Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
An efficient and secured routing protocol design is the vital concern for mobile ad hoc networks in view of major problems raising on security issues and loss of the network resources is due to changes within the connections of the network like Node failures, link breakages in the network. Our proposed scheme enhances the secured and reliable transmission of data, which also improves the network constancy, efficient packet delivery ratio and network life time by integrating through the AODV Routing protocol. It unites the authentication, stable routes and signal strength of the nodes to attain the secure and reliable transmission of data through nodes.
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.
Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure
and un-accessibility to the trusted servers. The performance of various MANET routing protocols is
significantly affected due to frequently changing network topology, confined network resources and
security of data packets. In this paper, a simulation based performance comparison of one of the most
commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance
Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based
Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of
performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based
simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet
delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node
energy for data transmission.
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...IJEEE
Mobile Ad-hoc networks are self-configuring multi-hop wireless networks where, the structure of the network changes dynamically. Because of the nodes in the MANET are mobile and battery operated, energy optimization is one of the major constraints in the MANET. Failure of some nodes operation can greatly impede the performance of the network and even affect the basic availability of the network, i.e., routing. To improve the lifetime of these networks can be improving the energy levels of the individual nodes of the network. This paper presents an analysis of the effects of different design choices for this on- demand routing protocols DSR and AODV in wireless ad hoc networks. In this paper, the energy efficient strategies are implemented in the AODV and DSR protocols to improve the life time of the Mobile ad hoc network. The CBEER-NN is developed using the existing DSR protocol and the AO- EEDTR is developed using the existing AODV protocol. GloMoSIM simulator is used to simulate the proposed MANET environment. This paper also compares the existing DSR and AODV protocols with proposed CBEER- NN and AO-EEDTR protocols. From the simulated results, this paper concludes that the proposed CBEER-NN and AO- EEDTR protocols are improving the life time of the network by improving the average residual energy of the nodes over the existing DSR and AO-EEDTR protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.t
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
An efficient and secured routing protocol design is the vital concern for mobile ad hoc networks in view of major problems raising on security issues and loss of the network resources is due to changes within the connections of the network like Node failures, link breakages in the network. Our proposed scheme enhances the secured and reliable transmission of data, which also improves the network constancy, efficient packet delivery ratio and network life time by integrating through the AODV Routing protocol. It unites the authentication, stable routes and signal strength of the nodes to attain the secure and reliable transmission of data through nodes.
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.
Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure
and un-accessibility to the trusted servers. The performance of various MANET routing protocols is
significantly affected due to frequently changing network topology, confined network resources and
security of data packets. In this paper, a simulation based performance comparison of one of the most
commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance
Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based
Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of
performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based
simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet
delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node
energy for data transmission.
Implementing Energy Efficient Strategies in the MANET on-demand routing Proto...IJEEE
Mobile Ad-hoc networks are self-configuring multi-hop wireless networks where, the structure of the network changes dynamically. Because of the nodes in the MANET are mobile and battery operated, energy optimization is one of the major constraints in the MANET. Failure of some nodes operation can greatly impede the performance of the network and even affect the basic availability of the network, i.e., routing. To improve the lifetime of these networks can be improving the energy levels of the individual nodes of the network. This paper presents an analysis of the effects of different design choices for this on- demand routing protocols DSR and AODV in wireless ad hoc networks. In this paper, the energy efficient strategies are implemented in the AODV and DSR protocols to improve the life time of the Mobile ad hoc network. The CBEER-NN is developed using the existing DSR protocol and the AO- EEDTR is developed using the existing AODV protocol. GloMoSIM simulator is used to simulate the proposed MANET environment. This paper also compares the existing DSR and AODV protocols with proposed CBEER- NN and AO-EEDTR protocols. From the simulated results, this paper concludes that the proposed CBEER-NN and AO- EEDTR protocols are improving the life time of the network by improving the average residual energy of the nodes over the existing DSR and AO-EEDTR protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.t
Improved aodv based on energy strength and dropping ratioIJLT EMAS
Wireless Sensor Networks are the latest trends in the
market due to the demand for communication and networking
among the wireless network devices. The routing protocols are
used in the Wireless Sensor Networks for efficient
communication of data between sensor nodes. The designs of
routing protocols in Wireless Sensor Networks are very concern
because they are influenced by many challenging factors. To
design the networks, the factors needed to be considered are the
coverage area, mobility, energy power consumption,
communication capabilities etc.. Broadcasting is an inevitable
operation in the route discovery phase of AODV protocol. A
probability based AODV is proposed, it uses nodes remaining
energy and threshold random delay to generate the
rebroadcasting of route request packet. The route request packet
of AODV is modified to gather nodes remaining energy strength.
The performance of probability based AODV is compared with
AODV over packet delivery fraction, normalized routing
overhead, delay and average acquisition latency.
NS-2 based simulator is used to evaluate the performance of
routing protocol.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction normalized routing load, average end to end delay by varying speed of nodes, traffic sources and mobility.
Routing protocols for mobile ad-hoc networks have to
face the challenge of frequently changing topology, low
transmission power and asymmetric links. Both
proactive and reactive routing protocols prove to be
inefficient under these circumstances. The Zone Routing
Protocol (ZRP) combines the advantages of the proactive
and reactive approaches by maintaining an up-to-date
topological map of a zone centered on each node. Within
the zone, routes are immediately available. For
destinations outside the zone, ZRP employs a route
discovery procedure, which can benefit from the local
routing information of the zones.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
Design and development of load sharing multipath routing protcol for mobile a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Cross layer design for power control and linkIJCNCJournal
Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes causes frequent routes breaks and adversely affects the required performance of the applications. We propose a cross layer design for the dynamic power control protocol and link prediction (DPCPLP) that provides a combined solution for power conservation as well as link availability. This combines the effect of optimum transmit power and received signal strength based link availability estimation with AODV routing protocol using cross layer approach.
This method proposes to use optimum transmit power for transmitting the packets to a neighboring node to
increase the battery life of adhoc nodes and received signal strength based link prediction to increase the
availability of the links. In this paper, the transmit power and received signal strength of the packets are
cross-layer interaction parameters to provide the combined solution for power conservation and reliable
route formation with increased availability of links and thus the routes amongst sources and destinations. Further, this increases network and nodes’ lifetime and capacity. It improves throughput and packet delivery ratio by spatial reuse, prior prediction of link breaks and initiating the route repair. It also reduces
end-to-end delay and power consumption by use of optimum transmit power. Through simulations, we have
shown that our proposed protocol shows better performance.
Mind of the Innovator: Taming the Traps of Traditional Thinking (a ChangeThis...Samuli Pahkala
Matthew May, author of "Elegant Solutions: Breakthrough Thinking the Toyota Way" and a popular ChangeThis manifesto on the subject, now brings our attention to the ‘Seven Sins of Solutions’, the traditional ways of thinking that prevent us from divining the most accurate—and elegant—of solutions to any problem solving situation. Using accessible examples, you’ll find yourself saying “Yes! That happens to me!” as you read. Lucky for us, May also provides methods to avoid those deadly sins and train our brains to think differently, allowing our inner innovator to flourish.
EURISCO demo installations of IPT, at GBIF EU Nodes meeting in Alicante (11 M...Dag Endresen
Regional GBIF NODES meeting of Europe in March 2010. Presentation of current activities from the NordGen NODE. Implementations of the GBIF IPT toolkit for genebanks in Europe. Upgrade for selected genebanks from the BioCASE publishing toolkit to the IPT. First step of a scheduled larger implementation planned to start in 2011 as part of the EuroGeneBank application pending EU funding decision. NordGen IPT EURISCO
How does one create something from nothing? Computer programming is a creative endeavor. Learn how to use the techniques of visual artists to solve problems and stimulate creativity.
Improved aodv based on energy strength and dropping ratioIJLT EMAS
Wireless Sensor Networks are the latest trends in the
market due to the demand for communication and networking
among the wireless network devices. The routing protocols are
used in the Wireless Sensor Networks for efficient
communication of data between sensor nodes. The designs of
routing protocols in Wireless Sensor Networks are very concern
because they are influenced by many challenging factors. To
design the networks, the factors needed to be considered are the
coverage area, mobility, energy power consumption,
communication capabilities etc.. Broadcasting is an inevitable
operation in the route discovery phase of AODV protocol. A
probability based AODV is proposed, it uses nodes remaining
energy and threshold random delay to generate the
rebroadcasting of route request packet. The route request packet
of AODV is modified to gather nodes remaining energy strength.
The performance of probability based AODV is compared with
AODV over packet delivery fraction, normalized routing
overhead, delay and average acquisition latency.
NS-2 based simulator is used to evaluate the performance of
routing protocol.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction normalized routing load, average end to end delay by varying speed of nodes, traffic sources and mobility.
Routing protocols for mobile ad-hoc networks have to
face the challenge of frequently changing topology, low
transmission power and asymmetric links. Both
proactive and reactive routing protocols prove to be
inefficient under these circumstances. The Zone Routing
Protocol (ZRP) combines the advantages of the proactive
and reactive approaches by maintaining an up-to-date
topological map of a zone centered on each node. Within
the zone, routes are immediately available. For
destinations outside the zone, ZRP employs a route
discovery procedure, which can benefit from the local
routing information of the zones.
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered reliably and in a timely manner. The objective of any routing protocol is to have packet delivered with least possible cost in terms of receiving power, transmission power, battery energy consumption and distance. All these factors basically effect the establishment of link between the mobile nodes and liability and stability of these links. In this paper, we implement a data link quality scheme on two protocols ODMRP and ADMR and compare them on the bases link quality and link stability.
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
This paper evaluates the energy consumption of well-known routing protocols, along with other metrics
such as throughput, packet delivery ratio (PDR), and delay in different scenarios. We consider two other
metrics in order to capture the efficiency of the energy consumption: e-throughput which is the ratio
between the consumed energy and the throughput; and the e-PDR which is the ratio between the
consumed energy and the PDR. We compare four routing protocols: AODV, OLSR, and HWMP in
Reactive and Proactive modes. The number of nodes is varying between 25 and 81 nodes, with different
mobility models. Simulations are conducted using NS3 and the parameters of a real network interface
card. From the results, AODV presents the lowest energy consumption and a better e-Throughput. OLSR
provides a better e-PDR in mobile scenarios. With a smaller e-PDR and e-Throughput, the proactive
mode of HWMP is more energy efficient than the reactive mode.
Design and development of load sharing multipath routing protcol for mobile a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Cross layer design for power control and linkIJCNCJournal
Frequent changes in network topology due to mobility and limited battery power of the mobile devices are the key challenges in the adhoc networks. The depletion of power source may cause early unavailability of nodes and thus links in the network. The mobility of nodes causes frequent routes breaks and adversely affects the required performance of the applications. We propose a cross layer design for the dynamic power control protocol and link prediction (DPCPLP) that provides a combined solution for power conservation as well as link availability. This combines the effect of optimum transmit power and received signal strength based link availability estimation with AODV routing protocol using cross layer approach.
This method proposes to use optimum transmit power for transmitting the packets to a neighboring node to
increase the battery life of adhoc nodes and received signal strength based link prediction to increase the
availability of the links. In this paper, the transmit power and received signal strength of the packets are
cross-layer interaction parameters to provide the combined solution for power conservation and reliable
route formation with increased availability of links and thus the routes amongst sources and destinations. Further, this increases network and nodes’ lifetime and capacity. It improves throughput and packet delivery ratio by spatial reuse, prior prediction of link breaks and initiating the route repair. It also reduces
end-to-end delay and power consumption by use of optimum transmit power. Through simulations, we have
shown that our proposed protocol shows better performance.
Mind of the Innovator: Taming the Traps of Traditional Thinking (a ChangeThis...Samuli Pahkala
Matthew May, author of "Elegant Solutions: Breakthrough Thinking the Toyota Way" and a popular ChangeThis manifesto on the subject, now brings our attention to the ‘Seven Sins of Solutions’, the traditional ways of thinking that prevent us from divining the most accurate—and elegant—of solutions to any problem solving situation. Using accessible examples, you’ll find yourself saying “Yes! That happens to me!” as you read. Lucky for us, May also provides methods to avoid those deadly sins and train our brains to think differently, allowing our inner innovator to flourish.
EURISCO demo installations of IPT, at GBIF EU Nodes meeting in Alicante (11 M...Dag Endresen
Regional GBIF NODES meeting of Europe in March 2010. Presentation of current activities from the NordGen NODE. Implementations of the GBIF IPT toolkit for genebanks in Europe. Upgrade for selected genebanks from the BioCASE publishing toolkit to the IPT. First step of a scheduled larger implementation planned to start in 2011 as part of the EuroGeneBank application pending EU funding decision. NordGen IPT EURISCO
How does one create something from nothing? Computer programming is a creative endeavor. Learn how to use the techniques of visual artists to solve problems and stimulate creativity.
Uncover Hidden Population Using Predictive Modeling Tool VitreosHealth
Using Predictive Modeling Tool to Identify at Risk Patients who has a chance of becoming users of High-Cost Healthcare service and subsequently Reducing PMPM (Per Member Per Month) Costs While Increasing Member Satisfaction
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
Wireless operations allow services, such as long-range communications, that are impossible or
impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol
[1]. The term is commonly used in the telecommunications industry to refer to telecommunications systems e.g.
radio transmitters and receivers, remote controls etc. which use some form of energy e.g. radio waves, acoustic
energy, etc. to transfer information without the use of wires.[1] Information is transferred in this manner over
both short and long distances.In this, routes may be detached due to lively movement of nodes. So route
assortment and topology grouping is not easy and demanding issue. This type of networks is more vulnerable to
both internal and external attacks due to presence of wicked neighbour nodes[1][2s. Paper see the sights new
method using AODV protocol to find out good neighbour node and finding reliable path according to their
signal strength, flow capacity relative position of node in network.
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multipath protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multi path protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
The Impact of Signal Strength over Routing Protocols in Wireless NetworksDr. Amarjeet Singh
In ad hoc routing protocols the source node
may need an intermediate nodes to transmit the packets into
the destination if the destination is not within transmission
range of the source. This paper studies the impact of signal
strength of nodes over ad hoc routing protocols and explains
an important effect of signal strength on ad hoc routing
protocols in four different directions including the routes and
the nodes. As a result the study give an important
improvement in ad hoc routing protocols when using signal
strength compared to other ad hoc routing protocols without
considering signal strength.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
Ad hoc networks are collections of mobile nodes communicating with each other using wireless media without any fixed infrastructure. During both route discovery and traversal of route-reply packets from destination to source,
broadcast of packets is required which incurs huge message cost. The present article deals with the message cost
reduction during transmission of route-reply from destination to source. Also the redundancy that is visible within the 2-hop neighborhood of a node is minimized during broadcasting of route-reply. This improves the average lifetime of network nodes by decreasing the possibility of network partition. The scheme of 2NI can be used with any reactive routing protocol in MANETs.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to IJCER (www.ijceronline.com) International Journal of computational Engineering research (20)
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
IJCER (www.ijceronline.com) International Journal of computational Engineering research
1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5
Energy Efficient Reliable Routing Protocol for Mobile Ad Hoc
Networks
1
T. SANTOSH, 2B.Kiran Kumar, 3E.SATISH BABU
Abstract
An important issue for mobile ad hoc network is the routing protocol design. Due to frequent changes in the
topology of the network this becomes a major technical challenge. Node failures and link breakages in the
network may cause loss of the network resources. Our proposed scheme enhances the QoS parameters likenetwork
stability, efficient packet delivery ratio and network lifetime which thereby improves the reliability of
thenetwork.This routing scheme is based on backbone nodes in the network and is incorporated in the AODV
protocol. It combines stable routes, battery power and signal strength of the nodes to achieve the QoS
parameters.
Key Words: Ad hoc network, Routing protocols, AODV, power, signal strength, Quality of Service.
I. Introduction
A Mobile Ad hoc Network (MANET) is collection of mobile nodes with no existing pre established infrastructure,
forming a temporary network. Each mobile node in the network acts as a router. Such networks are characterized
by: Dynamic topologies, existence of bandwidth constrained and variable capacity links, energy constrained
operations and are highly prone to security threats. Due to all these features routing is a major concern in ad hoc
networks. MANET is viewed as suitable systems which can support some specific applications as virtual classrooms,
military communications, emergency search and rescue operations, data acquisition in hostile environments,
communications set up in Exhibitions, conferences and meetings, in battle field among soldiers to coordinate defense
or attack, at airport terminals for workers to share files etc. Due to the frequent changes in network topology and
the lack of the network resources both in the wireless medium and in the mobile nodes, mobile ad hoc
networking becomes a challenging task. Routing in Ad hoc networks experiences more link failures than in
other networks. Hence, a routing protocol that supports QoS for ad hoc networks requires considering the reasons
for link failure to improve its performance. Link failure stems from node mobility and lack ofthe network resources.
For instance, it is possible that a route that was earlier found to meet certain QoS requirements no longer
does so due to the dynamic nature of the topology. In such a case, it is Important that the network intelligently adapts
the session to its new and changed conditions. Quality of service means providing a set of service
requirements to the flows while routing them throughthe network. A new scheme has been suggested which
combines three basic features to Achieve QoS; these are stable routing, concept of battery power and signal
strength. The scheme uses backbone nodes for stable routes and uses power factor and signal strength to determine
active nodes to participate in routing.The rest of the paper is organized as follows: Section 2 takes a look at the Routing
protocols classification, Section 3 analyzes new proposed scheme and Section 4 summarizes the study and the status
of the work.
Ii. Routing Protocol Classifications
A routing protocol has to find a route for packet delivery and make the packet delivered to the correct
destination. Many protocols [2] have been suggested keeping applications and type of network in view. Routing
Protocols in Ad Hoc Networks can be classified into two types:
A. Table Driven Or Proactive Protocols
Table driven routing protocols maintain consistent, up- to-date routing information from each node to every other
node in the network. These protocols require each node to maintain one or more tables to store routing
information. These routing protocols respond to changes in network topology by propagating updates
information throughout network. This type of routing is called as source routing. The areas in which they differ are
the number of necessary routing tables and changes in network structure are broadcast. Some of the table driven or
proactive protocols are: GSR, WRP, ZRP, STAR etc.
Issn 2250-3005(online) September| 2012 Page 1470
2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5
B. On Demand or Reactive Protocols
A different approach from table-driven routing is source-initiated on-demand routing. This type of routing
creates routes only when desired by the source node. When a node requires a route to a destination, it initiates a
route discovery process within the network. This process is completed once a route is found or all
possible route permutations have been examined. Once a route has been established, it is maintained by a
route maintenance procedure until either the destination becomes inaccessible along every path from the source
or until the route is no longer desired. Some famous on demand routing protocols are: DSR, RDMAR, AODV
etc. The study has been concentrated on reactive routing protocols because of proposed scheme is suitable for
this protocols
Figure1: routing protocols classification
Iii. Proposed Scheme: E2r2p
The proposed scheme “Energy Efficient Reliable Routing Protocol” takes care of on demand routing along
with a new concept of backbone nodes with optimal power factor and signal strength. This scheme concerns about
the reliable routes and better packet delivery ratio. The emphasis is on concept of battery power and signal strength or
energy requirement for routing process.
In this paper three different concepts have been joined together to make an efficient protocol. The backbone nodes
help in reconstruction phase i.e., they assist in fast selection of new routes. Selection of backbone nodes is made
upon availability of nodes, battery status and signal strength. Each route table has an entry for number of
backbone nodes attached to it and their battery status and signal strength. The protocol is divided into three phases.
Route Request (RREQ), Route Repair (RREP) and Error Phase (ERR).
The proposed scheme is explained with the help of an example shown in Figure 2. The light colored nodes depict
the node with less power factor. The Route selection from S (source) to D (destination) is made via 1-2-3-4-5
using shortest path routing.
Figure 2: Example of routing
In case any of the participating nodes get damaged or move out of the range, the backbone nodes (6,8 and 9) can
be takes care of the process. These nodes are nearer to the routing path nodes and have a sufficient power and
signal strength so they can join the process any time. This may lead to slight delay but improves overall
efficiency of theprotocol by sending more packets without link break than the state when some node is unable to
process route due to inadequate battery power and signal strength. The process also helps when some
intermediate node moves out of the range and link break occurs. In such cases the backbone nodes take care of
the process and the route is established again without much overhead. The nodes which are having battery power
and signal strength can be selected for route reconstruction. Backbone Node will be selected at one hop distance
from the affected node.
A. Route Construction (Req) Phase
In AODV routing protocol [5], route request and route reply operations are the most important, and route discovery
with AODV is purely on-demand. When a node wishes to send a packet to a destination node, it checks its route
table to determine whether it currently has a route to that node. If so, it forwards the packet to the next appropriate
hop toward the destination; otherwise, it has to initiate a route discovery process. The source node broadcasts a
flooding RREQ packet, which contains the source and destination node’s IP address and broadcast ID to form a
unique identifier for the RREQ. The intermediate nodes can avoid processing the same RREQ using this unique
identifier. After broadcasting the RREQ, the source node sets a timer to wait for a reply.
The node that successfully received the RREQ should The node that successfully received the RREQ should judge
whether it is the destination or it has a route to the destination with corresponding sequence number
Issn 2250-3005(online) September| 2012 Page 1471
3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5
greater than or equal to that contained in the RREQ. In the latter case, the node uncast a route reply (RREP)
packet back to the source; otherwise, it rebroadcasts the RREQ. If the intermediate nodes receive the RREQ
they have already processed, the RREQ should be discarded directly. When the route reply process is done, a forward
route is set up. When a link break in an active route is detected, an ERR message is used to notify that the loss of link
has occurred to its one hop neighbor. Here ERR message indicates those destinations which are no longer
reachable. Taking advantage of the broadcast nature of wireless communications, a node promiscuously
overhears packets that are transmitted by their neighboring nodes. When a node that is not part of the route
overhears a REP packet not directed to itself transmit by a neighbor (on the primary route), it records that neighbor as
the next hop to the destination in its alternate route table. From these packets, a node obtains alternate path
information and makes entries of these backbone nodes (BN) in its route table. If route breaks occurs it just starts
route construction phase from that node. The protocol updates list of BNs and their power status and signal
strength periodically in the route table.
.
B. Route Maintenance
When a node detects a link break [1], it performs a one hop data broadcast to its immediate neighbors. The node
specifies in the data header that the link is disconnected and thus the packet is candidate for alternate routing.
Upon receiving this packet route maintenance phase starts b selecting alternate path and checking power
status, signal strength.
C. Local Repair
When a link break in an active route occurs as shown in figure 3, the node upstream of that break may choose to
repair the link locally if the destination was no farther and there exists BNs that are active. When a link break
occurs the route is disconnected. Backbone nodes are broad casts their power status and signal strength to the
neighbor nodes. The nodes which are having maximum battery power and signal strength can be selected as
route.[7] The received signal strength can be calculated as
Here pr is the total received signal strength, pT is the the transmission power of the node and di is the distance of the
node.When link breaks at node C, route repair starts, node C starts searching for new paths, buffering packets
from S-A in its buffer. The nodes L, M, K, K1, L1, P1, P2 are broadcasts their power status and signal
strength to its neighbor nodes. Now backbone nodes are selected and proper selection of nodes is done based
on power factor and signal strength. Path selected becomes [C - L – M – K – Destination], instead of [C – L – P
–Destination], since the node P is not in active state.Simulation study has been performed for packet delivery ratio.
Figure 3: Local repair
Even though the route may become longer, the selected route path is far more stable and delivery of packets is
reliable. Stability and reliability of route depends upon three major aspects as: Life time, Power status and signal
strength.
Iv. Simulation And Results
Simulation study has been carried out to studythe Performance studyofexistingdifferent protocols. Simulation
Environment used is NS-2 (network simulator) version NS2.29 to carry out the process. Simulation results have
been compared with EERRP,AODV, DSR and TORA.
Issn 2250-3005(online) September| 2012 Page 1472
4. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.5
V. Conclusion
A new scheme has been presented that utilizes a mesh structure and alternate paths. The scheme can be
incorporated into any ad hoc on-demand unicast routing protocol to improve reliable packet delivery in the face
of node movements and route breaks. Alternate routes are utilized only when data packets cannot be delivered
through the primary route. The process of checking the protocol scheme is to be done for more sparse mediums
and real life scenarios. This scheme can also be extended for metrics like End-to-End delay, Throughput and Path
optimality, Link layer overhead.
References
[1] Vinay Rishiwal, Ashwani Kush, Shekhar Verma “Stable and Energy Efficient Routing for Mobile
AdhocNetworks” Fifth International Conference on Information Technology: New Generations 2008,
1028-1033.
[2] E.M. Royer and C.K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks”.
IEEE Personal Communications, pages 46–55, April 1999.
[3] J.J. Garcia, M. Spohn and D. Bayer, “Source Tree Adaptive Routing protocol”, IETF draft, October 1999.
[4] D.B. Johnson, D.A. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, T.
Imielinski and H. Korth, Eds., Kulwer, 1996, pp. 152-81 protocol for mobile ad hoc networks
(RDMAR)”, CCSR ,UK.
[5] C.E. Perkins, E.M. Royer, “Ad-Hoc On Demand Distance Vector Routing”, Proceedings of the 2nd IEEE
Workshop on Mobile Computing Systems and Application New Orleans, LA, February
1999, pp. 90-100.
[6] Josh Broch, David A.Maltz and Jorjeta Jetcheva, “A performance Comparison of Multi hop Wireless
Adhoc Network Routing Protocols”, Mobicomm’98, Texas, Oct 1998.
[7] WU Da-peng , WU Mu-qing, ZHEN Yan, “Reliable routing mechanism based on neighbor stability
for MANET” www.buptjournal.cn/xben June 2009, 16(3): 33–39.
[8] C. K. Toh, “Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc
networks”, IEEE Comm. Mag., June 2001, pp. 138-147.
[9] Z.J. Hass, M.R. Pearlman, “Zone routing protocol (ZRP)”, Internet draft. June 1999, at www.ietf.org
[10] E. Crawley, R. Nair, B. Rajagopalan, and H. Sandick, “A framework for QoS based routing in the
internet,” RFC 2386, Aug. 1998.
[11] M. Ettus. System Capacity, Latency, and Power Consumption in Multihop-routed SS-CDMA Wireless
Networks. In Radio and Wireless Conference (RAWCON ’98), pages 55–58, Aug.1998.
[12] X. Lin and I. Stojmenovic. Power-Aware Routing in Ad Hoc Wireless Networks. In SITE,
University of Ottawa, TR-98- 11, Dec. 1998.
[13] A. Chockalingam and M. Zorzi, “Energy Consumption Performance of a Class of Access Protocols for
Mobile Data Networks,” Proc. IEEE VTC, May 1998, pp. 820–24.
[14] A. Michail and A. Ephremides, “Energy Efficient Routing for Connection Oriented Traffic in Ad-hoc
Wireless Networks,” Proc. IEEE PIMRC, Sept. 2000, pp. 762–66.
[15] G. Zussman and A. Segall. Energy efficient routing in ad hoc disaster recovery networks. Proceedings of
IEEE INFOCOM, April, 2003.
[16] C. Schurgers and M. B. Srivastava. Energy efficient routing in wireless sensor networks. Proceedings of
IEEE MILCOM, pages 28–31, October 2001
Issn 2250-3005(online) September| 2012 Page 1473