SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013

IMPROVING THE SCALABILITY BY
CONTACT INFORMATION COMPRESSION
IN ROUTING
V.Karthikeyan1 and V.J.Vijayalakshmi2
1

2

Department of ECE, SVS College of Engineering, Coimbatore, India
Department of EEE, Sri Krishna College of Engg & Tech., Coimbatore, India

ABSTRACT
The existence of reduced scalability and delivery leads to the development of scalable routing by contact
information compression. The previous work dealt with the result of consistent analysis in the performance
of DTN hierarchical routing (DHR). It increases as the source to destination distance increases with
decreases in the routing performance. This paper focuses on improving the scalability and delivery through
contact information compression algorithm and also addresses the problem of power awareness routing to
increase the lifetime of the overall network. Thus implementing the contact information compression (CIC)
algorithm the estimated shortest path (ESP) is detected dynamically. The scalability and release are more
improved during multipath multicasting, which delivers the information to a collection of target
concurrently in a single transmission from the source.

KEYWORDS
Delay Tolerant Network (DTN), DTN Hierarchical Routing (DHR), Contact Information Compression
(CIC), Scalability and Delivery

1.

INTRODUCTION

The DTN Research Group (DTNRG) has designed architecture to support different protocols in
DTN which can be described using graphs. So, any border in the graph indicates the continuation
of set of contacts. The communication among any two nodes for a stage of instance is defined as
the contact. Unlike types of contacts survived among which unrelenting contacts for incessant
communication and predicted contacts for irregular communication amid nodes. listed contacts
can stay alive, for occurrence, between a base station on earth and an Orbiting spread satellite.
Opportunistic contacts are shaped just by the occurrence of two entities at the similar position. In
the Opportunistic contacts a node waits to get together the goal in regulate to move its package.
Messages transferred in DTNs are simply called bundles. They are transferred in an tiny manner
between nodes using a transfer procedure that ensures node-to-node consistency. These messages
can be of any size. Nodes are unspecified to contain huge buffers in which they can store up the
bundles. The main benefit of this method is that it involves only one transmission per bundle.
Most of the work relating to routing in DTN will be performed with predicted contacts. This DTN
faces harsh problems due to the unreliable time and uncertainty in network connections.
Hierarchical techniques are projected to improve scalability. In order to fully develop scalable
routing techniques, it is essential to classify user communication sessions in a hierarchical way,
so that the existing traffic prototype also scales well. The study of hierarchical routing reveals
DOI : 10.5121/ijit.2014.2404

45
International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013

that, by adjusting the numeral of levels in the routing hierarchy a enhanced scalability can be
achieved [2]. The DTN hierarchical routing address competent information aggregation and
compression in the time-space domain while maintaining serious information Hierarchical routing
requires the address of the source and the destination for efficient scalable routing [1]. If any of
the sources in the network lacks in the address information, the source can remedy to a overhaul
location.

2. RELATED WORKS
Routing in communication networks involves the indirection as of a unrelenting name (or ID) to a
locator and delivering packets based in the lead the locator. On a large-scale, highly active
network, the ID-to-locator mappings are both huge in number, and modify frequently.
conventional routing protocols have need of elevated transparency to keep these indirections upto-date [1]. In Weak State Routing (WSR), a routing device for large-scale highly active
networks. WSR’s innovation is that it uses arbitrary directional walks incomplete irregularly by
weak indirection state information in midway nodes. The indirection position information is
weak, i.e. interpreted not as complete truth, but as probabilistic hints. Nodes only have part
information about the district a destination node is likely to be. This technique allows us to
cumulative information about a number of distant locations in a geographic section. In other
words, the state information maps a set-of-IDs to a geographical region [1]. In order to stay away
from the propagation of the packets the threshold between 0.6 to 0.8 probabilities is permanent
for each node and manage flooding can be avoided [4].

3.

FORMULATED CIC ROUTING

In this proposed paper, we widen the study of scalable deterministic routing in DTNs by means of
recurring mobility based on our preceding works. As an alternative of routing with global contact
information, we proposed a routing algorithm that routes on contact information compacted by
three collective methods. We address the challenge of well-organized information aggregation
and firmness in the time-space area while maintaining significant information for capable routing.

4.

DHR ALGORITHMS

Our proposed DHR is fairly clear-cut subsequent to the hierarchical network has been built. DHR
is as well a hop by- hop routing. Every node makes its forwarding conclusion in two phases. The
first phase runs only when the maximum level on which the cluster of the current node and that of
the destination are different [1].

Fig.1
46
International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013

5.

MULTI PATH CREATION

It creates the nodes (sensors) according to the network capability. Here it will show in a draw
panel. While the conception of, all the nodes show their connected calls and primarily it resolve
be zero. After the construction of the multi paths, link between the nodes will set up and links are
based on two circumstances, by finding adjacent neighbors and by linking to the inaccessible
paths. Each path must join to the nodes through by the devices, according to the node competence
and power efficient. If the network capability is less, there will be unsuccessful paths. User can
see the listing of total nodes made.

6.

MULTI - PATH MULTICASTING

The proposed system is multicast data put on the air in multiple paths over wireless networks. We
presume that the set of connections is evenly loaded, i.e., mobility and deprived channel
circumstance rather than jamming are main reasons for packet crash. Begin by viewing the
viability of numerous path multicasts, and subsequently move on to describe the way to forward
the packets through multiple paths. The projected system has three basic steps, discovery of the
shortest route, maintenance of the Route and Data Transmission [6].

6.1 Route Discovery
The underneath planning consists of 30 nodes in which two being source and destination others
will be used for data transmission. The collection of a path for data broadcast is done based on the
accessibility of the nodes in the section using the ad-hoc on insist remoteness vector routing
algorithm. By using the Ad hoc on Demand Distance Vector routing protocol, the routes are
created on demand, i.e. only when a route is needed for which there is no “fresh” record in the
routing table [6].

6.2 Route Maintenance
The next step is the preservation of these routes which is evenly significant. The source has to
incessantly observe the location of the nodes to create sure the data are creature agreed during the
path to the destination lacking loss. In any case, if the location of the nodes change and the source
doesn’t make a note of it then the packets will be mislaid and ultimately have to be dislike [5].

6.3 Data Transmission
The pathway selection, preservation and data transmission are successive processes which
happens in split seconds in real-time broadcast. Hence the paths allocated priory is used for data
transmission. The first path allocated before is currently used for data transmission. The data is
transferred through the tinted path. The second path chosen is now used for data transmission.
The data is transferred through the highlighted path. The third path selected is used for data
transmission. The data is transferred through the highlighted path [5].

7 MULTI-PATH POWER EFFICIENT ROUTING
A MANET might consist of nodes which are not capable to be re-charged in an predictable time
period, energy maintenance is crucial to maintaining the lifetime of such a node. In networks
consisting of these nodes, where it is unfeasible to stock up the nodes power, techniques for
47
International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013

energy-efficient routing as well as competent data distribution between nodes is critical. An
energy-efficient mechanism for input routing in sensor networks are called directed diffusion has
been projected. Directed diffusion is an on-demand routing approach which has a data to drive
occasionally and broadcasts it. When nodes receives a data, they send a support message to a preselected neighbor which indicates that it needs to receive more data from the selected neighbor.
As these strengthening messages are propagated back to the source, an implied data path is set up;
each midway node sets up state that forwards comparable data towards the previous hop [7].

Fig.2

Fig.3
48
International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013

8

CONCLUSION

The projected work has show in simulations results, the period of connection state measurements
is chosen as one second. As a result, source nodes can keep informed their rates at most excellent
roughly every two seconds, while it requires two measurements for estimating the slope vector
according to the customized power algorithm. For simplicity the rate of redundancy is due to
source coding, The most favorable values put forward that the difficulty of having elegant routers
that are capable to ahead packets onto every branch at a dissimilar rate. It offers only a
insignificant profit in this situation, However, it is firm to depict any additional conclusions, as
this result might depend on the exact topology and source-destination pair selections [4]. Also,
our algorithm does better than traditional power algorithm as a effect of the accessibility of
multiple trees to allocate the traffic load. However, while under network topology model the
algorithm is capable to reduce the cost to a certain level, it cannot remove the packet losses and
has a a great deal advanced overall cost compared to usual ones. The motive behind this result is
the be short of of multicast functionality. Since we cannot generate multicast trees, the only
savings due to multicasting occurs between the sources and overlay nodes.

REFERENCES
[1]Cong Liu and Jie Wu, Fellow, IEEE “Scalable Routing in Cyclic Mobile Networks”-2009
[2]U. Acer, S. Kalyanaraman, and A. Abouzeid, “Weak State Routing for Large Scale Dynamic Networks,”
Proc. ACM MobiCom, 2007.
[3]V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, Delay-Tolerant
Network Architecture, Internet Draft: draft-irrf-dtnrg-arch. Text, DTN Research Group, 2006.
[4]J. Haas, J.Y. Halpern, and L. Li, “Gossip-Based Ad Hoc Routing,” Proc. IEEE INFOCOM, 2002.
[5]J. Leguay, T. Friedman, and V. Conan, “DTN Routing in a Mobility Pattern Space,” Proc. ACM
SIGCOMM Workshop Delay- Tolerant Networking, 2005
[6]J. Haas, J.Y. Halpern, and L. Li, “Gossip-Based Ad Hoc Routing,”Proc. IEEE INFOCOM, 2002.J.
Eriksson, M. Faloutsos, and S. Krishnamurthy, “Scalable Ad Hoc Routing: [The Case for Dynamic
Addressing,” Proc. IEEE INFOCOM, 2004.
[7]S. Jain, K. Fall, and R. Patra, “Routing in a Delay Tolerant Network,” Proc. ACM SIGCOMM, 2004
[8]J. Leguay, T. Friedman, and V. Conan. DTN routing in a mobility pattern space. In Proc. Of ACM
SIGCOMM Workshop on Delay-Tolerant Networking, 2005.
[9]A. Lindgren, A. Doria, and O. Schelen. Probabilistic routing in intermittently connected networks.
Lecture Notes in Computer Science , 3126:239 {254, Aug 2004.
[10]S. Merugu, M. Ammar, and E. Zegura. Routing in space and time in network with predictable mobility.
In Technical report: GIT-CC-04-07, College of Computing, Georgia Tech , 2004.

Authors
Prof. V. Karthikeyan has received his Bachelor’s Degree in Electronics and
Communication Engineering from PGP college of Engineering and Technology in 2003,
Namakkal, India, He received a Masters Degree in Applied Electronics from KSR college
of Technology, Erode in 2006 He is currently working as Assistant Professor in SVS
College of Engineering and Technology, Coimbatore. She has about 8 years of Teaching
Experience
Prof. V. J.Vijayalakshmi has completed her Bachelor’s Degree N Electrical &
Electronics Engineering from Sri Ramakrishna Engineering College, Coimbatore, India.
She finished her Masters Degree in Power Systems Engineering from Anna University of
Technology, Coimbatore, She is currently working as Assistant Professor in Sri Krishna
College of Engineering and Technology, Coimbatore She has about 5 years of Teaching
Experience.
49

More Related Content

What's hot

Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyData Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyIJCNCJournal
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...M H
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksM H
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networkscsandit
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...M H
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...eSAT Journals
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)IAESIJEECS
 

What's hot (16)

E0942531
E0942531E0942531
E0942531
 
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyData Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
 
D0441722
D0441722D0441722
D0441722
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
 

Viewers also liked

Presentation2 suwati
Presentation2 suwatiPresentation2 suwati
Presentation2 suwatisuwatiwati3
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
Ensayo de asentamiento de concreto
Ensayo de asentamiento de concretoEnsayo de asentamiento de concreto
Ensayo de asentamiento de concretoLIMALFRI
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1KARTHIKEYAN V
 
V.karthikeyan published article
V.karthikeyan published articleV.karthikeyan published article
V.karthikeyan published articleKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
Oracle APEX or ADF? From Requirements to Tool Choice
Oracle APEX or ADF? From Requirements to Tool ChoiceOracle APEX or ADF? From Requirements to Tool Choice
Oracle APEX or ADF? From Requirements to Tool ChoiceSten Vesterli
 
"Upravljanje porodičnim preduzećima:šta vlasnik može da učini da produži živo...
"Upravljanje porodičnim preduzećima:šta vlasnik može da učini da produži živo..."Upravljanje porodičnim preduzećima:šta vlasnik može da učini da produži živo...
"Upravljanje porodičnim preduzećima:šta vlasnik može da učini da produži živo...FEFA Faculty
 

Viewers also liked (12)

Presentation2 suwati
Presentation2 suwatiPresentation2 suwati
Presentation2 suwati
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
 
OTM_STV-DIR_0
OTM_STV-DIR_0OTM_STV-DIR_0
OTM_STV-DIR_0
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
Ensayo de asentamiento de concreto
Ensayo de asentamiento de concretoEnsayo de asentamiento de concreto
Ensayo de asentamiento de concreto
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
 
V.karthikeyan published article
V.karthikeyan published articleV.karthikeyan published article
V.karthikeyan published article
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
Oracle APEX or ADF? From Requirements to Tool Choice
Oracle APEX or ADF? From Requirements to Tool ChoiceOracle APEX or ADF? From Requirements to Tool Choice
Oracle APEX or ADF? From Requirements to Tool Choice
 
"Upravljanje porodičnim preduzećima:šta vlasnik može da učini da produži živo...
"Upravljanje porodičnim preduzećima:šta vlasnik može da učini da produži živo..."Upravljanje porodičnim preduzećima:šta vlasnik može da učini da produži živo...
"Upravljanje porodičnim preduzećima:šta vlasnik može da učini da produži živo...
 

Similar to V.KARTHIKEYAN PUBLISHED ARTICLE A

Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd Iaetsd
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...IJECEIAES
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 

Similar to V.KARTHIKEYAN PUBLISHED ARTICLE A (20)

Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 

More from KARTHIKEYAN V

V.KARTHIKEYAN PUBLISHED ARTICLE AA..
V.KARTHIKEYAN PUBLISHED ARTICLE AA..V.KARTHIKEYAN PUBLISHED ARTICLE AA..
V.KARTHIKEYAN PUBLISHED ARTICLE AA..KARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
V.karthikeyan published article a..a
V.karthikeyan published article a..aV.karthikeyan published article a..a
V.karthikeyan published article a..aKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE A..
V.KARTHIKEYAN PUBLISHED ARTICLE A..V.KARTHIKEYAN PUBLISHED ARTICLE A..
V.KARTHIKEYAN PUBLISHED ARTICLE A..KARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1KARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 

More from KARTHIKEYAN V (9)

V.KARTHIKEYAN PUBLISHED ARTICLE AA..
V.KARTHIKEYAN PUBLISHED ARTICLE AA..V.KARTHIKEYAN PUBLISHED ARTICLE AA..
V.KARTHIKEYAN PUBLISHED ARTICLE AA..
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
V.karthikeyan published article a..a
V.karthikeyan published article a..aV.karthikeyan published article a..a
V.karthikeyan published article a..a
 
V.KARTHIKEYAN PUBLISHED ARTICLE A..
V.KARTHIKEYAN PUBLISHED ARTICLE A..V.KARTHIKEYAN PUBLISHED ARTICLE A..
V.KARTHIKEYAN PUBLISHED ARTICLE A..
 
V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1V.KARTHIKEYAN PUBLISHED ARTICLE 1
V.KARTHIKEYAN PUBLISHED ARTICLE 1
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 

Recently uploaded

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

V.KARTHIKEYAN PUBLISHED ARTICLE A

  • 1. International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013 IMPROVING THE SCALABILITY BY CONTACT INFORMATION COMPRESSION IN ROUTING V.Karthikeyan1 and V.J.Vijayalakshmi2 1 2 Department of ECE, SVS College of Engineering, Coimbatore, India Department of EEE, Sri Krishna College of Engg & Tech., Coimbatore, India ABSTRACT The existence of reduced scalability and delivery leads to the development of scalable routing by contact information compression. The previous work dealt with the result of consistent analysis in the performance of DTN hierarchical routing (DHR). It increases as the source to destination distance increases with decreases in the routing performance. This paper focuses on improving the scalability and delivery through contact information compression algorithm and also addresses the problem of power awareness routing to increase the lifetime of the overall network. Thus implementing the contact information compression (CIC) algorithm the estimated shortest path (ESP) is detected dynamically. The scalability and release are more improved during multipath multicasting, which delivers the information to a collection of target concurrently in a single transmission from the source. KEYWORDS Delay Tolerant Network (DTN), DTN Hierarchical Routing (DHR), Contact Information Compression (CIC), Scalability and Delivery 1. INTRODUCTION The DTN Research Group (DTNRG) has designed architecture to support different protocols in DTN which can be described using graphs. So, any border in the graph indicates the continuation of set of contacts. The communication among any two nodes for a stage of instance is defined as the contact. Unlike types of contacts survived among which unrelenting contacts for incessant communication and predicted contacts for irregular communication amid nodes. listed contacts can stay alive, for occurrence, between a base station on earth and an Orbiting spread satellite. Opportunistic contacts are shaped just by the occurrence of two entities at the similar position. In the Opportunistic contacts a node waits to get together the goal in regulate to move its package. Messages transferred in DTNs are simply called bundles. They are transferred in an tiny manner between nodes using a transfer procedure that ensures node-to-node consistency. These messages can be of any size. Nodes are unspecified to contain huge buffers in which they can store up the bundles. The main benefit of this method is that it involves only one transmission per bundle. Most of the work relating to routing in DTN will be performed with predicted contacts. This DTN faces harsh problems due to the unreliable time and uncertainty in network connections. Hierarchical techniques are projected to improve scalability. In order to fully develop scalable routing techniques, it is essential to classify user communication sessions in a hierarchical way, so that the existing traffic prototype also scales well. The study of hierarchical routing reveals DOI : 10.5121/ijit.2014.2404 45
  • 2. International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013 that, by adjusting the numeral of levels in the routing hierarchy a enhanced scalability can be achieved [2]. The DTN hierarchical routing address competent information aggregation and compression in the time-space domain while maintaining serious information Hierarchical routing requires the address of the source and the destination for efficient scalable routing [1]. If any of the sources in the network lacks in the address information, the source can remedy to a overhaul location. 2. RELATED WORKS Routing in communication networks involves the indirection as of a unrelenting name (or ID) to a locator and delivering packets based in the lead the locator. On a large-scale, highly active network, the ID-to-locator mappings are both huge in number, and modify frequently. conventional routing protocols have need of elevated transparency to keep these indirections upto-date [1]. In Weak State Routing (WSR), a routing device for large-scale highly active networks. WSR’s innovation is that it uses arbitrary directional walks incomplete irregularly by weak indirection state information in midway nodes. The indirection position information is weak, i.e. interpreted not as complete truth, but as probabilistic hints. Nodes only have part information about the district a destination node is likely to be. This technique allows us to cumulative information about a number of distant locations in a geographic section. In other words, the state information maps a set-of-IDs to a geographical region [1]. In order to stay away from the propagation of the packets the threshold between 0.6 to 0.8 probabilities is permanent for each node and manage flooding can be avoided [4]. 3. FORMULATED CIC ROUTING In this proposed paper, we widen the study of scalable deterministic routing in DTNs by means of recurring mobility based on our preceding works. As an alternative of routing with global contact information, we proposed a routing algorithm that routes on contact information compacted by three collective methods. We address the challenge of well-organized information aggregation and firmness in the time-space area while maintaining significant information for capable routing. 4. DHR ALGORITHMS Our proposed DHR is fairly clear-cut subsequent to the hierarchical network has been built. DHR is as well a hop by- hop routing. Every node makes its forwarding conclusion in two phases. The first phase runs only when the maximum level on which the cluster of the current node and that of the destination are different [1]. Fig.1 46
  • 3. International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013 5. MULTI PATH CREATION It creates the nodes (sensors) according to the network capability. Here it will show in a draw panel. While the conception of, all the nodes show their connected calls and primarily it resolve be zero. After the construction of the multi paths, link between the nodes will set up and links are based on two circumstances, by finding adjacent neighbors and by linking to the inaccessible paths. Each path must join to the nodes through by the devices, according to the node competence and power efficient. If the network capability is less, there will be unsuccessful paths. User can see the listing of total nodes made. 6. MULTI - PATH MULTICASTING The proposed system is multicast data put on the air in multiple paths over wireless networks. We presume that the set of connections is evenly loaded, i.e., mobility and deprived channel circumstance rather than jamming are main reasons for packet crash. Begin by viewing the viability of numerous path multicasts, and subsequently move on to describe the way to forward the packets through multiple paths. The projected system has three basic steps, discovery of the shortest route, maintenance of the Route and Data Transmission [6]. 6.1 Route Discovery The underneath planning consists of 30 nodes in which two being source and destination others will be used for data transmission. The collection of a path for data broadcast is done based on the accessibility of the nodes in the section using the ad-hoc on insist remoteness vector routing algorithm. By using the Ad hoc on Demand Distance Vector routing protocol, the routes are created on demand, i.e. only when a route is needed for which there is no “fresh” record in the routing table [6]. 6.2 Route Maintenance The next step is the preservation of these routes which is evenly significant. The source has to incessantly observe the location of the nodes to create sure the data are creature agreed during the path to the destination lacking loss. In any case, if the location of the nodes change and the source doesn’t make a note of it then the packets will be mislaid and ultimately have to be dislike [5]. 6.3 Data Transmission The pathway selection, preservation and data transmission are successive processes which happens in split seconds in real-time broadcast. Hence the paths allocated priory is used for data transmission. The first path allocated before is currently used for data transmission. The data is transferred through the tinted path. The second path chosen is now used for data transmission. The data is transferred through the highlighted path. The third path selected is used for data transmission. The data is transferred through the highlighted path [5]. 7 MULTI-PATH POWER EFFICIENT ROUTING A MANET might consist of nodes which are not capable to be re-charged in an predictable time period, energy maintenance is crucial to maintaining the lifetime of such a node. In networks consisting of these nodes, where it is unfeasible to stock up the nodes power, techniques for 47
  • 4. International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013 energy-efficient routing as well as competent data distribution between nodes is critical. An energy-efficient mechanism for input routing in sensor networks are called directed diffusion has been projected. Directed diffusion is an on-demand routing approach which has a data to drive occasionally and broadcasts it. When nodes receives a data, they send a support message to a preselected neighbor which indicates that it needs to receive more data from the selected neighbor. As these strengthening messages are propagated back to the source, an implied data path is set up; each midway node sets up state that forwards comparable data towards the previous hop [7]. Fig.2 Fig.3 48
  • 5. International Journal on Information Theory (IJIT), Vol.2, No.1/2/3/4, October 2013 8 CONCLUSION The projected work has show in simulations results, the period of connection state measurements is chosen as one second. As a result, source nodes can keep informed their rates at most excellent roughly every two seconds, while it requires two measurements for estimating the slope vector according to the customized power algorithm. For simplicity the rate of redundancy is due to source coding, The most favorable values put forward that the difficulty of having elegant routers that are capable to ahead packets onto every branch at a dissimilar rate. It offers only a insignificant profit in this situation, However, it is firm to depict any additional conclusions, as this result might depend on the exact topology and source-destination pair selections [4]. Also, our algorithm does better than traditional power algorithm as a effect of the accessibility of multiple trees to allocate the traffic load. However, while under network topology model the algorithm is capable to reduce the cost to a certain level, it cannot remove the packet losses and has a a great deal advanced overall cost compared to usual ones. The motive behind this result is the be short of of multicast functionality. Since we cannot generate multicast trees, the only savings due to multicasting occurs between the sources and overlay nodes. REFERENCES [1]Cong Liu and Jie Wu, Fellow, IEEE “Scalable Routing in Cyclic Mobile Networks”-2009 [2]U. Acer, S. Kalyanaraman, and A. Abouzeid, “Weak State Routing for Large Scale Dynamic Networks,” Proc. ACM MobiCom, 2007. [3]V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, Delay-Tolerant Network Architecture, Internet Draft: draft-irrf-dtnrg-arch. Text, DTN Research Group, 2006. [4]J. Haas, J.Y. Halpern, and L. Li, “Gossip-Based Ad Hoc Routing,” Proc. IEEE INFOCOM, 2002. [5]J. Leguay, T. Friedman, and V. Conan, “DTN Routing in a Mobility Pattern Space,” Proc. ACM SIGCOMM Workshop Delay- Tolerant Networking, 2005 [6]J. Haas, J.Y. Halpern, and L. Li, “Gossip-Based Ad Hoc Routing,”Proc. IEEE INFOCOM, 2002.J. Eriksson, M. Faloutsos, and S. Krishnamurthy, “Scalable Ad Hoc Routing: [The Case for Dynamic Addressing,” Proc. IEEE INFOCOM, 2004. [7]S. Jain, K. Fall, and R. Patra, “Routing in a Delay Tolerant Network,” Proc. ACM SIGCOMM, 2004 [8]J. Leguay, T. Friedman, and V. Conan. DTN routing in a mobility pattern space. In Proc. Of ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005. [9]A. Lindgren, A. Doria, and O. Schelen. Probabilistic routing in intermittently connected networks. Lecture Notes in Computer Science , 3126:239 {254, Aug 2004. [10]S. Merugu, M. Ammar, and E. Zegura. Routing in space and time in network with predictable mobility. In Technical report: GIT-CC-04-07, College of Computing, Georgia Tech , 2004. Authors Prof. V. Karthikeyan has received his Bachelor’s Degree in Electronics and Communication Engineering from PGP college of Engineering and Technology in 2003, Namakkal, India, He received a Masters Degree in Applied Electronics from KSR college of Technology, Erode in 2006 He is currently working as Assistant Professor in SVS College of Engineering and Technology, Coimbatore. She has about 8 years of Teaching Experience Prof. V. J.Vijayalakshmi has completed her Bachelor’s Degree N Electrical & Electronics Engineering from Sri Ramakrishna Engineering College, Coimbatore, India. She finished her Masters Degree in Power Systems Engineering from Anna University of Technology, Coimbatore, She is currently working as Assistant Professor in Sri Krishna College of Engineering and Technology, Coimbatore She has about 5 years of Teaching Experience. 49