Techniques about Data Replication for Mobile Ad-hoc Network Databases
|
|
- Aleesha Shaw
- 8 years ago
- Views:
Transcription
1 Techniques about Data Replication for Mobile Ad-hoc Network Databases Rashid Azeem and Muhammad Ishfaq Ahmad Khan Director of Institute of Computer Management Sciences (ICMS), Pakistan Abstract Mobile Ad-hoc Network (MANET) is a Network, which permit Mobile Servers and Clients to commune in lack of a permanent Infrastructure. MANET is a rapid and rising region of study as it discover utilize a diversity of applications, in turn to make possible well-organized Information access and bring up to date, Databases are arranged on MANETs. Such Databases, which function on MANETs, are passed on to MANET Databases. Since Mobility and Power constrain of the Server and Client influence Data accessibility in MANETs, Data in MANET are replicated. Numeral of Data Replication techniques has been projected for MANET Databases. This scheme recognizes topics drawn in MANETs Data Replication and tries to categorize presented MANET Data Replication techniques found on problems they deal with limitation and presentation. Additionally, this paper also suggest criterion for choosing suitable Data Replication techniques for a variety of applications requirements in conclusion, the document end with a argument on future research directions. Keywords Data Replication, Techniques, Applications and Databases A I. INTRODUCTION s Data accessibility in a MANETs is influenced by Mobility and Power constrain of the Servers and Clients, Data in MANETS be replicated. The IEEE 802 Standards is devoted to the structure of MANs and LANs. Eminent component of this grouping are the IEEE and the now almost over and done however the majority of the rising Standards in this family arrangement with Networking over the wireless medium [1]. The , of which Blue tooth is part of, are planned to communicate private procedure over a small area Wireless personal area Network (WPAN). For the making of the Wireless corresponding of a LAN (i.e. a Wireless Local Area Network or WLAN), the IEEE planned the 8o2.11 standard; while the (WImax) take in hand the difficulty of city area Network or Wireless Metropolitan area Network (WMAN). Those 3 Standards have in familiar the detail, which they are powerfully support on some type of communication. In a Wireless Personal Area Network (WPAN) - a master device focuses the entire interchange. For a WLAN, the access point shows a vital task, by relay the entire traffics among contributing Wireless. Moreover, finally, WImax is as well communication bound, its central Nodes is a controlling and practical base station, Although still simple to organize when evaluate to there wired corresponding item, those equipment are not practical in situation where no communication at all is accessible, e.g., is a tragedy region where a normal disaster or fanatic bother entirely damaged some communication. Although here is a great deal of further frequent situation wherever communication- open Network be desirable. The rising and cost-effectively test area wherever no reserves survive to put together or preserve an operational communication. A no communication or Ad-hoc Network may be the influential digital addition device desirable to lessen deficiency by way of expanding right to use to Information and learning stuffing. An Ad-hoc Network is a self-forming, self-configuring Network, which allots some communication, even an access point. In such a Network a Nodes is capable to correspond with several additional Nodes inside collection and as well by Nodes out of instantaneous radio range. To execute the later, an Ad-hoc Network depends on the Nodes to communicate traffics for benefit of other Nodes an additional significant class of Multihopes Nodes Networks is in general call Mesh Networks. In a Mesh Networks a few of the Nodes are devoted to the advance of traffics of the other Nodes form a Nodes backhaul, which might be, measured its communication". A review of such methods is able to initiate in [2] and an explanation of the routing protocols and metrics characteristically use is able to be establishing in [3]. The 1 st Multi-hopes Wireless Networks used layer 3 method to communicate packet starting the resource to the target and even though Network layer implementing are still Common in Ad hoc Networks, there are current pains to include the lost Multihope abilities in 3 abovementioned IEEE Wireless tools. This lecture present the suggestion of a Mesh Networks with 8o2.11 devices - a goal being follow through the IEEE 8o2.11 Task Group s", namely IEEE 8o2.11s [4], [5], [6]. It is become aware of which for this IEEE task group the expressions Mesh and ad hoc are exchangeable. The major help of this tutorial are a thorough explanation of a number of secrete of the upcoming standard and a step by-step study of genuine Multihope MAC traffics, in addition to the importance of pros and cons of the layer 2 over the layer 3 approach to the Wireless Multihopes Networks [7] private and public Networkers looking to buy (WLAN) Wireless and local area Network. Numerous products are conventional to 8o2.11a, 8o2.11b, 8o2.11g, or8o2.11n Wireless Standards jointly identified as Wi-Fi technology. Moreover, Blue tooth and a variety of additional non Wi-Fi technologies as well exist, each one as well planned for detailed Networking functions MANET is a group of Wireless independent nodes, which shift randomly, [ISSN: ] 53
2 form a provisional network with no permanent infrastructure [8]. Each and every Node in MANETS is Mobile and, therefore, limited through Power. These Nodes not merely can correspond with Nodes, which is surrounded by their communication choices, however also can communicate with Nodes, which is exterior, their communication range by means of multihop communication. As no permanent Infrastructure is necessary, they fit fine in military, rescue actions and sensor Networks [9]. Furthermore a lot of applications in this situations are time dependant and, therefore, their connections be supposed to be perform not simply appropriately, however as well contained by their time limits. In a Distributed Database System, Data is repeatedly replicated to get better consistency and accessibility. Though one significant subject to be measured as replicating Data is the accuracy of the Replicated Data. As Nodes in MANETS are Mobile and contain some degree of Power, disentanglement might happen often, cause a group of Network separation. Mobile hosts cannot access data, which is obtainable in Mobile hosts in one division in another detachment. The subject connected to Data Replication in MANETS Databases is as. Server Power Consumption: Servers in MANETS run on battery Power. If Servers have a small Power remains and if it replicated with numerous often-contact Data objects, then the numerous Data access requests for these hot Data will consume its Power. Server Mobility: Because of its Mobility, Servers may from time to time shift to a position where they might not be getting in touch with by any other Servers or Clients. Client Mobility: Client which inquiry Servers for Information is as well Mobile. Clients more often than not launch their contacts to the adjacent Servers to obtain a rapid reaction. The choice to Replicate Data substance at exacting Servers might be found on the way in frequencies of Data matter from those precise Servers. Therefore, the judgment to Replicate Data stuff at suitable Servers has to be dynamic and found on the current Network topology Client Power: Clients in MANETS also run on battery Power. If Clients stay excessively extended for its communications fallout, it may drop its Power quickly. The Replication technique ought to be capable to Replicate Data matter at suitable Servers in such a way that a Client may be capable to contact its demanded Data substances from its adjacent Server, which has the smallest amount workload. Time Critical Applications: Numerous MANET applications, like rescue Networks, military processes, are time dependant. Data Replication is supposed to be used to progress Data ease of access and performance of the System, thus falling the time to perform communications. Dealings with short time limit ought to be sent to the nearest Server, which contain the smallest amount workload for their implementation. These communications be supposed to be carry out previous to other Transactions, which have longer time limit. Not even a single existing Replication technique believe every of the above subject. In this paper, we talk about this technique and its presentation assessment in specific. Partition and Network division is a severe difficulty in MANETS as Server in one division which hold necessary Data items cannot provide services too their Clients and Servers in dissimilar separations [10]. II. CLASSIFICATION OF PRESENT DATA Replication techniques: Following from the discussion of the matters, which can concern Replication in MANET Databases, we can recognize the matters in Real-time necessities of applications and Network division as 3 of the significant matters to be measured in the plan of a Data Replication technique for MANETs. At the same time as these matters are also connected to usual Networks, they turn into further rigorous in MANETs. As MANETs permits for Mobility of Servers and Clients, Network failure and division happen regularly in MANETs.Power breakdown as well happen normally in MANETs because of the inadequate battery capability of Mobile Wireless. These happening extend transaction implementation time due to inaccessibility of distant devices. Moreover, MANET is normally organized for time dependent applications; therefore, allow the implementation of transactions earlier than the expiration of their time limit. Therefore, these matters (power utilization, real-time necessities of applications and Network division) ought to be measured when scheming a Replication technique for MANETS Databases. Found on these MANETs Data Replication matters, we can describe the following. Power conscious techniques obtain into account the Power utilization of Clients and Servers. Replication techniques, which sustain transactions contain time limit and make an effort to reduce the amount of transactions, which miss their time limit, are described as real time-aware technique. Replication techniques, which expect the happening of Network partition and Replicate Data matter, consequently in advance of time are describes as partition-aware techniques. A perfect Replication approach for MANETs would be Power-aware, real time aware plus partition-aware. The presented Data Replication techniques can be classified into 5 classes depends on dissimilar arrangements of the aforementioned criterion. Non-power aware non real time aware and non-partition aware techniques are evaluated in section III. Power aware, non real time aware and non-partition aware techniques are evaluated in section IV, while Power aware, real time aware and non partition aware techniques are evaluated in section V. Non Power aware, on real time aware and partition aware techniques are evaluated in section VI, followed by Power aware, on real time aware and partition aware techniques are evaluated in section VII. III. NON-POWER AWARE, NON REAL TIME AWARE AND NON-PARTITION AWARE TECHNIQUES Techniques, which focus on refining Data convenience in MANETS Databases, however do not address the matters connected to Client and Server Power, real-time transactions and network partition, are called Non Power aware, non real [ISSN: ] 54
3 time aware and non-partition aware techniques. These techniques are explained in this section. Information dissemination in partition-able: MANETs [11] Karumanchi et al. [11] suppose a situation of regular bring up to date transactions and replication on every server. It believes architecture, which consists of Server that perform as peers (which communicate with each other) and Client, which question the Server for Data, which they need. Each Client informs its existing position and state to every other Server. This is completed to allow each Server to recover the most recent position Information of all Servers. The Update Information is spread in such a means that Nodes Query this Update information to get nearly all-current Data, thus dropping irregularity and dirty read transactions. Each Node 1 st decides the instance to send the Update Information. After deciding when to update, each Nodes then decide where to send these Updates and which Nodes to inquiry for the Information in such a way which it lessen the contact of Network partitioning. It utilizes a difference of a Quorumdepend method. Particular set of Server S, a Quorum is a set of m cross subsets which entirely make S. This technique is targeted for applications where imprecision is chosen to no Information at all. Therefore, it permits dirty read transactions to be implemented. It challenge to address the two matters concerned in Information distribution in MANETS, when to send Updates and where to send Update and Query transactions. When to send updates? Four special approaches, which decide the time to send Updates, were proposed: Time depend strategy Time depend and location depend strategy Absolute connectivity depend strategy Percentage connectivity depend strategy Where to send update and query transactions? All nodes x keep a list of Nodes which it cannot attain. These Nodes are accumulate in a Data arrangement called DQL (x) the disqualified file for x. Nodes in DQL (x) are from time to time detached after a definite period of time called the disqualification period. Nodes x 1st pick a Quorum (assume S 1 ) and after that sends its Update ask for every Server in which quorum. Every server, which do not respond to x (denoted as S 1 1 ) supplementary to DQL (x). Now an additional Nodes y may question the similar Data item from a dissimilar quorum (assume S 2 ). Various Servers (denoted as S21) may not be capable to respond as they may be in a dissimilar panel. There will be at least one regular Server among the 2 Quorums S 1 and S 2, however there may not be a general Server among (S 1 - S 1 1 ) and (S 2 = S 2 1 ) When there is no Common Server among the Updated Quorum and the Quorum in which the data are read, the Query may finish up with a dirty read operation. Therefore, the 3 following techniques were projected to decrease dirty reads. 3.1 Select then eliminate (STE) Eliminate then select (ETS) 3.2 Effective replica allocation in ad hoc Networks for improving Data accessibility Static access frequency (SAF) Dynamic access frequency and neighborhood (DAFN) Dynamic connectivity depend grouping (DCG) 3.3 Replica allocation with Data Update Maximizing the number of successful access requests. Reducing the rate of reading dirty items 3.4 Replica allocation for correlated data item 3.5 REDMAN, a decentralized middle ware solution for cooperative Replication in dense MANETS Replica Distribution Replica retrieval Replication degree maintenance 3.6 Replica Distribution methods considering the location of Mobile hosts in Wireless ad hoc Networks Skip copy (SC) method Data access Replica relocation Replica Update IV. POWER AWARE, NON REAL TIME AWARE AND NON PARTITION AWARE TECHNIQUES As Nodes in a MANETS are Mobile, it might not be achievable for them to chare their batteries when necessary. Due to its insufficient battery competence of Mobile hosts, Power is greatly desirable source in MANETs, which ought to be preserved as much as achievable. Therefore, a fine Replication technique ought to be capable to lessen the Power consumption of the Mobile hosts in the Network. Replication techniques, which believe simply the Client and Server Power limitation, are referred to as Power aware, non real time aware and non-partition aware techniques. Energy-efficient replication extended database state machine in MANETs. Probabilistic quorum systems V. POWER AWARE, REAL TIME AWARE AND NON- PARTITION AWARE TECHNIQUES Power on both Clients and Servers in a MANET is insufficient, as discuss in Sect. 2. Replication techniques, which address equally Servers and Clients Power limitation in accumulation to Real time restriction, however do not address the matter of Network Partitioning are called Power aware, real time aware and non-partition aware techniques. To decrease Power expenditure, a fine Replication technique ought to lessen communication messages among a variety of Mobile hosts. It ought to dispense and stable the workload of Servers in order to avoid the circumstances in which simply a small number of Servers carry out every transaction requirements and run out of Power, while the remaining of the Servers stay idle. In addition, to address the necessities of real-time applications, the Replication technique must get better Data accessibility for transaction implementation in an appropriate way. We have recognized one technique, which fit in, in this classification. [ISSN: ] 55
4 VI. NON-POWER AWARE, NON REAL TIME AWARE AND PARTITION AWARE TECHNIQUES Network Partitioning decreases Data accessibility of MANET Databases to a huge amount. A fine Replication technique ought to be planned to sustain Data accessibility at a preferred point still for the period of recurrent disassociations. The presented Replication techniques which do not address the matters of Power utilization and real time transactions, however do address Network Partitioning are called Non-power aware non real time aware and nonpartition aware techniques. 6.1 Service coverage in partition able MANETs [13] 6.2 Replication Decision algorithms depends on link Evaluation services in MANETS [14] Efficient Broadcast Depend Protocol (mode 0) Stormy Broadcast Depend Protocol (mode 1) Directed response Depend Protocol (mode 2) 6.3 Stability of Radio links [15] DAFN-S1 (DAFN Stability of Radio links: 1) DAFN-S2 (DAFN Stability of Radio links: 2) DCG-S1 (DCG Stability of Radio links: 1) 6.4 exploring group of Mobility for replica allocation in a mobile settings [16] VII. FEATURES COMPARISON In this part, we evaluate the presented Data Replication techniques, which were classified, and review in Section III VII by a framework collected of 13 significant features as given. MANETS Architecture: For which type(s) of MANETs system architecture(s) is the Replication technique developed? The System architecture determines how Mobile hosts communicate with each other. There are four types of architectures. Centralized Architecture: All Mobile hosts send their queries to central Servers. This architecture goes through from the only access point failure problem, where the entire system fails if the central Server fails. Group-Depend Common Servers: Architecture: Mobile hosts are arranged into dissimilar groups depend on a variety of considerations. Mobile hosts might belong to further than one group. Every group is related with central servers and Clients belong to a group access Data throughout the central Servers. The central Server of dissimilar groups might be capable to communicate with each other to coordinate data as well as to publicize group membership Information. Decentralized group-depend Architecture: Mobile hosts are set into dissimilar groups depend on a variety of factors like position of hosts, applications semantics etc. Every Mobile host belongs to only one group. Mobile hosts in a group can communicate only with Mobile hosts which are in the same group. There is no central Server in any group, and Client in the group may access Data from any Server in the group. Decentralized Architecture: A Mobile host can send its transactions to any of the mobile hosts which are within its communication range. Client/Server classification: do the replication techniques organize mobile hosts into clients and servers? Server Power-aware: do the replication techniques address Server Power limitation? Client Power-aware: do the replication techniques address Client Power limitation? Techniques, which do not differentiate Mobile hosts as Client/Server can also be aware of the Power limitation of Mobile hosts in general. Real-time-aware: do the Replication technique support firm and soft real-time transactions? Read-only assumption: do the Replication techniques suppose which all transactions are read-only transactions? Replication period: Is the choices to Replicate Data taken other than once? If yes, how often? Partition-aware: do the Replication techniques expect Network partitions before they occur and Replicate Data accordingly? Routing Protocol Dependency: do the Replication technique Dependent on any particular routing protocol? Replication level: What is the level of Replication used? Is it complete or limited Replication? Parameters which are considered for the decision to replicate Radio link stability: do the Replication techniques believe the permanence of the Wireless links at the same time as make a Decision if an exacting Data item can be replicated in a Mobile host? Access frequency: This point to the number of times a Data item was contact by a Mobile host. Does the Replication technique believe this for Replication conclusion? Communication cost: do the techniques believe the communication cost (for example number of hops, distances among the communicating hosts, strong point of link association among communicating hosts, etc.) In the judgment of how the Replication ought to be complete? Use of GPS or other alternatives techniques: do the replication techniques require the services of a GPS or any other Wireless positioning technique? Network partitions detection: How do the systems sense Network partitions as taking the conclusion to replicate? VIII. CONCLUSIONS AND FUTURE RESEARCH DIRECTIONS We offered a survey and classification of Data Replication techniques for MANETS Databases. Present Replication techniques were evaluated Depend on how they addressed the recognize matters. Criterion for choosing a Replication technique for exacting applications was recognized. In this survey, we explain a numeral of open research troubles. [ISSN: ] 56
5 Existing partition aware techniques notice Network partitions effect simply by the Mobility of Nodes; though, Network Partitioning may as well happen due to failure of power of Nodes. Techniques, which identify partitions, depend on route, velocity and association model of Nodes cannot notice partitions due to failure of power of Nodes; therefore, in adding to Nodes Mobility, it is essential to also believe power as an aspect for Network partitioning. The power expenditure of Mobile hosts Depends on their workload. Therefore, to be capable to expect the incidence of Network Partitioning due to failure of power. A Replication technique must be capable to approximate the workload of the Server. In adding, Network partitions might reconnect after some time, reasoning Data Replicated across the partitions to be unnecessary; therefore, the Replication technique should be capable to eradicate replica doubling to progress Data ease. Such algorithm would be reasonable only by a System containing the ability of recognizing reconnected partitions. Nothing of the presented Data Replication techniques addresses all the MANETS matters, that is, none of them is as power aware, real time aware and partition aware techniques. Advancement of a Data Replication technique, which believes all the 3 matters, would be a smart issue for future research. The decisive intend of such a technique would be to make the most of the number of transactions fulfilling their closing date restraint whereas reducing the power utilization of every Mobile hosts, and improving the results of Network Partitioning by appropriate Data Replication. [13] Wang, K., Li, B.: Efficient and guaranteed service coverage in partitionable mobile ad hoc networks. IEEE INFOCOM, pp , (2002), pp (2003) [14] Hauspie, M., Simplot, D., Carle, and J., Replication decision algorithm based on link evaluation services in MANET. CNRS UPRESA 8022 LIFL University Lille (2002). [15] Hara, T., Loh, Y.H., Nishio, S.: Data replication methods based on the stability of radio links in ad hoc networks. In: The 14 th International Workshop on Database and Expert Systems Applications, [16] Huang, J.-L., Chen, M.-S., Peng, and W.C., Exploring group mobility for replica data allocation in a mobile environment. In: 12th ACM International Conference on Information and Knowledge Management(CIKM-03), pp , November 3 8 (2003) REFRENCES [1] M. S. Kuran and T. Tugcu, A survey on emerging broadband Wireless access technologies, Comput. Network. vol. 51, no. 11, pp , [2] I. F. Akyildiz and X. Wang, A survey on Wireless Mesh Networks, IEEE Commun. Mag., vol. 43, no. 9, pp. S23 S30, Sept [3] M. E. M. Campista, et al., Routing metrics and protocols for Wireless Mesh Networks, IEEE Network, vol. 22, no. 1, pp. 6 12, Jan [4] IEEE, P8o2.11s draft d3.02, draft amendment to standard IEEE 8o2.11: ESS Mesh Networking, 2008, standard. [5] J. Camp and E. Knightly, The IEEE 8o2.11s extended service set Mesh networking standard, Commun. Mag., IEEE, vol. 46, no. 8, pp , Aug [6] R. Carrano, et al., Multi-hope MAC: IEEE 8o2.11sWireless Mesh Networks, Encyclopedia on Ad Hoc and Ubiquitous Computing. World Scientific, 2009, Ch. 19. [7] IEEE Communications Surveys & Tutorials, Vol. 13, No. 1, FIRST QUARTER 2011 [8] IETF MANET Home Page: [9] X. Hong, M. Gerla, G. Pei, and C. Chiang, A group mobility model for ad-hoc wireless networks, ACM/IEEE MS WiM, Seattle, Washington, 1999, pp [10] Managing Data Replication in Mobile Ad-hoc Network Databases (Invited Paper). [11] Karumanchi, G., Muralidharan, S., Prakash, R.: Information disseminationin partition able mobile ad hoc networks. In: IEEE Symposium on Reliable Distributed Systems, pp (1999). [12] Hara, T.: Replica allocation methods in ad hoc networks with data update. ACM Kluwer J. Mobile Netw. Appl. 8(4), (2003) [ISSN: ] 57
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
More informationLOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS
LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) olume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationCOMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationMultihop Wireless Networks
Multihop Wireless Networks Ray-Guang Cheng Associate Professor Department of Electronic Engineering, National Taiwan Univ. of Science and Technology, Taipei, Taiwan Email: crg@mail.ntust.edu.tw Outline
More informationImplementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks
Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationRole of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
More informationA RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous
More informationAn Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs
An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management
More informationStudy of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
More informationMetroNet6 - Homeland Security IPv6 R&D over Wireless
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:
More informationEENMDRA: Efficient Energy and Node Mobility based Data Replication Algorithm for MANET
www.ijcsi.org 357 EENMDRA: Efficient Energy and Node Mobility based Data Replication Algorithm for MANET P.Mukilan 1 & Dr.A.Wahi 2 1 Anna University of Technology, Coimbatore, India. 2 Professor, Department
More informationA Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
More informationStudent, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Protocol
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationDESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
More informationPERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir
More informationA UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS
A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS Chandanpreet Kaur Global Institute of Management and Emerging Technologies, Amritsar, Punjab, India, lpu_chandan@yahoo.co.in
More informationCHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
More informationEXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
More informationHeterogeneous network establishment assisted by cellular operators
Heterogeneous network establishment assisted by cellular operators Marc Danzeisen (1)(2), Torsten Braun (1), Daniel Rodellar (2), Simon Winiker (1)(2) (1) University of Bern, Computer Networks and Distributed
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationA Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network
A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network Parama Bhaumik 1, Somprokash Bandyopadhyay 2 1 Dept. of Information Technology, Jadavpur
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
More informationProposition of a new approach to adapt SIP protocol to Ad hoc Networks
, pp.133-148 http://dx.doi.org/10.14257/ijseia.2014.8.7,11 Proposition of a new approach to adapt SIP protocol to Ad hoc Networks I. Mourtaji, M. Bouhorma, M. Benahmed and A. Bouhdir Computer and Communication
More informationSecurity and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
More informationLecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
More informationEfficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationAutoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationDynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network
Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network P. Shiva Kumar $, Rinki Sharma *, G.Varaprasad # $ Department of Information Technology Acharya Institute of Management and
More informationEnergy Efficiency of Load Balancing in MANET Routing Protocols
Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques
More informationSome Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
More informationComparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach
Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach U. Dillibabau 1, Akshay 2, M. Lorate Shiny 3 UG Scholars,
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More informationMobile Network Analysis - Hole Healing
, pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationIntelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based
More informationDesign of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn
More informationRecent advances in microelectromechanical
COVER FEATURE Energy-Efficient Area Monitoring for Sensor Networks The nodes in sensor networks must self-organize to monitor the target area as long as possible. Optimizing energy consumption in area
More informationLowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm
Lowest-ID with Adaptive ID Reassignment: A Novel Mobile Ad-Hoc Networks Clustering Algorithm Damianos Gavalas, Grammati Pantziou, Charalampos Konstantopoulos, Basilis Mamalis Department of Cultural Technology
More informationSuganya D. Computer Science and Engineering, Anna University SMK FOMRA Institute of Technology, Chennai, India Suganya2086@yahoo.
gopalax -International Journal of Technology And Engineering System(IJTES): Jan March 2011- Vol.2.No.2. ) Most Efficient Multicast structure for Wireless Mesh Networks Suganya D Computer Science and Engineering,
More informationLoad Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationReliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems
Reliability Trade-off Analysis of Deadline-Sensitive Wireless Messaging Systems Debessay Fesehaye, Shameem Ahmed,Thadpong Pongthawornkamol, Klara Nahrstedt and Guijun Wang Dept. of Computer Science, University
More informationAn Ants Algorithm to Improve Energy Efficient Based on Secure Autonomous Routing in WSN
An Ants Algorithm to Improve Energy Efficient Based on Secure Autonomous Routing in WSN *M.A.Preethy, PG SCHOLAR DEPT OF CSE #M.Meena,M.E AP/CSE King College Of Technology, Namakkal Abstract Due to the
More informationWave Relay System and General Project Details
Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless
More informationThe Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
More informationAdapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
More informationA Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy Consumption
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Novel Multi Ring Forwarding Protocol for Avoiding the Void Nodes for Balanced Energy
More informationStep by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
More informationEnergy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India nadhachandra@gmail.com Abstract Energy efficient load balancing in a Wireless Sensor
More informationOn Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks
On Reliability of Dynamic Addressing Routing Protocols in Mobile Ad Hoc Networks Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paura Department of Electronic and Telecommunication Engineering (DIET) University
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationA Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
More informationAdaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks
Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks Kaixin Xu, Ken Tang, Rajive Bagrodia Scalable Network Technologies, Inc. {xkx, ktang,rlb}@scalable-networks.com Mario Gerla
More informationDynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks
928 Dynamic and Adaptive Organization of Data-Collection Infrastructures in Sustainable Wireless Sensor Networks Rui Teng, Shirazi N. Mehdad and Bing Zhang National institute of information and communications
More informationA Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
More informationLoad-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
More informationEstablishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation
Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student
More informationAn Energy Efficient Location Service for Mobile Ad Hoc Networks
An Energ Efficient Location Service for Mobile Ad Hoc Networks Zijian Wang 1, Euphan Bulut 1 and Boleslaw K. Szmanski 1, 1 Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 12180
More informationHybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network
International Journal of Computer Applications (975 8887) Volume 4 No.6, July 21 Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network Harneet Kour Department of Computer
More informationStudy And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on
More informationMinimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART
Minimum-Hop Load-Balancing Graph Routing Algorithm for Wireless HART Abdul Aziz Memon and Seung Ho Hong Abstract In this paper load-balancing routing algorithm for WirelessHART standard is proposed. WirelessHART
More informationAnomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
More informationRemote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
More informationA Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
More informationHow To Balance Load In Rdi With Power Conservation In A Power Efficient System
EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,
More informationA Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great strength to be applied
More informationMunicipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
More informationPower Efficiency Metrics for Geographical Routing In Multihop Wireless Networks
Power Efficiency Metrics for Geographical Routing In Multihop Wireless Networks Gowthami.A, Lavanya.R Abstract - A number of energy-aware routing protocols are proposed to provide the energy efficiency
More informationA Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing
A Survey on Lifetime Maximization of Wireless Sensor Network using Load Balancing Radhika Sarad, Kiran Bhame, Vaibhav Wabale, Amol Katake B.E. Students, Dept. of Computer Engineering, KJCOEMR, Pune, Maharashtra,
More informationComputer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More information3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
More informationENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION
ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851
More informationDynamic Scheduling and Pricing in Wireless Cloud Computing
Dynamic Scheduling and Pricing in Wireless Cloud Computing R.Saranya 1, G.Indra 2, Kalaivani.A 3 Assistant Professor, Dept. of CSE., R.M.K.College of Engineering and Technology, Puduvoyal, Chennai, India.
More informationAccelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More informationPerformance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
More information- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
More informationInternational Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
More informationImplementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
More informationSimulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
More information