Open Access   Article Go Back

Sovereign Mobile Mesh Networks

N Venkata Santhi1 , D Kumar2

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 172-177, Sep-2015

Online published on Oct 01, 2015

Copyright © N Venkata Santhi , D Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N Venkata Santhi , D Kumar, “Sovereign Mobile Mesh Networks,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.172-177, 2015.

MLA Style Citation: N Venkata Santhi , D Kumar "Sovereign Mobile Mesh Networks." International Journal of Computer Sciences and Engineering 3.9 (2015): 172-177.

APA Style Citation: N Venkata Santhi , D Kumar, (2015). Sovereign Mobile Mesh Networks. International Journal of Computer Sciences and Engineering, 3(9), 172-177.

BibTex Style Citation:
@article{Santhi_2015,
author = {N Venkata Santhi , D Kumar},
title = {Sovereign Mobile Mesh Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {172-177},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=662},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=662
TI - Sovereign Mobile Mesh Networks
T2 - International Journal of Computer Sciences and Engineering
AU - N Venkata Santhi , D Kumar
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 172-177
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2263 2203 downloads 2355 downloads
  
  
           

Abstract

Networks composed of mobile nodes inherently suffer from intermittent connections and high delays. Performance can be improved by adding supporting infrastructure, including base stations, meshes, and relays, but the cost-performance trade-offs of different designs is poorly understood. To examine these trade-offs, we have deployed a large-scale vehicular network and three infrastructure enhancement alternatives. Mobile ad-hoc networks (MANETs) are ideal for situations where a fixed infrastructure is unavailable or infeasible. Today’s MANETs, however, may suffer from network partitioning. This limitation makes MANETs unsuitable for applications such as crisis management and battlefield communications, in which team members might need to work in groups scattered in the application terrain. In such applications, inter-group communication is crucial to the team collaboration. To address this weakness, we introduce in this paper a new class of ad-hoc network called Autonomous Mobile Mesh Network (AMMNET). We propose a distributed client tracking solution to deal with the dynamic nature of client mobility, and present techniques for dynamic topology adaptation in accordance with the mobility pattern of the clients. Our simulation results indicate that AMMNET is robust against network partitioning and capable of providing high relay throughput for the mobile clients.

Key-Words / Index Term

Mobile Mesh Networks, Dynamic Topology Deployment, Client Tracking

References

[1] E. Dahlman, S. Parkvall, and J. Sko¨ ld, 4G LTE/LTE-Advanced for Mobile Broadband. Academic, 2011.
[2] L. Nuaymi, WiMAX: Technology for Broadband Wireless Access. John Wiley & Sons, 2007.
[3] K. Fall, “A Delay-Tolerant Network Architecture for Challenged Internets,” Proc. ACM Special Interest Group on Data Comm., 2003.
[4] A. Petkova, K.A. Hua, and S. Koompairojn, “Processing Approximate Rank Queries in a Wireless Mobile Sensor Environment,”Proc. 11th Int’l Conf. Mobile Data Management (MDM), 2010.
[5] “Quadrocopter LLC,” http://quadrocopter.us/, 2013.
[6] R. Roy, Handbook of Mobility Models and Mobile Ad Hoc Networks.Springer, 2010.
[7] Y.-C. Chen, E. Rosensweig, J. Kurose, and D. Towsley, “Group Detection in Mobility Traces,” Proc. Sixth Int’l Wireless Comm. And Mobile Computing Conf. (IWCMC ’10), 2010.
[8] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobility Models for Ad Hoc Network Research,” Wireless Comm. and Mobile Computing, vol. 2, no. 5, pp. 483-502, 2002
[9] X. Hong, M. Gerla, G. Pei, and C. Chiang, “A Group Mobility Model for Ad Hoc Wireless Networks,” Proc. Second ACM Int’l Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM ’99), 1999.
[10] K. Blakely and B. Lowekamp, “A Structured Group Mobility Model for the Simulation of Mobile Ad Hoc Networks,” Proc. Second Int’l Workshop Mobility Management & Wireless Access Protocols (MobiWac), 2004.