2018
DOI: 10.1007/978-3-030-02683-7_46
|View full text |Cite
|
Sign up to set email alerts
|

Bandwidth Estimation for Admission Control in MANET: Review and Conceptual MANET Admission Control Framework

Abstract: Mobile ad-hoc network (MANET) is one of the main technologies for the next generation wireless networking because of the positive impact it poses over other wireless networks having undergone rapid progress, which has inspired many applications. However, providing quality of service (QoS) assurance to MANET is hard because of the unpredictable nature of the wireless medium, contention problem amongst the channel, mobility problem and lack of central coordinator. Admission control is therefore seen as one of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 53 publications
0
4
0
Order By: Relevance
“…So that credibility of the rating remains intact and trustworthy. Techniques like iterative probing, unambiguous probing and so forth require a dummy or probe packet to be transmitted along the selected network path of communication, which eats up bandwidth degrading the flow performance in the network 16 . This is a huge cost paid to identify malicious activities of nodes.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…So that credibility of the rating remains intact and trustworthy. Techniques like iterative probing, unambiguous probing and so forth require a dummy or probe packet to be transmitted along the selected network path of communication, which eats up bandwidth degrading the flow performance in the network 16 . This is a huge cost paid to identify malicious activities of nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Techniques like iterative probing, unambiguous probing and so forth require a dummy or probe packet to be transmitted along the selected network path of communication, which eats up bandwidth degrading the flow performance in the network. 16 This is a huge cost paid to identify malicious activities of nodes. However, if an attacker accidentally forwards the probe packet and then raises a link breakage attack for actual data packets, then it will incur complete loss and no gain at least for that particular communication session.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As earlier stated, the main function of an admission control scheme is to ensure the admission of a new traffic flow into a network, provided it does not violate the rules that may exist within the network. According to [5], [6], for an admission control scheme to be successfully implemented, there are several requirements that must to be fulfilled [7]; these includes: a. Robustness: the implemented admission control scheme on the network must ensure that the necessary QoS requested is provided. The network quality must also be robust towards traffic heterogeneity, heavy load, and time scale.…”
Section: Introductionmentioning
confidence: 99%