SlideShare a Scribd company logo
1 of 3
Download to read offline
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 8, No. 3, December 2017, pp. 712 ~ 714
DOI: 10.11591/ijeecs.v8.i3.pp712-714  712
Received August 3, 2017; Revised October 25, 2017; Accepted November 9, 2017
Immensely Discriminate Routing in Wireless Networks
Sujatha V*, EA Mary Anitha
AMET University, Chennai
Wireless networks are predictable to grant essential Internet access multimedia traffic service
also increasingly such networks have been emerged in real life. However, the application scenarios is
indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in
wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop
routing in wireless network. Here, node distance, node link, node trust and node quality of service is
evaluated the next hop. This parameters are determined an efficient path in the wireless network.
Keywords: Distance, quality of service, wireless network, trust, link quality
Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved.
1. Materials and Methods
In wireless network, video traffic has become a well-liked subject with the huge use of
smart phones. Handling best quality of transferred video from the user perception is important.
The quality of the video is affected either by the alteration or deformation due to channel
induced errors and interference losses, route inaccessibility owing to mobility of nodes,
untrustworthiness of links and lack of security. To overcome these problems, we propose
proficiently choose an instant next hop for routing information in the wireless network. The
wireless link represents the connectivity between the nodes. Transmit the hello messages is
one of the techniques for know the condition of the links ([8] and [9]). The other methods for
receiving link dynamics can be established in [10], [11] and [12]. This method is useful for find
the quality of the link before data is transmitted to a node to avoid link failures.
Trust is a parameter for find the node is legitimate or illegitimate in the network that
helps in route selection. Many methods of trust present in the literature – both centralized and
decentralized trust mechanisms. A technique particularly designed for ad hoc networks is
established]. A survey for trust method is presented. These are classified the nodes depend on
the trust. Quality of Service is representing the successful transmission data from source to
destination in wireless network. Some of the techniques existing have been reasonably
successful in improving the network performance. A survey of all the QoS based routing
protocols have explained the importance of QoS. The numerous routing methods were
proposed that explained multiple radio parameters. In this paper also described in, Media
Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless
Ad Hoc Network [14]. Hash based Technique to Identify the Selfish Node in Mobile Ad-hoc
Network [15]. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks [16].
2. Immensely Discriminate Routing in Wireless Networks
To reach the highest effectiveness, we propose the Immensely Discriminate Routing
protocol for improve the multi-hop routing. In this scheme, the next hop node selection based on
node link, Distance and quality of Service parameters. The above parameters are determined
the next hop selection is evaluated by matrix.
j j
j j
NL ND
NT Q
NH
oS
 
  
 
(1)
Where,
jNL Node Link
jND Node Distance
IJEECS ISSN: 2502-4752 
Immensely Discriminate Routing in Wireless Networks (Sujatha V)
713
jNT Node Trust
jQoS Node quality of Service
Figure 1. Illustration of Wireless Network
The Immensely Discriminate Routing protocol applies three stages of routing such as
the source node is stage 1, its instant adjacent node is stage 2 as well as the stage 3 contains
the adjacent of adjacent is illustrate in Figure 1. In Wireless Network, the distance is an
important factor for finding the route. The link information are dynamically received from the
Medium Access Control. The trust measurement is used to find out the node is legitimate.
Quality of service represents the presentation of a node in a network.
3. Conclusion
In this paper, we proposed Immensely Discriminate Routing protocol is used for multi-
hop routing in wireless network. The node distance, link, trust and node quality of service is
evaluated to fining the next hop. This parameters are determined an efficient path in the
wireless network. This parameters are provide efficiency path and reached better throughput in
wireless network.
References
[1] VC Giruka and M Singhal. Hello protocols for ad-hoc networks: overhead and accuracy tradeoffs. In
Proc. Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
354–361
[2] Seon Yeong Han and Dongman Lee. An Adaptive Hello Messaging Scheme for Neighbor Discovery
in On-Demand MANET Routing Protocols. IEEE Communications Letters. 2013; 17(5).
[3] KH Kim and KG Shin. On accurate measurement of link quality in multi-hop wireless mesh networks.
In Proc. ACM MobiCom ’06. 2006: 38–49.
[4] R Fonseca, O Gnawali, K Jamieson and P Levis. Four-bit wireless link estimation. In Proc. HotNets
VI. 2007.
[5] J Sanchez, R Marin-Perez and P Ruiz. BOSS: Beacon-less on demand strategy for geographic
routing inwireless sensor networks. In Proc. IEEE MASS ’07. 1–10.
[6] RC Mayer, JH Davis and FD Schoorman. An Integrative Model of Organizational Trust. Academy of
Management Review. 1995; 20(3): 709-734.
[7] M Blaze, J Feigenbaum and J Lacy. Decentralized trust management. In Security and Privacy, 1996.
Proceedings. 1996 IEEE Symposium on Security and Privacy. 1996: 164–173.
[8] AA Pirzada and C Mcdonald. Trust Establishment in Pure Ad hoc Networks. Wireless Personal
Communications. 2006; 37(1-2): 139-168.
[9] Kannan Govindan and Prasant Mohapatra. Trust Computations and Trust Dynamics in Mobile Adhoc
Networks: A Survey. IEEE Communications Surveys & Tutorials. 2012; 14(2). DOI:
 ISSN: 2502-4752
IJEECS Vol. 8, No. 3, December 2017 : 712 – 714
714
10.1109/SURV.2011.042711.00083
[10] George Apostolopoulos, Roch Guérin, Sanjay Kamat, Satish K Tripathi. Quality of service based
routing: a performance perspective. ACM SIGCOMM Computer Communication Review. 1998; 28(4):
17-28. DOI: 10.1145/285243.285251
[11] Gabriel Ioan Ivascu, Samuel Pierre, Alejandro Quintero. QoS routing with traffic distribution in mobile
ad hoc networks. Computer Communications. 2009; 32(2): 305–316. DOI:
10.1016/j.comcom.2008.10.012
[12] Lajos Hanzo II and Rahim Tafazolli. A Survey of Qos Routing Solutions for Mobile Ad Hoc Networks.
IEEE Communications Surveys. 2007; 9(2).
[13] Tabatabaei S. Multiple criteria routing algorithms to increase durability path in mobile ad hoc
networks. International Conference for Internet Technology and Secured Transactions. 2009: 1 – 5
6060), CSI.
[14] Shah RD and Singh SK. Media Access Delay and Throughput Analysis of Voice Codec with Silence
Suppression on Wireless Ad Hoc Network. Procedia Computer Science. 2016; 79: 940-947.
[15] Vennila G and Arivazhagan D. Hash based Technique to Identify the Selfish Node in Mobile Ad-hoc
Network. Indian Journal of Science and Technology. 2015; 8(14): 1.
[16] Ahmed AS, Kumaran TS, Syed SSA & Subburam S. Cross-Layer Design Approach for Power Control
in Mobile Ad Hoc Networks. Egyptian Informatics Journal. 2015; 16(1): 1-7.

More Related Content

What's hot

A Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc NetworksA Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc Networkspijans
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...IJCNCJournal
 
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks Yayah Zakaria
 
A survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkA survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkijcses
 
A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies Radha Mahalle
 
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Editor IJARCET
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSijwmn
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...ijmnct
 
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Provisioning Quality of Service of Wireless  Telemedicine for E-health Services Provisioning Quality of Service of Wireless  Telemedicine for E-health Services
Provisioning Quality of Service of Wireless Telemedicine for E-health Services Mustafa Algaet
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429IJRAT
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 
Network parameters impact on dynamic transmission power control in vehicular ...
Network parameters impact on dynamic transmission power control in vehicular ...Network parameters impact on dynamic transmission power control in vehicular ...
Network parameters impact on dynamic transmission power control in vehicular ...ijngnjournal
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkAn efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEKARTHIKEYAN V
 

What's hot (17)

A Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc NetworksA Trust-Based Predictive Model for Mobile Ad Hoc Networks
A Trust-Based Predictive Model for Mobile Ad Hoc Networks
 
C0941017
C0941017C0941017
C0941017
 
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
MAR SECURITY: IMPROVED SECURITY MECHANISM FOR EMERGENCY MESSAGES OF VANET USI...
 
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
A Vertical Handover Algorithm in Integrated Macrocell Femtocell Networks
 
A survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access networkA survey on cost effective survivable network design in wireless access network
A survey on cost effective survivable network design in wireless access network
 
A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies A Brief Review on: Evolution of Communication Technologies
A Brief Review on: Evolution of Communication Technologies
 
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...Dynamic resource allocation for opportunistic software-defined IoT networks: s...
Dynamic resource allocation for opportunistic software-defined IoT networks: s...
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKSBIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
BIO-INSPIRED SEAMLESS VERTICAL HANDOVER ALGORITHM FOR VEHICULAR AD HOC NETWORKS
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
 
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
Provisioning Quality of Service of Wireless  Telemedicine for E-health Services Provisioning Quality of Service of Wireless  Telemedicine for E-health Services
Provisioning Quality of Service of Wireless Telemedicine for E-health Services
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
Network parameters impact on dynamic transmission power control in vehicular ...
Network parameters impact on dynamic transmission power control in vehicular ...Network parameters impact on dynamic transmission power control in vehicular ...
Network parameters impact on dynamic transmission power control in vehicular ...
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile networkAn efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for future mobile network
 
V.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLEV.KARTHIKEYAN PUBLISHED ARTICLE
V.KARTHIKEYAN PUBLISHED ARTICLE
 

Similar to 33 9140 it immensely discriminate routing in wireless (edit lafi)

AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETSAN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETSIRJET Journal
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET Journal
 
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKijsrd.com
 
11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols forAlexander Decker
 
Application-Based QoS Evaluation of Heterogeneous Networks
Application-Based QoS Evaluation of Heterogeneous Networks Application-Based QoS Evaluation of Heterogeneous Networks
Application-Based QoS Evaluation of Heterogeneous Networks csandit
 
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS cscpconf
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceIJAAS Team
 

Similar to 33 9140 it immensely discriminate routing in wireless (edit lafi) (20)

Manet ns2
Manet ns2Manet ns2
Manet ns2
 
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETSAN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
AN INTEGRATED SECURED ROUTING APPROACH FOR MANETS
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
K010635566
K010635566K010635566
K010635566
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...IRJET-  	  Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
 
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACK
 
11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for
 
Application-Based QoS Evaluation of Heterogeneous Networks
Application-Based QoS Evaluation of Heterogeneous Networks Application-Based QoS Evaluation of Heterogeneous Networks
Application-Based QoS Evaluation of Heterogeneous Networks
 
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...
 
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling DistanceA Novel Handoff Necessity Estimation Approach Based on Travelling Distance
A Novel Handoff Necessity Estimation Approach Based on Travelling Distance
 

More from IAESIJEECS

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...IAESIJEECS
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...IAESIJEECS
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...IAESIJEECS
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...IAESIJEECS
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...IAESIJEECS
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-IAESIJEECS
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...IAESIJEECS
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...IAESIJEECS
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on applicationIAESIJEECS
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-edIAESIJEECS
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reductionIAESIJEECS
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power lossIAESIJEECS
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reductionIAESIJEECS
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural networkIAESIJEECS
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancementIAESIJEECS
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijictIAESIJEECS
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijictIAESIJEECS
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijictIAESIJEECS
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijictIAESIJEECS
 

More from IAESIJEECS (20)

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on application
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reduction
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power loss
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reduction
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural network
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijict
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijict
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijict
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijict
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

33 9140 it immensely discriminate routing in wireless (edit lafi)

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 8, No. 3, December 2017, pp. 712 ~ 714 DOI: 10.11591/ijeecs.v8.i3.pp712-714  712 Received August 3, 2017; Revised October 25, 2017; Accepted November 9, 2017 Immensely Discriminate Routing in Wireless Networks Sujatha V*, EA Mary Anitha AMET University, Chennai Wireless networks are predictable to grant essential Internet access multimedia traffic service also increasingly such networks have been emerged in real life. However, the application scenarios is indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network. Keywords: Distance, quality of service, wireless network, trust, link quality Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. 1. Materials and Methods In wireless network, video traffic has become a well-liked subject with the huge use of smart phones. Handling best quality of transferred video from the user perception is important. The quality of the video is affected either by the alteration or deformation due to channel induced errors and interference losses, route inaccessibility owing to mobility of nodes, untrustworthiness of links and lack of security. To overcome these problems, we propose proficiently choose an instant next hop for routing information in the wireless network. The wireless link represents the connectivity between the nodes. Transmit the hello messages is one of the techniques for know the condition of the links ([8] and [9]). The other methods for receiving link dynamics can be established in [10], [11] and [12]. This method is useful for find the quality of the link before data is transmitted to a node to avoid link failures. Trust is a parameter for find the node is legitimate or illegitimate in the network that helps in route selection. Many methods of trust present in the literature – both centralized and decentralized trust mechanisms. A technique particularly designed for ad hoc networks is established]. A survey for trust method is presented. These are classified the nodes depend on the trust. Quality of Service is representing the successful transmission data from source to destination in wireless network. Some of the techniques existing have been reasonably successful in improving the network performance. A survey of all the QoS based routing protocols have explained the importance of QoS. The numerous routing methods were proposed that explained multiple radio parameters. In this paper also described in, Media Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless Ad Hoc Network [14]. Hash based Technique to Identify the Selfish Node in Mobile Ad-hoc Network [15]. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks [16]. 2. Immensely Discriminate Routing in Wireless Networks To reach the highest effectiveness, we propose the Immensely Discriminate Routing protocol for improve the multi-hop routing. In this scheme, the next hop node selection based on node link, Distance and quality of Service parameters. The above parameters are determined the next hop selection is evaluated by matrix. j j j j NL ND NT Q NH oS        (1) Where, jNL Node Link jND Node Distance
  • 2. IJEECS ISSN: 2502-4752  Immensely Discriminate Routing in Wireless Networks (Sujatha V) 713 jNT Node Trust jQoS Node quality of Service Figure 1. Illustration of Wireless Network The Immensely Discriminate Routing protocol applies three stages of routing such as the source node is stage 1, its instant adjacent node is stage 2 as well as the stage 3 contains the adjacent of adjacent is illustrate in Figure 1. In Wireless Network, the distance is an important factor for finding the route. The link information are dynamically received from the Medium Access Control. The trust measurement is used to find out the node is legitimate. Quality of service represents the presentation of a node in a network. 3. Conclusion In this paper, we proposed Immensely Discriminate Routing protocol is used for multi- hop routing in wireless network. The node distance, link, trust and node quality of service is evaluated to fining the next hop. This parameters are determined an efficient path in the wireless network. This parameters are provide efficiency path and reached better throughput in wireless network. References [1] VC Giruka and M Singhal. Hello protocols for ad-hoc networks: overhead and accuracy tradeoffs. In Proc. Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks. 354–361 [2] Seon Yeong Han and Dongman Lee. An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols. IEEE Communications Letters. 2013; 17(5). [3] KH Kim and KG Shin. On accurate measurement of link quality in multi-hop wireless mesh networks. In Proc. ACM MobiCom ’06. 2006: 38–49. [4] R Fonseca, O Gnawali, K Jamieson and P Levis. Four-bit wireless link estimation. In Proc. HotNets VI. 2007. [5] J Sanchez, R Marin-Perez and P Ruiz. BOSS: Beacon-less on demand strategy for geographic routing inwireless sensor networks. In Proc. IEEE MASS ’07. 1–10. [6] RC Mayer, JH Davis and FD Schoorman. An Integrative Model of Organizational Trust. Academy of Management Review. 1995; 20(3): 709-734. [7] M Blaze, J Feigenbaum and J Lacy. Decentralized trust management. In Security and Privacy, 1996. Proceedings. 1996 IEEE Symposium on Security and Privacy. 1996: 164–173. [8] AA Pirzada and C Mcdonald. Trust Establishment in Pure Ad hoc Networks. Wireless Personal Communications. 2006; 37(1-2): 139-168. [9] Kannan Govindan and Prasant Mohapatra. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey. IEEE Communications Surveys & Tutorials. 2012; 14(2). DOI:
  • 3.  ISSN: 2502-4752 IJEECS Vol. 8, No. 3, December 2017 : 712 – 714 714 10.1109/SURV.2011.042711.00083 [10] George Apostolopoulos, Roch Guérin, Sanjay Kamat, Satish K Tripathi. Quality of service based routing: a performance perspective. ACM SIGCOMM Computer Communication Review. 1998; 28(4): 17-28. DOI: 10.1145/285243.285251 [11] Gabriel Ioan Ivascu, Samuel Pierre, Alejandro Quintero. QoS routing with traffic distribution in mobile ad hoc networks. Computer Communications. 2009; 32(2): 305–316. DOI: 10.1016/j.comcom.2008.10.012 [12] Lajos Hanzo II and Rahim Tafazolli. A Survey of Qos Routing Solutions for Mobile Ad Hoc Networks. IEEE Communications Surveys. 2007; 9(2). [13] Tabatabaei S. Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks. International Conference for Internet Technology and Secured Transactions. 2009: 1 – 5 6060), CSI. [14] Shah RD and Singh SK. Media Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless Ad Hoc Network. Procedia Computer Science. 2016; 79: 940-947. [15] Vennila G and Arivazhagan D. Hash based Technique to Identify the Selfish Node in Mobile Ad-hoc Network. Indian Journal of Science and Technology. 2015; 8(14): 1. [16] Ahmed AS, Kumaran TS, Syed SSA & Subburam S. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks. Egyptian Informatics Journal. 2015; 16(1): 1-7.