandomWaypoint mobility scenarios
+ RandomWaypoint3D v1.0 Application to construct RandomWaypoint (3D) mobility scenarios
+ RPGM v1.0 Application to create movement scenarios according to the Reference Point Group Mobility model
+ SLAW v1.0 Application to construct mobility scenarios according to the Self-similar Least Action Walk model
+ SMOOTH v0.1 Application to construct SMOOTH mobility scenarios
+ Static v1.0 Application to construct static scenarios with no movement at all
+ StaticDrift v1.1 Application to construct static scenarios with a drift
+ SteadyStateRandomWaypoint v1.0 Application to construct Steady State Random Waypoint mobility scenarios
+ TIMM v1.0 Application to construct Tactical Indoor Mobility Model mobility scenarios
Now if you want to run particular model (it will display all the available option of specific model )
For Example for RandomWalk
[root@localhost bin]# ./bm -hm RandomWalk
BonnMotion 2.1a
== RandomWalk ========================================================
Version: v1.0
Description: Application to construct RandomWalk mobility scenarios
Affiliation: Toilers - Colorado School of Mines (http://toilers.mines.edu/)
Authors: Chris Walsh
App:
-D print stack trace
Scenario:
-a <attractor parameters (if applicable for model)>
-c [use circular shape (if applicable for model)]
-d <scenario duration>
-i <number of seconds to skip>
-n <number of nodes>
-x <width of simulation area>
-y <height of simulation area>
-R <random seed>
RandomSpeedBase:
-h <max. speed>
-l <min. speed>
-p <max. pause time>
RandomWalk:
-t x (mode: [T]ime. Nodes will walk until time interval x is up)
OR (do not use both -t and -s)
-s x (mode: Di[s]tance. Nodes will walk until distance x has been covered)
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
I would like to know the best suitable methodology to overcome the scalability problem?
Relevant answer
Answer
I think you should go for Distributed Hash Table(DHT) in MANETs as well as Clustering...... 
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
In many aspects clustering techniques used for key issues like routing, intrusion detection, backbone construction and topology control... how?
Is there is any book to understand the clustering techniques?
Relevant answer
Answer
Clustering is available as both data mining technique and machine learning technique. Choice depends on, what you want to achieve using clustering?
You can have look at this book : 
Data Mining: Practical Machine Learning. Tools and Techniques, Second Edition. Ian H. Witten and Eibe Frank.
The e-book is available on the web.
  • asked a question related to Mobile Ad Hoc Networks
Question
2 answers
I am going to produce mobility scenarios for VANET simulations and using Sumo-based TraNS. It uses a uniform seed that generates the same random mobility for the same number of vehicles. How I can change the seed so that I can get different mobility scenarios for the same number of vehicles several times?
For instance, I want different mobility traces for 200 vehicles when I run the TraNS more than one time with the same 200 vehicles.
Any help would be really appreciated.
Relevant answer
Answer
Thank you so much Mangesh.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
See above. 
Relevant answer
Answer
You can use xfuzzy tool instead of using matlab fuzzy logic toolbox. xfuzzy can generate C/C++ or java source code file of fuzzy logic engine designed in its graphical interface. These source code files can be further used in network simulator 2 or Omnet.   
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
In dsr /aodv are the route request packets stored in the send buffer?
Kindly guide me
Relevant answer
Answer
  • In DSR it is stored in SEND buffer.
  • Each node implementing DSR protocol maintains a Route Cache, which contains the routing information needed by the node. A node adds information to its Route Cache as it finds the new links between nodes in the ad hoc network; for example, a node can find the new links when it receives a packet carrying a Route Request. Likewise, a node removes information from its Route Cache as it finds the existing link/links in ad hoc network is/are no longer available.
  • Anytime a node adds new information to its Route Cache, the node checks each packet in its own SEND buffer  to determine whether a route to that packet's IP Destination Address now exists in the node's Route Cache, if so, the packet should then be sent using that route and removed from the SEND buffer.
  • For AODV there is no as such SEND buffer, however there is single buffer for handling route request packets whose size is 100 by default.
  • For more details about AODV
  • https://www.ee.iitb.ac.in/~prakshep/IBMA_lit/manual/manual26.html
 .
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
I am new to OPNET. Could you please guide me with some basic questions  I have regarding OPNET
1)How do you modify the existing MANET routing Protocol "DSR" available in OPNET. Do we have to save all the existing files of DSR in different names?
2)How to create a custom routing protocol in OPNET?How to let the nodes in MANET know that I want to deploy Custom Routing Protocol?
 
I would be deeply obliged if you could please help me with the same.
Relevant answer
Answer
I am working on NetSim can can help you in that
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
iSense with Shawn Simulator
Relevant answer
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
Idea implemented in laboratory will need to be translate to realistic use (LAB-to LAND).
Relevant answer
Answer
I have ever seen a real AODV based MANET, which was developed by three chinese students. They integrated a open sourced MANET protocol stack into Android system in a  tablet computer, and powered it by a portable power source. It is amazing, and it is the first real mobile ad hoc network i have ever seen.
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
What is selfish node? What is partially selfish node? What type of problems will occur when this happened in MANETs?
Relevant answer
Answer
Selfish nodes can be said as authorized member nodes of a network who are lazy to co-operate with other node communications. But these nodes are really meant selfish because they will take full benefits of the network services. They accepts packets addressed to it , but drops other multi-hop packets addressed to other nodes. Please go through my publications as it can give you more ideas on this..........................
  • asked a question related to Mobile Ad Hoc Networks
Question
9 answers
How this algorithm used for clustering the nodes in MANETs?
Relevant answer
Answer
Genetic Algorithms are frequently used to solve optimization problems. A clustering problem can be modelled as an optimization problem. For example, you could see it as a multi-objective problem where inter-cluster distance is minimized and intra-cluster distance is maximized.
  • asked a question related to Mobile Ad Hoc Networks
Question
9 answers
I want to introduce SDN in heterogeneous networked environment such as MANETs/VANETs...
Is it possible?  If yes then how?
I have two simulator option on is EstiNet and second one is QualNet...
Is that possible to simulate SDN in MANETs/VANETs via using these simulation tool... 
Relevant answer
Answer
I found following paper interesting in terms of describing the need of SDN for Wireless networks.
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
It needs to control a large number of vehicles and hence area of coverage is a concern for the researcher.
Relevant answer
Answer
It depends on your intention or application. VANET has it own specific function, we can't expect it works as full connected network as Internet, but VANET can give us a real time application like safety and traffic condition in a related area , which is very valuable. It doesn't means the larger area VANET covered, the functionality is better. That depends the application.
But, in my opinion, the coverage of VANET or MANET should not be too large. The radio range of IEEE802.11p is almost 200m, 10 hops is more constrained in wireless network, so for a single VANET 2km is proper, but we may connect sub-network in one.
  • asked a question related to Mobile Ad Hoc Networks
Question
7 answers
Can we can utilize the selfish node for transmission of packets? 
Relevant answer
Answer
Dear Raja,
From what I understand a selfish node in ad-hoc net aims to benefit itself. It may not forward packets from other nodes, to spare energy; if there are routing based on incentives it may forward packets only enough to transmit its own.
So doing selective forwarding or no forwarding at all by these nodes will degrade the network.
Used them or not will depend on the necessity and the incentive it may have to be used. But it also raises the issue of how to detect them.
"ad hoc routing incentive based" in Google scholar gives several results that may provide further information.
This will also touch routing security, where the work from Jean Yves Le Boudec should be looked at. That will tackle detection and penalties.
Hope it helps,
Best
Pedro
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
As we know that event driven simulators available for WSNs and MANETs usually do not consider the processing time as well as the energy spent on computation. Sometimes, it becomes necessary, while comparing two algorithms/protocols in terms energy consumption (transmission + computation) or complexity of the algorithm.
Relevant answer
Answer
In my opinion, event-based network simulator can simulate incorporate processing. However, a real problem is that it is fully user's role. (includes modeling, analysis and verification). Usually, existing simulators cannot provide to full models for all of real-world phenomena. Therefore, to satisfy various users demand, most of them are provide a set of developer's APIs for customizable simulation to users. e.g. the simulation engine (discrete-event processing), simulation stacks (network layers of each simulation node) and so on.
I think if you find some generalizable models to incorporate processing on computation time, may be you can contribute humanity.
  • asked a question related to Mobile Ad Hoc Networks
Question
46 answers
I want to make some changes in MAC protocols in WSN . Please give me guideline regarding the simulation tool for WSN .
Relevant answer
Answer
Highly robust medium access control (MAC) protocols prolong network lifetime. MAC protocols are generally classified into six categories: Scheduled-based, Contention-based, low duty cycle MAC, Hybrid MAC, Real time MAC and Mobility-based MAC. Now it depends on you what kind of MAC protocol, you want to implement and modify. I will highlight some of simulators which provide reasonable support for MAC over Wireless Sensor Networks.
I start unfamiliar but good simulator COOJA that provides the best platform for simulationg / emulating WSNs MAC protocols especially creating compatible topology for MAC.
It is included in Contiki version 2.0. You will get more information how to install this simulator on following link.
DEFT NETZ is another unfamiliar but good choice for crating network topology and providing the cross layering support but needs to understand fully the working process of this simulator otherwise will be complicated.
JiST / SWANS can be good candidate for cross layering support, connecting MAC with network layer.
Castalia on Omnet++ can be considered as good candidate for handling the mobility and provision of multiple channel support.
OPNET is also good option for developing new MAC protocols and changing in the existing MAC protocols but I will not recommend to go with OPNET because you cannot get 100% realistic results.
If you want to do modification at parameter levels then NS2 and NS3 are best suitable options. In addition, NS2 and NS3 can be considered strong candidate for MAC layer that can provide the better flexibility for accessing the channel, slot-reuse concept, Scheduling, hierarchically level change, new implementation mobility support, handling scalability, provision of automatic buffering process etc.
  • asked a question related to Mobile Ad Hoc Networks
Question
8 answers
Power actively influences the performance of an ad hoc network.
Relevant answer
Answer
For obtaining Quality of Service on a MANET, it is not adequate to get just basic routing functionality but other characteristics should also be taken into consideration such as bandwidth limitations due generally to a mutual media, dynamic topology since mobile nodes are mobile and the topology may change and power consumption due to limited batteries. Form this statement, we infer that “power” is also QoS in ad-hoc networks.
You can go through following interesting contribution that will help to understand the QoS parameters.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
See above.
Relevant answer
Answer
Matlab is good for phy layer modelling. There are many built-in functions. NS3, NS2 etc. are good for level 2 and level 3.
I have once wrote a network simulator for packet level simulation in Matlab. It was very slow. Then i rewrote lots of modules in C++ (compiled them into mex functions) and everything has become fast. I should have used NS2 (or something like that) from the beginning, but I had little knowledge of C++ and a great knowledege of Matlab.
You can do anything you want in Matlab, but it may run very slow. If your simulations have thousands of packets transmitted, use network simulator based on C++. Matlab is script language, not compiled language.
P.S. Matlab has no built-in functions for modelling networks on layers above phy.
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
I want to find the static node in Manet.
Relevant answer
Answer
Perhaps observing the Doppler shift in frequency can help determining relative motion of transmitter and receiver
  • asked a question related to Mobile Ad Hoc Networks
Question
5 answers
I want to generate graph for the simulation result of a my routing scheme using C.
Relevant answer
Answer
Thank u sir..
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
How can these systems prevent disaster?
Relevant answer
Answer
Vehicular ad-hoc networks can be utilized in multiple ways to improve safety. By definition, each node could exchange data, which would allow vehicles to utilize data in the network to be predictive about traffic conditions beyond the visual horizon of the driver. One thing to consider is that there is a whole aspect of disaster prevention that can be provided by tying this data to infrastructure assets, for example calculating aggregate vehicular weight as compared to a bridge with a reduced load limit, and then using that information to moderate the traffic flow to avoid overloading assets (preventing catastrophic failure) as well as reducing the wear and tear on them.
Beyond that, emergency vehicles (police and fire) could utilize VANETs as was originally intended to handle disaster situations.
  • asked a question related to Mobile Ad Hoc Networks
Question
6 answers
I'm searching for an advanced mathematical method to reduce noise and Rayleigh fading on the communication channel in mobile communications using OFDM technology.
Relevant answer
Answer
Pulse shaping techniques can be used along with OFDM systems. I have tried raised cosine filter and observed better BER performance.
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
I am required to simulate a routing protocol using MATLAB.
Relevant answer
Answer
I can help you.follow me and keep touch with me
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
I prepared a paper in QoS issue in MANETs, could you please suggest some valid journals related to MANET to publish, which takes less reviews?
Relevant answer
Answer
No, we need to publish paper on journal which will gregariously review our work.. Elsevier journals related to networking are the best journals to publish.
  • asked a question related to Mobile Ad Hoc Networks
Question
4 answers
Research topics required on MANET's and Big data
Relevant answer
Answer
I would think that you can link Big Data to MANET. One method would be to run large simulations and then perform any scientific analysis on the very large trace files that have been generated. Some typical example include, Failure analysis, Data reduction & compression with an acceptable loss of properties, Entropy based approach to reducing large data sets applied to MANET traces.
  • asked a question related to Mobile Ad Hoc Networks
Question
1 answer
I require research on manet routing protocols. I understand Inet Manet in OMNeT++ is suitable.
I would be grateful if someone could guide me in installing Inet Manet on Windows 7.
Is the DSR protocol already available on it?
Relevant answer
Answer
Just instal Omnetpp and then import the inet-manet (specify the path of the compressed folder while importing) to the Omnetpp. I think DSR may be available there.
  • asked a question related to Mobile Ad Hoc Networks
Question
3 answers
I have noticed that many good journal/conference papers (including some research books) have some non-smooth curve plotting, such as for packet delivery ratio (PDR), End-to-End (E2E) communication delays and packets reachability (RE).
In many cases, some sudden jerks in achieved values are noticed. The overall curve would show a meaningful result, such as fall of PDR with increase in network density, but it would also have few values in between going out of the fall trend. E.g. PDR for nodes = 400 would be higher for PDR for nodes = 350.
On the other hand, I have also noticed that many papers have reasonably smooth curves for the above mentioned metrics. What are factors that play a role in these non-smooth outputs? I personally could think of the randomness introduced in each simulation runs as being the major factor.
Relevant answer
Answer
When reading a paper you should pay attention to the way the data was collected. Many of these "smooth curves" papers, as you mention, are theoretical ones. I mean, the results are obtained through the mathematical formulation/analysis of the problem. In such cases, the errors/variations play little role on the results, thus having more "harmonious" results. When analyzing real traffic logs, test bed implementation and even well conceived simulation/emulation experiments.... things are normally not very smooth. The amount of variables and different things that can impact the experiment rarely permits a very smooth output. However, you can minimize the discrepancies by:
- Run your experiment a fair amount of times (if in simulation with different seeds) so that it is statistically relevant. On the long run, if you have enough experiments, the spikes on one single experiment will have lower impact on the analysis of the whole experiment.
- Do a good statistical treatment of your data. Some statistical tools like percentile, weighted mean, mode, provide the correlation coefficient and confidence intervals... all these and other statistical methods/tools can, not only improve the quality of the results but help you (and your readers) to understand your results.
- Most of all, do not forget that is your job to analyze your graphs and drawn conclusions from it, not from your reader. YOU have access to all the codes, raw data and you have more time to analyze and understand your results. The reader should not do this job for you. If you are not satisfied with your results.... imagine the reader. Always put yourself on the shoes of the reader and see if you would be satisfied by the quality of the graph, what it is showing and the explanations provided for "strange" behaviors.