Techniques about Data Replication for Mobile Ad-hoc Network Databases

Size: px
Start display at page:

Download "Techniques about Data Replication for Mobile Ad-hoc Network Databases"

Transcription

1 Techniques about Data Replication for Mobile Ad-hoc Network Databases Rashid Azeem and Muhammad Ishfaq Ahmad Khan Director of Institute of Computer Management Sciences (ICMS), Pakistan Abstract Mobile Ad-hoc Network (MANET) is a Network, which permit Mobile Servers and Clients to commune in lack of a permanent Infrastructure. MANET is a rapid and rising region of study as it discover utilize a diversity of applications, in turn to make possible well-organized Information access and bring up to date, Databases are arranged on MANETs. Such Databases, which function on MANETs, are passed on to MANET Databases. Since Mobility and Power constrain of the Server and Client influence Data accessibility in MANETs, Data in MANET are replicated. Numeral of Data Replication techniques has been projected for MANET Databases. This scheme recognizes topics drawn in MANETs Data Replication and tries to categorize presented MANET Data Replication techniques found on problems they deal with limitation and presentation. Additionally, this paper also suggest criterion for choosing suitable Data Replication techniques for a variety of applications requirements in conclusion, the document end with a argument on future research directions. Keywords Data Replication, Techniques, Applications and Databases A I. INTRODUCTION s Data accessibility in a MANETs is influenced by Mobility and Power constrain of the Servers and Clients, Data in MANETS be replicated. The IEEE 802 Standards is devoted to the structure of MANs and LANs. Eminent component of this grouping are the IEEE and the now almost over and done however the majority of the rising Standards in this family arrangement with Networking over the wireless medium [1]. The , of which Blue tooth is part of, are planned to communicate private procedure over a small area Wireless personal area Network (WPAN). For the making of the Wireless corresponding of a LAN (i.e. a Wireless Local Area Network or WLAN), the IEEE planned the 8o2.11 standard; while the (WImax) take in hand the difficulty of city area Network or Wireless Metropolitan area Network (WMAN). Those 3 Standards have in familiar the detail, which they are powerfully support on some type of communication. In a Wireless Personal Area Network (WPAN) - a master device focuses the entire interchange. For a WLAN, the access point shows a vital task, by relay the entire traffics among contributing Wireless. Moreover, finally, WImax is as well communication bound, its central Nodes is a controlling and practical base station, Although still simple to organize when evaluate to there wired corresponding item, those equipment are not practical in situation where no communication at all is accessible, e.g., is a tragedy region where a normal disaster or fanatic bother entirely damaged some communication. Although here is a great deal of further frequent situation wherever communication- open Network be desirable. The rising and cost-effectively test area wherever no reserves survive to put together or preserve an operational communication. A no communication or Ad-hoc Network may be the influential digital addition device desirable to lessen deficiency by way of expanding right to use to Information and learning stuffing. An Ad-hoc Network is a self-forming, self-configuring Network, which allots some communication, even an access point. In such a Network a Nodes is capable to correspond with several additional Nodes inside collection and as well by Nodes out of instantaneous radio range. To execute the later, an Ad-hoc Network depends on the Nodes to communicate traffics for benefit of other Nodes an additional significant class of Multihopes Nodes Networks is in general call Mesh Networks. In a Mesh Networks a few of the Nodes are devoted to the advance of traffics of the other Nodes form a Nodes backhaul, which might be, measured its communication". A review of such methods is able to initiate in [2] and an explanation of the routing protocols and metrics characteristically use is able to be establishing in [3]. The 1 st Multi-hopes Wireless Networks used layer 3 method to communicate packet starting the resource to the target and even though Network layer implementing are still Common in Ad hoc Networks, there are current pains to include the lost Multihope abilities in 3 abovementioned IEEE Wireless tools. This lecture present the suggestion of a Mesh Networks with 8o2.11 devices - a goal being follow through the IEEE 8o2.11 Task Group s", namely IEEE 8o2.11s [4], [5], [6]. It is become aware of which for this IEEE task group the expressions Mesh and ad hoc are exchangeable. The major help of this tutorial are a thorough explanation of a number of secrete of the upcoming standard and a step by-step study of genuine Multihope MAC traffics, in addition to the importance of pros and cons of the layer 2 over the layer 3 approach to the Wireless Multihopes Networks [7] private and public Networkers looking to buy (WLAN) Wireless and local area Network. Numerous products are conventional to 8o2.11a, 8o2.11b, 8o2.11g, or8o2.11n Wireless Standards jointly identified as Wi-Fi technology. Moreover, Blue tooth and a variety of additional non Wi-Fi technologies as well exist, each one as well planned for detailed Networking functions MANET is a group of Wireless independent nodes, which shift randomly, [ISSN: ] 53

2 form a provisional network with no permanent infrastructure [8]. Each and every Node in MANETS is Mobile and, therefore, limited through Power. These Nodes not merely can correspond with Nodes, which is surrounded by their communication choices, however also can communicate with Nodes, which is exterior, their communication range by means of multihop communication. As no permanent Infrastructure is necessary, they fit fine in military, rescue actions and sensor Networks [9]. Furthermore a lot of applications in this situations are time dependant and, therefore, their connections be supposed to be perform not simply appropriately, however as well contained by their time limits. In a Distributed Database System, Data is repeatedly replicated to get better consistency and accessibility. Though one significant subject to be measured as replicating Data is the accuracy of the Replicated Data. As Nodes in MANETS are Mobile and contain some degree of Power, disentanglement might happen often, cause a group of Network separation. Mobile hosts cannot access data, which is obtainable in Mobile hosts in one division in another detachment. The subject connected to Data Replication in MANETS Databases is as. Server Power Consumption: Servers in MANETS run on battery Power. If Servers have a small Power remains and if it replicated with numerous often-contact Data objects, then the numerous Data access requests for these hot Data will consume its Power. Server Mobility: Because of its Mobility, Servers may from time to time shift to a position where they might not be getting in touch with by any other Servers or Clients. Client Mobility: Client which inquiry Servers for Information is as well Mobile. Clients more often than not launch their contacts to the adjacent Servers to obtain a rapid reaction. The choice to Replicate Data substance at exacting Servers might be found on the way in frequencies of Data matter from those precise Servers. Therefore, the judgment to Replicate Data stuff at suitable Servers has to be dynamic and found on the current Network topology Client Power: Clients in MANETS also run on battery Power. If Clients stay excessively extended for its communications fallout, it may drop its Power quickly. The Replication technique ought to be capable to Replicate Data matter at suitable Servers in such a way that a Client may be capable to contact its demanded Data substances from its adjacent Server, which has the smallest amount workload. Time Critical Applications: Numerous MANET applications, like rescue Networks, military processes, are time dependant. Data Replication is supposed to be used to progress Data ease of access and performance of the System, thus falling the time to perform communications. Dealings with short time limit ought to be sent to the nearest Server, which contain the smallest amount workload for their implementation. These communications be supposed to be carry out previous to other Transactions, which have longer time limit. Not even a single existing Replication technique believe every of the above subject. In this paper, we talk about this technique and its presentation assessment in specific. Partition and Network division is a severe difficulty in MANETS as Server in one division which hold necessary Data items cannot provide services too their Clients and Servers in dissimilar separations [10]. II. CLASSIFICATION OF PRESENT DATA Replication techniques: Following from the discussion of the matters, which can concern Replication in MANET Databases, we can recognize the matters in Real-time necessities of applications and Network division as 3 of the significant matters to be measured in the plan of a Data Replication technique for MANETs. At the same time as these matters are also connected to usual Networks, they turn into further rigorous in MANETs. As MANETs permits for Mobility of Servers and Clients, Network failure and division happen regularly in MANETs.Power breakdown as well happen normally in MANETs because of the inadequate battery capability of Mobile Wireless. These happening extend transaction implementation time due to inaccessibility of distant devices. Moreover, MANET is normally organized for time dependent applications; therefore, allow the implementation of transactions earlier than the expiration of their time limit. Therefore, these matters (power utilization, real-time necessities of applications and Network division) ought to be measured when scheming a Replication technique for MANETS Databases. Found on these MANETs Data Replication matters, we can describe the following. Power conscious techniques obtain into account the Power utilization of Clients and Servers. Replication techniques, which sustain transactions contain time limit and make an effort to reduce the amount of transactions, which miss their time limit, are described as real time-aware technique. Replication techniques, which expect the happening of Network partition and Replicate Data matter, consequently in advance of time are describes as partition-aware techniques. A perfect Replication approach for MANETs would be Power-aware, real time aware plus partition-aware. The presented Data Replication techniques can be classified into 5 classes depends on dissimilar arrangements of the aforementioned criterion. Non-power aware non real time aware and non-partition aware techniques are evaluated in section III. Power aware, non real time aware and non-partition aware techniques are evaluated in section IV, while Power aware, real time aware and non partition aware techniques are evaluated in section V. Non Power aware, on real time aware and partition aware techniques are evaluated in section VI, followed by Power aware, on real time aware and partition aware techniques are evaluated in section VII. III. NON-POWER AWARE, NON REAL TIME AWARE AND NON-PARTITION AWARE TECHNIQUES Techniques, which focus on refining Data convenience in MANETS Databases, however do not address the matters connected to Client and Server Power, real-time transactions and network partition, are called Non Power aware, non real [ISSN: ] 54

3 time aware and non-partition aware techniques. These techniques are explained in this section. Information dissemination in partition-able: MANETs [11] Karumanchi et al. [11] suppose a situation of regular bring up to date transactions and replication on every server. It believes architecture, which consists of Server that perform as peers (which communicate with each other) and Client, which question the Server for Data, which they need. Each Client informs its existing position and state to every other Server. This is completed to allow each Server to recover the most recent position Information of all Servers. The Update Information is spread in such a means that Nodes Query this Update information to get nearly all-current Data, thus dropping irregularity and dirty read transactions. Each Node 1 st decides the instance to send the Update Information. After deciding when to update, each Nodes then decide where to send these Updates and which Nodes to inquiry for the Information in such a way which it lessen the contact of Network partitioning. It utilizes a difference of a Quorumdepend method. Particular set of Server S, a Quorum is a set of m cross subsets which entirely make S. This technique is targeted for applications where imprecision is chosen to no Information at all. Therefore, it permits dirty read transactions to be implemented. It challenge to address the two matters concerned in Information distribution in MANETS, when to send Updates and where to send Update and Query transactions. When to send updates? Four special approaches, which decide the time to send Updates, were proposed: Time depend strategy Time depend and location depend strategy Absolute connectivity depend strategy Percentage connectivity depend strategy Where to send update and query transactions? All nodes x keep a list of Nodes which it cannot attain. These Nodes are accumulate in a Data arrangement called DQL (x) the disqualified file for x. Nodes in DQL (x) are from time to time detached after a definite period of time called the disqualification period. Nodes x 1st pick a Quorum (assume S 1 ) and after that sends its Update ask for every Server in which quorum. Every server, which do not respond to x (denoted as S 1 1 ) supplementary to DQL (x). Now an additional Nodes y may question the similar Data item from a dissimilar quorum (assume S 2 ). Various Servers (denoted as S21) may not be capable to respond as they may be in a dissimilar panel. There will be at least one regular Server among the 2 Quorums S 1 and S 2, however there may not be a general Server among (S 1 - S 1 1 ) and (S 2 = S 2 1 ) When there is no Common Server among the Updated Quorum and the Quorum in which the data are read, the Query may finish up with a dirty read operation. Therefore, the 3 following techniques were projected to decrease dirty reads. 3.1 Select then eliminate (STE) Eliminate then select (ETS) 3.2 Effective replica allocation in ad hoc Networks for improving Data accessibility Static access frequency (SAF) Dynamic access frequency and neighborhood (DAFN) Dynamic connectivity depend grouping (DCG) 3.3 Replica allocation with Data Update Maximizing the number of successful access requests. Reducing the rate of reading dirty items 3.4 Replica allocation for correlated data item 3.5 REDMAN, a decentralized middle ware solution for cooperative Replication in dense MANETS Replica Distribution Replica retrieval Replication degree maintenance 3.6 Replica Distribution methods considering the location of Mobile hosts in Wireless ad hoc Networks Skip copy (SC) method Data access Replica relocation Replica Update IV. POWER AWARE, NON REAL TIME AWARE AND NON PARTITION AWARE TECHNIQUES As Nodes in a MANETS are Mobile, it might not be achievable for them to chare their batteries when necessary. Due to its insufficient battery competence of Mobile hosts, Power is greatly desirable source in MANETs, which ought to be preserved as much as achievable. Therefore, a fine Replication technique ought to be capable to lessen the Power consumption of the Mobile hosts in the Network. Replication techniques, which believe simply the Client and Server Power limitation, are referred to as Power aware, non real time aware and non-partition aware techniques. Energy-efficient replication extended database state machine in MANETs. Probabilistic quorum systems V. POWER AWARE, REAL TIME AWARE AND NON- PARTITION AWARE TECHNIQUES Power on both Clients and Servers in a MANET is insufficient, as discuss in Sect. 2. Replication techniques, which address equally Servers and Clients Power limitation in accumulation to Real time restriction, however do not address the matter of Network Partitioning are called Power aware, real time aware and non-partition aware techniques. To decrease Power expenditure, a fine Replication technique ought to lessen communication messages among a variety of Mobile hosts. It ought to dispense and stable the workload of Servers in order to avoid the circumstances in which simply a small number of Servers carry out every transaction requirements and run out of Power, while the remaining of the Servers stay idle. In addition, to address the necessities of real-time applications, the Replication technique must get better Data accessibility for transaction implementation in an appropriate way. We have recognized one technique, which fit in, in this classification. [ISSN: ] 55

4 VI. NON-POWER AWARE, NON REAL TIME AWARE AND PARTITION AWARE TECHNIQUES Network Partitioning decreases Data accessibility of MANET Databases to a huge amount. A fine Replication technique ought to be planned to sustain Data accessibility at a preferred point still for the period of recurrent disassociations. The presented Replication techniques which do not address the matters of Power utilization and real time transactions, however do address Network Partitioning are called Non-power aware non real time aware and nonpartition aware techniques. 6.1 Service coverage in partition able MANETs [13] 6.2 Replication Decision algorithms depends on link Evaluation services in MANETS [14] Efficient Broadcast Depend Protocol (mode 0) Stormy Broadcast Depend Protocol (mode 1) Directed response Depend Protocol (mode 2) 6.3 Stability of Radio links [15] DAFN-S1 (DAFN Stability of Radio links: 1) DAFN-S2 (DAFN Stability of Radio links: 2) DCG-S1 (DCG Stability of Radio links: 1) 6.4 exploring group of Mobility for replica allocation in a mobile settings [16] VII. FEATURES COMPARISON In this part, we evaluate the presented Data Replication techniques, which were classified, and review in Section III VII by a framework collected of 13 significant features as given. MANETS Architecture: For which type(s) of MANETs system architecture(s) is the Replication technique developed? The System architecture determines how Mobile hosts communicate with each other. There are four types of architectures. Centralized Architecture: All Mobile hosts send their queries to central Servers. This architecture goes through from the only access point failure problem, where the entire system fails if the central Server fails. Group-Depend Common Servers: Architecture: Mobile hosts are arranged into dissimilar groups depend on a variety of considerations. Mobile hosts might belong to further than one group. Every group is related with central servers and Clients belong to a group access Data throughout the central Servers. The central Server of dissimilar groups might be capable to communicate with each other to coordinate data as well as to publicize group membership Information. Decentralized group-depend Architecture: Mobile hosts are set into dissimilar groups depend on a variety of factors like position of hosts, applications semantics etc. Every Mobile host belongs to only one group. Mobile hosts in a group can communicate only with Mobile hosts which are in the same group. There is no central Server in any group, and Client in the group may access Data from any Server in the group. Decentralized Architecture: A Mobile host can send its transactions to any of the mobile hosts which are within its communication range. Client/Server classification: do the replication techniques organize mobile hosts into clients and servers? Server Power-aware: do the replication techniques address Server Power limitation? Client Power-aware: do the replication techniques address Client Power limitation? Techniques, which do not differentiate Mobile hosts as Client/Server can also be aware of the Power limitation of Mobile hosts in general. Real-time-aware: do the Replication technique support firm and soft real-time transactions? Read-only assumption: do the Replication techniques suppose which all transactions are read-only transactions? Replication period: Is the choices to Replicate Data taken other than once? If yes, how often? Partition-aware: do the Replication techniques expect Network partitions before they occur and Replicate Data accordingly? Routing Protocol Dependency: do the Replication technique Dependent on any particular routing protocol? Replication level: What is the level of Replication used? Is it complete or limited Replication? Parameters which are considered for the decision to replicate Radio link stability: do the Replication techniques believe the permanence of the Wireless links at the same time as make a Decision if an exacting Data item can be replicated in a Mobile host? Access frequency: This point to the number of times a Data item was contact by a Mobile host. Does the Replication technique believe this for Replication conclusion? Communication cost: do the techniques believe the communication cost (for example number of hops, distances among the communicating hosts, strong point of link association among communicating hosts, etc.) In the judgment of how the Replication ought to be complete? Use of GPS or other alternatives techniques: do the replication techniques require the services of a GPS or any other Wireless positioning technique? Network partitions detection: How do the systems sense Network partitions as taking the conclusion to replicate? VIII. CONCLUSIONS AND FUTURE RESEARCH DIRECTIONS We offered a survey and classification of Data Replication techniques for MANETS Databases. Present Replication techniques were evaluated Depend on how they addressed the recognize matters. Criterion for choosing a Replication technique for exacting applications was recognized. In this survey, we explain a numeral of open research troubles. [ISSN: ] 56

5 Existing partition aware techniques notice Network partitions effect simply by the Mobility of Nodes; though, Network Partitioning may as well happen due to failure of power of Nodes. Techniques, which identify partitions, depend on route, velocity and association model of Nodes cannot notice partitions due to failure of power of Nodes; therefore, in adding to Nodes Mobility, it is essential to also believe power as an aspect for Network partitioning. The power expenditure of Mobile hosts Depends on their workload. Therefore, to be capable to expect the incidence of Network Partitioning due to failure of power. A Replication technique must be capable to approximate the workload of the Server. In adding, Network partitions might reconnect after some time, reasoning Data Replicated across the partitions to be unnecessary; therefore, the Replication technique should be capable to eradicate replica doubling to progress Data ease. Such algorithm would be reasonable only by a System containing the ability of recognizing reconnected partitions. Nothing of the presented Data Replication techniques addresses all the MANETS matters, that is, none of them is as power aware, real time aware and partition aware techniques. Advancement of a Data Replication technique, which believes all the 3 matters, would be a smart issue for future research. The decisive intend of such a technique would be to make the most of the number of transactions fulfilling their closing date restraint whereas reducing the power utilization of every Mobile hosts, and improving the results of Network Partitioning by appropriate Data Replication. [13] Wang, K., Li, B.: Efficient and guaranteed service coverage in partitionable mobile ad hoc networks. IEEE INFOCOM, pp , (2002), pp (2003) [14] Hauspie, M., Simplot, D., Carle, and J., Replication decision algorithm based on link evaluation services in MANET. CNRS UPRESA 8022 LIFL University Lille (2002). [15] Hara, T., Loh, Y.H., Nishio, S.: Data replication methods based on the stability of radio links in ad hoc networks. In: The 14 th International Workshop on Database and Expert Systems Applications, [16] Huang, J.-L., Chen, M.-S., Peng, and W.C., Exploring group mobility for replica data allocation in a mobile environment. In: 12th ACM International Conference on Information and Knowledge Management(CIKM-03), pp , November 3 8 (2003) REFRENCES [1] M. S. Kuran and T. Tugcu, A survey on emerging broadband Wireless access technologies, Comput. Network. vol. 51, no. 11, pp , [2] I. F. Akyildiz and X. Wang, A survey on Wireless Mesh Networks, IEEE Commun. Mag., vol. 43, no. 9, pp. S23 S30, Sept [3] M. E. M. Campista, et al., Routing metrics and protocols for Wireless Mesh Networks, IEEE Network, vol. 22, no. 1, pp. 6 12, Jan [4] IEEE, P8o2.11s draft d3.02, draft amendment to standard IEEE 8o2.11: ESS Mesh Networking, 2008, standard. [5] J. Camp and E. Knightly, The IEEE 8o2.11s extended service set Mesh networking standard, Commun. Mag., IEEE, vol. 46, no. 8, pp , Aug [6] R. Carrano, et al., Multi-hope MAC: IEEE 8o2.11sWireless Mesh Networks, Encyclopedia on Ad Hoc and Ubiquitous Computing. World Scientific, 2009, Ch. 19. [7] IEEE Communications Surveys & Tutorials, Vol. 13, No. 1, FIRST QUARTER 2011 [8] IETF MANET Home Page: [9] X. Hong, M. Gerla, G. Pei, and C. Chiang, A group mobility model for ad-hoc wireless networks, ACM/IEEE MS WiM, Seattle, Washington, 1999, pp [10] Managing Data Replication in Mobile Ad-hoc Network Databases (Invited Paper). [11] Karumanchi, G., Muralidharan, S., Prakash, R.: Information disseminationin partition able mobile ad hoc networks. In: IEEE Symposium on Reliable Distributed Systems, pp (1999). [12] Hara, T.: Replica allocation methods in ad hoc networks with data update. ACM Kluwer J. Mobile Netw. Appl. 8(4), (2003) [ISSN: ] 57

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh

More information

Multihop Wireless Networks

Multihop Wireless Networks Multihop Wireless Networks Ray-Guang Cheng Associate Professor Department of Electronic Engineering, National Taiwan Univ. of Science and Technology, Taipei, Taiwan Email: crg@mail.ntust.edu.tw Outline

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

EENMDRA: Efficient Energy and Node Mobility based Data Replication Algorithm for MANET

EENMDRA: Efficient Energy and Node Mobility based Data Replication Algorithm for MANET www.ijcsi.org 357 EENMDRA: Efficient Energy and Node Mobility based Data Replication Algorithm for MANET P.Mukilan 1 & Dr.A.Wahi 2 1 Anna University of Technology, Coimbatore, India. 2 Professor, Department

More information

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET

A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,

More information

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually

More information

Heterogeneous network establishment assisted by cellular operators

Heterogeneous network establishment assisted by cellular operators Heterogeneous network establishment assisted by cellular operators Marc Danzeisen (1)(2), Torsten Braun (1), Daniel Rodellar (2), Simon Winiker (1)(2) (1) University of Bern, Computer Networks and Distributed

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana

More information

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks

Proposition of a new approach to adapt SIP protocol to Ad hoc Networks , pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication

More information

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and

More information

Energy Efficiency of Load Balancing in MANET Routing Protocols

Energy Efficiency of Load Balancing in MANET Routing Protocols Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques

More information

Some Security Trends over Wireless Sensor Networks

Some Security Trends over Wireless Sensor Networks Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -

More information

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Mobile Network Analysis - Hole Healing

Mobile Network Analysis - Hole Healing , pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Recent advances in microelectromechanical

Recent advances in microelectromechanical COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area

More information

Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm

Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm Damianos Gavalas, Grammati Pantziou, Charalampos Konstantopoulos, Basilis Mamalis Department of Cultural Technology

More information

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo.

Suganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo. gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. ) Most Efficient Multicast structure for Wireless Mesh Networks Suganya D Computer Science and Engineering,

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems

Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems Debessay Fesehaye, Shameem Ahmed,Thadpong Pongthawornkamol, Klara Nahrstedt and Guijun Wang Dept. of Computer Science, University

More information

An Ants Algorithm to Improve Energy Efficient Based on Secure Autonomous Routing in WSN

An Ants Algorithm to Improve Energy Efficient Based on Secure Autonomous Routing in WSN An Ants Algorithm to Improve Energy Efficient Based on Secure Autonomous Routing in WSN *M.A.Preethy, PG SCHOLAR DEPT OF CSE #M.Meena,M.E AP/CSE King College Of Technology, Namakkal Abstract Due to the

More information

Wave Relay System and General Project Details

Wave Relay System and General Project Details Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless

More information

The Monitoring of Ad Hoc Networks Based on Routing

The Monitoring of Ad Hoc Networks Based on Routing The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,

More information

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and

More information

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption

A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy

More information

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar

More information

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network

Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor

More information

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks

On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks

Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla

More information

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks

Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks 928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications

More information

A Survey: High Speed TCP Variants in Wireless Networks

A Survey: High Speed TCP Variants in Wireless Networks ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:

More information

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

An Energy Efficient Location Service for Mobile Ad Hoc Networks

An Energy Efficient Location Service for Mobile Ad Hoc Networks An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180

More information

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on

More information

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART

Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART

More information

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

How To Balance Load In Rdi With Power Conservation In A Power Efficient System

How To Balance Load In Rdi With Power Conservation In A Power Efficient System EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,

More information

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks

Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency

More information

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing

A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies 3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

Dynamic Scheduling and Pricing in Wireless Cloud Computing

Dynamic Scheduling and Pricing in Wireless Cloud Computing Dynamic Scheduling and Pricing in Wireless Cloud Computing R.Saranya 1, G.Indra 2, Kalaivani.A 3 Assistant Professor, Dept. of CSE., R.M.K.College of Engineering and Technology, Puduvoyal, Chennai, India.

More information

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking

Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract

More information

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection

More information

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India

More information

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &

More information