An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks
|
|
- Karen Greer
- 7 years ago
- Views:
Transcription
1 Int'l Conf. Wireless Networks ICWN' An Efficient Crowdsourcing Search Scheme in Vehicular Ad hoc Networks Chyi-Ren Dow, Duc-Binh Nguyen, Zi-How Lin and Shiow-Fen Hwang Department of Information Engineering and Computer Science Feng Chia University, Taichung, Taiwan {crdow, p39568, m12313, and sfhwang Abstract In recent years, Vehicular Ad-hoc Networks (VANETs) have become a popular research field. In addition, conditions happened surrounding our life often have the demand to be supported by other people, and these conditions often occur on the road. This study proposes an efficient crowdsourcing search scheme in VANETs to search objects and collect data. Our proposed mechanism is based on the virtual backbone construction in VANETs. The regional data exchange can be limited, and the packet transmissions can be reduced. We have established coordinator and header mechanisms to manage the information of region nodes, reduce the amount of packet transmission and improve searching efficiency. Experimental results show that our schemes can effectively provide assistance in terms of search efficiency and satisfactory ratio. Keywords: VANETs, crowdsourcing, search scheme. I. INTRODUCTION Vehicular Ad-hoc Networks are emerging network architecture using wireless network technologies on the intelligent transportation systems (ITS) for mobile information communications. There are many VANETs applications, such as cooperative monitoring of traffic load, prevention and warning of vehicle collision, and location based services (LBS) combined with the nearby area information, etc. In addition, a model for problem solving is also developed with the Internet. Jeff Howe, a reporter of the Wired magazine has created a whole new jargon Crowdsourcing in 26. Enterprise organizations solicit a large number of volunteers to help them to gather information, provide ideas and solve problems about technical through the Internet. Volunteers usually complete tasks in their spare time and charge a small reward or not, but there may be some opportunities to get more rewards in the future. This solution provides a new way of organizing labors, especially for the software industry and the service industry. For example, Wikipedia [2] is an Internet encyclopedia, and everyone can participate in online editing. In the past, when people got off a taxi and forgot something in the car, it is not only hard to find the lost property but also wasting time, especially when they do not know the taxi fleet and license plate number. Currently, some taxi fleets and radio stations provide services to help people finding their missing property online. However, it is not immediate when the messages are broadcasted until the driver finds the lost property and returns it. In recent years, with the development of the Internet and the popularity of smart phones, people began to help each other through exchanging messages over the network such as looking for an accident escape, animal abusing, bullying and other cases. These Internet users can assist in finding suspects as long as they have enough information. In fact, the concept of the crowdsourcing already exists in our daily life. Crowdsourcing mechanisms have been widely applied in many fields since created, and there were many applications developed with sensors on smart phones and tablets. However, in VANETs with crowdsourcing, how to choose the crowd to assist the task and communicate effectively to the demand for them, and how to make proper filtering and screening to ensure the quality and accuracy of the returned data by the crowd, are important issues about crowdsourcing. In addition, the concept of traditional practice of distribution of demand and recovery of data is similar to the broadcast or multicast schemes. It is easy to generate large amounts of streaming data. The influence is perhaps not obvious because there is enough bandwidth in the wired network architecture, but it is a serious problem in VANETs with limited bandwidth. If we want to provide applications with effective crowdsourcing, we need to reduce the time of request spread and data recovery. Both are closely related to the amount of packet transmission. Anycast [1] is a method of information spreading on the network. Its concept is that if there is anyone who can provide the required services, they will be accepted after the demand spread. This method not only can reduce the amount of packet transmission, but also can choose appropriate service providers. Thus, anycast is more suitable for applications in bandwidth limited wireless network infrastructure compared with the broadcast scheme. Considering these issues, the application and technology of taxi based VANETs with a group structure and high density to find and track the target in a city are worth a discussion among us. Therefore, we propose an efficient crowdsourcing search scheme in VANETs. It is a distributed searching system based on virtual backbone and geography information
2 196 Int'l Conf. Wireless Networks ICWN'15 in VANETs. It uses vehicles on the backbone to play the role of crowd, and apportions the searching tasks to the crowd through crowdsourcing in VANETs. The information of vehicles is integrated and exchanged with headers via coordinators in a geographic grid [9]. When there are searching demands generated, our system will ask the coordinators first, and then forward the packet to headers and request vehicles to join the searching task. II. RELATED WORK The topic of data searching has been engaged in network research. Lakas et al. [8] proposed a hybrid cooperative through cooperating vehicles using the store-and-forward technique to share collected information. Noguchi et al. [14] proposed a location-aware service discovery scheme. It spreads service discovery messages to nodes inside a geographical area with IPv6 multicast. Some research schemes [6], [13] improved AODV to propose methods to optimize the route of discovery. Lo et al. [12] enabled vehicles to cooperatively aid the source node to discover the location of the destination node without the support of location services. The geographic load balancing routing, namely GLRV is deployed to provide a virtual backbone. GLRV can increase delivery ratio and reduce the transmission latency in hybrid VANETs architecture. How to process the distribution of a vast number of information from different locations is an important issue. Data aggregation technique aims to solve redundant or distributed data problem to improve the communication efficiency. Tal et al. [16] analyzed various solutions by using Fuzzy Logic in data aggregation schemes is suitable to get benefits in the development process of traffic systems that relies on these schemes. Zhang et al. [19] presented a hierarchical data aggregation scheme to reduce the transmitting of the redundant data which resulted from multisource data collecting and multi-path data transmitting. Traditional data aggregation methods usually rely on a fixed routing structure to ensure data to be aggregated. However, they cannot be used in highly mobile vehicle environments. Catch-Up [17] dynamically changed the forwarding speed of nearby reports so that they had a better chance to meet each other and be aggregated together. Dietzel et al. [4] proposed a generic model to describe and classify the proposed schemes. DA2RF [18] is an infrastructure-free data aggregation scheme by restricting forwarders to limit the number of forwarders in VANETs. In this way, transmission collisions can be avoided as much as possible. With the increasing popularity of smart phones in recent years, there are many studies using crowdsourcing techniques, including the sensing data collection, transportation issues, data accuracy, and other interesting applications. CrowdITS system [1] used the smart phones to collect sensing data without additional sensors and communication equipment and make improvements to traffic by collection of traffic information. CrowdOut [2] is based on contributions made by mobile users equipped with smart phones. It allows users to report traffic offense in real time and to map them on a city plan. There are systems sought volunteers to mine the disaster sensing dead space by crowdsourcing [3] and create a noise map in the urban environment through mobile phones with crowdsourcing [7]. Huang et al. [5] presented selection methods of automatic sensor based on crowdsourcing models for unattended acoustic sensor selection. Furthermore, passengers can also be an effective statistical evaluation of the traveling road conditions through the triaxial sensors in the phone [15]. Liu et al. [11] combined people and mobile sensing devices into a live wireless sensor. It uses this combination to remedy the traditional sensor blind, and also conforms the concept of crowdsourcing. III. THE PROPOSED SEARCHING METHOD In this section, we introduce our proposed searching mechanisms, including virtual backbone establishment of the tree searching architecture and the design of the crowdsourcing anycast query spreading mechanism. Then, we formulate crowdsourcing data filtering mechanisms. A. The Virtual Backbone of the Tree Searching Architecture Traffic could change very often with complex road structure in urban environments as time goes by different distances, directions and speed of the vehicle will cause the network topology changes and affect the stability of the chain. If the city roads are divided by geographic grids to establish a backbone tree, we can limit the area of data exchange of information and reduce unnecessary traffic packets to achieve fast and stable data transmission. Exchanging and maintaining the data table between important nodes in the backbone can simplify data storage and management. The data can be found more quickly, and the searching time can also be reduced with precise management. The vehicle stays in each geographic grid longest will be elected as a header to manage the information of other vehicles in the grid to reduce the packet number of switched data. Normally, the vehicle closest to the center of the grid will be elected as a coordinator. As shown in Figure 1,, where and are coordinates of the center, and are coordinates of the vehicles in the same grid. is the range of transmission to consider a vehicle as the header in the grid. As shown in Figure 1, we calculate the distance between each vehicle and the center, the header of the grid is D1 because it has the smallest distance. Headers within grids regularly gather information of vehicles in the same grid. As shown in Figure 2, the coordinator within the grid gathers information from adjacent grids in order to accelerate the speed of searching, but it will generate a lot of queries and return packets when there are too many coordinators. Therefore, development an appropriate number of coordinators is an important issue. As shown in Figure 3, considering the degree of branching of the tree and beginning with the smallest number of grids. If the degree of the header within the grid is greater than 2, it will be elected as the coordinator. Therefore, this step may lead to a coordinator
3 Int'l Conf. Wireless Networks ICWN' having too many nearby coordinators. For example, coordinator within grids 22 and 54 are superfluous, because there are too many coordinators. In order to avoid collecting unnecessary information from other paths, a coordinator is created every three hops. However, the coordinator cannot be established if it is located in the leaves of the tree (grids 2 and 58) to avoid excessive control overhead and reduce excess coordinators. Because grids 55 and 58 collect information on the same area, they will result in a large amount of duplicated information and redundant of transmission. B. The Crowdsourcing Anycast Query Spreading Mechanism Figure 1 Grid Header Election Figure 4 The Reply Table Figure 5 The Query Packet Figure 2 Coordinator Collection Figure 3 Coordinator Establishment The header or the coordinator within each grid maintains a reply table as shown in Figure 4 which contains detailed data fields of each informed object. Vehicles will periodically reply the information of board objects (such as lost and sensor data, etc.) to headers within grids, and forward the data to coordinators for management. When there is a task (object searching or data collection, etc.), our system will generate query packets as shown in Figure 5 to send to the nearby coordinator. These query packets contain the purpose of task (lost, target searching, data collection, etc.), content (including target characteristics, time, location, etc.). The coordinator receiving the query packet will be compared with the reply table, and then return to the source node. If the task needs to cooperate for finding the target, the header within the grid near the target area asks the vehicle within the grid for joining the task after receiving the query packet. When any vehicle responses content, the task starts. When the task is completed, the data will be returned by the header and coordinator. If there is no matching information, the coordinator passes the query packets to other coordinators through the adjacent headers within the grids, and they compare with the reply table. In order to maintain the
4 198 Int'l Conf. Wireless Networks ICWN'15 effectiveness of the searching mechanism, we have developed the threshold of searching time to avoid searching too long or endless searching. We will terminate searching and return results if time is over. Our crowdsourcing search mechanism is listed as follows: (1) Coordinators regularly update the reply form. (2) Source node generates a query packet, and delivers to coordinators for comparing data. In case of the data is matched, the coordinator returns to the source node. (3) If the data is not matching, the query packet will be passed to other coordinators for comparing data by neighbor headers. (4) After receive the query packet, the header of each neighbor will ask other vehicles if willing to assist or not. (5) The task starts when any vehicle responses content. (6) When the task completes, messages will be responded to the source node via headers and coordinators. (7) If searching time exceeds T search, the task will be terminated. C. The Filtering Mechanism Although we have designed the query packet format and reply mechanism to provide the format of returned data. However, getting the number of requirements from the return data is also a problem. Hence we need to formulate the filtering mechanism to deal with these situations. If we allow the transmitted of data to be collected together, it would cause a considerable burden for the network. Thus, we must filter redundant information through hierarchical steps to reduce traffic and leave useful information. We divide data filtering into three types. For the first type, the searching condition given from the source node to the coordinator is precision and the searching condition given from the coordinator to the header is fuzzy. By this way, we can reduce the difficulty of searching by vehicles and increase the number of data. The coordinator can filter those data returned by headers before passing to the source node. The second type) where conditions given from the source node, and the coordinator are both precise. It increases the difficulty of searching by vehicles but reduces the amount of data and reduces the load of networks. The third type represents the conditions given from the source node and the coordinators are both fuzzy, the data returned by vehicles will not be filtered by the coordinator, and the source node can select the information which one does it wants. When the new beginning data is received, our mechanisms allow the same information received within the time threshold T for maintaining accuracy and reliability of the information. The number of repetitions will be recorded into the reply table and form a credit value. The higher credit value represents the higher reliability of the data. Each cumulative data will get a survival time, T life after time T, and it is not allowed to accept the same data. When the time T life ends, the extra data will be discarded or replaced by new data. IV. EXPERIMENTAL RESULTS This section is carried to evaluate our proposed crowdsourcing search scheme. We use the version 2.35 of Network Simulator 2 (NS-2) as our simulator. The simulation vehicular movement mode is generated by Simulation of Urban Mobility (SUMO). As shown in Figure 6, we compare the control overhead with the time change. At the beginning, since the purpose of our method is to establish the backbone, the amount of control packets required will be greater than AODV and Geogrid. However, once the backbone structure and information forms contents are completed, the needed amount of control overhead will gradually stabilize. Control Overhead Success Rate Time (sec) Figure 6 Control Overhead vs. Time Distance (m) Figure 7 Successful Rate vs. Distance Ours AODV Geogrid AODV Geogrid Ours As shown in Figure 7, the success rate is compared to the change in distance. The range for distance is 5 to 25. The success rate of AODV decreases as the distance increases, because AODV always starts a new search. Therefore, the success rate will decrease when the distance increases. On the other hand, when Geogrid perform a search, every point is looking for the nearest coordinator for inquiries. Thus, the success rate obtained will display a stable status. In our method, every coordinator works together to maintain and
5 Int'l Conf. Wireless Networks ICWN' exchange the reply tables. This reduces the search time, which also raises the level of efficiency. In comparison, Geogrid can find the target more effectively. V. CONCLUSIONS In this study, we propose an effective crowdsourcing search scheme in VANETs. It can reduce the number of transmission packets through the establishment of coordinator and header, and provide crowdsourcing search of the query instead of blind searching. The proposed scheme not only improves the results of discovery, but also reduces dissemination time and reply time. Design of the table information can help to exchange all reply discoveries. As the future work, we intend to implement our crowdsourcing search scheme. However, not everyone is willing to participate in crowdsourcing tasks. Maybe we can combine incentives to promote the wishes of people, providing them with virtual or real currency. Furthermore, we will consider more methods for both data aggregation and data filtering in order to achieve more perfect results. ACKNOWLEDGMENT The authors would like to thank the Ministry of Science and Technology of the Republic of China for financially supporting this research under Contract No E REFERENCES [1] K. Ali, D. A. Yaseen, A. Ejaz, T. Javed and H. S. Hassanein, CrowdITS: Crowdsourcing in Intelligent Transportation Systems, Wireless Communications and Networking Conference, Paris, pp , Apr [2] E. Aubry, T. Silverston, A. Lahmadi and O. Festor, CrowdOut: A Mobile Crowdsourcing Service for Road Safety in Digital Cities, Pervasive Computing and Communications Workshops, Budapest, pp , Mar [3] E. T. Chu, Y. L. Chen, J. Y. Lin and J. W. S. Liu, Crowdsourcing Support System for Disaster Surveillance and Response, Symposium on Wireless Personal Multimedia Communications, Taipei, pp , Sep [4] S. Dietzel, J. Petit, F. Kargl and B. Scheuermann, In-Network Aggregation for Vehicular Ad Hoc Networks, Communications Surveys & Tutorials, Vol. PP, No. 99, pp.1, Apr [5] P. S. Huang, M. H. Johnson, Y. Wotao and T. S. Huang, Opportunistic Sensing: Unattended Acoustic Sensor Selection Using Crowdsourcing Models, IEEE International Workshop on Machine Learning for Signal Processing, Santander, pp. 1-6, Sep [6] F. Iqbal, M. I. K. Babar, M. H. Zafar and M. F. Zuhairi, I- AODV: Infrastructure Based Ad Hoc On-demand Distance Vector Routing Protocol for Vehicular Ad Hoc Networks, IEEE International Conference on Smart Instrumentation, Measurement and Applications, TBD Malaysia, pp. 1-5, Nov [7] S. S. Kanhere, Participatory Sensing: Crowdsourcing Data from Mobile Smartphones in Urban Spaces, IEEE International Conference on Mobile Data Management,Lulea, pp. 3-6, Jun [8] A. Lakas, M. A. Serhani and M. Boulmalf, A Hybrid Cooperative Service Discovery Scheme for Mobile Services in VANET, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Wuhan, pp , Oct [9] Y. H. Lee, C. R. Dow, L. H. Huang, Y. C. Lin, S. F. Hwang and W. B. Lee, An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc Networks, Ninth International Conference on Information Technology: New Generations, Nevada, pp , Apr [1] P. J. Lin, C. R. Dow, S. C. Chen, C. J. Li and S. F. Hwang, An Efficient Anycast Scheme for Discovering K Services in Mobile Ad-hoc Networks, The 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, Vancouver, pp , Oct. 28. [11] J. W. S. Liu, E. T. H. Chu and P. H. Tsai, Fusing Human Sensor and Physical Sensor Data, IEEE International Conference on Service-Oriented Computing and Applications,Taipei, pp. 1-5, Dec [12] C. C. Lo, J. W. Lee, C. H. Lin, M. F. Horng and Y. H. Kuo, A Cooperative Destination Discovery Scheme to Support Adaptive Routing in VANETs, IEEE Vehicular Networking Conference, New Jersey, pp.22-28, Dec. 21. [13] H. Maowad and E. Shaaban, Efficient Routing Protocol for Vehicular Ad Hoc Networks, IEEE International Conference on Networking, Sensing and Control, Beijing, pp , Apr [14] S. Noguchi, M. Tsukada, T. Ernst, A. Inomata and K. Fujikawa, Location-aware Service Discovery on IPv6 GeoNetworking for VANET, International Conference on ITS Telecommunications, Petersburg, pp , Aug [15] C. Song, J. Wu, M. Liu, H. Gong and B. Gou, RESen: Sensing and Evaluating the Riding Experience Based on Crowdsourcing by Smart Phones, 8 th International Conference on Mobile Ad-hoc and Sensor Networks, Chengdu, pp , Dec [16] I. Tal and G. Muntean, Using Fuzzy Logic for Data Aggregation in Vehicular Networks, Distributed Simulation and Real Time Applications, Dublin, pp , Oct [17] B. Yu, C. Z. Xu and M. Guo, Adaptive Forwarding Delay Control for VANET Data Aggregation, Parallel and Distributed Systems, Vol. 23, No. 1, pp , Jan [18] Y. Yuan, J. Luo, W. Yan, T. Zhao and S. Lu, DA2RF: A Data Aggregation Algorithm by Restricting Forwarders for VANETs, Computing, Networking and Communications, Anaheim, pp , Feb [19] L. Zhang and B. Jin, QoS-Oriented Data Dissemination in VANETs, Parallel and Distributed Processing Symposium Workshops & PhD Forum, Shanghai, pp.21-25, May 212. [2] Wikipedia.
Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks Jeongcheol Lee, Euisin
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationLoad-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationAchieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
More informationPosition and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationPerformance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas
I.J.Computer Network and Information Security, 21, 2, 26-32 Published Online December 21 in MECS (http://www.mecs-press.org/) Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationFigure 1. The Example of ZigBee AODV Algorithm
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
More informationOptimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
More informationAnalysis on Leveraging social networks for p2p content-based file sharing in disconnected manets
Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor
More informationImprovisation of The Quality Of Service In ZigBee Cluster Tree Network
Improvisation of The Quality Of Service In ZigBee Cluster Tree Network Trupti Satavse, Vijyalaxmi Kadrolli Information Technology Terna College of Engineering Nerul, Navi-Mumbai, India Trupti1814@gmail.com
More informationFormal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
More informationA Novel Approach for Load Balancing In Heterogeneous Cellular Network
A Novel Approach for Load Balancing In Heterogeneous Cellular Network Bittu Ann Mathew1, Sumy Joseph2 PG Scholar, Dept of Computer Science, Amal Jyothi College of Engineering, Kanjirappally, Kerala, India1
More informationContinuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information
Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering
More informationA Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationA UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationA Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications
A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications Ahmed Abada Dept. of Systems and Computer Engineering Carleton University Ottawa, ON, Canada Li Cui Institute of Computing
More informationTraffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg
More informationStudent, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationForced Low latency Handoff in Mobile Cellular Data Networks
Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir
More informationLocation Information Services in Mobile Ad Hoc Networks
Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent
More informationISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
More informationA Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
More informationRemote Home Security System Based on Wireless Sensor Network Using NS2
Remote Home Security System Based on Wireless Sensor Network Using NS2 #Rajesh Banala 1, Asst.Professor,E-mail: rajesh.banal@gmail.com #D.Upender 2, Asst.Professor, E mail: upender584@gmail.com #Department
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationCluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network
International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationIntelligent transportation systems: Past, present and look to future by using Grid technology
Intelligent transportation systems: Past, present and look to future by using Grid technology Behin Alipour Islamic Azad University of Tabriz Alipour_behin@yahoo.com Abstract Existing technologies in ITS
More informationRoad-Based Routing Protocol for Vanet Using Sumo and Move
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Road-Based Routing Protocol for Vanet Using Sumo and Move Devipriya. D 1 and Muruganandam.A
More informationTowards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
More informationSimulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2
Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2 Sulaiman Khalifa Yakhlef, Ismail Shrena, Nasaraldian Ambark Shashoa Azzaytuna University, Faculty of Engineering Tarhuna
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationControl overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks
Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks Dr.G.Mary Jansi Rani Professor / Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering
More informationINTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-
ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationOptimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
More informationIntelligent Transportation System for Vehicular Ad-Hoc Networks
Intelligent Transportation System for Vehicular Ad-Hoc Networks T. Sujitha 1, S. Punitha Devi 2 1,2 Department of CSE, P.A College of Engineering and Technology, Coimbatore, Tamilnadu Abstract - Vehicular
More informationMobile Tracking and Resource Reservation Scheme for Cellular Networks
Mobile Tracking and Resource Reservation Scheme for Cellular Networks Subbiah Shenbagaraman, B. Prabhakaran, S. Venkatesan Department of Computer Science, University of Texas at Dallas, Richardson, USA,
More informationDynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network
Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationEfficient Discovery of Internet Gateways in Future Vehicular Communication Systems
Efficient Discovery of Internet Gateways in Future Vehicular Communication Systems Marc Bechler, Lars Wolf Technical University of Brunswick, Germany Email: [bechler, wolf]@ibr.cs.tu-bs.de Oliver Storz
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationPerformance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
More informationEnergy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks
Energy Efficient and Improved Certificate Revocation Technique for Mobile Ad Hoc Networks Navyasree Veeramallu M.Tech DECS Gudlavalleru Engineering College Gudlavalleru- 521356, Krishna District, Andhra
More informationA Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
More informationA Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 dayanads@rediffmail.com
More informationOptimized Load Balancing Mechanism Using Carry Forward Distance
Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,
More informationNetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationPerformance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks
I.J. Information Technology and Computer Science, 2,, 4-46 Published Online November 2 in MECS (http://www.mecs-press.org/) Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks
More informationPerformance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions
Performance Evaluation of VANETs with Multiple Car Crashes in Different Traffic Conditions Georgios Charalampopoulos 1,2 and Tasos Dagiuklas 1 1. Dept. of Computer Science, Hellenic Open University, Greece,
More informationISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationHybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
More informationECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)
ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) Yao, Yanjun 1 Papers Real-time Power-Aware Routing in Sensor Networks Real-Time Traffic Management in Sensor
More informationEnergy Consumption analysis under Random Mobility Model
DOI: 10.7763/IPEDR. 2012. V49. 24 Energy Consumption analysis under Random Mobility Model Tong Wang a,b, ChuanHe Huang a a School of Computer, Wuhan University Wuhan 430072, China b Department of Network
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on
More information3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
More informationA Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
More informationA SURVEY OF MOBILITY MANAGEMENT PROTOCOLS
A SURVEY OF MOBILITY MANAGEMENT PROTOCOLS Wei Siang Hoh, Sashikumar Muthut, Bi-Lynn Ong, Mohamed Elshaikh, Mohd Nazri Mohd Warip and R. Badlishah Ahmad School of Computer and Communication Engineering,
More informationLocation-Aided Routing (LAR) in mobile ad hoc networks
Location-Aided Routing (LAR) in mobile ad hoc networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA 2000 Abstract A mobile
More informationRobust Routing in Wireless Ad Hoc Networks
Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract
More informationDAG based In-Network Aggregation for Sensor Network Monitoring
DAG based In-Network Aggregation for Sensor Network Monitoring Shinji Motegi, Kiyohito Yoshihara and Hiroki Horiuchi KDDI R&D Laboratories Inc. {motegi, yosshy, hr-horiuchi}@kddilabs.jp Abstract Wireless
More informationSIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationA Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification
A Routing Algorithm Designed for Wireless Sensor Networks: Balanced Load-Latency Convergecast Tree with Dynamic Modification Sheng-Cong Hu r00631036@ntu.edu.tw Jen-Hou Liu r99631038@ntu.edu.tw Min-Sheng
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationMultimedia Data Transmission over Wired/Wireless Networks
Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu
More informationSuganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo.
gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. ) Most Efficient Multicast structure for Wireless Mesh Networks Suganya D Computer Science and Engineering,
More informationIII. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S ramya_88@yahoo.com, k shobsi@yahoo.co.in,thangam_85@yahoo.com Department of Computer Science,
More informationBandwidth Management Framework for Multicasting in Wireless Mesh Networks
Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.
More informationPREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL
PREVENTION OF DENIAL OF SERVICE ATTACK ON DYNAMIC SOURCE ROUTINGVANET PROTOCOL Komal Rani 1, Meenakshi 2 1 M.Tech Scholar, Central University of Punjab er.komrani@gmail.com 2 Centre for computer science
More informationAn Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework
An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationRouting and Transport in Wireless Sensor Networks
Routing and Transport in Wireless Sensor Networks Ibrahim Matta (matta@bu.edu) Niky Riga (inki@bu.edu) Georgios Smaragdakis (gsmaragd@bu.edu) Wei Li (wli@bu.edu) Vijay Erramilli (evijay@bu.edu) References
More informationLoad Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation
Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,
More informationOn the Potential of Network Coding for Cooperative Awareness in Vehicular Networks
On the Potential of Network Coding for Cooperative Awareness in Vehicular Networks Miguel Sepulcre, Javier Gozalvez, Jose Ramon Gisbert UWICORE, Ubiquitous Wireless Communications Research Laboratory,
More informationUsing SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network
Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network Shih-yi Chiu Graduate Inst. of Networking and Communication Eng. Chao Yang Univ. of Tech., Taichung, Taiwan s9430605@cyut.edu.tw
More informationIntroduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
More informationTechnology Longowal, Punjab, India
An Intrusion Detection System Against Multiple Blackhole Attacks In Ad-Hoc Networks Using Wireless Antnet Sunny Chanday 1, Rajeev Kumar 2, Dilip Kumar 3 1 M.Tech student, Department of Computer Science
More informationIsolines: Energy-efficient Mapping in Sensor Networks
Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract
More informationPERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1
More informationCongestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks
Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks Ken Tang * Katia Obraczka + Sung-Ju Lee^ Mario Gerla * * Computer Science Department, University of California, Los
More information