scispace - formally typeset
Journal ArticleDOI

Cross-layering in mobile ad hoc network design

Marco Conti, +3 more
- 01 Feb 2004 - 
- Vol. 37, Iss: 2, pp 48-51
Reads0
Chats0
TLDR
The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.
Abstract
Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.

read more

Citations
More filters
Journal ArticleDOI

Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

TL;DR: The Cross-Layer design approach for Power control (CLPC) would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination.
Journal ArticleDOI

Design considerations for a multihop wireless network testbed

TL;DR: This article is one of the first attempts to identify a comprehensive set of requirements for a general-purpose multihop wireless network testbed and the challenges therein.
Proceedings ArticleDOI

A link-quality and congestion-aware cross layer metric for multi-hop wireless routing

TL;DR: A new link-quality and congestion aware metric for multi-hop wireless routing is proposed which is obtained from MAC layer and shows that still having a path with reasonable length improves the performance of routing in terms of end-to-end delay and throughput in comparison to minimum-hop count metric.
Journal ArticleDOI

Reliable and efficient forwarding in ad hoc networks

TL;DR: A lightweight mechanism for REliable and Efficient Forwarding (REEF), which mitigates the effects of adverse situations caused by cooperation misbehavior or network fault conditions, and becomes also a security mechanism in case of a security association established between the communication parties.
Journal ArticleDOI

Cross-Layer Architectures for Autonomic Communications

TL;DR: This paper reviews the cross–layer approach to network architecture and compares the different cross-layering architectures, observing that most current approaches depend purely on local information and provide only poor and inaccurate information gathering at the global scale.
References
More filters
Journal ArticleDOI

Mobile ad hoc networking: imperatives and challenges

TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Journal ArticleDOI

Design challenges for energy-constrained ad hoc wireless networks

TL;DR: It is shown that cross-layer design of these protocols is imperative to meet emerging application requirements, particularly when energy is a limited resource.
Journal ArticleDOI

Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks

TL;DR: It is concluded that the current version of this wireless LAN protocol does not function well in multihop ad hoc networks, and it is doubt whether the WaveLAN-based system is workable as a mobile ad hoc testbed.
Journal ArticleDOI

A cautionary perspective on cross-layer design

TL;DR: It is argued that it behooves to exercise caution while engaging in cross-layer design, because unbridled cross- layer design can lead to spaghetti design, which can stifle further innovation and be difficult to upkeep.
Book

Mobile Ad Hoc Networking

TL;DR: In this article, the authors present a model for wireless ad-hoc networks with a view of 4G wireless: Imperatives and challenges. But the authors do not discuss the security aspects of ad hoc networks.