Real-time multimedia transport over MANET has stringent bandwidth, delay, and loss requirements. It is
a great challenge to support such applications in wireless ad hoc networks, which are characterized by
frequent link failures, congestion, and lack of central administration.
In this paper, we use NCTUns 6.0
to simulate this kind of networks ,because it is difficult to do that is the
real world .In this paper, two routing protocols (AODV, ADV) are
studied within many scenarios to achieve their performances and
reliabi
lity using many metrics.
We conclude that ADV routing protocol adapts quickly when the
complexity of network and mobility of nodes increase. This is achieved
by varying the size and frequency of routing updates.
Throughput
الإنتاجية
MANET
VANET
شعاع المسافة عند الطلب النقال
شعاع المسافة الموائم
شبكات العقد النقالة
شبكات المركبات النقالة
التصادمات
الرزم المرمية
متوسط توصيل الرزم
متوسط التأخير طرف إلى طرف
متوسط حمل التوجيه
المحاكي NCTUns 6.0
NCTUns 6.0 simulator
AODV
ADV
collisions
drop packets
Packet delivery ratio
المزيد..
Mobile ad-hoc Networking MANETS is a promising concept to provide flexible, adaptive, and reconfigurable architecture, cost effective solution.In the mobile ad hoc network security is the basic concern for network functions work properly.Routing is t
he corner stone in Mobile ad-hoc Networks, A lot of known vulnerabilities and security threats can be exploited to attack routing messages, so it is important to provide secure routing protocol for MANETs.In this paper, we present a secure extension for ad-hoc On Demand Distance Vector Protocol (AODV). The default routing protocol for MANETs. The proposed protocol ensures that discovery of the route between the nodes is functioning properly and securely, achieving mutual authentication between nodes, routing message integrity, generating a security key of data sent and exchanges it securely to ensure confidentiality and all of these are in one stage. By this we save in wireless band, resource consumption, preventing duplicate of authentication algorithms.