In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
The document discusses and compares the performance of two on-demand routing protocols for mobile ad hoc networks (MANETs), Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV). The protocols were simulated using the NS-2 network simulator across different network parameters and their performance was evaluated based on average throughput, end-to-end delay, and packet delivery ratio. The results showed that AODV generally performed better than DSR, having lower end-to-end delays and higher throughput, especially as the packet size and number of nodes increased. However, DSR may resort to route discovery less often than AODV since it can maintain multiple routes for a source-
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
International Journal of Engineering Research and DevelopmentIJERD Editor
This document describes the simulation and performance evaluation of a wireless ad hoc network using the NS2 simulator. The network uses the AODV routing protocol. 15 nodes were simulated over a 1000m x 800m area for 1000 seconds, with 6 concurrent UDP connections. Packet delivery ratio, throughput, and packet drop ratio were evaluated based on the trace file data. The simulation found a packet delivery ratio of 0.71 and throughput of around 534.19 kbps for the AODV protocol in the simulated network.
This document summarizes a research paper that compares the performance of three routing protocols (DSDV, DSR, and AODV) in a mobile ad hoc network using the NS-2 simulator. The paper analyzes key performance metrics like packet delivery ratio and end-to-end delay under different numbers of nodes. Simulation results show that the reactive DSR protocol generates and receives more packets than the proactive DSDV protocol. DSR also has better packet delivery ratio and lower end-to-end delay compared to DSDV and AODV as the number of nodes increases. The paper concludes that DSR performs best in the simulated chain topology network.
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
Disruption Tolerant Network Coding scenarios often rises from mobile wireless networks where due to limited transmission power, fast node mobility,sparse node density, and frequent equipment failures, there is often no contemporaneous path from the source to destination nodes. Before going to the depth of DTN, it is recommended to review traditional non-coding routing schemes for broadcast and unicast applications in DTNs, and the basic operations of Random Linear Coding (RLC).
The document discusses and compares the performance of two on-demand routing protocols for mobile ad hoc networks (MANETs), Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV). The protocols were simulated using the NS-2 network simulator across different network parameters and their performance was evaluated based on average throughput, end-to-end delay, and packet delivery ratio. The results showed that AODV generally performed better than DSR, having lower end-to-end delays and higher throughput, especially as the packet size and number of nodes increased. However, DSR may resort to route discovery less often than AODV since it can maintain multiple routes for a source-
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
International Journal of Engineering Research and DevelopmentIJERD Editor
This document describes the simulation and performance evaluation of a wireless ad hoc network using the NS2 simulator. The network uses the AODV routing protocol. 15 nodes were simulated over a 1000m x 800m area for 1000 seconds, with 6 concurrent UDP connections. Packet delivery ratio, throughput, and packet drop ratio were evaluated based on the trace file data. The simulation found a packet delivery ratio of 0.71 and throughput of around 534.19 kbps for the AODV protocol in the simulated network.
This document summarizes a research paper that compares the performance of three routing protocols (DSDV, DSR, and AODV) in a mobile ad hoc network using the NS-2 simulator. The paper analyzes key performance metrics like packet delivery ratio and end-to-end delay under different numbers of nodes. Simulation results show that the reactive DSR protocol generates and receives more packets than the proactive DSDV protocol. DSR also has better packet delivery ratio and lower end-to-end delay compared to DSDV and AODV as the number of nodes increases. The paper concludes that DSR performs best in the simulated chain topology network.
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
Ad-hoc networks are basically peer to peer multihop
mobile wireless networks in which the information packets
are transmitted in a ‘store and forward’ manner from a source
to an arbitrary destination via intermediate nodes. The main
objective of this paper is to evaluate the performance of various
ad-hoc networks routing protocols viz. DSDV (Destination
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The
comparison of these protocols is based on different
performance metrics, which are throughput, packet delivery
ratio, routing overheads, packet drop and average end to end
delay. The performance evaluation has been done by using
simulation tool NS2 (Network Simulator) which is the main
simulator.
This document evaluates the performance of the AODV and DSR routing protocols under black hole attacks in a mobile ad hoc network (MANET). It conducts simulations using the network simulator NS-2 to compare the protocols' throughput, packet delivery ratio, and end-to-end delay both with and without black hole attacks from malicious nodes. The results show that under black hole attacks, the throughput and packet delivery ratio of both protocols decreases as the number of malicious nodes increases. However, AODV is shown to be more resistant to the effects of black hole attacks compared to DSR, experiencing smaller decreases in performance under black hole attacks.
Disruption Tolerant Network Coding scenarios often rises from mobile wireless networks where due to limited transmission power, fast node mobility,sparse node density, and frequent equipment failures, there is often no contemporaneous path from the source to destination nodes. Before going to the depth of DTN, it is recommended to review traditional non-coding routing schemes for broadcast and unicast applications in DTNs, and the basic operations of Random Linear Coding (RLC).
The document provides an overview of routing protocols in mobile ad-hoc networks (MANETs) and enhancements to reactive protocols. It discusses the key features of MANETs and challenges like security. It describes different routing strategies including proactive, reactive, and hybrid protocols. It provides details on reactive protocols like DSR and AODV. It focuses on enhancements to DSR including the watchdog and pathrater mechanisms to detect misbehaving nodes and select more reliable routes. The document is a technical paper that evaluates routing protocols and security issues in MANETs.
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
The document summarizes the use of the NS-2 network simulator to simulate mobile ad hoc network (MANET) routing algorithms. It describes creating scenarios of mobile nodes, generating network traffic between nodes, running simulations of different routing protocols, and analyzing the resulting trace files to calculate throughput. Key aspects covered include the NS-2 architecture, scenario and traffic generation procedures, simulation and analysis procedures, and options configured for the simulations.
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTRavi Teja P
This document is a project report submitted by three students for their Bachelor of Technology degree. It analyzes the performance of the AODV and DSDV routing protocols for mobile ad hoc networks (MANETs) using the NS-2 network simulator. The report includes an introduction to MANETs, a literature review of routing protocols for MANETs including AODV and DSDV, a description of the simulation setup and design using NS-2, results of the simulations comparing the performance of AODV and DSDV under different metrics, and conclusions.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
The document discusses performance exploration of quality of service (QoS) parameters in mobile ad hoc networks (MANETs). It contains 6 figures analyzing how different QoS parameters are affected by increasing the reporting rate of data packets in the MANET. Figure 2 shows that packet delivery ratio decreases as reporting rate increases due to congestion. Figure 3 shows that packet loss ratio increases with higher reporting rates. Figure 4 indicates that throughput initially increases then decreases with reporting rate. Control overheads and average energy consumption shown in Figures 5 and 6 also are affected by varying the reporting rate in the MANET. The document analyzes how the reporting rate impacts key QoS metrics during data transmission in a MANET.
1) The document describes the Random Early Detection (RED) algorithm for congestion control in computer networks. RED monitors average queue size and randomly drops packets before buffers get full to avoid congestion.
2) The author simulates a computer network using NS2 to test the performance of RED under different parameter settings. By varying RED parameters like minimum threshold, maximum threshold, and maximum drop probability, the author analyzes how it affects network performance metrics like drop count, efficiency, throughput, and delay.
3) The simulation involves defining a network topology with sources, sinks and a bottleneck link implementing RED. The author collects statistics from running the simulation and analyzes the results using scripting to understand the impact of RED parameters on
This document summarizes a research paper that proposes a new routing protocol called Timer Based DFS-LAROD (TBD-LAROD) for intermittently connected mobile ad hoc networks (MANETs). The protocol uses a timer function and depth first search approach to handle voids (areas with no nodes) during packet routing. When a node encounters a void, it sets a void flag. This flag is passed along routes to help avoid voids. The timer function considers void flags, node progress towards the destination, and load balancing to select the next hop. Simulation results show TBD-LAROD improves delivery ratio compared to the existing LAROD-LoDiS protocol without void handling.
This document summarizes Darpan Dekivadiya's seminar report on ad hoc networks from April 2011. It defines ad hoc networks as mobile wireless networks where nodes are directly connected to each other via wireless links without any centralized administration. The key characteristics of ad hoc networks are that they can operate without infrastructure, use multi-hop radio relaying, and have frequent topology changes due to node mobility. Some applications of ad hoc networks include military networks, emergency response, and sensor networks. The document then discusses the architecture of ad hoc networks based on the IEEE 802.11 standard and protocols for routing in these networks.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
In Mobile Ad Hoc Networks(MANETs), a set of interacting nodes should cooperatively
implement the routing functions to enable end-to-end communication along dynamic paths composed by
multi-hop wireless links. Several multi-hop routing protocols have been proposed for ad hoc networks,
and most popular ones include: Dynamic Source Routing (DSR), Optimized Link-State Routing (OLSR),
Ad Hoc On-Demand Distance Vector (AODV) and Destination- Sequenced Distance-Vector (DSDV).
Most of these protocols rely on the assumption of a trustworthy cooperation among all participating
nodes; unfortunately, this may not be a realistic assumption in real hosts. Malicious hosts could exploit
the weakness of MANET to launch various kinds of attacks. Node mobility on ad hoc network cannot be
restricted. As results, many Intrusion Detection System(IDS) solutions have been proposed for the wired
network, which they are defined on strategic points such as switches, gateways, and routers, can not be
implemented on the MANET. Thus, the wired network IDS characteristics must be modified prior to be
implemented in the ad hoc network. Thus an IDS should be added to enhance the security level of
MANETs. If MANET can detect the attackers as soon as they enter the network, we will be able to
completely eliminate the potential vulnerabilities caused by compromised nodes at the first time. IDSs
usually act as the second layer in MANETs. This paper presents an novel IDS for MANETs which is
based on acknowledgements.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a study that evaluated the performance of the AODV and DSR routing protocols for MANETs under increasing node density using VBR traffic. The study found that as node density increased:
- DSR had lower routing overhead than AODV
- AODV had a higher packet delivery ratio than DSR
- DSR experienced higher network load and was more overloaded than AODV
- DSR maintained more optimal path lengths than AODV
Overall, the study concluded that AODV is better suited than DSR for delay-sensitive applications with VBR traffic in dense MANETs due to its lower overhead and delays.
This document summarizes a research paper that compares the performance of two reactive routing protocols (AODV and DSR) in mobile ad hoc networks (MANETs) using the NS-2 simulator. It provides background on MANETs and describes the key mechanisms of AODV and DSR. The document then outlines the simulation setup, including mobility and traffic models, and the performance metrics used to evaluate and compare the protocols: packet delivery ratio, throughput, and average end-to-end delay.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
The document summarizes a proposed fuzzy informer homed routing protocol for wireless sensor networks. The protocol uses fuzzy logic to select primary cluster heads based on distance to the base station and remaining energy. Each primary cluster head then chooses a backup cluster head from its cluster with the most remaining energy. The backup cluster head monitors the primary cluster head for failures by sending inquiry messages. If the primary cluster head fails to respond after multiple inquiries, the backup cluster head informs nodes to send data to it directly. Simulation results showed the proposed protocol significantly reduces energy consumption and improves reliability compared to existing protocols.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
ZigBee is the new standard developed wireless personal area network (WPAN) based on IEEE 802.15.4 for low cost, low data rate and low power consumption wireless network. In present times, zigbee has become a hot topic for research and development all over the world. This paper briefly describes various ZigBee network topologies including star, cluster tree and mesh topology and further introduces different ZigBee routing protocols such as AODV, AODVjr, Hierarchical, Integrated and Enhanced hierarchical routing protocol (EHRP).
Improving Distribution Feeders for Photovoltaic Generation by Loop Power Cont...IJMER
1) The document discusses using a Loop Power Controller (LPC) to improve distribution feeder loading balance for systems with high photovoltaic (PV) generation. The LPC controls real and reactive power flows between feeders by adjusting voltage ratio and phase shift.
2) A control algorithm is developed for the LPC to minimize loading imbalance and power losses based on hourly PV generation and load profiles from a distribution automation system.
3) Simulation results on Taiwanese distribution feeders show the LPC improves loading balance and reduces losses compared to conventional reconfiguration methods affected by intermittent PV generation.
Optimized, Low-Power Dissipative and Precise Pulsating Constant Current Sourc...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
The document provides an overview of routing protocols in mobile ad-hoc networks (MANETs) and enhancements to reactive protocols. It discusses the key features of MANETs and challenges like security. It describes different routing strategies including proactive, reactive, and hybrid protocols. It provides details on reactive protocols like DSR and AODV. It focuses on enhancements to DSR including the watchdog and pathrater mechanisms to detect misbehaving nodes and select more reliable routes. The document is a technical paper that evaluates routing protocols and security issues in MANETs.
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
The document summarizes the use of the NS-2 network simulator to simulate mobile ad hoc network (MANET) routing algorithms. It describes creating scenarios of mobile nodes, generating network traffic between nodes, running simulations of different routing protocols, and analyzing the resulting trace files to calculate throughput. Key aspects covered include the NS-2 architecture, scenario and traffic generation procedures, simulation and analysis procedures, and options configured for the simulations.
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTRavi Teja P
This document is a project report submitted by three students for their Bachelor of Technology degree. It analyzes the performance of the AODV and DSDV routing protocols for mobile ad hoc networks (MANETs) using the NS-2 network simulator. The report includes an introduction to MANETs, a literature review of routing protocols for MANETs including AODV and DSDV, a description of the simulation setup and design using NS-2, results of the simulations comparing the performance of AODV and DSDV under different metrics, and conclusions.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
In this paper, we design and formulate a trust-based routing protocol for secure transactions, such as military and disaster
relief operations, banking in mobile ad hoc networks (MANETs). The proposed approach is showing the idea of a trust model in the
network layer of MANET.AODV is ad hoc on demand distance vector, this protocol starts the route specially when some node claims
to send data. In AODV whenever a link breaks an error message is sent indicating the link and packet sending is dropped. In our
proposed scheme a packet is sent through alternative path. In this approach a trust node is made with neighbors. Simulation results
shows that proposed scheme has less packet loss and packet ratio delivered is more.
The document discusses performance exploration of quality of service (QoS) parameters in mobile ad hoc networks (MANETs). It contains 6 figures analyzing how different QoS parameters are affected by increasing the reporting rate of data packets in the MANET. Figure 2 shows that packet delivery ratio decreases as reporting rate increases due to congestion. Figure 3 shows that packet loss ratio increases with higher reporting rates. Figure 4 indicates that throughput initially increases then decreases with reporting rate. Control overheads and average energy consumption shown in Figures 5 and 6 also are affected by varying the reporting rate in the MANET. The document analyzes how the reporting rate impacts key QoS metrics during data transmission in a MANET.
1) The document describes the Random Early Detection (RED) algorithm for congestion control in computer networks. RED monitors average queue size and randomly drops packets before buffers get full to avoid congestion.
2) The author simulates a computer network using NS2 to test the performance of RED under different parameter settings. By varying RED parameters like minimum threshold, maximum threshold, and maximum drop probability, the author analyzes how it affects network performance metrics like drop count, efficiency, throughput, and delay.
3) The simulation involves defining a network topology with sources, sinks and a bottleneck link implementing RED. The author collects statistics from running the simulation and analyzes the results using scripting to understand the impact of RED parameters on
This document summarizes a research paper that proposes a new routing protocol called Timer Based DFS-LAROD (TBD-LAROD) for intermittently connected mobile ad hoc networks (MANETs). The protocol uses a timer function and depth first search approach to handle voids (areas with no nodes) during packet routing. When a node encounters a void, it sets a void flag. This flag is passed along routes to help avoid voids. The timer function considers void flags, node progress towards the destination, and load balancing to select the next hop. Simulation results show TBD-LAROD improves delivery ratio compared to the existing LAROD-LoDiS protocol without void handling.
This document summarizes Darpan Dekivadiya's seminar report on ad hoc networks from April 2011. It defines ad hoc networks as mobile wireless networks where nodes are directly connected to each other via wireless links without any centralized administration. The key characteristics of ad hoc networks are that they can operate without infrastructure, use multi-hop radio relaying, and have frequent topology changes due to node mobility. Some applications of ad hoc networks include military networks, emergency response, and sensor networks. The document then discusses the architecture of ad hoc networks based on the IEEE 802.11 standard and protocols for routing in these networks.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
A Novel Acknowledgement based Intrusion Detection System for MANETsIJMER
In Mobile Ad Hoc Networks(MANETs), a set of interacting nodes should cooperatively
implement the routing functions to enable end-to-end communication along dynamic paths composed by
multi-hop wireless links. Several multi-hop routing protocols have been proposed for ad hoc networks,
and most popular ones include: Dynamic Source Routing (DSR), Optimized Link-State Routing (OLSR),
Ad Hoc On-Demand Distance Vector (AODV) and Destination- Sequenced Distance-Vector (DSDV).
Most of these protocols rely on the assumption of a trustworthy cooperation among all participating
nodes; unfortunately, this may not be a realistic assumption in real hosts. Malicious hosts could exploit
the weakness of MANET to launch various kinds of attacks. Node mobility on ad hoc network cannot be
restricted. As results, many Intrusion Detection System(IDS) solutions have been proposed for the wired
network, which they are defined on strategic points such as switches, gateways, and routers, can not be
implemented on the MANET. Thus, the wired network IDS characteristics must be modified prior to be
implemented in the ad hoc network. Thus an IDS should be added to enhance the security level of
MANETs. If MANET can detect the attackers as soon as they enter the network, we will be able to
completely eliminate the potential vulnerabilities caused by compromised nodes at the first time. IDSs
usually act as the second layer in MANETs. This paper presents an novel IDS for MANETs which is
based on acknowledgements.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a study that evaluated the performance of the AODV and DSR routing protocols for MANETs under increasing node density using VBR traffic. The study found that as node density increased:
- DSR had lower routing overhead than AODV
- AODV had a higher packet delivery ratio than DSR
- DSR experienced higher network load and was more overloaded than AODV
- DSR maintained more optimal path lengths than AODV
Overall, the study concluded that AODV is better suited than DSR for delay-sensitive applications with VBR traffic in dense MANETs due to its lower overhead and delays.
This document summarizes a research paper that compares the performance of two reactive routing protocols (AODV and DSR) in mobile ad hoc networks (MANETs) using the NS-2 simulator. It provides background on MANETs and describes the key mechanisms of AODV and DSR. The document then outlines the simulation setup, including mobility and traffic models, and the performance metrics used to evaluate and compare the protocols: packet delivery ratio, throughput, and average end-to-end delay.
International Journal of Computer Networks & Communications (IJCNC)IJCNCJournal
The document summarizes a proposed fuzzy informer homed routing protocol for wireless sensor networks. The protocol uses fuzzy logic to select primary cluster heads based on distance to the base station and remaining energy. Each primary cluster head then chooses a backup cluster head from its cluster with the most remaining energy. The backup cluster head monitors the primary cluster head for failures by sending inquiry messages. If the primary cluster head fails to respond after multiple inquiries, the backup cluster head informs nodes to send data to it directly. Simulation results showed the proposed protocol significantly reduces energy consumption and improves reliability compared to existing protocols.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
ZigBee is the new standard developed wireless personal area network (WPAN) based on IEEE 802.15.4 for low cost, low data rate and low power consumption wireless network. In present times, zigbee has become a hot topic for research and development all over the world. This paper briefly describes various ZigBee network topologies including star, cluster tree and mesh topology and further introduces different ZigBee routing protocols such as AODV, AODVjr, Hierarchical, Integrated and Enhanced hierarchical routing protocol (EHRP).
Improving Distribution Feeders for Photovoltaic Generation by Loop Power Cont...IJMER
1) The document discusses using a Loop Power Controller (LPC) to improve distribution feeder loading balance for systems with high photovoltaic (PV) generation. The LPC controls real and reactive power flows between feeders by adjusting voltage ratio and phase shift.
2) A control algorithm is developed for the LPC to minimize loading imbalance and power losses based on hourly PV generation and load profiles from a distribution automation system.
3) Simulation results on Taiwanese distribution feeders show the LPC improves loading balance and reduces losses compared to conventional reconfiguration methods affected by intermittent PV generation.
Optimized, Low-Power Dissipative and Precise Pulsating Constant Current Sourc...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
NMP is the most effective solvent for removing ash content from Indian coal samples based on a comparative study of 5 solvents. The maximum reduction of ash content achieved was:
1) 72% for a coal sample with initial ash content of 51.1% using a 1:10 ratio of NMP to coal at 120°C.
2) 20% for a sample with 37% initial ash using a 1:40 NMP to coal ratio.
3) 26% for a sample with 26% initial ash using a 1:10 NMP to coal ratio.
In contrast, acetic acid and toluene achieved negligible maximum reductions of only 1.5-1.9% ash
Noise Tolerant and Faster On Chip Communication Using Binoc ModelIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
This document summarizes a research paper on clustering algorithms in data mining. It begins by defining clustering as an unsupervised learning technique that organizes unlabeled data into groups of similar objects. The document then reviews different types of clustering algorithms and methods for evaluating clustering results. Key steps in clustering include feature selection, algorithm selection, and cluster validation to assess how well the derived groups represent the underlying data structure. A variety of clustering algorithms exist and must be chosen based on the problem characteristics.
The Effects of Vehicle Speeds on Accident Frequency within Settlements along ...IJMER
Literature provides overwhelming evidence that a strong relationship exist between
vehicle speed and accident risk, and an outcome severity in the event of an accident. Excessive speed
is said to be a major causal factor of road accidents on trunk roads; contributing 60% of all vehicular
accidents. However, speed rationalization measures implemented on a number of trunk roads in
Ghana have realized very little success. This study therefore investigated the effects of vehicle speeds
on accident frequency within settlements along trunk roads. Data was collected on accidents, vehicle
speeds and other road and environment-related features for ninety-nine (99) settlements delineated
from four (4) trunk roads. Correlation analysis was employed to establish useful relationships and
provided insight into the contributions of relevant road and environmental-related variables to the
occurrence of road traffic accidents. Using the Negative Binomial error structure within the
Generalized Linear Model framework, core (flow-based) models were formulated based on accident
data and exposure variables (vehicle mileage, daily pedestrian flow and travel speed). Incremental
addition of relevant explanatory variables further expanded the core models into comprehensive
models. Findings indicate the main risk factors are number of accesses, daily pedestrian flow and
total vehicle kilometers driven, as vehicle speed did not appear to influence the occurrence of road
traffic accidents within settlements along trunk roads. In settlement corridors, mitigating accident
risks should not focus only on traffic calming but rather on measures that reduce pedestrian and
vehicular conflict situations as well as improve conspicuity around junctions
The document summarizes a study that assessed the vulnerability of aquifers in the Imo River Basin in southeastern Nigeria to pollution. Eight locations were investigated to determine parameters like depth to water table, recharge rate, aquifer and soil properties, topography, and hydraulic conductivity. These parameters were used in the DRASTIC model to develop a vulnerability map. The map showed that areas within the Benin Formation generally have moderate vulnerability due to fine to coarse grained sandy overburden. Higher vulnerabilities were found near Aba, while lower vulnerabilities occurred around Obibiezena and Naze. The study demonstrated the usefulness of the DRASTIC model for assessing vulnerability of aquifer systems.
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
This document summarizes a study on the effect of aluminum variation on hardness and aluminum loss in zinc-aluminum alloys. Samples of mild steel were coated with zinc-aluminum alloys containing 2.5%, 4.5%, 6.5%, 8.5%, and 11.5% aluminum. Microstructural analysis found the coatings consisted of zinc-aluminum dendrites within a eutectic lamellar structure. Hardness measurements showed both the eutectic and dendritic structures increased in hardness with higher aluminum content. Testing also revealed aluminum loss from the coatings increased with higher initial aluminum percentages in the alloy. The study concluded that dendrite formation and coating hardness rise with aluminum
The document analyzes pores in the microstructure of two cast aluminum alloys (Al-20%wtSi and Al-20%wtCu) using fractal analysis, multi-stage random sampling, and spatial point pattern methods. Fractal analysis showed that all pores were shrinkage pores with fractal dimensions approaching 2. The multi-stage random sampling and spatial point pattern methods revealed that crack initiation for eventual failure of the Al-20%wtSi alloy would start in the worst pore found in the lower right region, as it had the lowest fractal dimension and sphericity values. This work demonstrated the effectiveness of using fractal analysis, multi-stage random sampling, and spatial point pattern methods to characterize pores in cast
Secure File Sharing In Cloud Using Encryption with Digital Signature IJMER
This paper we discuss about the data sharing in a cloud with multiple owner by generating
keys and digital signature. The proposed methodology suggests the encryption of the files to be uploaded
on the cloud. To ensure the security of data, we proposed a method by implementing AES algorithm. The
integrity and confidentiality of the data is achieved by not only encrypting it but also providing Digital
Signature for successful authentication. It provides two way security for data sharing.
Optimization of Factors Affecting Glucuronic Acid Production in Yogurt Ferme...IJMER
The document summarizes research optimizing factors affecting glucuronic acid production in yogurt fermentation using two bacterial strains, Lactobacillus acidophilus and Gluconacetobacter nataicola. A Plackett-Burman design screened seven factors and identified five significant factors. Response surface methodology with a central composite design (RSM-CCD) modeling optimized the five factors. The design determined the optimal conditions for maximum glucuronic acid concentration of 59.81mg/L were 4.43 log CFU/mL G. nataicola density, 5.1 log CFU/mL L. acidophilus density, 9.96% sucrose, initial pH 5, and incubation at 32
Modeling and Reduction of Root Fillet Stress in Spur Gear Using Stress Relie...IJMER
A gear is a component within a transmission device that transmits rotational forces. Gears
are commonly used for transmitting power. Gear teeth failure due to fatigue is a common fact
observed. Even a small reduction in the root tensile stress results in great raise in the fatigue life of a
gear. They develop high stress concentration at the root and the point of contact. The repeated
stressing on the fillets causes the fatigue failure of gear tooth. For many years, gear design has been
improved by using better material, hardening surfaces with carburization and heat treatment, and shot
penning to improve surface finish etc. Few more hard work have been made to improve the durability
and strength by changing the pressure angle, using the asymmetric teeth, varying the geometry of root
fillet curve and so on. The majority of the above systems don't ensure the compatibility of the current
rigging frameworks. This work presents the possibilities of utilizing the stress redistribution techniques
by introducing the Stress relieving features in the stressed zone to the advantage of reduction of root
fillet stress in spur gear
Optimization of Turning Parameters Using Taguchi MethodIJMER
Abstract: Today in manufacturing and metal industries customer satisfaction is very important to
make own place in competitive market and also to make mirror image with faith in the heart of
customer, because customer gives preference to buy good quality product. In the metal and
manufacturing industries for the product low surface roughness is very important. Lowest surface
roughness assures not only good quality but also reduces manufacturing cost. In this paper the main
objective is to study effect of cutting speed, feed rate and depth of cut on surface roughness of mild steel
in turning operation and as a result of that the combination of optimum level of factors was obtained to
get lowest surface roughness. Experiments have been conducted using Taguchi’s experimental design
technique. An orthogonal array, signal to noise ratio, and analysis of variance are employed to
investigate cutting characteristics of mild steel using high speed steel. Experimental results show that
among the cutting parameter cutting speed is the most significant machining parameter for surface
roughness followed by feed rate and depth of cut.
Control Chart Analysis of Ek/M/1 Queueing Model IJMER
Queueing problems are most common features not only in our daily-life situations such as bank
counters, post offices, ticket booking centres, public transportation systems, but also in more technical
environments such as in manufacturing, computer networking and telecommunications. For any queueing
system average queue length, average system length, average waiting time in the queue and average
waiting time in the system are the main observable performance characteristics. Control chart is a graph
used to study how a process changes over time and it is also used to control ongoing processes. In this
paper control limits are established to study the behavior of Ek
/M /1 queueing model using the
performance characteristics. Numerical results are given to highlight its applications.
Performance Evaluation of Push-To-Talk Group CommunicationIJMER
Recently the VoIP technology has been used for the purpose of voice conversation through the
Internet since the proliferation of smart phones. In this paper, we are interested in the network performance
of the group communication a.k.a. the push-to-talk (PTT) service. As the media traffic to a VoIP server
increases, the VoIP server can be a bottleneck and the voice quality can be declined, which results from the
asymmetry between the in-bound traffic and the out-bound traffic in a VoIP server. To simulate the voice
packet transfer of the group communication, we use ns-2.34 and the ns2VoIP++ package to calculate the
end-to-end mean opinion score. Simulation results show that both the packet error rate and the packet delay
have a significant effect on the performance in terms of the mean opinion score.
The document outlines tasks for a blog post that will explain uses of digital communication systems. It provides details on topics that must be covered such as communication protocols including W3C, WAP, GSM, 3G, MMS, and GPRS. It also lists methods of communication like email, IM, SMS, MMS, internet, forums, blogs, and conferencing. Additional topics that must be covered are internet services including the www, ISPs, URLs, domains, and hosting. The blog post should also demonstrate an understanding of Web 2.0 communities focusing on social networking, information sharing, and adding content. Appropriate language for different methods and their business and personal purposes is to be used.
This document summarizes the synthesis and characterization of ferrate (VI) alkali metal (Na2FeO4) using a wet method. Na2FeO4 was synthesized between 50-55°C by oxidizing ferric sulfate with sodium hypochlorite in a concentrated sodium hydroxide solution. The synthesized Na2FeO4 was characterized using infrared spectroscopy, X-ray diffraction, thermal gravimetric analysis, and Mössbauer spectroscopy. Infrared spectroscopy and XRD confirmed the formation of Na2FeO4. TGA showed decomposition peaks around 100°C and 295°C. Mössbauer spectroscopy revealed the degradation of Fe(VI) to Fe(III)
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
This document analyzes the performance of three routing protocols - AODV, OLSR, and ZRP - under a blackhole security attack in a mobile ad hoc network (MANET). It defines the blackhole attack and describes how each protocol functions. Simulations are run in OPNET with 40 nodes using various performance metrics like network load, end-to-end delay, and packet delivery ratio. The results show that while all protocols are negatively impacted by blackhole nodes, AODV maintains the most consistent performance under attack compared to OLSR and ZRP.
Performance measurement of MANET routing protocols under Blackhole security a...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses detecting sequence number collector problems in black hole attacks in AODV-based mobile ad hoc networks. It begins with background on mobile ad hoc networks (MANETs) and characteristics such as dynamically changing topologies. It then discusses the AODV routing protocol and describes black hole attacks, where a malicious node advertises itself as having the shortest path. The problem is that a malicious node can act as a sequence number collector to obtain numbers from many nodes. The proposed solution classifies nodes into categories based on behavior and isolates malicious nodes from routing and forwarding. Associations between nodes are then used for route selection to increase security while encouraging cooperation.
This document summarizes a research paper that proposes a reliable node-disjoint multipath routing protocol for mobile ad-hoc networks (MANETs). The protocol aims to determine all available reliable node-disjoint routes from the source to destination with minimum overhead during route discovery. It selects primary and backup routes based on link quality and route expiration time. If the primary path fails, it uses the next available backup route. The performance is evaluated using simulations in NS-2, which show it reduces packet drop and delay, increasing packet delivery ratio.
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
Wireless mesh network (WMN) is a novel emerging tec
hnology that will change the world more effectively
and efficiently. It is regarded as a highly promisi
ng technology being increasingly important in mobil
e
wireless networks of the future generation. In this
paper, we consider energy management for wireless
mesh networks from a point of view that started rec
ently to attract the attention means the conservati
on of
energy for operational and the environment reasons
which is known as the Green Networking. This paper
discusses different routing protocols to establish
a protocol which considers energy efficiency. The e
xisting
protocols are compared using the basic functions of
routing and the suggest protocol is designed to
overcome some of their shortcomings. We are focusin
g on the conception of the cross-layer routing
protocol that is implemented in TDMA (Time Division
Multiple Access) wireless mesh networks based
MAC protocol.
This document analyzes the performance of three routing protocols - AODV, DSDV, and OLSR - in a mobile ad hoc network simulation using the NS-3 simulator. It describes the key characteristics of each protocol and the simulation setup, which involved 50 nodes moving according to a random waypoint model. The performance metric studied was packet delivery ratio. The results showed that OLSR achieved the highest packet delivery ratio, performing better than AODV and DSDV in delivering packets from source to destination nodes over the 600 second simulation.
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
This document analyzes the performance of three routing protocols - AODV, DSDV, and OLSR - in mobile ad hoc networks based on packet delivery ratio. It simulates the protocols using NS-3 simulator over 600 seconds with 50 nodes moving randomly. The results show that OLSR has the best performance with high and stable packet delivery ratio, while DSDV has the worst performance with many dropped packets. AODV shows average performance throughout the simulation.
Enhanced location based self adaptive routing algorithm for wsn in industrial...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document evaluates the performance of 5 routing protocols (AODV, DSR, TORA, OLSR, GRP) in a mobile ad hoc network (MANET) using the OPNET simulator. Simulations were run with 30, 60, and 90 nodes using email and video conferencing applications. Performance was analyzed based on throughput, delay, load, and data dropped. In general, GRP and OLSR had the lowest delay, DSR and GRP had the lowest load, and OLSR and AODV had the highest throughput, while TORA often had the worst performance based on the metrics. The evaluation provides insights into the relative performance of the routing protocols under different conditions in a MANET
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
Review on security issues of AODV routing protocol for MANETsIOSR Journals
This document discusses security issues with the Ad Hoc On-Demand Distance Vector (AODV) routing protocol used in mobile ad hoc networks. AODV is vulnerable to attacks where malicious nodes manipulate routing information like sequence numbers and hop counts. The document reviews these vulnerabilities and proposes securing AODV through symmetric encryption of routing control packets between nodes to prevent modification by unauthorized nodes. It suggests approaches for key exchange without a central authority and describes securing the route discovery and maintenance processes in AODV to authenticate routing updates and detect malicious nodes.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
A Mobile Ad hoc NETwork (MANET), is a self-configuring infra structure less network of mobile devices
connected by wireless links. ad hoc is Latin and means "for this purpose". Each device in a MANET is free
to move independently in any direction, and will therefore change its links to other devices frequently. Each
must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building
a MANET is equipping each device to continuously maintain the information required to properly route
traffic. QOS is defined as a set of service requirements to be met by the network while transporting a
packet stream from source to destination. Intrinsic to the notion of QOS is an agreement or a guarantee by
the network to provide a set of measurable pre-specified service attributes to the user in terms of delay,
jitter, available bandwidth, packet loss, and so on. The analysis is mainly between proactive or table-driven
protocols like OLSR (Optimized Link State Routing) viz DSDV (Destination Sequenced Distance Vector) &
CGSR (Cluster Head Gateway Switch Routing) and reactive or source initiated routing protocols viz
AODV (Ad hoc on Demand distance Vector) & DSR (Dynamic Source Routing). The QoS analysis of the
above said protocols is simulated on NS2 and results are shown thereby.
This document summarizes an article that proposes improvements to the Ad hoc On-Demand Distance Vector (AODV) routing protocol for use in Vehicular Ad hoc Networks (VANETs). It first provides background on VANETs and discusses different types of routing protocols used in VANETs, including topology-based, position-based, and hybrid protocols. It then focuses on improvements made to the reactive AODV routing protocol, including adding link layer security checks and a method to reduce packet delay called AODV_BD. The goal of these improvements is to create more stable routes and reduce packet delay for safety communications between vehicles.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Similar to Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s (20)
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...amsjournal
The Fourth Industrial Revolution is transforming industries, including healthcare, by integrating digital,
physical, and biological technologies. This study examines the integration of 4.0 technologies into
healthcare, identifying success factors and challenges through interviews with 70 stakeholders from 33
countries. Healthcare is evolving significantly, with varied objectives across nations aiming to improve
population health. The study explores stakeholders' perceptions on critical success factors, identifying
challenges such as insufficiently trained personnel, organizational silos, and structural barriers to data
exchange. Facilitators for integration include cost reduction initiatives and interoperability policies.
Technologies like IoT, Big Data, AI, Machine Learning, and robotics enhance diagnostics, treatment
precision, and real-time monitoring, reducing errors and optimizing resource utilization. Automation
improves employee satisfaction and patient care, while Blockchain and telemedicine drive cost reductions.
Successful integration requires skilled professionals and supportive policies, promising efficient resource
use, lower error rates, and accelerated processes, leading to optimized global healthcare outcomes.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Advanced control scheme of doubly fed induction generator for wind turbine us...
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
1. International
OPEN ACCESS Journal
Of Modern Engineering Research (IJMER)
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 12 | Dec. 2014 | 10 |
Black Hole Detection in AODV Using Hexagonal Encryption
in Manet’s
Mr. S. Balamurugan1
, V. Kanmani2
(MCA), S. Radhika3
(MCA),
1
Assistant Professor, MCA Deptt.
Sir Manakula Vinayagar Engineering College Madagadipet Pondicherry
I. Introduction
A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile
devices connected without wires. Each device in a MANET is free to move independently in any direction, and
will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use,
and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously
maintain the information required to properly route traffic. Such networks may operate by themselves or may be
connected to the larger Internet. They may contain one or multiple and different transceivers between nodes.
This results in a highly dynamic, autonomous topology. In a MANET, nodes within each other’s wireless
transmission ranges can communicate directly; however, nodes outside each other’s range have to rely on some
other nodes to relay messages. Any routing protocol must encapsulate an essential set of security mechanism.
These mechanisms are used to prevent, detect and respond to security attacks.
The advantage of wireless networks as opposed to wiredor fixed wireless networks is that they are
truly wireless. Most traditional "wireless" access points still need to be wired to the Internet to broadcast their
signal. For large wireless networks, Ethernet cables need to be buried in ceilings and walls and throughout
public areas. For this mechanism, we are using AODV protocol. This algorithm enables dynamic, self-starting,
multihop routing between participating mobile nodes wishing to establish and maintain an ad hoc network.
AODV allows mobile nodes to respond to link breakages and changes in network topology in a timely manner.
The operation of AODV is loop-free, and by avoiding the” counting to infinity” problem offers quick
convergence when the ad hoc network topology changes (typically, when a node moves in the network). When
links break, AODV causes the affected set of nodes to be notified so that they are able to invalidate the routes
using the lost link.
II. Black Hole Attack
In a black hole attack, a malicious node can impersonate a destination node by sending a spoofed route packet
to a source node that initiates a route discovery. A blackhole has two properties:
1. The node exploits the ad hoc routing protocol to advertise itself as having a valid route to a destination, even
though the route is spurious, with the intention of intercepting packets.
2. The node consumes the intercepted packets. In an ad hoc network that uses the AODV protocol, a black hole
node absorbs the network traffic and drops all packets. To explain the black hole attack we add a malicious
node that exhibits black hole behavior.
ABSTRACT: In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Keywords: AODV, Blackhole node behavior, Hexagonal Encryption, MANET’s, Security attackss.
2. Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 12 | Dec. 2014 | 11 |
Fig. 1: Black hole attack in AODV
An attacker suppresses or modifies packets originating from some nodes, while leaving the data from the other
nodes unaffected, which limits the suspicion of its wrong doing.
NS is a discrete event simulator targeted at networking research. Ns provides substantial support for simulation
of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks.
It should be aligned with the simulation needs of modern networking research.
It should encourage community contribution, peer review, and validation of the software.
Since the process of creation of a network simulator that contains a sufficient number of high-quality validated,
tested and actively maintained models requires a lot of work, ns-2 project spreads this workload over a large
community of users and developers
Ns2 is built using C++ and Python with scripting capability. The ns-2 library is wrapped to python
thanks to the pybindgen library which delegates the parsing of the ns-2 C++ headers to gccxml and pygccxml to
generate automatically the corresponding C++ binding glue. These automatically-generated C++ files are finally
compiled into the ns-3 python module to allow users to interact with the C++ ns-2 models and core through
python scripts. The ns-2 simulator features an integrated attribute-based system to manage default and per-
instance values for simulation parameters. All of the configurable default values for parameters are managed by
this system, integrated with command-line argument processing, Doxygen documentation, and an XML-based
and optional GTK-based configuration subsystem.
Tcl (Tool Command Language): Tcl gained acceptance on its own. It is commonly used for rapid prototyping,
scripted applications, GUIs and testing. Tcl is used on embedded systems platforms, both in its full form and in
several other small-footprint versions.
The interpreted class hierarchy is automatically established through methods defined in the class TclClass. user
instantiated objects are mirrored through methods defined in the class TclObject. There are other hierarchies in
the C++ code and OTcl scripts; these other hierarchies are not mirrored in the manner of TclObject.
III. AODV Protocol
AODV is a reactive routing protocol that does not require maintenance of routes to destination nodes that are
not in active communication. Instead, it allows mobile nodes to quickly obtain routes to new destination nodes.
Every mobile node maintains a routing table that stores the next hop node information for a route to the
destination node. When a source node wishes to route a packet to a destination node, it uses the specified route
if a fresh enough route to the destination node is available in its routing table. If such a route is not available in
its cache, the node initiates a route discovery process by broadcasting a Route Request (RREQ) message to its
neighbors. On receiving a RREQ message, the intermediate nodes update their routing tables for a reverse route
to the source node. All the receiving nodes that do not have a route to the destination node broadcast the RREQ
packet to their neighbors. Intermediate nodes increment the hop count before forwarding the RREQ.
A Route Reply (RREP) message is sent back to the source node when the RREQ query reaches either
the destination node itself or any other intermediate node that has a current route to the destination. As the
RREP propagates to the source node, the forward route to the destination is updated by the intermediate nodes
receiving a RREP. The RREP message is a unicast message to the source node. AODV uses sequence numbers
to determine the freshness of routing information and to guarantee loop-free routes. In case of multiple routes, a
node selects the route with the highest sequence number. If multiple routes have the same sequence number,
then the node chooses the route with the shortest hop count. Timers are used to keep the route entries fresh.
3.1 Tradeoff between Delay and Capacity
Increasing transmission power has the side effect of reducing the maximum achievable throughput in a
WSN due to increased channel contention and interference. Our focus is on real-time applications in which
3. Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 12 | Dec. 2014 | 12 |
meeting the deadlines of critical data is more important than the total throughput. For example, in a surveillance
application, timely delivery of the location of an intruder is more important to the user than delivering a large
amount of non-critical data. It is also important to note that the reduced capacity is a problem only when the
workload approaches the network capacity. Recent advances in real-time capacity theory show that the
performance degradation may be avoided as long as the amount of high-priority data transmitted in the network
is small enough not to trigger capacity bottlenecks.
AODV achieves the desired tradeoff among communication delay, energy consumption, and network
capacity by adapting the transmission power based on required communication delays. When deadlines are
tight, AODV trades capacity and energy for shorter communication delay by increasing the transmission power.
Conversely, when the deadlines are loose, AODV lowers the transmission power to increase throughput and
reduce energy consumption. This adaptive approach is a key feature of AODV.
AODV assumes that each packet is assigned a soft deadline by the application, which specifies the
desired bound on the end-to-end delay of a packet. The primary goal of AODV is to increase the number of
packets that meet their deadlines while minimizing the energy consumed for transmitting packets under their
deadline constraints. AODV focuses on minimizing the energy consumed in packet transmissions. In addition,
AODV is designed based on the following principles:
MANETs applications have varied communication requirements resulting in workloads with diverse
deadlines. A real-time power-aware routing protocol should dynamically adapt its transmission power and
routing decisions based on workload and packet deadlines.
The design of AODV should account for the realistic characteristics of MANETs including loss links
and extreme resource constraints in terms of memory, bandwidth and energy. AODV should be localized
protocol that makes decisions based solely on onehop neighborhood information.
IV. Blackhole Detection Methods
Black hole is nothing but the malicisious node. This node accepts the data from source but does not forward it to
the destination. This node used for hacking purpose. There are two detection techniques are involved in the
detection of black hole:
Depending upon how many times that path is used for transmission.
By updating the routing table and comparing unique sequence number at each time.
Method 1
In this method, the sender node needs to verify the authenticity of the node that initiates the RREP
packet by utilizing the network redundancy. Since any packet can be arrived to the destination through many
redundant paths, the idea of this solution is to wait for the RREP packet to arrive from more than two nodes.
During this time the sender node will buffer its packets until a safe route is identified. Once a safe route has
identified, these buffered packets will be transmitted. When a RREP arrives to the source, it will extract the full
paths to the destinations and wait for another RREP. Two or more of these nodes must have some shared hops
(in ad hoc networks, the redundant paths in most of the time have some shared hops or nodes). From these
shared hops the source node can recognize the safe route to the destination. If no shared nodes appear to be in
these redundant routes, the sender will wait for another RREP until a route with shared nodes identified or
routing timer expired. This helps for find secure type of communication between the source and destination.
But the major disadvantage of the this method is its time consuming. Because here secure intermediate node is
find out on the basis how many times that node is used for the data transfer. Now if that node is busy when
source wants to transmit data then source have to wait for it. It might be possible that another node which is
available for transmissions not black hole. This increase unnecessary delay for transmission of data.
Method 2
Every packet in MANETs has a unique sequence number. This number is an increasing value, i.e., the
next packet must have higher value that the current packet sequence number. The node in regular routing
protocols keeps the last packet sequence number that it has received and uses it to check if the received packet
was received before from the same originating source or not. Packet-sequence-numbers for the last packet
received from every node. These tables are updated when any packet arrived or transmitted. The sender
broadcasts the RREQ packet to its neighbors. Once this RREQ reach the destination, it will initiate a RREP to
the source, and this RREP will contain the last packet-sequence-numbers received from this source. When an
intermediate node has a route to the destination and receives this RREQ, it will reply to the sender with a RREP
contains the last packetsequence- numbers received from the source by this intermediate node. This method
provides secure type of data transmission and fast transmission of data as compared to the previous method.
4. Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 12 | Dec. 2014 | 13 |
V. Black Hole Prevention
Real Time Monitoring
This method first identifies the neighbor of the RREP node creator i.e. suspected node. Neighbor node
is instructed to listens the packets send by suspected node. Fcount and rcount are the two counters maintained by
neighbor node. When a neighbor node forwards any packet to suspected node it will increase the fcount counter
by 1. If suspected node forward a packet it will be overheard by the neighbor node and rcount is increased by 1.
After source node receives RREP it sends packets to path to check the node is malicious node or not. Neighbor
node forwards packets to suspect node until fcount reaches a threshold; thereafter if rcount is 0. RREP creator
will identify as malicious node and blocked.
Overcome Blackhole attack
By modifying an original AODV. To participate in Communication RREP originator must exhibit its
honesty. If the node is the first receiver of the RREP packet, it will forward it to Source andcheck forthe
honesty of node based on the opinion of the neighbors of RREP originator Node. Neighbors are requested to
send an opinion about the RREP originator node. After receiving reply from all neighbor nodes. It checked if
RREP originator node has delivered many packets to destination it a an honest node, if RREP originator node as
received many packets but do not forward packets further or it has send many RREP packets, it is a misbehaving
node. Such nodes are added to the quarantine list and blocked.
Comparing Destination Sequence Number
To prevent Blackhole attack in AODV. In the method source node collects all the RREP from different
intermediate node. The first entry received by source is marked first entry in Route reply table (RRT). The
destination sequence number (DSN) of first entry is compared with sequence number of source node. If the
DSN of first entry is very large as compared to source sequence number, the node is considered as malicious
node and removed from the RRT. Path is selected based on the remaining entries in RRT which is arranged
according to DSN. The node with highest DSN is selected for path.
VI. Hexagonal Encryption Algorithm
1. The sender sends a RREQ packet which contains a plain text.
2. When a node recieves the RREQ packet
if(not(Reciever)) then
if((has better route to reciever) ||
(has shorter route to reciever) then
Save the reverse route
Forward the packet
fi
else
Encrypt the plaintext in the packet with
the partition and key preagreed upon
Send a RREP towards the sender with the cipher text
fi
3. When a node node recieves a RREP packet
if(not(Sender)) then //By Sender we mean the
// original source of the RREQ packet
Forward the packet towards sender
else
if(RREP packet contains the required cipher) then
Forward data packets to the last forwarder
of the RREP packet
else
Drop the RREP packet
fi
fi
Fig 2: Algorithm for hexagonal encryption
VII. Experimental Result
The simulation was done with 20,25,30,35,40 nodes. The simulation was done in TCl. With simulations for each
in both AODV Black hole Aodv environments, the scenarios for which were created using the stedest command.
5. Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 12 | Dec. 2014 | 14 |
In each case the number of packets sent, received, dropped and percentage of packets recieved were recorded by
analyzing the trace file. If the nodes are attacked by black hole attack. The hexagonal encryption technique
detect the black hole attack node in network and its changes the route path to some other route without any
data(packet) drops. From this simulation we are increasing packet delivery ratios and reducing packet end-to-
end delay and average packet lengths.The results are shown in the graphs respectively.
Graph 1
It shows the efficient increasing packet delivery ratio when compared to existing one.
Fig 3: Increasing packet delivery ratio using hexagonal encryption
Graph 2
It shows the decreased average packet length when compared to existing one.
Fig 4: Average packet length
Graph 3
It shows the decreased End-to-End delay when compared to existing one.
6. Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 12 | Dec. 2014 | 15 |
Fig 5: End-to-end delay
VIII. Conclusion
The proposed technique to avoid Blackhole node behaviour in AODV(Ad Hoc On-Demand Distance Vector)
using Hexagonal Encryption in NS2. Hexagonal Encryption has been chosen for low cost and high computation
speed up. Compared to existing blackhole detection technique, this proposed technique obtain better result by
stimulating in NS2.
REFERENCES
[1] L. Raja1, Dr. S. Santhosh Baboo, Dept. of Computer Applications, Pachaiyappa’s College, Chennai“Analysis of
Blackhole attacks on AODV Routing Protocol in MANET” December 2012 | Vol 2, Issue 12, 1522-1526
[2] Shraddha Raut & Sd Chede “detection and removal of black hole in mobile Ad-hoc network (manet)” Electronics &
Telecommunication Department.
[3] Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park,” Black Hole Attack in Mobile Ad Hoc Networks”
[4] Vishnu K, Amos J Paul,” Detection and Removal of Cooperative Black/Gray hole attack in Mobile ADHOC
Networks"
[5] AWANDHIYA, P.M., GHONGE, M.M., M.S.ALI, D., DESHPANDE, P.J.. A Survey of Mobile Ad Hoc Network
Attacks. International Journal of Engineering Science and Technology 2010;.
[6] Perkins, C., Belding-Royer, E., Das, S.. Ad hoc On-Demand Distance Vector (AODV) Routing. Tech. Rep. RFC
3561; IETF; 2003. URL:https://tools.ietf.org/html/rfc3561.
[7] Dutta, S.. An approach towards development of effecient encryption techniques. Ph.D. thesis; The University of
North Bengal; 2004.
[8] The ns Manual (formerly ns Notes and Documentation). UC Berkeley, LBL, USC//ISI, and Xerox PARC; 2011.
[9] Greis, M.. Tutorial for the Network Simulator ”ns”. 2004.
[10] Dokurer, S.. SIMULATION OF BLACK HOLE ATTACK IN WIRELESS AD-HOC NETWORKS. Master’s thesis;
Atılım University; 2006.
[11] Sun, B., et al. Detecting Black-hole Attack in Mobile Ad Hoc Networks. Personal Mobile Communications
Conference, 5th European 2003;(492).
[12] Berkeley, U., LBL, , USC/ISI, , PARC, X.. The ns Manual; 2011.
[13] Ross, F.J., Ruiz, P.M.. Implementing a New Manet Unicast Routing Protocol in NS2. Tech. Rep.; Dept. of
Information and Communications Engineering University of Murcia; 2004.
[14] Sukla Banerjee, “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”,
Proceedings of the World Congress on Engineering and Computer Science 2008
[15] Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei , “A Survey on Attacks and Counterme asures in Mobile Ad Hoc
Network,” Wireless/Mobile Network Security, Y. Xiao, X. Shen, and D.-Z. Du (Eds.) pp, @ 2006 Springer.
[16] Nishu Garg and R.P.Mahapatra, “MANET Security Issues ,” IJCSNS International Journal of Computer Science and
Network Security, VOL.9 No.8, August 2009.
[17] N.Shanthi, Dr.Lganesan and Dr.K.Ramar, “Study of Different Attacks on Multicast Mobile Ad hoc Network,” Journal
of Theoretical and Applied Information Technology.