SlideShare a Scribd company logo
1 of 13
Toward Secure and Efficient Peer-
to-Peer Voice over IP
Communication in Large-scale
Hierarchical Mobile Ad Hoc
Networks
By
Kashif Kashif
Kashif.namal@gmail.com
University of Camerino Italy
Mobile Ad Hoc Network
โ€ข Formed by Mobile Host which may use Mobile
without using pre exisiting infratucture
โ€ข Routes between Nodes may Contain Multiple
Hopsor
โ€ข Decrease Dependence on infrastucture
โ€ข Use for miltary Operations
Layers
Peer-to-Peer (P2P) Voice-over-Internet
Protocol (VoIP)
โ€ข Protocols are a logical choice
โ€ข MANET is also inherently a P2P network
where each node moves from one place to
another independently, joins and leaves the
network as it wishes.
Peer-to-Peer (P2P) Voice-over-Internet
Protocol (VoIP)
P2P VoIP uses a distributed hash table (DHT) for
routing among the nodes
โ€ข Hierarchical topology consisting of cluster heads
that form the backbone of the MANET
โ€ข Cluster head controls a set of ordinary nodes
that form an access MANET network
โ€ข MANET uses a broadcast-based MANET physical
routing protocol
โ€ข We will use P2P Session Initiation Protocol (P2P-
SIP) defined in RFCs 5694 and 6940,
P2P in Military
โ€ข We propose to study two important aspects
of deploying P2P-SIP over MANETs
โ€ข security and efficiency (routing optimization).
Security
โ€ข In client/server model, the storage is
distributed in P2P networks
โ€ข Need to prevent storage and retrieval attacks
โ€ข In Store malicious peer may refuse to store the
data(store data but delete it later or
communication)
โ€ข Coordinate attacks with other peers
โ€ข P2P-SIP, the SIP protocol requires a
distributed registry service, implemented
Security
โ€ข Using a lightweight PKI infrastructure: assuming
nodes require some sort of pre-authorization to
join the P2P network. ( X.509 certificates)
โ€ข Trust-on-First-Use
โ€ข Replication of messages can help ensure correct
routing in the presence of uncooperative or
malicious nodes.
โ€ข Replication of data storage can also help deal
with storage and retrieval attacks,
Security
โ€ข Resistance to storage/retrieval attacks can be
viewed as a case of requiring an agreement in
a completely decentralized manner in the
presence of malicious and uncooperative
nodes, and is known as the Byzantine
Generals problem
Routing Optimization
In overlay networks such as P2P-SIP, peers establish a
logical topology at the application layer and communicate
based on this logical topology
โ€ข These logical connections are then mapped onto the
underlying physical topology and messages are routed
by the routing mechanism deployed at the network
layer
โ€ข If these two layers each independently operate from
one another the Result is poor.
โ€ข This is particularly true in MANETs, where the wireless
links that establish the physical topology have limited
bandwidth.
Approach to P2P
โ€ข We will utilize a cross-layer design
โ€ข P2P overlays need to know about the status of the
underlay/physical network (help to reducing the
maintenance o
โ€ข MANET algorithms should also be aware of the P2P
overlay in order to maintain the appropriate
connections with relevant neighbouring overlay nodes
overhead).
โ€ข Could be achieved either by having the application
layer and network layer exchange information within a
node or by integrating the P2P algorithms
Cluster head knowing
There are Multiple MANETs exist, running their
own internal routing protocol. Each MANET
elects a cluster head, and connectivity is
provided among the MANETs by organizing the
clusterheads in a P2P network
โ€ข Nodes are free to move and new networks can
join and leave, without the need for a
fixed/centralized network infrastructure.
Tool to Implement P2P
OMNeT++
โ€ข Component-based C++ simulation library and
framework
โ€ข Open Source wired, wireless and mobile
networks, and OverSim
โ€ข INET provides the basic protocols and
capabilities to simulate MANETs

More Related Content

What's hot

Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
Kunal Prajapati
ย 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
skobu
ย 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
Iftach Ian Amit
ย 

What's hot (20)

Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
ย 
Centralized System in MANET with GRP Protocol
Centralized System in MANET with GRP ProtocolCentralized System in MANET with GRP Protocol
Centralized System in MANET with GRP Protocol
ย 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
ย 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
ย 
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
IEEE 802.11s Tutorial - Overview of the Amendment for Wireless Local Area Mes...
ย 
MobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH NetworksMobiMESH: Introduction to Wireless MESH Networks
MobiMESH: Introduction to Wireless MESH Networks
ย 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
ย 
Manet
ManetManet
Manet
ย 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
ย 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
ย 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
ย 
wormhole attacks in wireless networks
wormhole attacks in wireless networkswormhole attacks in wireless networks
wormhole attacks in wireless networks
ย 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
ย 
Mesh network presentation
Mesh network presentationMesh network presentation
Mesh network presentation
ย 
Protocol manet
Protocol manetProtocol manet
Protocol manet
ย 
Adhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-RagavanAdhoc & WSN-Unit-I-Ragavan
Adhoc & WSN-Unit-I-Ragavan
ย 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
ย 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
ย 
Practical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsPractical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their Applications
ย 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
ย 

Viewers also liked

Viewers also liked (12)

Big data presentation for University of Reykjavik, Iceland, March 22
Big data presentation for University of Reykjavik, Iceland, March 22 Big data presentation for University of Reykjavik, Iceland, March 22
Big data presentation for University of Reykjavik, Iceland, March 22
ย 
Process mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.comProcess mining approaches kashif.namal@gmail.com
Process mining approaches kashif.namal@gmail.com
ย 
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.comMcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
Mcrl2 by kashif.namal@gmail.com, adnanskyousafzai@gmail.com
ย 
Process Mining For Customer Support
Process Mining For Customer SupportProcess Mining For Customer Support
Process Mining For Customer Support
ย 
Process Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance CheckingProcess Mining - Chapter 7 - Conformance Checking
Process Mining - Chapter 7 - Conformance Checking
ย 
Modello unitร  di apprendimento ub d fase 3
Modello unitร  di apprendimento ub d fase 3Modello unitร  di apprendimento ub d fase 3
Modello unitร  di apprendimento ub d fase 3
ย 
Junta del 4 bimestre
Junta del 4 bimestreJunta del 4 bimestre
Junta del 4 bimestre
ย 
3Com 69-000205-06
3Com 69-000205-063Com 69-000205-06
3Com 69-000205-06
ย 
Political alert house of representatives daily program, tuesday 21 march 2017
Political alert   house of representatives daily program, tuesday 21 march 2017Political alert   house of representatives daily program, tuesday 21 march 2017
Political alert house of representatives daily program, tuesday 21 march 2017
ย 
anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters anguilla catamaran charters /anguilla boat charters
anguilla catamaran charters /anguilla boat charters
ย 
Jess presentation1
Jess presentation1Jess presentation1
Jess presentation1
ย 
Desenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimirDesenhos para pano de prato para imprimir
Desenhos para pano de prato para imprimir
ย 

Similar to Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks

Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
DhruvilSTATUS
ย 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
krishna683602
ย 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
ssuser036308
ย 

Similar to Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks (20)

Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
ย 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
ย 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
ย 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
ย 
Network protocol
Network protocolNetwork protocol
Network protocol
ย 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
ย 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
ย 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
ย 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
ย 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
ย 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
ย 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
ย 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
ย 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
ย 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
ย 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
ย 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
ย 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
ย 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
ย 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
ย 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
KreezheaRecto
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 

Recently uploaded (20)

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
ย 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
ย 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 

Toward Secure and Efficient Peer-to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks

  • 1. Toward Secure and Efficient Peer- to-Peer Voice over IP Communication in Large-scale Hierarchical Mobile Ad Hoc Networks By Kashif Kashif Kashif.namal@gmail.com University of Camerino Italy
  • 2. Mobile Ad Hoc Network โ€ข Formed by Mobile Host which may use Mobile without using pre exisiting infratucture โ€ข Routes between Nodes may Contain Multiple Hopsor โ€ข Decrease Dependence on infrastucture โ€ข Use for miltary Operations
  • 4. Peer-to-Peer (P2P) Voice-over-Internet Protocol (VoIP) โ€ข Protocols are a logical choice โ€ข MANET is also inherently a P2P network where each node moves from one place to another independently, joins and leaves the network as it wishes.
  • 5. Peer-to-Peer (P2P) Voice-over-Internet Protocol (VoIP) P2P VoIP uses a distributed hash table (DHT) for routing among the nodes โ€ข Hierarchical topology consisting of cluster heads that form the backbone of the MANET โ€ข Cluster head controls a set of ordinary nodes that form an access MANET network โ€ข MANET uses a broadcast-based MANET physical routing protocol โ€ข We will use P2P Session Initiation Protocol (P2P- SIP) defined in RFCs 5694 and 6940,
  • 6. P2P in Military โ€ข We propose to study two important aspects of deploying P2P-SIP over MANETs โ€ข security and efficiency (routing optimization).
  • 7. Security โ€ข In client/server model, the storage is distributed in P2P networks โ€ข Need to prevent storage and retrieval attacks โ€ข In Store malicious peer may refuse to store the data(store data but delete it later or communication) โ€ข Coordinate attacks with other peers โ€ข P2P-SIP, the SIP protocol requires a distributed registry service, implemented
  • 8. Security โ€ข Using a lightweight PKI infrastructure: assuming nodes require some sort of pre-authorization to join the P2P network. ( X.509 certificates) โ€ข Trust-on-First-Use โ€ข Replication of messages can help ensure correct routing in the presence of uncooperative or malicious nodes. โ€ข Replication of data storage can also help deal with storage and retrieval attacks,
  • 9. Security โ€ข Resistance to storage/retrieval attacks can be viewed as a case of requiring an agreement in a completely decentralized manner in the presence of malicious and uncooperative nodes, and is known as the Byzantine Generals problem
  • 10. Routing Optimization In overlay networks such as P2P-SIP, peers establish a logical topology at the application layer and communicate based on this logical topology โ€ข These logical connections are then mapped onto the underlying physical topology and messages are routed by the routing mechanism deployed at the network layer โ€ข If these two layers each independently operate from one another the Result is poor. โ€ข This is particularly true in MANETs, where the wireless links that establish the physical topology have limited bandwidth.
  • 11. Approach to P2P โ€ข We will utilize a cross-layer design โ€ข P2P overlays need to know about the status of the underlay/physical network (help to reducing the maintenance o โ€ข MANET algorithms should also be aware of the P2P overlay in order to maintain the appropriate connections with relevant neighbouring overlay nodes overhead). โ€ข Could be achieved either by having the application layer and network layer exchange information within a node or by integrating the P2P algorithms
  • 12. Cluster head knowing There are Multiple MANETs exist, running their own internal routing protocol. Each MANET elects a cluster head, and connectivity is provided among the MANETs by organizing the clusterheads in a P2P network โ€ข Nodes are free to move and new networks can join and leave, without the need for a fixed/centralized network infrastructure.
  • 13. Tool to Implement P2P OMNeT++ โ€ข Component-based C++ simulation library and framework โ€ข Open Source wired, wireless and mobile networks, and OverSim โ€ข INET provides the basic protocols and capabilities to simulate MANETs