SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering Research and Development 
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com 
Volume 10, Issue 6 (June 2014), PP.38-41 
A Reliable data delivery in Mobile Ad hoc Network, 
Simulation Study 
Anil Kulkarni1, Arati Gouri2 
1Computer Science and Engineering, GNDEC Bidar , Karnataka. 
2Computer Science and Engineering, GNDEC Bidar , Karnataka 
Abstract:- In this, the problem of delivering data packets for highly dynamic mobile ad hoc 
network in a consistently good in quality or performance and the data to be trusted. The 
existing ad hoc routing protocols are vulnerable to node mobility. If route fails , the existing 
protocol called end-to-end protocol is not capable of discovering and recovering of route. To 
overcome the problem of existing protocol we introduce a new protocol called Position based 
routing protocol. The position based opportunistic routing protocol which takes the advantage 
of property of stateless indicates that no node in a network does not maintain any routing 
table and broadcast nature of wireless network. In the case of communication, virtual 
destination based void handling scheme is further proposed to work together with position 
based opportunistic routing protocol. 
Keywords:- Geographic routing, Mobile adhoc network, reliable data delivery. 
I. INTRODUCTION 
By definition, Mobile Ad hoc Network (MANET) is a collection of mobile nodes equipped with both a 
wireless source and destination that communicate with each other via bidirectional wireless links either directly 
or indirectly. 
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile 
devices connected without wires. Each device in a MANET is free to move independently in any direction, 
therefore change its links to other devices frequently. Geo-graphic routing uses hop by hop routing to forward 
the packets by making use of the location information. 
The problem in the existing protocol is delivering of data packets in reliable and timely manner. The 
problem occurs because the existing protocol uses predetermination of route, this problem occurs because, if 
there is a route failure discovering of new route and recovering of failed route consume more time. 
So to overcome the above problem the position based opportunistic routing protocol will be introduced. In 
position based opportunistic routing protocol nodes are made as forwarding candidates and the suboptimal 
nodes also involved in packet forwarding. 
If the best forwarder node does not forward the packet in certain time slot, the suboptimal candidates will 
forward the packets according to their order and from this any one of the candidates succeeds in receiving and 
forwarding the packets to destination and transmission route will not be interrupted for any reason. 
An electronic copy can be downloaded from the conference website. For questions on paper 
guidelines, please contact the publications committee as indicated on the website. Information about final paper 
submission is available from the website. 
II. EXISTING SYSTEM 
Geo-graphic routing uses hop-by-hop routing which forwards the packets by using location information. 
To select next node forwarder with the positive progress towards the destination the greedy forwarding is used. 
In the greedy forwarding, the node which is far from the sender node is chosen as next node and if this node 
moves out of the senders coverage area the transmission will fails. 
The error in wireless channel and the dynamic network infrastructure, reliable data delivery in MANETs, in 
challenged environments with high mobility remains an issue. 
It is very difficult to maintain route deterministic for constant and fast changing network topology .Once the 
path fails it consumes more time for path recovery and discovery of new path. 
38
A Reliable data delivery in Mobile Ad hoc Network, Simulation Study 
III. PROPOSED SYSTEM 
To overcome the existing system problem, the position based opportunistic routing protocol is 
39 
proposed. 
In the position based opportunistic routing protocol the nodes which are involved in the transmission 
will be used as forwarding candidates and suboptimal node also used as forwarder if main forwarding nodes are 
not involve in the transmission. If the best forwarder node does not forward the packet in a given time slot, the 
suboptimal node involved in the transmission of the packets[2]. 
The modules which are used in the proposed system are given as follows: 
A. Position based opportunistic routing protocol (POR) 
B. Selection and prioritisation of forwarding candidate 
A. Position based opportunistic routing protocol (POR) 
The POR (position based opportunistic routing protocol) design is based on geographic routing and 
opportunistic forwarding. The nodes which are involved in the POR operation are assumed to be aware of their 
location and position of the neighbors node. The neighbors node information can be exchanged using piggyback 
in the data packets header. While for the position of the destination, we assumed that location registration and 
lookup service which maps node addresses. 
In the POR operation if the source node wants to forward the packet, the source node gets the location of 
the destination and attaches it to the packet header. Due to destination nodes transmission the multiple node path 
may splits from the original or true location of the final destination and the packet may drop even if it has 
already been delivered into the destination. 
B. Selection and prioritisation of forwarding candidate 
The selection and prioritization of forwarding nodes are one of the key problems in POR. The nodes located 
in the forwarding area would get the chance to be backup nodes. Forwarding area is found by source node and 
next node of the source node. There are two conditions which satisfies the node which is located in the given 
range of forwarding area 
a) It makes the positive progress towards the receiver 
b) In the forwarding region all nodes must have distance in such a way that they all must here one another 
and it should not be half of the transmission range of wireless node (i.e., R=2). 
IV. PERFORMANCE EVALUTION 
Network simulation is used to calculate the performance of POR and AOMDV (multipath routing 
protocol) is comparing with GPSR. Some of the simulation parameters which are using in simulation are given 
in the following table[1] . 
Parameter Value 
MAC protocol 
Propagation model 
Transmission range 
Traffic type 
Packet size 
Number of nodes 
Simulation time 
IEEE 802.11 
Two ray ground 
100m 
Constant bit rate 
100 
40 
5.0
A Reliable data delivery in Mobile Ad hoc Network, Simulation Study 
40 
The following are used for performance comparison: 
A. Packet delivery ratio : The ratio of the no of data packets received at the destination to the no of data 
packets send by the source. 
B. End-to-End latency : The total end-to-end delay are evaluated, together with cumulative distribution function 
of the delay. 
C. Path length: The average end-to-end path length(no of nodes) for successful packet delivery. 
Packet forwarding times per hop (FTH): The average number of times a packet Is being forwarded from the 
routing layer to deliver a data packet over each hop[1]. 
D. Packet forwarding times per packet (FTP): The average number of times a packet is being forwarded to 
deliver data packets from source to destination. 
V. RELATED WORK 
Multipath routing is used in wireless medium to increase the reliability of data transmission [2]. Existing 
multipath routing protocols are classified into the following types: 
a. Using different available paths[3][4] 
b. Packets replication with multiple paths 
c. Split and multipath delivery and reconstruction using some coding techniques. 
The connectivity between the mobile node and base station server can be improved by making use of 
opportunistic forwarding [5]. 
VI. RESULT 
In this module, the performance of the proposed method is analyzed. Based on the analyzed results X-graphs 
are plotted. Delay is the basic parameters considered here and X-graph is plotted for this parameters. 
In this graph we are comparing existing system with proposed system. By observing this graph we 
conclude that the delay proposed system is better than existing system. 
VII. CONCLUSION 
To addresses the problem of data delivery in reliable manner for Highly dynamic Mobile adhoc 
Networks changing of network infrastructure makes the adhoc protocols incapable of providing required 
performance. In case of link or path break due to the node mobility the data packets which are within the 
forwarding area get lost before discovery of new path. To overcome this problem a new protocol is proposed 
called POR[1]. 
In the POR the forwarding area will be assumed within and the nodes are selected must be within the 
transmission range and these nodes will be further use for the transmission of data packets and the distance 
between them must be in such a way that nodes must her one another and because of this nodes can share all 
node information from one node to another node and make of this there will be no failure of path and all the 
data packets must be delivered correctly in time to the destination.
A Reliable data delivery in Mobile Ad hoc Network, Simulation Study 
REFERENCES 
[1]. Shengbo Yang,Chal Kiat Yeo and Bu Sung Lee “Towards reliable data delivery for highly dynamic 
mobile ad hoc networks,” IEEE Trans. Mobile Computing, vol. 11, no. 1, Jan 2012. 
[2]. M. Marina and S. Das, “On-Demand Multipath Distance Vector Routing in Ad Hoc Networks,” Proc. 
Ninth Int’l Conf. Network Protocols (ICNP ’01), pp. 14-23, Nov. 2001. 
[3]. D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly Resilient, Energy-Efficient Multipath 
Routing in Wireless Sensor Networks,” ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 
5, no. 4, pp. 11-25, 2001. 
[4]. A. Valera, W. Seah, and S. Rao, “Improving Protocol Robustness in Ad Hoc Networks through 
Cooperative Packet Caching and Shortest Multipath Routing,” IEEE Trans. Mobile Computing, vol. 4, 
no. 5, pp. 443-457, Sept./Oct. 2005. 
[5]. M.-H. Lu, P. Steenkiste, and T. Chen, “Design, Implementation and Evaluation of an Efficient 
Opportunistic Retransmission Protocol,” Proc. ACM MobiCom, pp. 73-84, 2009. 
41

More Related Content

What's hot

Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...ijwmn
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)IISRT
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingIOSR Journals
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 

What's hot (18)

218
218218
218
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWO...
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Efficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided RoutingEfficient Utilization of Bandwidth in Location Aided Routing
Efficient Utilization of Bandwidth in Location Aided Routing
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
A02100108
A02100108A02100108
A02100108
 
A340105
A340105A340105
A340105
 

Viewers also liked

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Geo connections presentation
Geo connections presentationGeo connections presentation
Geo connections presentationTrishelnine
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Pratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligentiPratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligentiilTempe
 
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISEUSB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISEUSB Promosi Indonesia
 
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_ideesMichael Launay
 
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?Alon Eini
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Viewers also liked (17)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A1080107
A1080107A1080107
A1080107
 
Geo connections presentation
Geo connections presentationGeo connections presentation
Geo connections presentation
 
A1060104
A1060104A1060104
A1060104
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1083237
E1083237E1083237
E1083237
 
Pratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligentiPratosmart: non esiste città intelligente senza cittadini intelligenti
Pratosmart: non esiste città intelligente senza cittadini intelligenti
 
W. nee-batismo-parte-1
W. nee-batismo-parte-1W. nee-batismo-parte-1
W. nee-batismo-parte-1
 
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISEUSB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
USB FLASH DISK PROMOSI - BARANG SOUVENIR MERCHANDISE
 
Láminas de anatomia patológica leucemia
Láminas de anatomia patológica leucemiaLáminas de anatomia patológica leucemia
Láminas de anatomia patológica leucemia
 
Ivete
IveteIvete
Ivete
 
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
2016 03-04-manuel utilisateur-nova-ideo_version_boite_a_idees
 
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
מאחורי הקלעים של חוויית משתמש - איך מייצרים חוויית משתמש ממכרת?
 
Ap grades 7 10 cg
Ap grades 7 10 cgAp grades 7 10 cg
Ap grades 7 10 cg
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Similar to International Journal of Engineering Research and Development

Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...IAESIJAI
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
Efficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETsEfficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETsidescitation
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms IJECEIAES
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)nIAESIJEECS
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153IJRAT
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
 

Similar to International Journal of Engineering Research and Development (20)

Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
E0942531
E0942531E0942531
E0942531
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
E010322531
E010322531E010322531
E010322531
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
A2546035115
A2546035115A2546035115
A2546035115
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
Efficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETsEfficient Destination Discovery using Geographical Gossiping in MANETs
Efficient Destination Discovery using Geographical Gossiping in MANETs
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.38-41 A Reliable data delivery in Mobile Ad hoc Network, Simulation Study Anil Kulkarni1, Arati Gouri2 1Computer Science and Engineering, GNDEC Bidar , Karnataka. 2Computer Science and Engineering, GNDEC Bidar , Karnataka Abstract:- In this, the problem of delivering data packets for highly dynamic mobile ad hoc network in a consistently good in quality or performance and the data to be trusted. The existing ad hoc routing protocols are vulnerable to node mobility. If route fails , the existing protocol called end-to-end protocol is not capable of discovering and recovering of route. To overcome the problem of existing protocol we introduce a new protocol called Position based routing protocol. The position based opportunistic routing protocol which takes the advantage of property of stateless indicates that no node in a network does not maintain any routing table and broadcast nature of wireless network. In the case of communication, virtual destination based void handling scheme is further proposed to work together with position based opportunistic routing protocol. Keywords:- Geographic routing, Mobile adhoc network, reliable data delivery. I. INTRODUCTION By definition, Mobile Ad hoc Network (MANET) is a collection of mobile nodes equipped with both a wireless source and destination that communicate with each other via bidirectional wireless links either directly or indirectly. A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Each device in a MANET is free to move independently in any direction, therefore change its links to other devices frequently. Geo-graphic routing uses hop by hop routing to forward the packets by making use of the location information. The problem in the existing protocol is delivering of data packets in reliable and timely manner. The problem occurs because the existing protocol uses predetermination of route, this problem occurs because, if there is a route failure discovering of new route and recovering of failed route consume more time. So to overcome the above problem the position based opportunistic routing protocol will be introduced. In position based opportunistic routing protocol nodes are made as forwarding candidates and the suboptimal nodes also involved in packet forwarding. If the best forwarder node does not forward the packet in certain time slot, the suboptimal candidates will forward the packets according to their order and from this any one of the candidates succeeds in receiving and forwarding the packets to destination and transmission route will not be interrupted for any reason. An electronic copy can be downloaded from the conference website. For questions on paper guidelines, please contact the publications committee as indicated on the website. Information about final paper submission is available from the website. II. EXISTING SYSTEM Geo-graphic routing uses hop-by-hop routing which forwards the packets by using location information. To select next node forwarder with the positive progress towards the destination the greedy forwarding is used. In the greedy forwarding, the node which is far from the sender node is chosen as next node and if this node moves out of the senders coverage area the transmission will fails. The error in wireless channel and the dynamic network infrastructure, reliable data delivery in MANETs, in challenged environments with high mobility remains an issue. It is very difficult to maintain route deterministic for constant and fast changing network topology .Once the path fails it consumes more time for path recovery and discovery of new path. 38
  • 2. A Reliable data delivery in Mobile Ad hoc Network, Simulation Study III. PROPOSED SYSTEM To overcome the existing system problem, the position based opportunistic routing protocol is 39 proposed. In the position based opportunistic routing protocol the nodes which are involved in the transmission will be used as forwarding candidates and suboptimal node also used as forwarder if main forwarding nodes are not involve in the transmission. If the best forwarder node does not forward the packet in a given time slot, the suboptimal node involved in the transmission of the packets[2]. The modules which are used in the proposed system are given as follows: A. Position based opportunistic routing protocol (POR) B. Selection and prioritisation of forwarding candidate A. Position based opportunistic routing protocol (POR) The POR (position based opportunistic routing protocol) design is based on geographic routing and opportunistic forwarding. The nodes which are involved in the POR operation are assumed to be aware of their location and position of the neighbors node. The neighbors node information can be exchanged using piggyback in the data packets header. While for the position of the destination, we assumed that location registration and lookup service which maps node addresses. In the POR operation if the source node wants to forward the packet, the source node gets the location of the destination and attaches it to the packet header. Due to destination nodes transmission the multiple node path may splits from the original or true location of the final destination and the packet may drop even if it has already been delivered into the destination. B. Selection and prioritisation of forwarding candidate The selection and prioritization of forwarding nodes are one of the key problems in POR. The nodes located in the forwarding area would get the chance to be backup nodes. Forwarding area is found by source node and next node of the source node. There are two conditions which satisfies the node which is located in the given range of forwarding area a) It makes the positive progress towards the receiver b) In the forwarding region all nodes must have distance in such a way that they all must here one another and it should not be half of the transmission range of wireless node (i.e., R=2). IV. PERFORMANCE EVALUTION Network simulation is used to calculate the performance of POR and AOMDV (multipath routing protocol) is comparing with GPSR. Some of the simulation parameters which are using in simulation are given in the following table[1] . Parameter Value MAC protocol Propagation model Transmission range Traffic type Packet size Number of nodes Simulation time IEEE 802.11 Two ray ground 100m Constant bit rate 100 40 5.0
  • 3. A Reliable data delivery in Mobile Ad hoc Network, Simulation Study 40 The following are used for performance comparison: A. Packet delivery ratio : The ratio of the no of data packets received at the destination to the no of data packets send by the source. B. End-to-End latency : The total end-to-end delay are evaluated, together with cumulative distribution function of the delay. C. Path length: The average end-to-end path length(no of nodes) for successful packet delivery. Packet forwarding times per hop (FTH): The average number of times a packet Is being forwarded from the routing layer to deliver a data packet over each hop[1]. D. Packet forwarding times per packet (FTP): The average number of times a packet is being forwarded to deliver data packets from source to destination. V. RELATED WORK Multipath routing is used in wireless medium to increase the reliability of data transmission [2]. Existing multipath routing protocols are classified into the following types: a. Using different available paths[3][4] b. Packets replication with multiple paths c. Split and multipath delivery and reconstruction using some coding techniques. The connectivity between the mobile node and base station server can be improved by making use of opportunistic forwarding [5]. VI. RESULT In this module, the performance of the proposed method is analyzed. Based on the analyzed results X-graphs are plotted. Delay is the basic parameters considered here and X-graph is plotted for this parameters. In this graph we are comparing existing system with proposed system. By observing this graph we conclude that the delay proposed system is better than existing system. VII. CONCLUSION To addresses the problem of data delivery in reliable manner for Highly dynamic Mobile adhoc Networks changing of network infrastructure makes the adhoc protocols incapable of providing required performance. In case of link or path break due to the node mobility the data packets which are within the forwarding area get lost before discovery of new path. To overcome this problem a new protocol is proposed called POR[1]. In the POR the forwarding area will be assumed within and the nodes are selected must be within the transmission range and these nodes will be further use for the transmission of data packets and the distance between them must be in such a way that nodes must her one another and because of this nodes can share all node information from one node to another node and make of this there will be no failure of path and all the data packets must be delivered correctly in time to the destination.
  • 4. A Reliable data delivery in Mobile Ad hoc Network, Simulation Study REFERENCES [1]. Shengbo Yang,Chal Kiat Yeo and Bu Sung Lee “Towards reliable data delivery for highly dynamic mobile ad hoc networks,” IEEE Trans. Mobile Computing, vol. 11, no. 1, Jan 2012. [2]. M. Marina and S. Das, “On-Demand Multipath Distance Vector Routing in Ad Hoc Networks,” Proc. Ninth Int’l Conf. Network Protocols (ICNP ’01), pp. 14-23, Nov. 2001. [3]. D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks,” ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 5, no. 4, pp. 11-25, 2001. [4]. A. Valera, W. Seah, and S. Rao, “Improving Protocol Robustness in Ad Hoc Networks through Cooperative Packet Caching and Shortest Multipath Routing,” IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 443-457, Sept./Oct. 2005. [5]. M.-H. Lu, P. Steenkiste, and T. Chen, “Design, Implementation and Evaluation of an Efficient Opportunistic Retransmission Protocol,” Proc. ACM MobiCom, pp. 73-84, 2009. 41