IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 12    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 12, December 2011
A Case Study on Pervasive Computing in MANET
Full Text(PDF, 3000)  PP.  
Author(s)
G.S.Sarma, Kallakunta.Ravi Kumar, A.Somasekhar
KEYWORDS
Mobile Communications, Wireless Networks, Adhoc Networking, Pervasive Computing, Routing Algorithm
ABSTRACT
In the near future, a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. Next generation of mobile communications will include both prestigious infrastructure wireless networks and novel infrastructure less mobile ad hoc networks (MANETs). Mobile Adhoc Network is designed for mobihttp://www.teluguone.com/tmdb/http://www.teluguone.com/tmdb/. The special features of MANET bring this technology great opportunities together with severe challenges. This paper describes the fundamental problems of ad hoc networking by giving its related research background including the concept, features, status, and applications of MANET. Some of the technical challenges MANET poses are also presented, based on which the paper points out some of the key research issues for ad hoc networking technology that are expected to promote the development and accelerate the commercial applications of the MANET technology. Special attention is paid on network layer routing strategy of MANET and key research issues include new X-cast routing algorithms, security & reliability schemes, QoS model, and mechanisms for interworking with outside IP networks.
References
[1] M. Frodigh, P. Johansson, and P. Larsson. “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review, No.4, 2000, pp. 248-263.

[2] IETF Working Group: Mobile Adhoc Networks (manet). http://www.ietf.org/html.charters/manet-charter.html.

[3] Ad Hoc Networking Extended Research Project. Online Project. http://triton.cc.gatech.edu/ubicomp/505. IEEE 802.11 Working Group. http://www.manta.ieee.org/groups/802/11/.

[4] E.M. Royer and C.K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” IEEE Personal Communications, 1999, 6(2), pp. 46-55.

[5] S.R. Das, R. Castaneda, and J. Yan, “Simulation-based performance evaluation of routing protocols for mobile ad hoc networks,” Mobile Networks and Applications, 2000, 5, pp. 179-189.

[6] S.-J. Lee, M. Gerla, and C.-K. Toh, “A simulation study of table-driven and on-demand routing protocols for mobile ad-hoc networks,” IEEE Network, 1999, 13(4), pp. 48-54.

[7] M. Joa-Ng and I.-T. Lu, “A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks,”.IEEE Journal on Selected Areas in Communications, 1999, 17(8), pp. 1415-1425.

[8] L. Ji, M. Ishibashi, and M.S. Corson, “An approach to mobile ad hoc network protocol kernel design,” In Proceedings of IEEE WCNC’99, New Orleans, LA, Sep. 1999, pp. 1303-1307.

[9] Y.-B. Ko and N. H. Vaidya, “Geocasting in mobile ad hoc networks: Location-based multicast algorithms,”. Technical Report TR-98-018, Texas A&M University, Sep. 1998.

[10] M. Gerla, C.-C. Chiang, and L. Zhang, “Tree multicast strategies in mobile, multihop wireless networks,”ACM/Baltzer Mobile Networks and Applications, speical issue on Mobile Ad Hoc Networking, 1999, 4(3), pp.193-207.

[11] S. Chakrabarti and A. Mishra, “QoS issues in ad hoc wireless networks,” IEEE Communications Magazine, 2001,39(2), pp. 142–148.

[12] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network Journal, 1999, 13(6), pp. 24-30.

[13] E. Pagnani and G. P. Rossi, “Providing reliable and fault tolerant broadcast delivery in mobile ad-hoc networks,” Mobile Networks and Applications, 1999, 5(4), pp. 175-192.

Untitled Page