Figure 4 - uploaded by Emmanuel Baccelli
Content may be subject to copyright.
5: Mobile IP tunneling. Node B sends a packet to mobile node A. The packet is routed to the Home Agent of node A which then tunnels it to the current location of node A. The path through the network is highlighted.  

5: Mobile IP tunneling. Node B sends a packet to mobile node A. The packet is routed to the Home Agent of node A which then tunnels it to the current location of node A. The path through the network is highlighted.  

Source publication
Article
Full-text available
Integrating mobile ad hoc devices in the Internet brings a number of new challenges, both in terms of optimization of the routing protocols providing ad hoc networks, and in terms of integration of ad hoc mobility with the IP-based infrastructure. This thesis overviews these challenges. Some existing solutions are analyzed and compared while a numb...

Similar publications

Article
Full-text available
A mobile ad-hoc network (MANET) consists of a number of mobile nodes that are connected dynamically without any infrastructure. In this network type, the use of the clustering technique significantly reduces the routing traffic that occurs during the routing process. Clustering is used to divide an ad-hoc network into small sets of nodes, where eac...
Article
Full-text available
In geographical routing algorithms, mobile nodes rely on geographical position to make routing judgments. Researchers frequently discuss such routing algorithms in (2D) space. However, in reality, mobile nodes spread in (3D) space. In this paper the authors present four new 3D geographical-based routing algorithms Cylinder, Greedy-Cylinder, Cluster...
Article
Full-text available
Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation...
Conference Paper
Full-text available
In recent years, Flying Ad hoc Networks (FANETs) consisted of multi Unmanned aerial vehicles (UAVs) through multi-hop wireless communication links, which have been widely involved in the military and civilian domains. Due to highly dynamic topology, high mobility, and varying radio link quality, the unicast routing protocols for FANETs still provid...
Article
Full-text available
Overhead quantifies how much routing and control information is necessary for the application data to reach the destination node. This is very important in Ad Hoc networks because the mobility of nodes makes routing paths change constantly, therefore, the exchange of control and routing information increases. In this work the overhead for AODV, BCH...

Citations

... The purpose of the implementation of a routing protocol is to determine the optimal path through the packet network based on a certain criterion of performance. The problem lies in the context of ad hoc networks is the adaptation of the routing method used with the large number of existing units in an environment characterized by modest computing capabilities and rapidly changing topologies [4] [5]. The mobile ad hoc routing protocols can be classified into three categories: o Proactive Protocols: Maintain routes to destinations even if they are not needed (OLSR, DSDV). ...
... Each node selects a set of its neighbors as multipoint relay (MPR). [4] In OLSR only selected as MPR nodes are only allowed to carry the information. Neighbors who are not receiving MPR and also process information but does not retransmit. ...
Conference Paper
Full-text available
Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. Routing protocols represent an essential aspect of the performance of mobile wireless networks. This paper presents a comparative analysis between several routing algorithms and their impact on the performance of WSN. The performance of routing protocols is evaluated by providing simulation results based on packet delivery ratio, end to end delay (EED), and throughput. Our simulation is performed in NS2 by varying total number of nodes in the first scenario and varying pause time in the second.
... The purpose of the implementation of a routing protocol is to determine the optimal path through the packet network based on a certain criterion of performance. The problem lies in the context of ad hoc networks is the adaptation of the routing method used with the large number of existing units in an environment characterized by modest computing capabilities and rapidly changing topologies [4] [5]. The mobile ad hoc routing protocols can be classified into three categories: ...
... Each node selects a set of its neighbors as multipoint relay (MPR). [4] In OLSR only selected as MPR nodes are only allowed to carry the information. Neighbors who are not receiving MPR and also process information but does not retransmit. ...
Article
Full-text available
ecent advances in wireless and micro electronic communications have enabled the development of a new type of wireless network called mobile ad hoc networks. MANETs are currently the greatest innovation in the field of telecommunications. A Mobile Ad hoc Wireless Network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop network, maintaining connectivity in a decentralized manner. Routing protocols represent an essential aspect of the performance of mobile wireless networks. In this paper, we present the performance analysis of three prominent MANET routing protocols; DSDV, DSR, and AODV using NS2.
... where r 0 is the connectivity radius for λ = 1. For the values α = 2.5 and K = 10 , it was calculated r 0 ≈ 0.12 [3] (see appendix C in [8] for a short and elegant proof that r = O(1/ √ λ).) Therefore, we can take as an assumption for this neighborhood model that two nodes of the P.p.p. of intensity ν are connected if they are within the distance r(λ) from each other. ...
... In Section 6.5 we prove that in our model the average PageRank does not depend on the number of outgoing links. Sections 6.6 and 6.7 provide auxiliary results on the moment generating function of the nodes' heights in subtrees and on the subtree size distribution, which lead to the final results and asymptotics given in Section 6. 8. The study is concluded by Section 6.9, where we discuss the results and compare them with the related results from the literature. ...
Chapter
Full-text available
This chapter explores techniques that enable efficient link state routing on compound networks. These techniques rely on the selection and maintenance of a subset of links in the network (i.e. an overlay) along which the different operations of link-state routing can be performed more efficiently. This chapter provides a formal analysis of such techniques, a qualitative evaluation of their specific properties and example applications of such techniques with a standard routing protocol.
Article
Full-text available
Incorporating multi-hop wireless networks in the IP infrastructure is an effort to which a growing community participates. One instance of such activity is the extension of the routing protocol OSPF, for operation on MANETs. Such extension allows OSPF, the most widely deployed interior gateway routing protocol on the Internet, to work on heterogeneous networks encompassing both wired and wireless routers. The latter may self-organize as multi-hop wireless subnetworks, and may be mobile. Three solutions have been proposed for this extension, among which two based on techniques derived from multi-point relaying (MPR) techniques and OLSR. This paper analyzes these two approaches and identifies some fundamental discussion items that pertain to adapting OSPF mechanisms to multi-hop wireless networking, before concluding with a proposal for a unique, merged solution based on this analysis.