Journal ArticleDOI
Cross-layering in mobile ad hoc network design
Reads0
Chats0
TLDR
The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.Abstract:
Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.read more
Citations
More filters
Journal ArticleDOI
Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks
TL;DR: The Cross-Layer design approach for Power control (CLPC) would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination.
Journal ArticleDOI
Design considerations for a multihop wireless network testbed
TL;DR: This article is one of the first attempts to identify a comprehensive set of requirements for a general-purpose multihop wireless network testbed and the challenges therein.
Proceedings ArticleDOI
A link-quality and congestion-aware cross layer metric for multi-hop wireless routing
G. Karbaschi,A. Fladenmuller +1 more
TL;DR: A new link-quality and congestion aware metric for multi-hop wireless routing is proposed which is obtained from MAC layer and shows that still having a path with reasonable length improves the performance of routing in terms of end-to-end delay and throughput in comparison to minimum-hop count metric.
Journal ArticleDOI
Reliable and efficient forwarding in ad hoc networks
TL;DR: A lightweight mechanism for REliable and Efficient Forwarding (REEF), which mitigates the effects of adverse situations caused by cooperation misbehavior or network fault conditions, and becomes also a security mechanism in case of a security association established between the communication parties.
Journal ArticleDOI
Cross-Layer Architectures for Autonomic Communications
TL;DR: This paper reviews the cross–layer approach to network architecture and compares the different cross-layering architectures, observing that most current approaches depend purely on local information and provide only poor and inaccurate information gathering at the global scale.
References
More filters
Journal ArticleDOI
Mobile ad hoc networking: imperatives and challenges
TL;DR: The important role that mobile ad hoc networks play in the evolution of future wireless technologies is explained and the latest research activities in these areas are reviewed, including a summary of MANETs characteristics, capabilities, applications, and design constraints.
Journal ArticleDOI
Design challenges for energy-constrained ad hoc wireless networks
TL;DR: It is shown that cross-layer design of these protocols is imperative to meet emerging application requirements, particularly when energy is a limited resource.
Journal ArticleDOI
Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks
Shugong Xu,Tarek Saadawi +1 more
TL;DR: It is concluded that the current version of this wireless LAN protocol does not function well in multihop ad hoc networks, and it is doubt whether the WaveLAN-based system is workable as a mobile ad hoc testbed.
Journal ArticleDOI
A cautionary perspective on cross-layer design
Vikas Kawadia,P. R. Kumar +1 more
TL;DR: It is argued that it behooves to exercise caution while engaging in cross-layer design, because unbridled cross- layer design can lead to spaghetti design, which can stifle further innovation and be difficult to upkeep.
Book
Mobile Ad Hoc Networking
Marco Conti,Silvia Giordano +1 more
TL;DR: In this article, the authors present a model for wireless ad-hoc networks with a view of 4G wireless: Imperatives and challenges. But the authors do not discuss the security aspects of ad hoc networks.