scispace - formally typeset
Journal ArticleDOI

Cross-layering in mobile ad hoc network design

Marco Conti, +3 more
- 01 Feb 2004 - 
- Vol. 37, Iss: 2, pp 48-51
Reads0
Chats0
TLDR
The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.
Abstract
Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.

read more

Citations
More filters
Journal ArticleDOI

Cross-Layer Design Approach with Power Consciousness for Mobile Ad-Hoc Networks

TL;DR: In this paper, CLD based architecture is proposed, where the objective is to provide a solution for power conservation, congestion control, and link failure management.

Analytical modeling of medium access control protocols in wireless networks

TL;DR: A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop wireless ad hoc networks, i.e., wireless networks characterized by the lack of any pre-existent infrastructure and where participating devices must cooperatively provide the basic functionalities that are common to any computer network.
Posted Content

Research Challenges in Wireless Sensor Network: A State of the Play

TL;DR: The goal of survey is to present a comprehensive review of the recent literature in wireless sensor network to review the major development and new research challenges in this area.
Journal ArticleDOI

Steepest-ascent constrained simultaneous perturbation for multiobjective optimization

TL;DR: This work proposes a hybrid approach for the problem of optimizing multiple responses in which the gradient is known for only one response, called simultaneous perturbation stochastic approximation steepest ascent, SPSA-SA or SP(SA)2 for short, and applies it to the cross-layer optimization of throughput, packet loss, and end-to-end delay in a mobile ad hoc network.
Journal ArticleDOI

Information-sharing protocol architectures for sensor networks: the state of the art and a new solution

TL;DR: X-Lisa is introduced, a novel Cross-Layer Information-Sharing Architecture that provides many desirable properties such as flexibility and simplicity, and offers programmers a modular framework, simplifying cross-layer interactions.
References
More filters
Journal ArticleDOI

Mobile ad hoc networking: imperatives and challenges

TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Journal ArticleDOI

Design challenges for energy-constrained ad hoc wireless networks

TL;DR: It is shown that cross-layer design of these protocols is imperative to meet emerging application requirements, particularly when energy is a limited resource.
Journal ArticleDOI

Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks

TL;DR: It is concluded that the current version of this wireless LAN protocol does not function well in multihop ad hoc networks, and it is doubt whether the WaveLAN-based system is workable as a mobile ad hoc testbed.
Journal ArticleDOI

A cautionary perspective on cross-layer design

TL;DR: It is argued that it behooves to exercise caution while engaging in cross-layer design, because unbridled cross- layer design can lead to spaghetti design, which can stifle further innovation and be difficult to upkeep.
Book

Mobile Ad Hoc Networking

TL;DR: In this article, the authors present a model for wireless ad-hoc networks with a view of 4G wireless: Imperatives and challenges. But the authors do not discuss the security aspects of ad hoc networks.