scispace - formally typeset
Journal ArticleDOI

Cross-layering in mobile ad hoc network design

Marco Conti, +3 more
- 01 Feb 2004 - 
- Vol. 37, Iss: 2, pp 48-51
Reads0
Chats0
TLDR
The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.
Abstract
Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.

read more

Citations
More filters
Book ChapterDOI

Framework for Cross-Layer Optimization in Cognitive Radio Network

TL;DR: The cross-layer optimization framework work related to wireless and cognitive radio network is reviewed and the MAC layer parameters optimization with the help of cross- layer interaction is explored and various potential challenges in this interaction are presented.
Proceedings ArticleDOI

Context Awareness through Cross-Layer Network Architecture

TL;DR: This paper studies the possibilities of context-awareness in communications through this architecture by two examples, using user-centric context to control the available link-bandwidth and satisfy user accordingly.
Journal ArticleDOI

E2XLRADR (Energy Efficient Cross Layer Routing Algorithm with Dynamic Retransmission for Wireless Sensor Networks)

TL;DR: Simulation and results shows that this approach can save the overall energy consumption and cross layered algorithm is proposed for routing and retransmission scheme.
Proceedings ArticleDOI

A Local View Management Protocol for network-wide view construction in wireless networks

TL;DR: This work proposes a new protocol called the Local View Management Protocol (LVMP), which implements a selective rebroadcast technique to reduce the number of nodes participating in the local view dissemination process while assuring that this local view attains all nodes.
Journal ArticleDOI

Congestion Control in Distributed Networking System-A Review

TL;DR: This paper investigates the work being carried out in the recent past for finding an effective solution to traffic congestion and proposes an idea of cross layer technique that can be adopted to have an effective control on congestion in distributed networks.
References
More filters
Journal ArticleDOI

Mobile ad hoc networking: imperatives and challenges

TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Journal ArticleDOI

Design challenges for energy-constrained ad hoc wireless networks

TL;DR: It is shown that cross-layer design of these protocols is imperative to meet emerging application requirements, particularly when energy is a limited resource.
Journal ArticleDOI

Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks

TL;DR: It is concluded that the current version of this wireless LAN protocol does not function well in multihop ad hoc networks, and it is doubt whether the WaveLAN-based system is workable as a mobile ad hoc testbed.
Journal ArticleDOI

A cautionary perspective on cross-layer design

TL;DR: It is argued that it behooves to exercise caution while engaging in cross-layer design, because unbridled cross- layer design can lead to spaghetti design, which can stifle further innovation and be difficult to upkeep.
Book

Mobile Ad Hoc Networking

TL;DR: In this article, the authors present a model for wireless ad-hoc networks with a view of 4G wireless: Imperatives and challenges. But the authors do not discuss the security aspects of ad hoc networks.