Joint-design of multiresolution modulation and ARQ protocol for prioritized packet transmission in wireless ad-hoc networks

Author(s):  
A. Annamalai ◽  
Dhadesugoor Vaman ◽  
John Matyjas ◽  
Michael Medley
Author(s):  
Arif Sari

The purpose of this chapter is to investigate and expose methods and techniques developed to provide security in wireless ad hoc networks. Researchers have proposed variety of solutions for security problems of Wireless Mobile Ad-Hoc Networks (MANET) against Distributed Denial of Service (DDoS) attacks. Due to the wireless nature of the channels and specific characteristics of MANETs, the attacks cannot be defeated through conventional security mechanisms. An adversary can easily override its medium access control protocol (MAC) and continually transfer packages on the network channel and the access point node(s) cannot assign authorization access to shared medium. These attacks cause a significant decrease on overall network throughput, packet transmission rates and delay in the MAC layer since other nodes back-off from the communication. In this chapter the proposed methods are applied for preventing and mitigating different wireless ad hoc network attacks are investigated and effectiveness and efficiency of these mechanisms are exposed.


2012 ◽  
Vol E95.B (9) ◽  
pp. 3047-3051 ◽  
Author(s):  
Xin AO ◽  
F. Richard YU ◽  
Shengming JIANG ◽  
Quansheng GUAN ◽  
Gang WEI

Author(s):  
N. Lavanya ◽  
M. Balakrishna

Network coding is a data transmission technique which allows intermediate nodes in a network to re-code data in transit. In contrast to traditional network communication where a node repeats incoming data to its outgoing channel without modifying the payload, a node implementing network coding not only repeats but also alters data. Network coding has been demonstrated to increase network throughput compared to the traditional forwarding transmission. It has potentially broad applications in many areas, including traditional computer networks, wireless ad-hoc networks, and peer to peer systems. This paper process a new technique for file sharing in P2P.


2009 ◽  
Vol 19 (12) ◽  
pp. 3218-3227
Author(s):  
Kai WEN ◽  
Wei GUO ◽  
Guang-Jie HUANG

Sign in / Sign up

Export Citation Format

Share Document