Establishing Mobile Ad-Hoc Networks in 802.11 Infrastructure Mode

被引:0
|
作者
Wirtz, Hanno [1 ]
Heer, Tobias [1 ]
Backhaus, Robert [1 ]
Wehrle, Klaus [1 ]
机构
[1] Rhein Westfal TH Aachen, Chair Commun & Distributed Syst, Aachen, Germany
关键词
Mobile Ad-Hoc Networks; Network Virtualization;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad-Hoc Networks (MANETs) rely on the 802.11 ad-hoc mode to establish communication with nearby peers. In practice, this makes MANETs hard to realize. While 802.11-compliant mobile devices implement the ad-hoc mode on the hardware layer, the software layer typically does not implement support for ad-hoc networking in terms of ad-hoc routing and name resolution protocols. Modern mobile operating systems, such as Android and iOS, even hide the inherent ad-hoc functionality of the wireless card through restrictions in the OS. In contrast to this, support for the 802.11 infrastructure mode is a commodity. We propose establishing ad-hoc networks using the 802.11 infrastructure mode. In MA-Fi (Mobile Ad-Hoc Wi-Fi), a small core of mobile router nodes (RONs) provides infrastructure mode network access to mobile station nodes (STANs). As STANs also act as a station in infrastructure networks of other RONs, MA-Fi achieves multi-hop communication between RON and STAN devices in the overall network. We show the creation and operation of mobile ad-hoc networks using MA-Fi. We focus on mobility of RONs and STANs as well as topology control in the overall network.
引用
收藏
页码:49 / 51
页数:3
相关论文
共 50 条
  • [21] Connectivity Service for Mobile Ad-Hoc Networks
    Cornejo, Alejandro
    Lynch, Nancy
    SASOW 2008: SECOND IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS, PROCEEDINGS, 2008, : 292 - 297
  • [22] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [23] Reliability Evaluation of Mobile Ad-hoc Networks
    Choudhary, Anil
    Roy, O. P.
    Tuithung, T.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (05): : 207 - 220
  • [24] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
  • [25] Group Monitoring in Mobile Ad-Hoc Networks
    Gaba, Albana
    Voulgaris, Spyros
    van Steen, Maarten
    NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
  • [26] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [27] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS
    Mohammadi, Hossein
    Oskoee, Ehsan Nedaaee
    Afsharchi, Mohsen
    Yazdani, Nasser
    Sahimi, Muhammad
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
  • [28] Cluster Maintenance in Mobile Ad-hoc Networks
    Lan Wang
    Stephan Olariu
    Cluster Computing, 2005, 8 : 111 - 118
  • [29] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS
    Visu, P.
    Chembian, W. T.
    Koteeswaran, S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44
  • [30] Interference Criteria for Mobile Ad-Hoc Networks
    Boksiner, Jeffrey
    Posherstnik, Yuriy
    Yeager, Richard O.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1427 - 1432