Journal ArticleDOI
Cross-layering in mobile ad hoc network design
Reads0
Chats0
TLDR
The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.Abstract:
Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.read more
Citations
More filters
CrossTalk: a data dissemination-based crosslayer architecture for mobile ad-hoc networks
TL;DR: This paper introduces CrossTalk, a cross-layer architecture based on data dissemination that enables each node in an ad-hoc network to evaluate its own status locally against that of the network for decision processes such as routing.
Journal ArticleDOI
COSR: a reputation-based secure route protocol in MANET
TL;DR: Cooperative On-demand Secure Route (COSR), a novel secure source route protocol, against malicious and selfish behaviors, and is verified through GloMoSim to show that COSR is secure and stable.
Proceedings ArticleDOI
Reflective and Refractive Variables: A Model for Effective and Maintainable Adaptive-and-Dependable Software
V. De Florio,Chris Blondia +1 more
TL;DR: The translator is described and the work it is carrying out within PATS to build simple and powerful libraries of scripts based on reflective and refractive variables, including robotics applications and RFID tags processing.
Journal ArticleDOI
Real-time service provisioning for mobile and wireless networks
Károly Farkas,Oliver Wellnitz,M. Dick,X. Gu,Marcel Busse,Wolfgang Effelsberg,Y. Rebahi,D. Sisalem,Dan Grigoras,Kyriakos Stefanidis,Dimitrios Serpanos +10 more
TL;DR: In this paper, the authors give an overview of the key technical challenges that are fundamental and need to be solved in order to easily support real-time applications in wireless and mobile environments.
Proceedings ArticleDOI
A cross-layer on-demand routing protocol for delay-sensitive applications
Lamia Romdhani,Christian Bonnet +1 more
TL;DR: A cross layer routing protocol called CLAE is presented which is based on the cooperation between the on-demand AODV routing protocol and the new IEEE 802.11e MAC protocol (EDCA).
References
More filters
Journal ArticleDOI
Mobile ad hoc networking: imperatives and challenges
TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Journal ArticleDOI
Design challenges for energy-constrained ad hoc wireless networks
TL;DR: It is shown that cross-layer design of these protocols is imperative to meet emerging application requirements, particularly when energy is a limited resource.
Journal ArticleDOI
Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks
Shugong Xu,Tarek Saadawi +1 more
TL;DR: It is concluded that the current version of this wireless LAN protocol does not function well in multihop ad hoc networks, and it is doubt whether the WaveLAN-based system is workable as a mobile ad hoc testbed.
Journal ArticleDOI
A cautionary perspective on cross-layer design
Vikas Kawadia,P. R. Kumar +1 more
TL;DR: It is argued that it behooves to exercise caution while engaging in cross-layer design, because unbridled cross- layer design can lead to spaghetti design, which can stifle further innovation and be difficult to upkeep.
Book
Mobile Ad Hoc Networking
Marco Conti,Silvia Giordano +1 more
TL;DR: In this article, the authors present a model for wireless ad-hoc networks with a view of 4G wireless: Imperatives and challenges. But the authors do not discuss the security aspects of ad hoc networks.