Author:
Al Ajrawi Shams,Tran Bang
Abstract
AbstractMobile wireless Ad-hoc has become more popular because it forms quickly, has an easy setup, and has easy extensibility. The mobile ad-hoc wireless networks can be further classified according to their applications as follows: Regular user ad-hoc networks are commercial communication that applies to vehicles to help avoid collisions and accidents and live connections to transfer data from car to car. Another application is disaster rescue ad-hoc networking, usually used when a normal infrastructure network is destroyed by storms, earthquakes, tsunamis, etc. Nowadays, a lot of applications, particularly those related to the military and emergency situations, rely on mobile ad hoc wireless networks, where security needs are more challenging to provide than in regular networks. We present the tactical network needs for the military. This platform attempts to assess the possible advantages of mobile ad hoc networks in tactical military applications. This work proposes route discovery using reactive (on-demand) routing protocols where nodes need to just transfer data. This eliminates the requirement for each node to store and maintain any routing tables. This study presents and contrasts the benefits and drawbacks of two fundamental mobile ad hoc routing systems (AODV and DSR). Both protocols are On-Demand routing techniques, and when data needs to be sent, the discovery phase begins. The results of the simulation, the AODV routing approach outperforms the DSV routing method under identical simulated conditions.
Funder
Alliant International University
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computers in Earth Sciences,Computer Science Applications,Geography, Planning and Development
Reference21 articles.
1. Da Silva, M. M. (2020). Cable and wireless networks: Theory and practice. CRC Press.
2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.
3. Choo, K. K. R., Liu, C. C., & Wang, Y. (2014). A survey of context-aware mobile computing research. Journal of Ambient Intelligence and Humanized Computing, 5(2), 159–180.
4. Wang, Z., Jiao, L., Chen, W., & Zhang, Y. (2019). A survey on visual analytics of big data in environmental monitoring. Journal of Cleaner Production, 238, 117869.
5. Zeiler, M. D., & Fergus, R. (2014). Visualizing and understanding convolutional networks. In D. Fleet, T. Pajdla, B. Schiele, & T. Tuytelaars (Eds.), Computer Vision–ECCV 2014. Lecture notes in Computer Science (vol. 8689, pp. 818–833). Cham: Springer.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献