scholarly journals QSMVM: QoS-Aware and Social-Aware Multimetric Routing Protocol for Video-Streaming Services over MANETS

Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 901
Author(s):  
Efraín Palacios Jara ◽  
Ahmad Mohamad Mezher ◽  
Mónica Aguilar Igartua ◽  
Rebeca P. Díaz Redondo ◽  
Ana Fernández-Vilas

A mobile ad hoc network (MANET) is a set of autonomous mobile devices connected by wireless links in a distributed manner and without a fixed infrastructure. Real-time multimedia services, such as video-streaming over MANETs, offers very promising applications, e.g., two members of a group of tourists who want to share a video transmitted through the MANET they form, a video-streaming service deployed over a MANET where users watch a film, among other examples. On the other hand, social web technologies, where people actively interact online with others through social networks, are leading to a socialization of networks. Information of interaction among users is being used to provide socially-enhanced software. To achieve this, we need to know the strength of the relationship between a given user and each user they interact with. This strength of the relationship can be measured through a concept called tie strength (TS), first introduced by Mark Granovetter in 1973. In this article, we modify our previous proposal named multipath multimedia dynamic source routing (MMDSR) protocol to include a social metric TS in the decisions taken by the forwarding algorithm. We find a trade-off between the quality of service (QoS) and the trust level between users who form the forwarding path in the MANET. Our goal is to increase the trust metric while the QoS is not affected significantly.

Author(s):  
Ashutosh Srivastava ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

AbstractMobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.


2014 ◽  
Vol 644-650 ◽  
pp. 2838-2841
Author(s):  
Ping Zong ◽  
Jun Qin

With the growth of multimedia business demand in commercial applications, providing QoS support in Ad Hoc network is more and more important. With the appearance of the business which has strict requirements on the QoS, to provide QoS guarantee in mobile Ad Hoc network will have more important significance. By researching the QoS guarantee mechanism research status of wireless Ad Hoc network, as well as the existing research results and the analysis of the problems remaining to be solved, this paper puts forward a new QoS routing protocol named ProDSR, which adds QoS guarantee mechanism extension to the dynamic source routing protocol (DSR). This protocol makes bandwidth, stability and hop count to be selection criteria for providing QoS guarantee, effectively improves the service quality of mobile Ad Hoc network.


Author(s):  
P. Subathra ◽  
S. Sivagurunathan

A Mobile Ad hoc Network (MANET) is a collection of wireless nodes communicating over multi-hop paths without any infrastructure. Nodes must cooperate to provide necessary network functionalities. The security in routing protocols like Dynamic Source Routing (DSR) can be compromised by a “Black Hole” attack. Here, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops them, leading to performance degradation. The situation becomes worse when two or more nodes cooperate and perform the “Cooperative black hole” attack. This chapter proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating the attacking nodes. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio, and false negative probability in comparison with trust and probe based schemes.


Author(s):  
Naseer Ali Husieen ◽  
Suhaidi Hassan ◽  
Osman Ghazali ◽  
Lelyzar Siregar

This paper evaluates the performance of Reliable Multipath Dynamic Source Routing Protocol (RM-DSR) protocol with different network size compared to DSR protocol. RM-DSR developed in the mobile ad-hoc network to recover from the transient failure quickly and divert the data packets into a new route before the link is disconnected. The performance of RM-DSR protocol is tested in the Network Simulator (NS-2.34) under the random way point mobility model with varying number of mobile nodes. The network size parameter is used to investigate the robustness and the efficiency of RM-DSR protocol compared to DSR protocol. The network size affects the time of the route discovery process during the route establishment and the route maintenance process which could influence the overall performance of the routing protocol. The simulation results indicate that RM-DSR outperforms DSR in terms of the packet delivery ratio, routing overhead, end-to-end delay, normalized routing load and packet drop.


2014 ◽  
Vol 598 ◽  
pp. 677-681
Author(s):  
Yen Wen Chen ◽  
Yuan Sing Ho ◽  
Chung Chen Sun

Cloud computing is becoming one of the most convenient ways for information services through network accesses. In this paper, we describe the architecture of cloud computing and discuss the issue of in-cast, which may downgrade the transmission performance when the number of simultaneous transmission servers is getting larger. The in-cast transmission may introduce the out of sequence of packet delivery and may reduce the system throughput. This paper constructs the software environment to simulate the performance of video streaming services delivered by the servers in cloud. We first examine the performance of the out of sequence issue of packet transmission when the Hashed Credit Fair (HCF) algorithm was applied and investigate the multicast performance of video streaming service with respect to the numbers of servers. With the increasing of the number of servers, we note that transmission performance is not improved, on the contrary, the system throughput downgrades sharply. We believe the simulation results of this paper will be helpful for the design of cloud video multicast services.


2010 ◽  
Vol 49 (4) ◽  
pp. 379-390 ◽  
Author(s):  
M. Aguilar Igartua ◽  
V. Carrascal Frías ◽  
Luis J. de la Cruz Llopis ◽  
Emilio Sanvicente Gargallo

Sign in / Sign up

Export Citation Format

Share Document