Preview

Reliability And Trust In MANET Analysis

Powerful Essays
Open Document
Open Document
1612 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Reliability And Trust In MANET Analysis
Reliability and Trust in Mobile Ad-hoc NETworks (MANET) are considerable due to their applicability in different situations such as military, emergency applications or health care applications. Indeed, due to absence of a fixed infrastructure and a central controller, providing trust and reliability still is challenge in these networks. Since energy is limited and distributed in MANETs, trust and reliability providing (is different from wired systems and it must be reasonable and compatible with network resources. Many literatures have been dedicated to provide trust and reliability in MANETs. In this paper we have a review on reliable and trusted routing protocols in MANETs.
Keywords: Mobile Ad-Hoc Networks, Routing, Trust, Reliability
I. INTRODUCTION
…show more content…
II. RELIABILITY AND TRUST
Reliability is an important issue in MANETs, and it would become a main issue when the system environment is distributed and energy is limited. Reliability is affected severely by fault and failure which happen because of several reasons. Occurring fault and failure in MANETs is deniable, therefore it must be looking for an approach to recover the transmitted information after occurring failure. Reliability is so important in fault and loss packet sensitive application. Hence, many researches are offered in MANET’s routing in order to increasing reliability which some of them are offered in this section.
Generally, multipath routing techniques are used for increasing reliability. The techniques mainly divide into two groups: discrete nodes and discrete edges [5]. When failure happen in a path, another paths are available to perform the operation, therefore route recovery is not required for disabled path [6]. But multipath routing is weak about packet
…show more content…
Santivanez et al, have introduced scalability metric in MANETs as sum of header and a least of load traffic. The analysis provided an improvement for simple flooding algorithms in high mobility scenarios with vague monitoring of connections [8]. In [9] a protocol is offered based on AODV. In the paper, high reliable nodes are used in order to increasing reliability. Authors have tried to use high reliable nodes in routing and rout discovery. Indeed, multipath routing is applied to prevent bottlenecks. Complexity of using high reliable nodes in implementation and large delay of multipath routing through reliable nodes are the limitation of this research. In [10], Heusse et al proved that if a low number of nodes operate in bandwidth, efficiency would be decreased. In [11], three techniques is studied to increase reliability: Retransmission of data link layer, Placement of low quality connections in black list and using reliability metrics in order to increase reliability in packet

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The simulation results of this thesis can allow to conclude that using the multipath with quality of service is the best method to get less jitter and more throughput as compare with another published paper and this algorithm gets less jitter without using multipath as in the first experiment, but the throughput is reduced in big network as in the sixth experiment because the transfer packet from client to server not fixed ,the packet take one path in first transfer but in second transfer may take another path to send to server and this can reduce the network throughput in random network .…

    • 246 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 1313 Words
    • 6 Pages

    Which Layer 4 protocol does EIGRP use to provide reliability for the transmission of routing information?…

    • 1313 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    It230 Unit 3 Assignment 1

    • 5629 Words
    • 23 Pages

    Vehicular Ad hoc Network (VANET), a subclass deriving from Mobile Ad Hoc networks (MANET), is a promising approach for future intelligent transportation system…

    • 5629 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    CIS590: Project Plan Paper

    • 4496 Words
    • 18 Pages

    Addressing the need for a network topology that will address security, resiliency and business continuity challenges both day-to-day and in the event of a man-made (i.e., hacker) or natural (earth quake) disaster.…

    • 4496 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    The need for computers of networks with guaranteed quality of service is widely recognized today. Unlike todays best effort networks like the Internet, where the user has no guarantee on the performing it may expect from the network, Quality of service networks guarantee the end user application a certain level of performance. Jitter measures the fluctuating of delay of packets in the given stream for packets, which is an important property for much application. Ideally, packets should be delivered in a completely periodic fashion; however, even if the source establish an evenly spaced stream, unavoidable jitter is displayed by the network due to the different queuing and propagation delays, and packets reach the destination with a wide range of inter-arrival times[36]. We need to achievement the QoS with the best performance thus the suggestion to combine two algorithms, the first algorithm simple switching spanning tree, and second algorithm multipath and must be using the Queue to set in switching. The first method design to learning the all switches about the location of the host in switch and then avoid any loop by using some codes, and second method design to send the packets to all path to decrease the…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In Dynamic Routing, Routing Protocols running in Routers reliably exchange system status upgrades between one another as broadcast or multicast. With the support of routing upgrades messages sent by the Routing Protocols, routers can always redesign the routing table whenever a framework topology change happens. The routers or switches then upgrade one another about all the networks or system they know. If a change happens in a router goes down, the dynamic routing protocols naturally illuminate all switches about the change. If static routing is utilized, then the system manager or administrator has to upgrade all changes redesign all progressions into all routers and therefore no routing protocol is utilized.…

    • 1266 Words
    • 6 Pages
    Good Essays
  • Good Essays

    There are two kinds of systems that people can utilize when setting up a network. They can use a distributed system or the other kind of system called a centralized system. In this paper we will find out what can happen as far as the failures in these systems and what if anything can be done to fix these systems when they fail.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    HW Assignment Unit 2

    • 545 Words
    • 2 Pages

    If any of the nodes fail then the ring is broken and data cannot be transmitted successfully.…

    • 545 Words
    • 2 Pages
    Good Essays
  • Best Essays

    554 Infrastructure

    • 3120 Words
    • 13 Pages

    Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience.…

    • 3120 Words
    • 13 Pages
    Best Essays
  • Good Essays

    (Network Protection, 2010). These metrics cover a broad range of key factors to the survivability, reliability and availability of the network. Factors such as the percentage of time a network and its services are up are important factors to not only the reliability of the network, but also the availability. Availability is affected by two aspects, these aspects being Mean time between failures (MTBF) and Mean time to repair (MTTR). As shown by the graphic below, availability is affected by MTBF distinctively.…

    • 811 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Homework

    • 304 Words
    • 1 Page

    Reliable Delivery: The protocols provides reliable delivery service by guaranteeing to move each network layer datagram across the link without error.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Bs311 Unit 3 Essay

    • 3508 Words
    • 15 Pages

    Designing secure key distribution in an ad-hoc network might be an extremely hard task. Any reliance on a certificate of authority is not trivial at all, for the same reasons that reliance in any centralized authority is problematic. Additional problems include the increased packet sizes required by authentication extensions, unicast/multicast routing, Quality of Service support and power aware routing. Furthermore, due to the limited transmission range of wireless network interfaces, multiple hops may be needed to exchange data between nodes in the network (c.f.…

    • 3508 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Electronic Engineer

    • 4716 Words
    • 19 Pages

    Abstract—Energy consumption of nodes is a crucial factor that constrains the networks life time for Wireless Sensor Networks (WSNs). WSNs are composed of small sensors equipped with lowpower devices, and have limited battery power supply. The main concern in existing architectural and optimisation studies is to prolong the network lifetime. The lifetime of the sensor nodes is affected by different components such as the microprocessor, the sensing module and the wireless transmitter/receiver. The existing works mainly consider these components to decide on best deployment, topology, protocols and so on. Recent studies have also considered the monitoring and evaluation of the path loss caused by environmental factors. Path loss is always considered in isolation from the higher layers such as application and network. It is necessary to combine path loss computations used in physical layer, with information from upper layers such as application layer for a more realistic evaluation. In this paper, a simulation-based study is presented that uses path-loss model and application layer information in order to predict the network lifetime. Physical environment is considered as well. We show that when path-loss is introduced, increasing the transmission power is needed to reduce the amount of packets lost. This presents a tradeoff between the residual energy and the successful transmission rate when more realistic settings are employed for simulation.…

    • 4716 Words
    • 19 Pages
    Powerful Essays