CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Issues and Imperatives of Adhoc Networks

by Bimal H Patel, Parth D Shah, Harikrishna B Jethva, Nishidh Chavda
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 13
Year of Publication: 2013
Authors: Bimal H Patel, Parth D Shah, Harikrishna B Jethva, Nishidh Chavda
10.5120/10139-4945

Bimal H Patel, Parth D Shah, Harikrishna B Jethva, Nishidh Chavda . Issues and Imperatives of Adhoc Networks. International Journal of Computer Applications. 62, 13 ( January 2013), 16-21. DOI=10.5120/10139-4945

@article{ 10.5120/10139-4945,
author = { Bimal H Patel, Parth D Shah, Harikrishna B Jethva, Nishidh Chavda },
title = { Issues and Imperatives of Adhoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 13 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number13/10139-4945/ },
doi = { 10.5120/10139-4945 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:41.867834+05:30
%A Bimal H Patel
%A Parth D Shah
%A Harikrishna B Jethva
%A Nishidh Chavda
%T Issues and Imperatives of Adhoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 13
%P 16-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET is a self organized, self configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The mobile nodes can receive and relay packets as a router. Routing is a critical issue and an efficient routing protocol makes the MANET reliable. The provision of quality of service (QoS) guarantees is much more challenging mainly due to node mobility and resource constraints. Security is an essential requirement in mobile ad hoc network (MANETs). Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. In practice, most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad Hoc Networks can lead to TCP implementations with poor performance. Wireless Mobile Ad-hoc networks offer challenges to TCP's congestion control mechanism related to its inability of distinguishing between losses induced by congestion and others types of losses. This article extensively and exclusively studies the issues involved in Adhoc network which can be exploded as further research purpose.

References
  1. Anilkumar Sharma, Neha Bhatia, "Behavioural study of MANET routing protocol" IJCEM International Journal of Computational Engineering & Management, Vol. 12, April 2011,pp. 100-104.
  2. Z. I. Dafalla, Mayyada Hammoshi "Performance evaluation of Tcp Variants" ATINER's Conference Paper Series COM2012-0046
  3. Matthias Hollick, Jens Schmitt, Christian Seipl, and Ralf Steinmetz "On the Effect of Node Misbehavior in Ad Hoc Networks" IEEE Vol. 6, pp. 3759--3763.
  4. Shailender Gupta, C. K. Nagpal and Charu Singla "Impact Of Selfish Node Concentration In MANET" International Journal of Wireless & Mobile Networks (IJWMN) Vol. 3, No. 2, April 2011,pp. 29-37.
  5. MukeshKumar, Rahul Rishi, D. K. Madan "Issues And Challenges Of Quality Of Service In Mobile Adhoc Network" International Journal of Computer Science & Engineering Technology (IJCSET) Vol. 1, No. 3,pp. 61-66.
  6. Hongbo Zhou "A Survey on Routing Protocols in MANETs" Technical Report: MSU-CSE-03-08 Mar 28, 2003.
  7. Ankur Lal, Dr. Sipi Dubey, Mr. Bharat Pesswani "Reliability of MANET through the Performance Evaluation of AODV, DSDV, DSR" International Journal of Advanced Research in Computer Science and Software Engineering Vol. 2, No. 5,May 2012,pp. 213-216.
  8. Sunil Taneja, Ashwani Kush "A Survey of Routing Protocols in Mobile Ad Hoc Networks" International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010",pp. 279-285.
  9. Rajni Sharma, Alisha Saini, "A Study of Various Security Attacks and their Countermeasures in MANET" International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 1 No. 1 December 2011",pp. 01-05.
  10. A. Boukerche, L. Bononi, "Simulation and modeling of wireless, mobile and ad hoc networks, in: S. Basagni, M. Conti, S. Giordano, I. Stojmenovic (Eds. ), Ad Hoc Networking" IEEE Press Wiley, New York, 2003.
  11. J. F. Kurose, H. Mouftah, Computer-aided modeling of computer communication networks, IEEE Journal on Selected Areas in Communications 6 (1) (1988) 130–145.
  12. Md Nazmul, Islam Khan, Rashid Ahmed, Md. Tariq aziz " A survey on TCP Reno, New Reno and Sack over mobile Ad hoc network" International Journal of Distributed and Parallel Systems Vol. 3,No 1,January 2012
  13. Opnet Modeler, http://www. opnet. com/products/ modeler / home. html.
  14. The Network Simulator-ns-2, http:// www. Isi. Edu / nsnam/ns/index. html.
  15. QualNet simulator, http://www. qualnet. com/.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Routing QoS Security TCP