Figure 1 - uploaded by Saher Manaseer
Content may be subject to copyright.
1: An example of an Infrastructured Wireless Network. 

1: An example of an Infrastructured Wireless Network. 

Source publication
Article
Full-text available
Since their emergence within the past decade, which has seen wireless networks being adapted to enable mobility, wireless networks have become increasingly popular in the world of computer research. A Mobile Ad hoc Network (MANET) is a collection of mobile nodes dynamically forming a temporary network without the use of any existing network infrast...

Similar publications

Article
Full-text available
Wireless Sensor Networks (WSNs) can be used to monitor environments, and therefore have broad range of interesting applications. The applications which may use WSN can be of sensitive nature and therefore might require enhanced secured environment. As sensors are used to monitor sensitive areas therefore Security and energy efficiency is essential...
Article
Full-text available
Applications of wearable and implanted wireless sensor devices are hot research area. A specialized field called the body area networks (BAN) has emerged to support this area. Managing and controlling such a network is a challenging task. An efficient media access control (MAC) protocol to handle proper management of media access can considerably i...
Article
Full-text available
Periodical broadcasts of individual vehicle’s safety information such as velocity and acceleration are critical in vehicular ad hoc networks (VANETs). However, current contention-based media access control (MAC) protocols cannot guarantee high performance in high density VANETs. In this paper, we propose a MAC protocol based on s -disjunct code to...
Article
Full-text available
The emergence of wireless networking technologies for large enterprises, operators (service providers), small-medium organizations, has made hotspot solutions for metropolitan area networks (MAN), last mile wireless connectivity, mobile broadband solutions, IP-based cellular phones (VOIP) and other event-based wireless solutions in very high demand...
Preprint
Full-text available
In airborne sensor networks (ASNs), the media access control (MAC) protocol is facing with serious unfairness problem due to the traditional protection mechanism of air-to-air communications among aircrafts. Actually by using the binary exponential back-off algorithm at high traffic loads to minimize collisions among users, the latest successful no...

Citations

... Recently, this technology has become increasingly fashionable due to its potential application in many areas. For illustration, such a network can be helpful in rescue operations where there is not adequate time or resource to organize a wired network [3]. MANETs are also very useful in military operations where the units are moving around the battlefield in a random way and a central unit cannot be used for organization [4]. ...
... Here comes the importance of fairness, in which the network can maintain the best performance and best utilizing for the resources as well as distributing the resources fairly among the propagated nodes in the network, backoff algorithms were used to maintain the fairness of the network [1], through the delay time and CW, unfortunately this couldn't be achieved in the traditional backoff algorithms, so many researchers conducted experiments to adjust existing algorithms and focusing on some parameters of backoff to reach fairness [21]. ...
Article
Full-text available
Recently the paradigm of achieving fairness in MANETs has become a significant issue in networks field. Researchers have been studying methods and proposing algorithms to maintain the best performance of the network as well as achieving fairness in utilizing resources. In MANETs nodes require fairness of accessibility to channel, bandwidth limit, quality of service, etc. many models were proposed in fairness management process to guarantee the allocation and utility fairly between nodes at the same time achieve the best output and performance as well as optimizing the power consumption and network resources. This paper aims at exploring these models and algorithms and focus on the way that fairness is defined, since there is no specific definition for fairness that all researchers agree on. Also this paper compares between the experiments and studies done in this field and evaluate the level they could improve and enhance in MANETs performance in terms of fairness.
... Recently, Mobile Ad hoc Networks (MANETs) are considered a significant challenge. The significant attention they have gained via the easiness of setup and usability in many fields [1]. Yet many challenges arise to control the topology especially the hidden or neglected parts of these infrastructure-less networks [2]. ...
... Wireless networks have emerged in the 1970s, then they were used to enable mobility [1]. MANETs began in the 1990s as a special type of Ad Hoc Networks. ...
... The difference was in the node mobility. In the mid of 1990, MANETs became popular and formed a significant research topic due to the emergence of 802.11/Wi-Fi wireless networking, PDAs and the laptops [1][3] [4]. ...
Article
Full-text available
Mobile Ad hoc networks do not have any form of centralized control as per their definition. Therefore, many challenges face the development of efficient protocols for such networks. One of the main challenges is the difficulty of extracting the total number of nodes in the network, this paper aims to find an estimate for this number using the average hop count for messages exchanged in the network. Experiments of this paper are conducted on Ad Hoc networks under DSR and AODV routing protocols. Results show a relation between network size and average hop count that can be used to predict the number of nodes in the network.
... Traffic load, number of nodes and mobility speed of a node, are factors that can affect the performance of MANETs, these factors where studied by [19], simulation was used to study the performance of a network under changing backoff algorithms. For transmission failure an increment behavior was performed, while decrement is performed in the case of a transmission success. ...
Article
Full-text available
As a significant part of the Media Access Control protocol, the backoff algorithm purpose is to minimize number of collisions if not totally avoid any collision in Mobile Ad Hoc Networks, in the case of contention between nodes to access a channel. Researchers have proposed many algorithms for backoff to enhance the network performance and improve it. This paper aims at exploring the main and most studied backoff algorithms and how do these algorithms lead to an enhancement of the MANETs performance. This paper also compares between the algorithms proposed in the literature and evaluates to what extent they have affected the performance and enhance it.
... The wireless network is a system of nodes (sensors, laptops, etc.) where each node collects and exchanges the information without any infrastructure (bridge and access point). Ad Hoc and Infrastructure are two classifications of the wireless network [1]. ...
... Ad Hoc networks are used in many fields of interests such as mobile and wireless Ad Hoc networks, wireless Local and Personal Area Networks, Quality-of-Service Issues, performance of protocols and many other issues [1]. ...
... Coordination of the messages flow through the network in Ad hoc networks does not depend on physical base station or routers, nodes of the network sends messages to each other. The original Latin word "Ad hoc" means "for this", leading to the purpose of this network "For this purpose" [1]. ...
Article
Full-text available
This paper aims at sensing the network, and detects the border nodes, the researcher use NS2, in order to represent, simulate and calculate the delivery ratios of the distributed packets which accordingly will help to detect the border nodes. The importance of this research comes from detecting the border nodes without depending on other resources, since Ad hoc networks coordinates are virtual. The researchers analysed the results of the trace file that came as an output of carrying out simulations in Network simulator (NS2) for the evaluation of the ratios. The methodology of this experiment depends on using the IEEE 802.11 MAC protocol. Flooding technique was used to send data packets through three scenarios: First, 5% of the nodes are randomly chosen to send their data packets per minute. In the second and third scenarios, the percentages of nodes that flood their data are 25% and 50% respectively.
... It is an extra step that needs to be taken by the researcher to justify the choices of parameters made. Manaseer [4] has shown some justification for the choice of simulation time and transmission range in relation to network area. ...
... It is necessary to understand the interaction between these factors and to take this into account when designing the simulation scenarios. Moreover, special care should be taken when varying more than one parameter to ensure that the values chosen do not contradict with the relation that binds the two factors together if any [4]. ...
Article
Full-text available
Over the course of the last 10 years, research on Mobile Ad Hoc Networks has witnessed high levels of focus. Because of this field being a relatively new topic, most researchers have focused on using simulation as the first choice for performance measurement and evaluation. In order to contribute to the credibility and reliability of research results on Ad Hoc networks, this paper addresses the issue of choosing parameter values that are used as input for simulators used in such experiments by surveying a sample of recently published papers on Ad Hoc Networks. Results show that in the majority of revised papers, the simulation environment is not carefully planned as reflected by the diversity and quality of parameters used.
... In the past years, Mobile Ad Hoc Networks (MANET) has attracted many researchers due to its use in situations where no infrastructure exists such as battlefields, disaster recovery operations, group communications and other applications (Manaseer, 2010, Kumar, et al. 2010. MANTs consist of a number of mobile hosts that has limited transmission range and power (Wei and Chan 2006) and (Park and Yoo 2013). ...
Thesis
A Mobile Ad Hoc Network (MANET) is a network with mobile devices connected by wireless links directly together without using a central administration or coordination. That is an infrastructure-less network in which nodes do not depend on a pre-existing infrastructure as in wired networks that use routers or in a wireless network that uses access points (AP). Therefore, each node sends its packets using other nodes as routing hops to reach the destination node. The determinations of routes between nodes are done dynamically according the network topology changes. The main characteristics of MANETs are that the management and administration tasks are distributed through all nodes due to the absence of a central management station. Due to mobility behavior of the nodes in MANETs, the topology of the network is highly dynamic since the nodes move randomly, frequently and at any moment of time. Moreover, due to the lack of central management, most of the messages traversing the network are broadcasted messages. This broadcasting affects the average network throughput and increases collisions. Taking into consideration that network resources in MANETs are limited; an efficient protocol must avoid any wasted transmission in order to save the limited bandwidth and battery life. This proposed algorithm Signal Strength Clustering Based (SSCB) uses two pieces of local network information to decrease the redundant rebroadcast in the network. The first information is the node neighbor density and the second is the received signal strength (RSS). These values are used to cluster the network into localized areas and only allow cluster heads in these clusters to rebroadcast depending on the residence of these nodes in dense or sparse areas and on the received signal strength. When the node receive the broadcast message it first check the broadcast ID in the message if this messages rebroadcasted before the node discarded the message if not the node check it is neighbors density if it found itself in a sparse area it shall compare the value of the received RSS with the average RSS value if it found it equal or less, the received message rebroadcasted if not the message dropped. If the node found itself in dense area it shall compare the value of the received RSS with the minimum RSS value if it found it equal, the received message rebroadcasted if not the message dropped. XII Through simulations, The (SSBC) algorithm has decreased broadcasted messages in the network to less than 20% compared to simple flooding and to the half compared to probability based broadcasting. In addition, the (SSBC) algorithm has decreased collisions by 83% compared to simple flooding and about 28% compared to probability based broadcasting.
... Each run of the simulation lasts for 1000 seconds [25,26]. Each simulation experiment is repeated twenty times with different random seeds, and the average value of their results is taken to insure integrity. ...
Article
Full-text available
The wide spread of sensor networks enforces the need to provide a new technology that supports the emerging characteristics of sensors. This has geared IEEE 802.15.4 standards committee toward working on the physical and data link layers in cooperation with ZigBee Alliance that has worked on the network and application layers. The new cooperation, named ZigBee, considers sensors characteristics in the full design. Numerous home applications are guiding the need for communication protocols supporting the new emergent characteristics of Wireless Sensor Networks (WSN), which demand ultra low rate, low power consumption and low cost. ZigBee operates in the license-free 2.4 GHz Industrial, Scientific and Medical (ISM) band that is used by many other standards such as, Bluetooth IEEE 802.15.1, and WLAN IEEE 802.11b. This paper proposes two smart schemes that enable the communication in environments with ZigBee and WLAN devices in order to achieve higher delivery ratios while maintaining acceptable end-to-end delay values. The proposed schemes carryout essential predictions to achieve fairness among ZigBee and WLAN transmissions, therefore, attain better load balancing among devices of different networks. Simulation results show that the proposed smart and opportunistic schemes increase the packet delivery ratio of ZigBee devices for different scenarios. In addition, the proposed schemes enhance the performance of WLAN devices by increasing the packet delivery ratio, while maintaining an acceptable level of end to end delay values.
... Therefore, the standard MAC protocol used for MANETs uses the standard BEB backoff algorithms. The first part of this work, presented as Chapter 3 of this thesis, studies the effects of changing the backoff behaviour upon a transmission failure or after a successful transmission [1][2]. The investigation has revealed that using different behaviours directly affects both network throughput and average packet delay. ...
... When collision occurs, node A pick up a random number T from [1,BO], then retransmits RTS after T time unit. But we have to know how to determine BO and for that we have to do the following calculations [13]-Ø After each collision we will find BO_new = Fum_inc((BO_old) Ø After each successful transmission we will find BO_new = Fun_dec(BO_old) ...
Article
Full-text available
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure. MANETs have received significant attention in recent years due to their easiness to setup and to their potential applications in many domains. Such networks can be useful in situations where there is not enough time or resource to configure a wired network. Ad hoc networks are also used in military operations where the units are randomly mobile and a central unit cannot be used for synchronization. The shared media used by wireless networks, grant exclusive rights for a node to transmit a packet. Access to this media is controlled by the Media Access Control (MAC) protocol. The Backoff mechanism is a basic part of a MAC protocol. Since only one transmitting node uses the channel at any given time, the MAC protocol must suspend other nodes while the media is busy. In order to decide the length of node suspension, a backoff mechanism is installed in the MAC protocol. The choice of backoff mechanism should consider generating backoff timers which allow adequate time for current transmissions to finish and, at the same time, avoid unneeded idle time that leads to redundant delay in the network. The current paper consists a study about the exponential binary back-off (BEB) algorithm and mainly how it is affected two very important MAC layer protocol MACA (Multiple access collision avoidance protocol) and other is MACAW (multiple access collision avoidance protocol for wireless network).
... We can distinguish two types of networks; infrastructure and ad hoc networks [1,3,22,23]. See figures 1 and 2. [29] Fig. 1 shows a simple example of the first type of infrastructure wireless networks. Communication between nodes at such networks is managed via a base station or a central access point. ...
Article
Full-text available
The standard IEEE 802.11 MAC protocol uses the Binary Exponential Backoff algorithm. The Binary Exponential Backoff makes exponential increments to contention window sizes. This work has studied the effect of choosing a combination between linear, exponential and logarithmic increments to contention windows. Results have shown that choosing the right increment based on network status enhances the data delivery ratio up to 37% compared to the Binary Exponential Backoff, and up to 39 % compared to the Pessimistic Linear Exponential Backoff algorithms for wireless Internet.