A distance routing effect algorithm for mobility (DREAM)
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
A power control MAC protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Deafness: A MAC Problem in Ad Hoc Networks when using Directional Antennas
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Capacity of multi-channel wireless networks: impact of number of channels and interfaces
Proceedings of the 11th annual international conference on Mobile computing and networking
Integer linear programming inference for conditional random fields
ICML '05 Proceedings of the 22nd international conference on Machine learning
Jamming and sensing of encrypted wireless ad hoc networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Communication in wireless networks with directional antennas
Proceedings of the twentieth annual symposium on Parallelism in algorithms and architectures
Media handling aspects of multimedia conferencing in broadband wireless ad hoc networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The emergence of proper reservation techniques to acquire the channel in Mobile Ad hoc Network is main concern when there is a random, unstipulated and insecure communication. The denial of proper channel causes the foe nodes to cause virtual jamming, thereby preventing the legitimate nodes to communicate especially in the real time scenario where the time factor is very critical. To avoid this, a proper architecture along with a specialized medium access method is necessary. The method employed here is to use a hierarchical-like network forming subworkgroups that define clusters of nodes formed randomly. These clusters propose their own way to allocate the channels for the specific nodes at both the intra-level and inter-level. Also a specialized MAC protocol, Dual Tone Multiple Control Channel [DSMCL] protocol has been formulated based on the busy tone protocol. This protocol also ensures the Quality of Service which reduces the overhead of the upper layers. The mobile nodes follow their own routing protocols for forwarding of packets within the domain and redistribute them for interoperability. While the inter-level channel acquisition is by means of allocation/relocation algorithms, at the intra level, they are carried out using the CTSP (Cell/Technology Selection Problem) pattern. This ensures that a genuine node ready to communicate is not trapped by the malicious node communicating with them forever.