SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 
E-ISSN: 2321-9637 
Improving Node Stability Using Hotspot Algorithm in 
87 
Mobile Ad-hoc Network 
Amanpreet Kaur Amandeep Kaur 
Department of Computer Science and Engineering, Sri Guru Granth Sahib World University, Fatehgarh sahib. 
cheemaaman84@yahoo.com 
Abstract- MANETs can manage without fixed infrastructure and can stay active rapid changes in the network topology. The 
primary challenge in building a MANETS is equipping each device to continuously maintain the information required to 
appropriately route traffic. Routing with high scalability and robust performance are the key challenges in deploying Mobile 
Ad-Hoc Networks. In order to operate the Ad-Hoc Networks more efficiently, suitable on-demand routing protocols have to 
be incorporated, to find more suitable routes between source and destination. The dynamic topology of a mobile ad hoc 
network (MANETS) poses a real challenge in the design of a MANETS routing protocol. Over the last many years, a variety 
of routing protocols have been developed and their performance simulations are made by network researchers. In the paper, 
we have used DSR protocol for the network. We have also emphasized on node stability which is an important consideration 
to enhance network efficiency. 
Keywords: MANETs, Routing in MANETs, Stability of Nodes, Hotspot Algorithm. 
1. INTRODUCTION 
As the importance of computers in our daily life is 
the following factors: for the installation, reliability factor, 
increases, it also need new demands for connectivity. 
cost, bandwidth, required power, security and 
Wired connectivity have been around for a long time but 
performance between nodes of network. All networks 
there is increasing demand on working wireless solutions. 
were based on fixed infrastructures of nodes. Most 
Wireless communication between mobile users is growing 
common infrastructure based wireless networks are 
more popular than ever before. This growth is due to the 
cordless telephone, cellular networks, Wireless Fidelity, 
technological advancements in the field of computers and 
Microwave communication, Worldwide Interoperability 
communicating devices. Technology has enabled 
for Microwave Access, Satellite communication and 
computers and communicating devices (like wireless 
Radio Detection and Ranging etc. 
devices such as laptops, mobile phones, tablets, wireless 
modems, etc. To be equipped with radio interfaces to 
communicate on fly. Wireless networking increased the 
utility of carrying a computing device. It provides the 
mobile user with versatile and flexible communication 
and continuous access of networked services. 
Network without having a fixed infrastructure is another 
promising type of network used in communication. It is 
used for any areas, planned or unplanned events like in 
war fields or in a meeting of business people scattered 
geographically. This type of network can be created or 
destroyed when we needed and that is why it is called 
mobile ad-hoc network and it has no central and 
Figure 1: Infrastructure based wireless network 
controlling authority. 
Wireless networks are playing a major role in the area of 
communication network. Now we are using wireless 
networks for the military applications, industrial 
applications and also in personal area networks. The main 
difference between wireless and wired networks was only 
in communication channel. In wired networks, there exist 
physical medium while on the other side physical medium 
doesn’t exist on the wireless networks. Wireless networks 
became very famous in different applications considering 
1.1 MANETs 
MANETs stand for Mobile Ad hoc Networks. Mobile 
implies “mobility”. Ad hoc is a Latin word and it means 
“for this only”. MANETs is an collection of mobile 
routers or nodes that communicate over wireless links. 
MANETs is an Infrastructure-less wireless network. The 
routers or nodes moves randomly and organize 
themselves arbitrarily. The nodes directly communicate 
through the wireless links between each other’s radio
International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 
E-ISSN: 2321-9637 
88 
range of nodes, while that are distant apart use other nodes 
as relay, in a multi-hop routing function in network. As 
the nodes are mobile and not stable, the structure of the 
network changes dynamically and unpredictably over 
time. Ad-hoc networks are self-configuring and self-organizing, 
so to provide communication between nodes 
in the network, each node behaves as a transmitter, a host 
and a router in a network. 
Figure 2: Mobile Ad-Hoc Network 
1.2 Routing in MANETs 
Described routing is an act of moving information from a 
source to a destination in an internetwork. At least one 
intermediate node in the internetwork is encountered 
during the transfer of information. Basically two process 
are involved in the concept of considered the optimal 
routing paths for nodes and transferring the packets 
through the internetwork. The transferring of the packets 
through the internetwork is called as packet switching 
which is straight forward, and the route determination 
could be difficult. 
Routing protocols use several metrics as standard 
measurement to determine the best path for routing the 
packets to its destination node that could be number of 
hops between nodes, which are used by the routing 
algorithm to determine the optimal route for the packet to 
its destination in network. The process of path 
determination is that, routing algorithms find out and hold 
routing tables, which contain the route information for the 
packets in network. The information of route varies from 
one routing algorithm to another between nodes. The 
routing tables are filled with entries in the routing table 
are internet protocol address prefix and the next hop. 
Destination/next hop optimally by sending the packet to a 
route representing the address prefix specifies a set of 
destinations for which the routing entry is valid. Routing 
is mainly classified into static and dynamic routing. 
1.3 Stability of Nodes 
To improve routing efficiency is to select the most 
stable path so as to reduce the latency and the overhead 
due to route reconstruction. To maximize throughput 
and reduce traffic latency, it is essential to ensure 
reliable source-destination connections overtime. A 
route should therefore be selected based on some 
knowledge of the nodes motion and on a probability 
model of the path future availability. 
In MANETs, neighbors that do not change too 
frequently will not impose large control overhead in 
constructing a path from source to the destination as 
well as provide better packet delivery ratio. The 
mobility of the nodes is a complicating factor that 
significantly affects the Effectiveness and 
performance of the routing Hence it is needed to find 
out the mobility of the node with respect to itself and 
considers neighbor mobility. We propose a stability 
factor that will be computed based on self stability and 
neighbor node stability. Once after finding the stability 
factor of a node, if the node is stable, then we can 
establish a path from the source to the destination 
through intermediate stable nodes for routing the 
packets to obtain less control overheads, less delays and 
higher packet delivery ratio. A node is said to be stable, 
if a node movement is restricted to half/quarter of 
transmission range with reference to previous position. 
The stability factor of only stable nodes will be 
computed and calculated stable timing of nodes. 
Stable nodes: - To maximize throughput and reduce 
traffic latency, it is essential to ensure reliable source-destination 
connections over time. A route should therefore 
be selected based on some knowledge of the nodes motion 
and on a probability model of the path future availability. 
Efficient route repair: - If an estimate of the path duration 
is available, service disruption due to route failure can be 
avoided by creating an alternative path before the current 
one breaks. Note that having some information on the path 
duration avoids waste of radio resources due to pre-allocation 
of backup paths. 
Network connectivity: - Connectivity and topology 
characteristics of a MANETs are determined by the link 
dynamics between nodes. These are fundamental issues to 
network design, since they determine the system capability 
to support user communications and their reliability level. 
Performance evaluation: - The performances achieved by 
high-layer protocols, such as transport and application 
protocols, intemperately depend on the quality of service 
metrics obtained at the network layer. For an example, the 
duration and frequency of route disruptions have a 
significant effect on TCP behavior, video streaming and 
VoIP services. Thus, characterizing nodes stability is the 
basis to evaluate the quality of service perceived by the 
users. 
1.4 Hotspot algorithm
International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 
E-ISSN: 2321-9637 
89 
The purpose of the hotspot algorithm is to identify regions 
of local enrichment of short-read 27-mer sequence tags 
mapped to the genome. Improvement is gauged in a 
small window (250bp) relative to a local background 
model based upon the binomial distribution, by using the 
observed tags in a 50kb surrounding window. Each 
mapped tag gets a z-score for the 250bp and 50kb 
windows centered on the tag. A hotspot is defined as a 
sequence of neighboring tags within a 250bp window, 
each of those compared having z-score greater than 2. 
When the hotspot is identified in network then hotspot 
itself is assigned a z-score relative to the 250bp and 50kb 
windows centered on the average position of the tags 
forming the hotspot. 
Two-pass hotspots. A problem occurs with hotspot 
scoring in regions of very high enrichment. These 
“monster hotspots” inflate the background for neighboring 
regions in network, and deflate neighboring z-scores. The 
effect of this is regions of otherwise high enrichment can 
be shadowed by the monster. For this problem, we 
implement a two-pass hotspot scheme. After the first 
round completed of hotspot detection in area, we delete all 
tags falling in the first-pass hotspots. Then we compute a 
second round of hotspots with this deleted background. 
The hotspots from the first and second passes computed 
are then combined with each other, and all are re-scored 
using the deleted background: the number of tags in each 
hotspot is computed using all tags, but 50kb background 
windows are used only the deleted background. 
2. RELATED WORK 
Shrivastava (2013) et al. [31] in the paper “Overview of 
Routing Protocols in MANETs’s and Enhancements in 
Reactive Protocols”. An ad hoc network doesn’t have any 
centralized arbitrator or server. In MANETs each and 
every mobile node is assumed to be moving with more or 
less relative speed in arbitrary direction. MANETs have 
very enterprising use in emergency scenarios like military 
operations & disaster relief operation where there is need 
of communication network immediately following some 
major event, or some temporary requirement like 
conference & seminar at new place where there is no 
earlier network infrastructure exist and need alternative 
solution. 
Abedalmotaleb Zadin (2013)et al. [32] paper “Maintaining 
Path Stability with Node Failure in Mobile Ad Hoc 
Networks” As the demand for mobile ad hoc wireless 
network (MANET) applications grows, so does their use 
for many important services where reliability and stability 
of the communication paths are of great importance. One 
approach or existing failure recovery protocols is based on 
using backup paths, or multi-paths. Our work is focused on 
protecting the route of mobile wireless communications in 
the presence of node failure in order to improve their use in 
MANETs applications by discovering efficient stable 
communication channels with longer lifetimes and 
increased number of packets delivered. 
Basarkod(2013) et al [33] this paper “Mobility Based 
Estimation of Node Stability in MANETs” providing an 
efficient, robust and low overhead unicast path from source 
node to destination node in MANETs is a critical issue due 
to frequent changes in the network topology and mobility 
of the nodes . The stability factor of a node may be used to 
establish a path from the source to the destination. The 
stable nodes in the path will 
provide higher packet delivery ratio and lower latency 
Richard (2013) et al. [34] in this paper “On the Selection 
of Management/Monitoring Nodes in Highly Dynamic 
Networks” the problem of provisioning 
management/monitoring nodes within highly dynamic 
network environments, particularly virtual networks. A 
subset of nodes has to be chosen for 
management/monitoring, each of which will manage a 
subset of the nodes in the network. A new, simple, and 
locally optimal greedy algorithm called Pressure is 
provided for choice of node position to minimize traffic. 
This algorithm is combined with a system for predicting 
the lifespan of nodes, and a tunable parameter is also given 
so that a system operator could express a preference for 
elected nodes to be chosen to reduce traffic, to be “stable,” 
or some compromise between these positions. The 
combined algorithm called Pressure Time is lightweight 
and could be run in a distributed manner. They perform 
well, both at reducing traffic and at choosing long lifespan 
nodes. 
3. PROPOSED METHODOLOGY:- 
Mobile ad hoc network is wireless network of mobile 
nodes, with no centralized management and control. In this 
work, we present a protocol with an enhanced route 
discovery mechanism that avoids the congestion in the 
route. This protocol selects route on the basis of traffic 
load on the node and resets path as the topology changes. 
Instead of transmitting entire data through one route, new 
efficient paths are discovered from time to time during 
transmission. This is an efficient technique for 
transmissions that requires a link for longer period of time. 
In this work, we will use opportunistic routing scheme to 
manage the nodes in highly dynamic networks. In this 
work, we also use optimization technique to optimize the 
network. 
4. PROPOSED MODEL 
ı To improve stability of nodes in MANETs with the 
use of Hotspot algorithm. 
ı To improve other network parameters Congestion 
control, to maintain Quality of service in MANETs. 
ı Analyze the proposed solution using network 
simulator-2 (NS-2) 
In this work, the scenario of virtual private network is 
created. We are basically focusing on the stability of 
nodes. Stability of nodes is checked by applying
International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 
E-ISSN: 2321-9637 
Hotspot algorithm. We are applying Routing on Nodes 
in Virtual Network and stability is checked on the 
basis of parameters. The DSV protocol is used for 
routing in the network which provides better routing 
between etween nodes. It also help for controlling traffic of 
packets between en nodes in network. This protocol 
selects route on the basis of traffic load on the node 
and resets path as the topology changes. Instead of 
transmitting entire data through one route, new 
efficient paths are discovered from time to time during 
transmission. on. In this work, we are using routing 
scheme for the management of nodes in networks. 
Optimization technique is used for the optimization. 
Congestion control and quality of service is improved 
in MANETs by this work. We have also analyzed a 
the 
proposed solution olution using Network Simulator 
Simulator-2 (NS-2) 
under different network parameters. 
4.1 Flow of Work 
4.2 Algorithmic Steps 
Step 1. Develop a ad-hoc scenario. 
Step 2. Apply and deploy nodes to scenario. 
Step 3. Create hotspot effective area. 
Step 4. Hotspot area, random compromise model. 
Step 5. According to detection rate, analyze the 
probability of attack. 
Step 6. Efficiency measure, finding average 
number of false hotspots per trackback session. 
Step 7. High compromise level of filter index in 
static scenario. 
Step 8. As to suppress new route request of hotspot 
to ensure that routed traffic doesn’t compound 
congestion problem. 
Step 9. To throttle traffic locally at hotspot to force 
tcp flows to slow down. 
Step 10. Design and evaluate mechanism, that can 
seamlessly interwork with existing routing 
protocols to migrate the impact of hotspot. 
Step 11. An efficient routing is done according to 
hotspot. 
Step 12. Quality of service factor is obtained. 
5. RESULTS AND FUTURE WORK 
5.1 Simulation Table 
Parameter Name Value 
Channel Wireless channel 
Number of Nodes 10 
Antenna Omni antenna 
Network Simulator NS2.35 
Mac version 802.11 
Simulation Time 90s 
Routing protocol DSR 
Area 1000m*1000m 
Packet Size 512 
Hello Interval 2s 
Traffic Rate(packets/s) 10s 
Network Interface Physical 
Scenario 1 
Scenario 1 is shown below in figure.In this scenario 
number of nodes are deployed are 10. In this 
scenario blue line shows that data is transfer 
between nodes. 
90 
mlessly
International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 
Fig 3. data Transmission Between Node0 and 
Node4 with Node1(hotspot) 
Scenario 2 
Scenario 2 in figure 4.2 shows data transfer and 
the red line between node1 to node 3 shows that it 
is next node to transfer data. 
Fig 4. Acknowledgement send by another node to 
hotspot node 
5.2 Graphs 
1. Packet Loss 
Fig 5 Graph represent packet loss. 
E-ISSN: 2321-9637 
This graph represents loss in wireless sensor network 
in case of hotspot algorithm. These graphs represent 
that the loss become low at later levels. 
2.Throughput 
Fig 6. Represent throughput 
In above graph (figure) the throughput is shown for 
the network with hot spot or network without hotspot. 
Throughput with hotspot is higher than the 
throughput without hotspot which is representing by 
red arc and green arc representing throughp 
hotspot. 
3. Lifetime 
throughput without 
Fig 7 Graph represent various lifetime 
In this graph the lifetime is shown here the red line 
shows lifetime for ideal condition 
5. CONCLUSION 
In this work, the scenario of virtual private network 
is created. Basically focusing on the stability of 
nodes. Stability of nodes is checked by applying 
Hotspot algorithm. We are applying Routing on 
Nodes in Virtual Network and stability is checked 
on the basis of parameters. 
route on the basis of traffic load on the node and 
resets path as the topology changes. Instead of 
91 
condition. 
. This protocol selects
International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 
E-ISSN: 2321-9637 
92 
transmitting entire data through one route, new 
efficient paths are discovered from time to time 
during transmission. In this work, we are using 
routing scheme for the management of nodes in 
networks. Optimization technique is used for the 
optimization. Congestion control and quality of 
service is improved in MANETs by this work. 
Parameters taken in this work are loss, throughput, 
lifetime and on the bases of these parameter 
conclusion is drawn that hotspot is better than the 
previous system and this can be better enhance in 
future by using some optimization technique in 
hotspot algorithm. 
REFERENCES 
1. Han L, “Wireless ad-hoc network” Wireless 
personal Communication journal, Vol 4 Oct 
2004. 
2. Taniya S & Kush A, “Energy Efficient, Secure & 
Stable Routing Protocol For MANETs” Global 
Journal of Computer Science & Technology 
Network, Vol 12 Issue-10 may 2012. 
3. Mondal M.F , Ashwini A.A , Pandey K and 
Fujinoki H, “Study of MANETS routing”, 
International Journal of Network Management, 
2005; 15: 393–410. 
4. Kumar R, Misra M, and Sarje A.K, “A 
Simplified Analytical Model for End-To-End 
Delay Analysis in MANETS” IJCA Special Issue 
on “Mobile Ad-hoc Networks” MANETs, 2010. 
5. Agrawal P “Mobile Ad-hoc Network”, Center for 
Distributed & Mobile Computing, 2003. 
6. Katkar G, “MANETs –Imperatives & 
Challenges”, IJCA Special Issue in MANET, 
2010. 
7. Wahi C, Sonbhadra S.K, “ Mobile Ad Hoc 
Network Routing Protocols: 
A Comparative Study” International Journal of 
Ad hoc, Sensor & Ubiquitous Computing 
(IJASUC) Vol.3, No.2, April 2012. 
8. kumar B.R., lokanatha C. Reddy, Prakash S, 
hiremath “ Performance Comparison of Wireless 
Mobile Ad-Hoc Network Routing Protocols” 
IJCSNS International Journal of Computer 
Science and Network Security, VOL.8 No.6, 
June 2008 . 
9. Tyagi S.S, Chauhan R.K, “Performance Analysis 
of Proactive & Reactive Routing Protocol For 
Ad-hoc Network”, IJCA Vol 1 2010. 
10. Divecha1 B, Abraham A, Grosan C and Sanyal S 
” Analysis of Dynamic Source Routing and 
Destination-Sequenced Distance- Vector 
Protocols for Different Mobility models” 
Proceedings of the First Asia International 
Conference on Modelling & Simulation 
(AMS'07) 2007, IEEE. 
11. Khandakar A “Step by Step Procedural 
Comparison of DSR, AODV and DSDV Routing 
protocol ” 2012 4th International Conference on 
Computer Engineering and Technology (ICCET 
2012) IPCSIT vol.40 (2012) © (2012) IACSIT 
Press, Singapore. 
12. Lakshmi G.V, Bindhu C.R, “Congestion Control 
Avoidance in Ad-hoc Network” , ISSN Vol-2 Aug 
2011. 
13. Lien V.N, “TCP Congestion Control Mechanism 
Over Wireless Ad-hoc Network by routter – 
Assisted Approach”, cs.nccu.edu. 
14. Baskhod P.I, “Mobility Based estimation of 
Node Stability in Manets”, IEEE International 
Conference on Emerging Treads in Computing , 
Communication, 2013. 
15. HotSpot Algorithm, 
http://www.uwencode.org/proj/hotpot %20 
algorithm doc. 
16. Mondal K, “Routing Protocols in Mobile Ad-hoc 
Networks”, A Master’ thesis in computer 
science, pp-1-36, 2005. 
17. Goel A, Sharma A “Performance Analysis of 
Mobile Ad-hoc Network Using AODV Protocol” 
International Journal of Computer Science and 
Security (IJCSS), Volume (3): Issue (5) 2005. 
18. Divechal B, Abraham A, “Analysis of Dynamic 
Source Routing and Destination Sequenced 
Distant Vector Protocols For different Mobility 
Models”Proceedings of the first asia international 
Conference On Modelelling & Simulation, IEEE 
2007 
19. C.Reddy L, “Performance Comparison of 
Wireless Mobile Ad-hoc Network Routing 
Protocol”, IJCSNS, Vol-8 no-6, June 2008. 
20. Dhurandher S.K , “Node Stability Based 
Location Update In Mobile Ad-hoc network”, 
IEEE 2008. 
21. Rath, Bikas, “Implementation Comparing DSR 
And DSDV Routing Protocol for MANET” 
IJSRD, pp-1-36, 2009. 
22. Baskaran R, “A Survey On QoS based Routing 
Protocol For MANETs” International Journal of 
Computer Application, Vol-8 no-3, oct 2010. 
23. Upadhaya S, “QOS Routing Using link And 
Node Stability In Mobile Ad-hoc Networks”, 
Journal of Theoretical and Applied Information 
technology, 2011. 
24. Soujanya B, “Study of Routing Protocols in 
MANETs”, IJEST, April 2011 
25. Kishtrary M, “Performance Evaluation of 
Reactive, Proactive and Hybrid Routing 
Protocols in MANET”, International Journal on 
Computer Science & Engineering, Vol-4, Feb 
2012 
26. Kaur R & Kumar Rai M” A Novel Review on 
Routing Protocols in MANETs”. Undergraduate 
Academic Research Journal (UARJ), ISSN: 2278 
– 1129, Volume-1, Issue-1, 2012. 
27. Gupta K, “Comparison based Performance 
Analysis of UDP/CBR and TCP/FTP Traffic 
under Routing Protocol in MANET”,
International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 
E-ISSN: 2321-9637 
93 
International Journal of Computer Application, 
VoL-56, 2012. 
28. Mohan R, “A Stable Mobility Model Evaluation 
Strategy for MANETs Routing Protocol ”, 
IJARCS, VoL-2,Issue 12, Dec 2012. 
29. Ramasubramanian V, “A Hybrid Adaptive 
Routing Protocol For MANETS”, Mobihoc’03, 
June2012. 
30. Shrivastava A, “Overview of Routing Protocol in 
MANETs & Enhancements in reactive 
Protocols”, IJSRD, Vol-2, 2013. 
31. Zadin A, “Maintaining Path Stability with Node 
Failure in Mobile Ad –hoc Networks”, 
International Conference & Ambient System and 
Network Tech, June 2013. 
32. Basarkod P.I, “Mobility Based stimation of Node 
Stability in MANETs”, IEEE 2013. 
33. Richard G., Clayman S., Pavlou G., Mamatas L., 
Galis A. “On the Selection of 
Management/Monitoring Nodes in Highly 
Dynamic Networks” IEEE Transactions on 
Computers, Vol. 62, No. 6, 2013

More Related Content

What's hot

Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)IISRT
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsIAEME Publication
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony OptimizationProf Ansari
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
 

What's hot (18)

Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
A survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane tsA survey on energy aware routing issues and cross layering in mane ts
A survey on energy aware routing issues and cross layering in mane ts
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Ant Colony Optimization
Ant Colony OptimizationAnt Colony Optimization
Ant Colony Optimization
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
A02100108
A02100108A02100108
A02100108
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 

Viewers also liked

Paper id 27201447
Paper id 27201447Paper id 27201447
Paper id 27201447IJRAT
 
Paper id 24201478
Paper id 24201478Paper id 24201478
Paper id 24201478IJRAT
 
Paper id 24201463
Paper id 24201463Paper id 24201463
Paper id 24201463IJRAT
 
Paper id 212014103
Paper id 212014103Paper id 212014103
Paper id 212014103IJRAT
 
Paper id 212014136
Paper id 212014136Paper id 212014136
Paper id 212014136IJRAT
 
Paper id 252014137
Paper id 252014137Paper id 252014137
Paper id 252014137IJRAT
 
Paper id 23201417
Paper id 23201417Paper id 23201417
Paper id 23201417IJRAT
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446IJRAT
 
Paper id 24201471
Paper id 24201471Paper id 24201471
Paper id 24201471IJRAT
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445IJRAT
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451IJRAT
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429IJRAT
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464IJRAT
 
Paper id 252014139
Paper id 252014139Paper id 252014139
Paper id 252014139IJRAT
 
Paper id 21201457
Paper id 21201457Paper id 21201457
Paper id 21201457IJRAT
 
Paper id 25201444
Paper id 25201444Paper id 25201444
Paper id 25201444IJRAT
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
Paper id 24201486
Paper id 24201486Paper id 24201486
Paper id 24201486IJRAT
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417IJRAT
 
Paper id 24201458
Paper id 24201458Paper id 24201458
Paper id 24201458IJRAT
 

Viewers also liked (20)

Paper id 27201447
Paper id 27201447Paper id 27201447
Paper id 27201447
 
Paper id 24201478
Paper id 24201478Paper id 24201478
Paper id 24201478
 
Paper id 24201463
Paper id 24201463Paper id 24201463
Paper id 24201463
 
Paper id 212014103
Paper id 212014103Paper id 212014103
Paper id 212014103
 
Paper id 212014136
Paper id 212014136Paper id 212014136
Paper id 212014136
 
Paper id 252014137
Paper id 252014137Paper id 252014137
Paper id 252014137
 
Paper id 23201417
Paper id 23201417Paper id 23201417
Paper id 23201417
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
 
Paper id 24201471
Paper id 24201471Paper id 24201471
Paper id 24201471
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
Paper id 252014139
Paper id 252014139Paper id 252014139
Paper id 252014139
 
Paper id 21201457
Paper id 21201457Paper id 21201457
Paper id 21201457
 
Paper id 25201444
Paper id 25201444Paper id 25201444
Paper id 25201444
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Paper id 24201486
Paper id 24201486Paper id 24201486
Paper id 24201486
 
Paper id 25201417
Paper id 25201417Paper id 25201417
Paper id 25201417
 
Paper id 24201458
Paper id 24201458Paper id 24201458
Paper id 24201458
 

Similar to Improving Node Stability in MANETs Using Hotspot Algorithm

A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc NetworksIOSR Journals
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...IOSR Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfLaurie Smith
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.JohnWilson47710
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
 

Similar to Improving Node Stability in MANETs Using Hotspot Algorithm (20)

A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc NetworksLink Stability Based On Qos Aware On - Demand Routing In  Mobile Ad Hoc Networks
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
A0110104
A0110104A0110104
A0110104
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
E1073644
E1073644E1073644
E1073644
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 

More from IJRAT

96202108
9620210896202108
96202108IJRAT
 
97202107
9720210797202107
97202107IJRAT
 
93202101
9320210193202101
93202101IJRAT
 
92202102
9220210292202102
92202102IJRAT
 
91202104
9120210491202104
91202104IJRAT
 
87202003
8720200387202003
87202003IJRAT
 
87202001
8720200187202001
87202001IJRAT
 
86202013
8620201386202013
86202013IJRAT
 
86202008
8620200886202008
86202008IJRAT
 
86202005
8620200586202005
86202005IJRAT
 
86202004
8620200486202004
86202004IJRAT
 
85202026
8520202685202026
85202026IJRAT
 
711201940
711201940711201940
711201940IJRAT
 
711201939
711201939711201939
711201939IJRAT
 
711201935
711201935711201935
711201935IJRAT
 
711201927
711201927711201927
711201927IJRAT
 
711201905
711201905711201905
711201905IJRAT
 
710201947
710201947710201947
710201947IJRAT
 
712201907
712201907712201907
712201907IJRAT
 
712201903
712201903712201903
712201903IJRAT
 

More from IJRAT (20)

96202108
9620210896202108
96202108
 
97202107
9720210797202107
97202107
 
93202101
9320210193202101
93202101
 
92202102
9220210292202102
92202102
 
91202104
9120210491202104
91202104
 
87202003
8720200387202003
87202003
 
87202001
8720200187202001
87202001
 
86202013
8620201386202013
86202013
 
86202008
8620200886202008
86202008
 
86202005
8620200586202005
86202005
 
86202004
8620200486202004
86202004
 
85202026
8520202685202026
85202026
 
711201940
711201940711201940
711201940
 
711201939
711201939711201939
711201939
 
711201935
711201935711201935
711201935
 
711201927
711201927711201927
711201927
 
711201905
711201905711201905
711201905
 
710201947
710201947710201947
710201947
 
712201907
712201907712201907
712201907
 
712201903
712201903712201903
712201903
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Improving Node Stability in MANETs Using Hotspot Algorithm

  • 1. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 E-ISSN: 2321-9637 Improving Node Stability Using Hotspot Algorithm in 87 Mobile Ad-hoc Network Amanpreet Kaur Amandeep Kaur Department of Computer Science and Engineering, Sri Guru Granth Sahib World University, Fatehgarh sahib. cheemaaman84@yahoo.com Abstract- MANETs can manage without fixed infrastructure and can stay active rapid changes in the network topology. The primary challenge in building a MANETS is equipping each device to continuously maintain the information required to appropriately route traffic. Routing with high scalability and robust performance are the key challenges in deploying Mobile Ad-Hoc Networks. In order to operate the Ad-Hoc Networks more efficiently, suitable on-demand routing protocols have to be incorporated, to find more suitable routes between source and destination. The dynamic topology of a mobile ad hoc network (MANETS) poses a real challenge in the design of a MANETS routing protocol. Over the last many years, a variety of routing protocols have been developed and their performance simulations are made by network researchers. In the paper, we have used DSR protocol for the network. We have also emphasized on node stability which is an important consideration to enhance network efficiency. Keywords: MANETs, Routing in MANETs, Stability of Nodes, Hotspot Algorithm. 1. INTRODUCTION As the importance of computers in our daily life is the following factors: for the installation, reliability factor, increases, it also need new demands for connectivity. cost, bandwidth, required power, security and Wired connectivity have been around for a long time but performance between nodes of network. All networks there is increasing demand on working wireless solutions. were based on fixed infrastructures of nodes. Most Wireless communication between mobile users is growing common infrastructure based wireless networks are more popular than ever before. This growth is due to the cordless telephone, cellular networks, Wireless Fidelity, technological advancements in the field of computers and Microwave communication, Worldwide Interoperability communicating devices. Technology has enabled for Microwave Access, Satellite communication and computers and communicating devices (like wireless Radio Detection and Ranging etc. devices such as laptops, mobile phones, tablets, wireless modems, etc. To be equipped with radio interfaces to communicate on fly. Wireless networking increased the utility of carrying a computing device. It provides the mobile user with versatile and flexible communication and continuous access of networked services. Network without having a fixed infrastructure is another promising type of network used in communication. It is used for any areas, planned or unplanned events like in war fields or in a meeting of business people scattered geographically. This type of network can be created or destroyed when we needed and that is why it is called mobile ad-hoc network and it has no central and Figure 1: Infrastructure based wireless network controlling authority. Wireless networks are playing a major role in the area of communication network. Now we are using wireless networks for the military applications, industrial applications and also in personal area networks. The main difference between wireless and wired networks was only in communication channel. In wired networks, there exist physical medium while on the other side physical medium doesn’t exist on the wireless networks. Wireless networks became very famous in different applications considering 1.1 MANETs MANETs stand for Mobile Ad hoc Networks. Mobile implies “mobility”. Ad hoc is a Latin word and it means “for this only”. MANETs is an collection of mobile routers or nodes that communicate over wireless links. MANETs is an Infrastructure-less wireless network. The routers or nodes moves randomly and organize themselves arbitrarily. The nodes directly communicate through the wireless links between each other’s radio
  • 2. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 E-ISSN: 2321-9637 88 range of nodes, while that are distant apart use other nodes as relay, in a multi-hop routing function in network. As the nodes are mobile and not stable, the structure of the network changes dynamically and unpredictably over time. Ad-hoc networks are self-configuring and self-organizing, so to provide communication between nodes in the network, each node behaves as a transmitter, a host and a router in a network. Figure 2: Mobile Ad-Hoc Network 1.2 Routing in MANETs Described routing is an act of moving information from a source to a destination in an internetwork. At least one intermediate node in the internetwork is encountered during the transfer of information. Basically two process are involved in the concept of considered the optimal routing paths for nodes and transferring the packets through the internetwork. The transferring of the packets through the internetwork is called as packet switching which is straight forward, and the route determination could be difficult. Routing protocols use several metrics as standard measurement to determine the best path for routing the packets to its destination node that could be number of hops between nodes, which are used by the routing algorithm to determine the optimal route for the packet to its destination in network. The process of path determination is that, routing algorithms find out and hold routing tables, which contain the route information for the packets in network. The information of route varies from one routing algorithm to another between nodes. The routing tables are filled with entries in the routing table are internet protocol address prefix and the next hop. Destination/next hop optimally by sending the packet to a route representing the address prefix specifies a set of destinations for which the routing entry is valid. Routing is mainly classified into static and dynamic routing. 1.3 Stability of Nodes To improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to route reconstruction. To maximize throughput and reduce traffic latency, it is essential to ensure reliable source-destination connections overtime. A route should therefore be selected based on some knowledge of the nodes motion and on a probability model of the path future availability. In MANETs, neighbors that do not change too frequently will not impose large control overhead in constructing a path from source to the destination as well as provide better packet delivery ratio. The mobility of the nodes is a complicating factor that significantly affects the Effectiveness and performance of the routing Hence it is needed to find out the mobility of the node with respect to itself and considers neighbor mobility. We propose a stability factor that will be computed based on self stability and neighbor node stability. Once after finding the stability factor of a node, if the node is stable, then we can establish a path from the source to the destination through intermediate stable nodes for routing the packets to obtain less control overheads, less delays and higher packet delivery ratio. A node is said to be stable, if a node movement is restricted to half/quarter of transmission range with reference to previous position. The stability factor of only stable nodes will be computed and calculated stable timing of nodes. Stable nodes: - To maximize throughput and reduce traffic latency, it is essential to ensure reliable source-destination connections over time. A route should therefore be selected based on some knowledge of the nodes motion and on a probability model of the path future availability. Efficient route repair: - If an estimate of the path duration is available, service disruption due to route failure can be avoided by creating an alternative path before the current one breaks. Note that having some information on the path duration avoids waste of radio resources due to pre-allocation of backup paths. Network connectivity: - Connectivity and topology characteristics of a MANETs are determined by the link dynamics between nodes. These are fundamental issues to network design, since they determine the system capability to support user communications and their reliability level. Performance evaluation: - The performances achieved by high-layer protocols, such as transport and application protocols, intemperately depend on the quality of service metrics obtained at the network layer. For an example, the duration and frequency of route disruptions have a significant effect on TCP behavior, video streaming and VoIP services. Thus, characterizing nodes stability is the basis to evaluate the quality of service perceived by the users. 1.4 Hotspot algorithm
  • 3. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 E-ISSN: 2321-9637 89 The purpose of the hotspot algorithm is to identify regions of local enrichment of short-read 27-mer sequence tags mapped to the genome. Improvement is gauged in a small window (250bp) relative to a local background model based upon the binomial distribution, by using the observed tags in a 50kb surrounding window. Each mapped tag gets a z-score for the 250bp and 50kb windows centered on the tag. A hotspot is defined as a sequence of neighboring tags within a 250bp window, each of those compared having z-score greater than 2. When the hotspot is identified in network then hotspot itself is assigned a z-score relative to the 250bp and 50kb windows centered on the average position of the tags forming the hotspot. Two-pass hotspots. A problem occurs with hotspot scoring in regions of very high enrichment. These “monster hotspots” inflate the background for neighboring regions in network, and deflate neighboring z-scores. The effect of this is regions of otherwise high enrichment can be shadowed by the monster. For this problem, we implement a two-pass hotspot scheme. After the first round completed of hotspot detection in area, we delete all tags falling in the first-pass hotspots. Then we compute a second round of hotspots with this deleted background. The hotspots from the first and second passes computed are then combined with each other, and all are re-scored using the deleted background: the number of tags in each hotspot is computed using all tags, but 50kb background windows are used only the deleted background. 2. RELATED WORK Shrivastava (2013) et al. [31] in the paper “Overview of Routing Protocols in MANETs’s and Enhancements in Reactive Protocols”. An ad hoc network doesn’t have any centralized arbitrator or server. In MANETs each and every mobile node is assumed to be moving with more or less relative speed in arbitrary direction. MANETs have very enterprising use in emergency scenarios like military operations & disaster relief operation where there is need of communication network immediately following some major event, or some temporary requirement like conference & seminar at new place where there is no earlier network infrastructure exist and need alternative solution. Abedalmotaleb Zadin (2013)et al. [32] paper “Maintaining Path Stability with Node Failure in Mobile Ad Hoc Networks” As the demand for mobile ad hoc wireless network (MANET) applications grows, so does their use for many important services where reliability and stability of the communication paths are of great importance. One approach or existing failure recovery protocols is based on using backup paths, or multi-paths. Our work is focused on protecting the route of mobile wireless communications in the presence of node failure in order to improve their use in MANETs applications by discovering efficient stable communication channels with longer lifetimes and increased number of packets delivered. Basarkod(2013) et al [33] this paper “Mobility Based Estimation of Node Stability in MANETs” providing an efficient, robust and low overhead unicast path from source node to destination node in MANETs is a critical issue due to frequent changes in the network topology and mobility of the nodes . The stability factor of a node may be used to establish a path from the source to the destination. The stable nodes in the path will provide higher packet delivery ratio and lower latency Richard (2013) et al. [34] in this paper “On the Selection of Management/Monitoring Nodes in Highly Dynamic Networks” the problem of provisioning management/monitoring nodes within highly dynamic network environments, particularly virtual networks. A subset of nodes has to be chosen for management/monitoring, each of which will manage a subset of the nodes in the network. A new, simple, and locally optimal greedy algorithm called Pressure is provided for choice of node position to minimize traffic. This algorithm is combined with a system for predicting the lifespan of nodes, and a tunable parameter is also given so that a system operator could express a preference for elected nodes to be chosen to reduce traffic, to be “stable,” or some compromise between these positions. The combined algorithm called Pressure Time is lightweight and could be run in a distributed manner. They perform well, both at reducing traffic and at choosing long lifespan nodes. 3. PROPOSED METHODOLOGY:- Mobile ad hoc network is wireless network of mobile nodes, with no centralized management and control. In this work, we present a protocol with an enhanced route discovery mechanism that avoids the congestion in the route. This protocol selects route on the basis of traffic load on the node and resets path as the topology changes. Instead of transmitting entire data through one route, new efficient paths are discovered from time to time during transmission. This is an efficient technique for transmissions that requires a link for longer period of time. In this work, we will use opportunistic routing scheme to manage the nodes in highly dynamic networks. In this work, we also use optimization technique to optimize the network. 4. PROPOSED MODEL ı To improve stability of nodes in MANETs with the use of Hotspot algorithm. ı To improve other network parameters Congestion control, to maintain Quality of service in MANETs. ı Analyze the proposed solution using network simulator-2 (NS-2) In this work, the scenario of virtual private network is created. We are basically focusing on the stability of nodes. Stability of nodes is checked by applying
  • 4. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 E-ISSN: 2321-9637 Hotspot algorithm. We are applying Routing on Nodes in Virtual Network and stability is checked on the basis of parameters. The DSV protocol is used for routing in the network which provides better routing between etween nodes. It also help for controlling traffic of packets between en nodes in network. This protocol selects route on the basis of traffic load on the node and resets path as the topology changes. Instead of transmitting entire data through one route, new efficient paths are discovered from time to time during transmission. on. In this work, we are using routing scheme for the management of nodes in networks. Optimization technique is used for the optimization. Congestion control and quality of service is improved in MANETs by this work. We have also analyzed a the proposed solution olution using Network Simulator Simulator-2 (NS-2) under different network parameters. 4.1 Flow of Work 4.2 Algorithmic Steps Step 1. Develop a ad-hoc scenario. Step 2. Apply and deploy nodes to scenario. Step 3. Create hotspot effective area. Step 4. Hotspot area, random compromise model. Step 5. According to detection rate, analyze the probability of attack. Step 6. Efficiency measure, finding average number of false hotspots per trackback session. Step 7. High compromise level of filter index in static scenario. Step 8. As to suppress new route request of hotspot to ensure that routed traffic doesn’t compound congestion problem. Step 9. To throttle traffic locally at hotspot to force tcp flows to slow down. Step 10. Design and evaluate mechanism, that can seamlessly interwork with existing routing protocols to migrate the impact of hotspot. Step 11. An efficient routing is done according to hotspot. Step 12. Quality of service factor is obtained. 5. RESULTS AND FUTURE WORK 5.1 Simulation Table Parameter Name Value Channel Wireless channel Number of Nodes 10 Antenna Omni antenna Network Simulator NS2.35 Mac version 802.11 Simulation Time 90s Routing protocol DSR Area 1000m*1000m Packet Size 512 Hello Interval 2s Traffic Rate(packets/s) 10s Network Interface Physical Scenario 1 Scenario 1 is shown below in figure.In this scenario number of nodes are deployed are 10. In this scenario blue line shows that data is transfer between nodes. 90 mlessly
  • 5. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 Fig 3. data Transmission Between Node0 and Node4 with Node1(hotspot) Scenario 2 Scenario 2 in figure 4.2 shows data transfer and the red line between node1 to node 3 shows that it is next node to transfer data. Fig 4. Acknowledgement send by another node to hotspot node 5.2 Graphs 1. Packet Loss Fig 5 Graph represent packet loss. E-ISSN: 2321-9637 This graph represents loss in wireless sensor network in case of hotspot algorithm. These graphs represent that the loss become low at later levels. 2.Throughput Fig 6. Represent throughput In above graph (figure) the throughput is shown for the network with hot spot or network without hotspot. Throughput with hotspot is higher than the throughput without hotspot which is representing by red arc and green arc representing throughp hotspot. 3. Lifetime throughput without Fig 7 Graph represent various lifetime In this graph the lifetime is shown here the red line shows lifetime for ideal condition 5. CONCLUSION In this work, the scenario of virtual private network is created. Basically focusing on the stability of nodes. Stability of nodes is checked by applying Hotspot algorithm. We are applying Routing on Nodes in Virtual Network and stability is checked on the basis of parameters. route on the basis of traffic load on the node and resets path as the topology changes. Instead of 91 condition. . This protocol selects
  • 6. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 E-ISSN: 2321-9637 92 transmitting entire data through one route, new efficient paths are discovered from time to time during transmission. In this work, we are using routing scheme for the management of nodes in networks. Optimization technique is used for the optimization. Congestion control and quality of service is improved in MANETs by this work. Parameters taken in this work are loss, throughput, lifetime and on the bases of these parameter conclusion is drawn that hotspot is better than the previous system and this can be better enhance in future by using some optimization technique in hotspot algorithm. REFERENCES 1. Han L, “Wireless ad-hoc network” Wireless personal Communication journal, Vol 4 Oct 2004. 2. Taniya S & Kush A, “Energy Efficient, Secure & Stable Routing Protocol For MANETs” Global Journal of Computer Science & Technology Network, Vol 12 Issue-10 may 2012. 3. Mondal M.F , Ashwini A.A , Pandey K and Fujinoki H, “Study of MANETS routing”, International Journal of Network Management, 2005; 15: 393–410. 4. Kumar R, Misra M, and Sarje A.K, “A Simplified Analytical Model for End-To-End Delay Analysis in MANETS” IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010. 5. Agrawal P “Mobile Ad-hoc Network”, Center for Distributed & Mobile Computing, 2003. 6. Katkar G, “MANETs –Imperatives & Challenges”, IJCA Special Issue in MANET, 2010. 7. Wahi C, Sonbhadra S.K, “ Mobile Ad Hoc Network Routing Protocols: A Comparative Study” International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.2, April 2012. 8. kumar B.R., lokanatha C. Reddy, Prakash S, hiremath “ Performance Comparison of Wireless Mobile Ad-Hoc Network Routing Protocols” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008 . 9. Tyagi S.S, Chauhan R.K, “Performance Analysis of Proactive & Reactive Routing Protocol For Ad-hoc Network”, IJCA Vol 1 2010. 10. Divecha1 B, Abraham A, Grosan C and Sanyal S ” Analysis of Dynamic Source Routing and Destination-Sequenced Distance- Vector Protocols for Different Mobility models” Proceedings of the First Asia International Conference on Modelling & Simulation (AMS'07) 2007, IEEE. 11. Khandakar A “Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol ” 2012 4th International Conference on Computer Engineering and Technology (ICCET 2012) IPCSIT vol.40 (2012) © (2012) IACSIT Press, Singapore. 12. Lakshmi G.V, Bindhu C.R, “Congestion Control Avoidance in Ad-hoc Network” , ISSN Vol-2 Aug 2011. 13. Lien V.N, “TCP Congestion Control Mechanism Over Wireless Ad-hoc Network by routter – Assisted Approach”, cs.nccu.edu. 14. Baskhod P.I, “Mobility Based estimation of Node Stability in Manets”, IEEE International Conference on Emerging Treads in Computing , Communication, 2013. 15. HotSpot Algorithm, http://www.uwencode.org/proj/hotpot %20 algorithm doc. 16. Mondal K, “Routing Protocols in Mobile Ad-hoc Networks”, A Master’ thesis in computer science, pp-1-36, 2005. 17. Goel A, Sharma A “Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol” International Journal of Computer Science and Security (IJCSS), Volume (3): Issue (5) 2005. 18. Divechal B, Abraham A, “Analysis of Dynamic Source Routing and Destination Sequenced Distant Vector Protocols For different Mobility Models”Proceedings of the first asia international Conference On Modelelling & Simulation, IEEE 2007 19. C.Reddy L, “Performance Comparison of Wireless Mobile Ad-hoc Network Routing Protocol”, IJCSNS, Vol-8 no-6, June 2008. 20. Dhurandher S.K , “Node Stability Based Location Update In Mobile Ad-hoc network”, IEEE 2008. 21. Rath, Bikas, “Implementation Comparing DSR And DSDV Routing Protocol for MANET” IJSRD, pp-1-36, 2009. 22. Baskaran R, “A Survey On QoS based Routing Protocol For MANETs” International Journal of Computer Application, Vol-8 no-3, oct 2010. 23. Upadhaya S, “QOS Routing Using link And Node Stability In Mobile Ad-hoc Networks”, Journal of Theoretical and Applied Information technology, 2011. 24. Soujanya B, “Study of Routing Protocols in MANETs”, IJEST, April 2011 25. Kishtrary M, “Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in MANET”, International Journal on Computer Science & Engineering, Vol-4, Feb 2012 26. Kaur R & Kumar Rai M” A Novel Review on Routing Protocols in MANETs”. Undergraduate Academic Research Journal (UARJ), ISSN: 2278 – 1129, Volume-1, Issue-1, 2012. 27. Gupta K, “Comparison based Performance Analysis of UDP/CBR and TCP/FTP Traffic under Routing Protocol in MANET”,
  • 7. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014 E-ISSN: 2321-9637 93 International Journal of Computer Application, VoL-56, 2012. 28. Mohan R, “A Stable Mobility Model Evaluation Strategy for MANETs Routing Protocol ”, IJARCS, VoL-2,Issue 12, Dec 2012. 29. Ramasubramanian V, “A Hybrid Adaptive Routing Protocol For MANETS”, Mobihoc’03, June2012. 30. Shrivastava A, “Overview of Routing Protocol in MANETs & Enhancements in reactive Protocols”, IJSRD, Vol-2, 2013. 31. Zadin A, “Maintaining Path Stability with Node Failure in Mobile Ad –hoc Networks”, International Conference & Ambient System and Network Tech, June 2013. 32. Basarkod P.I, “Mobility Based stimation of Node Stability in MANETs”, IEEE 2013. 33. Richard G., Clayman S., Pavlou G., Mamatas L., Galis A. “On the Selection of Management/Monitoring Nodes in Highly Dynamic Networks” IEEE Transactions on Computers, Vol. 62, No. 6, 2013