SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
DOI : 10.5121/ijcseit.2012.2211 119
ERROR PERFORMANCE ANALYSIS USING
COOPERATIVE CONTENTION-BASED
ROUTING IN WIRELESS ADHOC NETWORKS
G.SRIMATHY
M.E/Communication Systems, S.A Engineering College,
Chennai-600 077, Tamil Nadu, India.
mail id: sri.mathy73@gmail.com
ABSTRACT
In Wireless Ad hoc network, cooperation of nodes can be achieved by more interactions at higher protocol
layers, particularly the MAC (Medium Access Control) and network layers play vital role. MAC facilitates
a routing protocol based on position location of nodes at network layer specially known as Beacon-less
geographic routing (BLGR) using Contention-based selection process. This paper proposes two levels of
cross-layer framework -a MAC network cross-layer design for forwarder selection (or routing) and a
MAC-PHY for relay selection. Wireless networks suffers huge number of communication at the same time
leads to increase in collision and energy consumption; hence focused on new Contention access method
that uses a dynamical change of channel access probability which can reduce the number of contention
times and collisions. Simulation result demonstrates the best Relay selection and the comparative of direct
mode with the cooperative networks. And also demonstrates the Performance evaluation of contention
probability with Collision avoidance.
KEY WORDS
Ad hoc networks, relay selection, cross-layer design, geographic routing, cooperative networks.
1. INTRODUCTION
Ad Hoc wireless network which means the users or nodes that want to communicate with each
other form self organising temporary network without any centralized administrator. Ad Hoc - a
Latin phrase which means "for this purpose" (i.e.) no advance planning [1] [2]. An autonomous
system of mobile hosts connected by wireless links, called Mobile Ad hoc NETworks (MANETs)
[1] [5]. To achieve efficient communication benefits from cooperation, more interactions at
higher protocol layers, particularly the MAC (Medium Access Control) [2] [9] and network
layers, are vitally required. For this purpose, Beacon-less geographic routing (BLGR) [1] [3],
based on position location of nodes and contention process.
1.1. MAC in multihop Ad hoc networks:
Ad Hoc networks consist of small, inexpensive, resource constrained nodes/host/router that
communicate wirelessly in a multihop network [2]. Each node collaborates with other devices in
the network to perform some operation for the end user, such as environmental monitoring or
target tracking. End users typically desire to deploy nodes randomly throughout the target area in
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
120
large numbers hundreds to thousands of nodes; however, some special cases may require the
precise deployment of a smaller network.
Nodes communicate via multihop network [2] [3] to forward messages to the destination. Despite
using it is to reduce energy requirements for communication, the wireless transceiver often
consumes the largest amount of energy-per time period of use-within a node and, thus, provides
the greatest potential for energy savings. Beyond improving the radio design, an efficient
Medium Access Control (MAC) protocol possesses the greatest capability to decrease the energy
consumption of the transceiver since it directly controls the transceiver operation.
In Section II, the paper summarizes related work. Section III, presents the proposed CoopGeo [1]
with the cross-layer design for cooperative networks with the problem statement. Section IV
gives the network model using BLGR, in which beaconless geographic routing and relay
selection, along with it includes the protocol description. Section V, discusses the simulation
results and evaluate its performance [1]. Finally, the paper concludes in section VI with future
outlook.
1.2. BLGR Concept
BLGR is one of the most efficient and scalable routing solutions for wireless ad hoc and sensor
networks. The key advantage of BLGR is that it needs neither the prior knowledge of network
topology for making a route decision nor the periodic exchange of control messages (i.e.,
beacons) for acquiring neighbours’ geographic locations. A current node can make its own
routing decisions by using local information. In general, a BLGR protocol comprises two
operating phases: forwarding phase and recovery phase. A forwarding node executes the greedy
mechanism in the forwarding phase, and, if failing, switches to recovery mode to perform a face
routing algorithm, finding another path to the destination.
2. RELATED WORK
Ad-hoc networks are infrastructure-less networks, auto configured with limited power
Bandwidth. Each node participating in the network acts as both host and a router to forward
packets for other nodes. Two nodes that are within transmission range of each other are called
one hop neighbours. Multihop ad-hoc networks [1] [3] are ones in which the source node route
the packets to destination node more than one hop away via intermediate nodes. Disaster
management operations and battalion of soldiers are the example of applications of such
cooperative ad-hoc wireless networks. This paper propose a protocol CoopGeo [1] [4], based on
position location of nodes obtained using GPS technology [7].
In traditional geographic routing protocols, each node exchanges periodic one-hop “Beacons” to
determine the position of its neighbours [2] [4]. Since these beacons can create severe problems
in real deployments due to the highly dynamic and error-prone nature of wireless links, it uses
Beacon-less geographic routing protocol (BLGR) [3]. Based on location knowledge and
contention based selection processes [15] [16], the proposed protocol, aims at providing an
efficient, distributed approach to select next hops and optimal operates properly with varying
densities of nodes.
A geographic relay selection scheme [4] based on the knowledge of location information of
nodes. By jointly combining the source-relay and relay-destination distances, the optimal relay
offering the best cooperative link can be efficiently determined. However, the selection process
proposed by requires a central controller to decide which relay [6] is most helpful, leading to
more overhead and power consumption.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
121
To perform position-based unicast forwarding without the help of beacons, using contention-
based forwarding scheme (CBF) [11] the next hop is selected through a distributed contention
process based on the actual positions of all current neighbours. For the contention process, CBF
makes use of biased timers. The BLGF mechanism [6] is carried out using the timer’s settings
[11], applying an area-based assignment function. In addition, a solution to detect malicious
nodes [13] normally operates during determination of a route.
Existing BLGR protocol called BOSS protocol, uses a three-way handshake [7]
(DATA/RESPONSE/SELECTION) and an area-based timer-assignment function to reduce
collisions among responses during the forwarder selection phase. Geographic Routing (GR)
algorithms require nodes to periodically transmit HELLO messages to allow neighbours know
their positions (beaconing mechanism) [9]. To reduce the control overhead due to these messages,
beacon-less routing algorithms have recently been proposed. However, existing beacon-less
algorithms have not considered realistic physical layers.
Other Existing protocol named CSMA/p* [16] [17], is non persistent carrier sense multiple access
(CSMA) [3] with a carefully chosen non uniform probability distribution p* that node s use to
randomly select contention slot. It compares the optimal non-persistent CSMA, discussed
possible implementation directions for the optimal protocol, and finally discussed sift. Sifts back-
off distribution approximately p* no matter how many stations are backlogged, obviating the
need to track this figure with a contention window and bounded back-off.
The traditional contention access technique [11] [14] [15] is reviewed to reduce collision in
networks. In traditional networks like Ethernet and WIFI when collision occurs, nodes apply the
binary exponential back-off technique (BEB) to reduce collisions. In BEB fairness is the most
important criteria. BEB ensures the same channel access probability for every node in the
network. However this technique does not take the criteria of energy consumption. In BEB
contention window size is varied according to the traffic level [15].
3. PROPOSED COOPERATIVE CROSS-LAYER PROTOCOL
To avoid the drawback of existing protocol, it presents a fully beaconless protocol without
requiring beacons in both the greedy forwarding and recovery modes. The paper introduces the
role of interactions between the MAC and physical layers and between the network and MAC
layers in a cooperative scenario. The proposed cross-layer framework, called CoopGeo, consists
of two joint cross-layer designs:
a. A joint network-MAC design for next hop selection and
b. A joint MAC-physical design for relay selection.
3.1. Existing COOPMAC design with Relay solution
Two issues, routing and relay selection, are two chief considerations.
(1) When to cooperate?
(2) Whom to cooperate with and how to do selection?
For the first question, intuitively cooperation may not be a requisite for reliable transmission if
the direct link is of high quality. Therefore a cooperative MAC protocol should be carefully
designed to prevent unnecessary cooperation [2]. A cooperation metric related to the
instantaneous source-relay and relay-destination channel measurements was proposed in [5] to
decide if cooperation is needed.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
122
Figure1. Ad hoc network with relay selection
The second question is about cooperative MAC design addresses the typical relay selection
problem. There may exist a group of available relays around the source; however, some are
beneficial and some not. How to find the optimal one(s) efficiently and effectively is of vital
importance to a practical MAC protocol. In particular, both the routing and relay selection
solutions in CoopGeo are beaconless geographic protocols using contention-based selection
processes, providing a strongly practical multi-layer integration for cooperative networks.
3.2. Hidden and Exposed node problems
The transmission range of stations in wireless network is limited by the transmission Power. This
means that normal carrier sense mechanism which assumes that all stations can listen to each
other, fails. In particular, this gives rise to hidden node and exposed node problem. A simple and
elegant solution to the hidden node problem is to use small packets called RTS (Request to send)
and CTS (Clear to Send) for handshaking before transmission of data packet.
3.3. Contention-based Relay selection:
When there is a collision in the network, it means that there are many contending transmissions in
the network. In the next contending period, if every node wakes up to contend to the channel [8]
[15], there would be two problems. First, the collision probability stays the same. Second, only
one node can win the channel, the other nodes waste energy to wake-up and to sense the channel.
Figure 2. Collision avoidance with two nodes
To avoid these problems, when there is a collision, all contending sensors reduce its contending
probability to a half [8]. Contending probability is the probability that sensors wake-up and go to
contention period. Therefore, after a collision, a half of the contending sensors will not contend
the channel in the next period as in Fig.3. They can save wake-up energy.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
123
Consider p as the contending probability of a node. This probability is always initialized to 100%,
which means that when a node wants to transmit a packet, it always switches its transceiver on to
sense the channel. With the contending probability p, when a node wants to send a package, it has
the probability p to wake-up and contend the channel and a probability 1-p to stay sleeping to
wait for the next period.
3.4. Geographic Routing Protocol
The routing process works in two phases, i.e. BLGF and BLRF. In the BLGF phase, a next hop
that provides maximum progress toward the destination is selected through a timerbased
contention process. As failing to find a next hop in the BLGF phase, the routing process enters
transparently to the BLRF phase and applies face routing by using graph planarization along with
a select-and-protest principle.
Figure 3. CoopGeo phases
Cooperative relaying is required after the routing task whenever the selected next hop decodes the
data packet erroneously.
4. PERFORMANCE METRICS
The Selection metric [1] [3] [4] [5] is the distance parameters that depends on source-relay and
relay-destination distances that indicates the SER performance [1] at the destination. The relay
selection process takes place after the forwarder selection whenever the demand for cooperation
is announced by a forwarder. In this case, a new contention period will be allocated for relay
selection. The relay selection process, in this paper, is based on the following selection criterion
[4],
mi =A2
dp
S,Ri +Bdp
Ri ,D (1)
where, i=1, 2, .., N(nodes),
mi - selection metric,
dp
i,j - distance-dependent parameters
dp
S,Ri – distance between source and Relay
dp
Ri ,D – distance between Relay and destination
Here mi is treated as our relay selection metric, which indicates the SER performance at the
forwarder—the smaller the metrics is, the better the resulting SER performance [4] will be.
Therefore, the best relay can be determined according to the following criteria
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
124
*Smaller the metrics, better the resulting SER performance.
We start with the computation of the collision probability [8] of a given contention window. Let
us recall that a collision occurs if two or more nodes choose the same first slot. Consider a
contention window CW, the probability that each node chooses a slot is 1/CW [8]. A successful
contention period is that one node chooses the first slot, and all other nodes choose later slots.
The probability of collisions is in conjunction with the probability of success [9]. Hence, if there
are N transmissions at the same time, the probability of collision (P colln ) [8] is thus calculated as
P colln =1- {(N/CW) ∑k=1
CW
[(CW-k)/CW] N-1
} (2)
Where N- No. of contending transmissions,
CW- Contention window size,
K- no. of slot.
In this probability of collisions when we fix the contention window CW=4 and vary the number
of contending transmissions N. Observing the expression (2), we find that the probability of
collision is proportional to the number of contending transmissions. When we fix the size of the
contention window CW, if the number of contending transmissions N is increased, the probability
of collision is increased too.
5. SIMULATION AND RESULT ANALYSIS
The Cooperative relay networks n=5 is the available relays, deployed in R. Denote (x,y) as the
coordinates of nodes. The path loss exponent is taken to be p = 2 in these simulations and it also
use QAM modulation technique. The advantage over QAM modulation technique is that it can be
used to obtain both the phase shift and Amplitude modulation. This results in efficient simulation
using Rayleigh channel model with constellation size varies from 4 to 512.
Table1. Simulation Settings
Input Value
No. of Neighbours
Channel model
Path Loss Exp.
Modulation Type
Constellation Size
1-15
Rayleigh
2
QAM
4-512
The neighbour nodes in the domain or outside the domain may be of maximum and so here we
take 15 nodes and that can be extended to 100 nodes. The simulation result has been obtained and
performance of the result is also analysed.
5.1.Result Analysis
The resulting figure depicts the SER versus SNR performance, where SNR is defined as P/N0 and
P is the total transmit power fixed. Figure4. shows that the selected best relay contributes to the
minimum SER at the destination as compared to other relays.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
125
0 5 10 15
10
-8
10
-7
10
-6
10
-5
10
-4
10
-3
10
-2
10
-1
10
0
SNR(dB)
SER
BEST RELAY SELECTION
Best Relay
2nd Best Relay
3rd Best Relay
worst Relay
Figure4. Optimal Relay Selection
In addition, it also reveals that worst relays corresponds to larger selection metrics, that is, the
smaller the selection metrics, the better the resulting SER performances. This is because each
relay has the same opportunities to be selected such that the performance will be averaged over
all the distributed relays.
0 5 10 15
10
-5
10
-4
10
-3
10
-2
10
-1
10
0
SNR(dB)
SER
COMPARISON: DIRECT AND COOPERATIVE RELAY SELECTION
Direct relay selection
Cooperative random Relay Selection
Figure5. Cooperative mode Vs Direct mode
In the Figure 5. , the performance of direct transmission from the source to the destination is
provided as a benchmark for a non-cooperation scheme is compared with the Cooperative relay
selection scheme, which results in High Performance with the Cooperative scheme.
0 2 4 6 8 10 12 14 16 18 20
75
80
85
90
95
100
No of contending nodes
Probablityofcollision
Collisiion Avoidance by varying contending probability
CW=32(fixed-CSMA/CA)
CW=4
CW=8
CW=16
Figure6. Collision reduced -varying CW size
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
126
The Fig.5(c), illustrates the probability of collision by using the proposal. The horizontal axis is
the number of contending periods. The vertical axis is the probability of collisions for each
contending period. It was observed that our approach reduces the number of collisions after a few
contending periods.
1 2 3 4 5 6 7 8
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
No of contending node
PER
Error performance:
Contending probability reduced
Figure7. Error performance
At the first period, the probability of collision is the same as CSMA/CA. But, after each collision,
the nodes reduce their contending probability in Figure6, so that the number of contending
transmission is reduce which implies a reduction of collision number.
6. CONCLUSION
The advantage of position-based geographic routing over other ad hoc routing protocols is the
fact that nodes require only knowledge about the local neighborhood and the destination’s
location instead of global route topology. Therefore, position-based routing is better suited for
networks with a certain degree of mobility. Thus this paper have proposed a cross-layer protocol
CoopGeo based on geographic information to effectively integrate the Network, MAC, and PHY
layers for cooperative wireless ad hoc networks. Simulation demonstrates that the selected best
relay contributes to the minimum SER at the destination as compared to other relays. It reveals
that the smaller the selection metrics, the better the resulting SER performances. Also presented
and analyzed a new contention access method to reduce collisions in scalable sensor network.
Proposed method uses a fixed contention window, and changes the contending probability. Error
performance is also evaluated based on contention and probability error rate.
REFERENCES
[1] Teck Aguilar, Syue-Ju Syue, Vincent Gauthier, Hossam Afifi, and Chin-Liang Wang; “CoopGeo: A
Beaconless Geographic Cross-Layer Protocol for Cooperative Wireless Ad Hoc Networks”, IEEE
Transactions on Wireless Communications, Accepted For Publication.
[2] H. Shan, W. Zhuang, and Z. Wang, “Distributed cooperative MAC for multihop wireless networks,”
IEEE Commun. Mag., vol. 47, no. 2, pp.126–133, Feb. 2009.
[3] J. A. Sanchez, P. M. Ruiz, R. Marin-Perez, “Beacon-less geographic routing made practical:
challenges, design guidelines, and protocols,”IEEE Commun. Mag., vol.47, no. 8, pp.85–91, Aug.
2009.
[4] C.-L. Wang, S.J. Syue, “A geographic based approach to relay selection for wireless ad hoc relay
networks,” in Proc. 2009 IEEE Vehic.Tech. Conf. (VTC 2009-Spring), Apr. 2009, pp. 1–5.
[5] A. S. Ibrahim, A. K. Sadek, W. Su, K. J. R. Liu, “Cooperative communications with relay selection:
when to cooperate and whom to cooperate with?” IEEE Trans. Wireless Commun., vol. 7, no. 7, pp.
2814–2827, July 2008.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012
127
[6] H. Kalosha, A. Nayak, S. Ruhrup, and I. Stojmenovic, “Select-and protest-based beaconless
georouting with guaranteed delivery in wireless sensor networks,” in Proc. INFOCOM 2008, Apr.
2008, pp. 346–350.
[7] J. A. Sanchez, R. Marin-Perez, P. M. Ruiz, “BOSS: beacon-less on demand strategy for geographic
routing in wireless sensor networks,” in Proc. 4th IEEE Int. Conf. on Mobile Ad-hoc and Sensor
Systems, Oct.2007, pp. 1–10.
[8] H-C. Le, H. Guyennet, N. Zerhouni, “A New Contention Access Method for Collision Avoidance in
Wireless Sensor Networks”, in Proc. 6th
IEEE Inter. Conf. on Networking, 0-7695-2805-8/07 -2007.
[9] P. Liu, Z. Tao, Z. Lin, E. Erkip, S. Panwar, “Cooperative wireless communications: a cross-layer
approach,” IEEE Trans. Wireless Commun., vol. 13, no. 4, pp. 84–92, Aug. 2006.
[10] Kurtis Kredo IIa Prasant Mohapatra b, “Medium Access Control in Wireless Sensor Networks” 29
June 2006.
[11] P. Liu, Z. Tao, and S. Panwar, “A cooperative MAC protocol for wireless local area networks,” in
Proc. 2005 IEEE Int. Conf. Commun., May 2005, pp. 2962–2968.
[12] Polastre, J., Hill, J., Culler, D.: “Versatile Low Power Media Access for Wireless Sensor Networks.”
In: Proc. of the ACM sensys conf., Baltimore, MD (2004) 95-107.
[13] Y. C. Tay, K. Jamieson, H. Balakrishnan, “Collision-Minimizing CSMA and Its Applications to
Wireless Sensor Networks”, IEEE Journal on Selected Areas in Communications. Volume: 22, issue:
6, pages: 1048-1057, August 2004.
[14] M. Heissenb uttel, T. Braun, T. Bernoulli, and M. Walchli, “BLR: beacon-less routing algorithm for
mobile ad-hoc networks,” Computer Commun., vol. 27, no. 11, pp. 1076–1086, 2003.
[15] H. Fubler, J. Widmer, M. Kasemann, M. Mauve, and H. Hartenstein,“Contention-based forwarding
for mobile ad hoc networks,” Ad Hoc Networks, vol. 1, no. 4, pp. 351–369, Nov. 2003.
[16] M. Zorzi, R. R. Rao, “Geographic random forwarding (GeRaF) for adhoc & sensor etworks: multihop
performance,” IEEE Trans. Mobile Comput., vol. 2, no. 4, pp. 337–348, Dec. 2003.
[17] V. Rajendran, K. Obraczka, J.J.Garcia-Luna-Aceves, “Energy –Efficient, Collision-Free Medium
Access Control for Wireless Sensor Networks”, Proc. ACM sensys 03, pages: 181 – 192, Los
Angeles, California, 5-7 November 2003.
[18] C. E. Perkins and E. M. Royer, “Ad-hoc On Demand Distance Vector Routing,” in Proc. of the 2nd
IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'99), 1999.
[19] Tony Larson and Nicklas Hedman, “Routing Protocols in Wireless Ad-Hoc Networks- A Simulation
Study”, Master’s thesis in Computer Science and Engineering 1998:362. ISSN: 1402-1617. ISRN:
LTU-EX—98/362—SE.
[20] Abdelmalik Bachir and Dominique Barthel, France Telecom R&D; Martin Heusse and Andrzej Duda,
LSR-IMAG Laboratory, “Hidden Nodes Avoidance in Wireless Sensor Networks”.
[21] A Tanenbaum, “Computer Networks”, 4th
edition, Prentice Hall, Pearson Education 2003.
Author
G. Srimathy received B.E in Electronics and Communication Engineering from SKP
Engineering College affiliated to Anna University, Chennai. Currently pursuing her M.E
(Communication Systems) at S.A. Engineering College affiliated to Anna University of
Technology, Chennai. She has contributed Four Technical papers in National and
International Conferences and published Two Journals. Her area of interest includes
Wireless Ad hoc and Sensor Networks Cooperative Communications, Cross layer design
of Wireless networks, Contention-Based Collision avoidance and Network Security.

More Related Content

What's hot

A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...Narendra Singh Yadav
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...IJCNCJournal
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...
6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...
6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...IJCNCJournal
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Yayah Zakaria
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkIJMTST Journal
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
 
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIPAREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIPVLSICS Design
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms IJECEIAES
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
 
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ijwmn
 

What's hot (17)

A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
 
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
MULTI-CLUSTER MULTI-CHANNEL SCHEDULING (MMS) ALGORITHM FOR MAXIMUM DATA COLLE...
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...
6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...
6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
Improvement at Network Planning using Heuristic Algorithm to Minimize Cost of...
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection Network
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
 
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIPAREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
AREA-EFFICIENT DESIGN OF SCHEDULER FOR ROUTING NODE OF NETWORK-ON-CHIP
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...
 
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)
 

Similar to ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRELESS ADHOC NETWORKS

Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01graphhoc
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
 
2269-2847-1-SM.pdf
2269-2847-1-SM.pdf2269-2847-1-SM.pdf
2269-2847-1-SM.pdfssuser47c279
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...IAESIJAI
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination inIJCNCJournal
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...ijwmn
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IJCNCJournal
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksAbir Hossain
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 

Similar to ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRELESS ADHOC NETWORKS (20)

Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
2269-2847-1-SM.pdf
2269-2847-1-SM.pdf2269-2847-1-SM.pdf
2269-2847-1-SM.pdf
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination in
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
Connectivity aware and adaptive multipath routing algorithm for mobile adhoc ...
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 

More from IJCSEIT Journal

ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS IJCSEIT Journal
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...IJCSEIT Journal
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...IJCSEIT Journal
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALGENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
 
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALMETA-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALIJCSEIT Journal
 
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMM-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...IJCSEIT Journal
 
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...IJCSEIT Journal
 
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...IJCSEIT Journal
 
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEUSING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEIJCSEIT Journal
 
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETPROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
 
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...IJCSEIT Journal
 

More from IJCSEIT Journal (20)

ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALGENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
 
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALMETA-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
 
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMM-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
 
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
 
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
 
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEUSING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
 
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETPROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
 
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257subhasishdas79
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...manju garg
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 

Recently uploaded (20)

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 

ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRELESS ADHOC NETWORKS

  • 1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 DOI : 10.5121/ijcseit.2012.2211 119 ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRELESS ADHOC NETWORKS G.SRIMATHY M.E/Communication Systems, S.A Engineering College, Chennai-600 077, Tamil Nadu, India. mail id: sri.mathy73@gmail.com ABSTRACT In Wireless Ad hoc network, cooperation of nodes can be achieved by more interactions at higher protocol layers, particularly the MAC (Medium Access Control) and network layers play vital role. MAC facilitates a routing protocol based on position location of nodes at network layer specially known as Beacon-less geographic routing (BLGR) using Contention-based selection process. This paper proposes two levels of cross-layer framework -a MAC network cross-layer design for forwarder selection (or routing) and a MAC-PHY for relay selection. Wireless networks suffers huge number of communication at the same time leads to increase in collision and energy consumption; hence focused on new Contention access method that uses a dynamical change of channel access probability which can reduce the number of contention times and collisions. Simulation result demonstrates the best Relay selection and the comparative of direct mode with the cooperative networks. And also demonstrates the Performance evaluation of contention probability with Collision avoidance. KEY WORDS Ad hoc networks, relay selection, cross-layer design, geographic routing, cooperative networks. 1. INTRODUCTION Ad Hoc wireless network which means the users or nodes that want to communicate with each other form self organising temporary network without any centralized administrator. Ad Hoc - a Latin phrase which means "for this purpose" (i.e.) no advance planning [1] [2]. An autonomous system of mobile hosts connected by wireless links, called Mobile Ad hoc NETworks (MANETs) [1] [5]. To achieve efficient communication benefits from cooperation, more interactions at higher protocol layers, particularly the MAC (Medium Access Control) [2] [9] and network layers, are vitally required. For this purpose, Beacon-less geographic routing (BLGR) [1] [3], based on position location of nodes and contention process. 1.1. MAC in multihop Ad hoc networks: Ad Hoc networks consist of small, inexpensive, resource constrained nodes/host/router that communicate wirelessly in a multihop network [2]. Each node collaborates with other devices in the network to perform some operation for the end user, such as environmental monitoring or target tracking. End users typically desire to deploy nodes randomly throughout the target area in
  • 2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 120 large numbers hundreds to thousands of nodes; however, some special cases may require the precise deployment of a smaller network. Nodes communicate via multihop network [2] [3] to forward messages to the destination. Despite using it is to reduce energy requirements for communication, the wireless transceiver often consumes the largest amount of energy-per time period of use-within a node and, thus, provides the greatest potential for energy savings. Beyond improving the radio design, an efficient Medium Access Control (MAC) protocol possesses the greatest capability to decrease the energy consumption of the transceiver since it directly controls the transceiver operation. In Section II, the paper summarizes related work. Section III, presents the proposed CoopGeo [1] with the cross-layer design for cooperative networks with the problem statement. Section IV gives the network model using BLGR, in which beaconless geographic routing and relay selection, along with it includes the protocol description. Section V, discusses the simulation results and evaluate its performance [1]. Finally, the paper concludes in section VI with future outlook. 1.2. BLGR Concept BLGR is one of the most efficient and scalable routing solutions for wireless ad hoc and sensor networks. The key advantage of BLGR is that it needs neither the prior knowledge of network topology for making a route decision nor the periodic exchange of control messages (i.e., beacons) for acquiring neighbours’ geographic locations. A current node can make its own routing decisions by using local information. In general, a BLGR protocol comprises two operating phases: forwarding phase and recovery phase. A forwarding node executes the greedy mechanism in the forwarding phase, and, if failing, switches to recovery mode to perform a face routing algorithm, finding another path to the destination. 2. RELATED WORK Ad-hoc networks are infrastructure-less networks, auto configured with limited power Bandwidth. Each node participating in the network acts as both host and a router to forward packets for other nodes. Two nodes that are within transmission range of each other are called one hop neighbours. Multihop ad-hoc networks [1] [3] are ones in which the source node route the packets to destination node more than one hop away via intermediate nodes. Disaster management operations and battalion of soldiers are the example of applications of such cooperative ad-hoc wireless networks. This paper propose a protocol CoopGeo [1] [4], based on position location of nodes obtained using GPS technology [7]. In traditional geographic routing protocols, each node exchanges periodic one-hop “Beacons” to determine the position of its neighbours [2] [4]. Since these beacons can create severe problems in real deployments due to the highly dynamic and error-prone nature of wireless links, it uses Beacon-less geographic routing protocol (BLGR) [3]. Based on location knowledge and contention based selection processes [15] [16], the proposed protocol, aims at providing an efficient, distributed approach to select next hops and optimal operates properly with varying densities of nodes. A geographic relay selection scheme [4] based on the knowledge of location information of nodes. By jointly combining the source-relay and relay-destination distances, the optimal relay offering the best cooperative link can be efficiently determined. However, the selection process proposed by requires a central controller to decide which relay [6] is most helpful, leading to more overhead and power consumption.
  • 3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 121 To perform position-based unicast forwarding without the help of beacons, using contention- based forwarding scheme (CBF) [11] the next hop is selected through a distributed contention process based on the actual positions of all current neighbours. For the contention process, CBF makes use of biased timers. The BLGF mechanism [6] is carried out using the timer’s settings [11], applying an area-based assignment function. In addition, a solution to detect malicious nodes [13] normally operates during determination of a route. Existing BLGR protocol called BOSS protocol, uses a three-way handshake [7] (DATA/RESPONSE/SELECTION) and an area-based timer-assignment function to reduce collisions among responses during the forwarder selection phase. Geographic Routing (GR) algorithms require nodes to periodically transmit HELLO messages to allow neighbours know their positions (beaconing mechanism) [9]. To reduce the control overhead due to these messages, beacon-less routing algorithms have recently been proposed. However, existing beacon-less algorithms have not considered realistic physical layers. Other Existing protocol named CSMA/p* [16] [17], is non persistent carrier sense multiple access (CSMA) [3] with a carefully chosen non uniform probability distribution p* that node s use to randomly select contention slot. It compares the optimal non-persistent CSMA, discussed possible implementation directions for the optimal protocol, and finally discussed sift. Sifts back- off distribution approximately p* no matter how many stations are backlogged, obviating the need to track this figure with a contention window and bounded back-off. The traditional contention access technique [11] [14] [15] is reviewed to reduce collision in networks. In traditional networks like Ethernet and WIFI when collision occurs, nodes apply the binary exponential back-off technique (BEB) to reduce collisions. In BEB fairness is the most important criteria. BEB ensures the same channel access probability for every node in the network. However this technique does not take the criteria of energy consumption. In BEB contention window size is varied according to the traffic level [15]. 3. PROPOSED COOPERATIVE CROSS-LAYER PROTOCOL To avoid the drawback of existing protocol, it presents a fully beaconless protocol without requiring beacons in both the greedy forwarding and recovery modes. The paper introduces the role of interactions between the MAC and physical layers and between the network and MAC layers in a cooperative scenario. The proposed cross-layer framework, called CoopGeo, consists of two joint cross-layer designs: a. A joint network-MAC design for next hop selection and b. A joint MAC-physical design for relay selection. 3.1. Existing COOPMAC design with Relay solution Two issues, routing and relay selection, are two chief considerations. (1) When to cooperate? (2) Whom to cooperate with and how to do selection? For the first question, intuitively cooperation may not be a requisite for reliable transmission if the direct link is of high quality. Therefore a cooperative MAC protocol should be carefully designed to prevent unnecessary cooperation [2]. A cooperation metric related to the instantaneous source-relay and relay-destination channel measurements was proposed in [5] to decide if cooperation is needed.
  • 4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 122 Figure1. Ad hoc network with relay selection The second question is about cooperative MAC design addresses the typical relay selection problem. There may exist a group of available relays around the source; however, some are beneficial and some not. How to find the optimal one(s) efficiently and effectively is of vital importance to a practical MAC protocol. In particular, both the routing and relay selection solutions in CoopGeo are beaconless geographic protocols using contention-based selection processes, providing a strongly practical multi-layer integration for cooperative networks. 3.2. Hidden and Exposed node problems The transmission range of stations in wireless network is limited by the transmission Power. This means that normal carrier sense mechanism which assumes that all stations can listen to each other, fails. In particular, this gives rise to hidden node and exposed node problem. A simple and elegant solution to the hidden node problem is to use small packets called RTS (Request to send) and CTS (Clear to Send) for handshaking before transmission of data packet. 3.3. Contention-based Relay selection: When there is a collision in the network, it means that there are many contending transmissions in the network. In the next contending period, if every node wakes up to contend to the channel [8] [15], there would be two problems. First, the collision probability stays the same. Second, only one node can win the channel, the other nodes waste energy to wake-up and to sense the channel. Figure 2. Collision avoidance with two nodes To avoid these problems, when there is a collision, all contending sensors reduce its contending probability to a half [8]. Contending probability is the probability that sensors wake-up and go to contention period. Therefore, after a collision, a half of the contending sensors will not contend the channel in the next period as in Fig.3. They can save wake-up energy.
  • 5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 123 Consider p as the contending probability of a node. This probability is always initialized to 100%, which means that when a node wants to transmit a packet, it always switches its transceiver on to sense the channel. With the contending probability p, when a node wants to send a package, it has the probability p to wake-up and contend the channel and a probability 1-p to stay sleeping to wait for the next period. 3.4. Geographic Routing Protocol The routing process works in two phases, i.e. BLGF and BLRF. In the BLGF phase, a next hop that provides maximum progress toward the destination is selected through a timerbased contention process. As failing to find a next hop in the BLGF phase, the routing process enters transparently to the BLRF phase and applies face routing by using graph planarization along with a select-and-protest principle. Figure 3. CoopGeo phases Cooperative relaying is required after the routing task whenever the selected next hop decodes the data packet erroneously. 4. PERFORMANCE METRICS The Selection metric [1] [3] [4] [5] is the distance parameters that depends on source-relay and relay-destination distances that indicates the SER performance [1] at the destination. The relay selection process takes place after the forwarder selection whenever the demand for cooperation is announced by a forwarder. In this case, a new contention period will be allocated for relay selection. The relay selection process, in this paper, is based on the following selection criterion [4], mi =A2 dp S,Ri +Bdp Ri ,D (1) where, i=1, 2, .., N(nodes), mi - selection metric, dp i,j - distance-dependent parameters dp S,Ri – distance between source and Relay dp Ri ,D – distance between Relay and destination Here mi is treated as our relay selection metric, which indicates the SER performance at the forwarder—the smaller the metrics is, the better the resulting SER performance [4] will be. Therefore, the best relay can be determined according to the following criteria
  • 6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 124 *Smaller the metrics, better the resulting SER performance. We start with the computation of the collision probability [8] of a given contention window. Let us recall that a collision occurs if two or more nodes choose the same first slot. Consider a contention window CW, the probability that each node chooses a slot is 1/CW [8]. A successful contention period is that one node chooses the first slot, and all other nodes choose later slots. The probability of collisions is in conjunction with the probability of success [9]. Hence, if there are N transmissions at the same time, the probability of collision (P colln ) [8] is thus calculated as P colln =1- {(N/CW) ∑k=1 CW [(CW-k)/CW] N-1 } (2) Where N- No. of contending transmissions, CW- Contention window size, K- no. of slot. In this probability of collisions when we fix the contention window CW=4 and vary the number of contending transmissions N. Observing the expression (2), we find that the probability of collision is proportional to the number of contending transmissions. When we fix the size of the contention window CW, if the number of contending transmissions N is increased, the probability of collision is increased too. 5. SIMULATION AND RESULT ANALYSIS The Cooperative relay networks n=5 is the available relays, deployed in R. Denote (x,y) as the coordinates of nodes. The path loss exponent is taken to be p = 2 in these simulations and it also use QAM modulation technique. The advantage over QAM modulation technique is that it can be used to obtain both the phase shift and Amplitude modulation. This results in efficient simulation using Rayleigh channel model with constellation size varies from 4 to 512. Table1. Simulation Settings Input Value No. of Neighbours Channel model Path Loss Exp. Modulation Type Constellation Size 1-15 Rayleigh 2 QAM 4-512 The neighbour nodes in the domain or outside the domain may be of maximum and so here we take 15 nodes and that can be extended to 100 nodes. The simulation result has been obtained and performance of the result is also analysed. 5.1.Result Analysis The resulting figure depicts the SER versus SNR performance, where SNR is defined as P/N0 and P is the total transmit power fixed. Figure4. shows that the selected best relay contributes to the minimum SER at the destination as compared to other relays.
  • 7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 125 0 5 10 15 10 -8 10 -7 10 -6 10 -5 10 -4 10 -3 10 -2 10 -1 10 0 SNR(dB) SER BEST RELAY SELECTION Best Relay 2nd Best Relay 3rd Best Relay worst Relay Figure4. Optimal Relay Selection In addition, it also reveals that worst relays corresponds to larger selection metrics, that is, the smaller the selection metrics, the better the resulting SER performances. This is because each relay has the same opportunities to be selected such that the performance will be averaged over all the distributed relays. 0 5 10 15 10 -5 10 -4 10 -3 10 -2 10 -1 10 0 SNR(dB) SER COMPARISON: DIRECT AND COOPERATIVE RELAY SELECTION Direct relay selection Cooperative random Relay Selection Figure5. Cooperative mode Vs Direct mode In the Figure 5. , the performance of direct transmission from the source to the destination is provided as a benchmark for a non-cooperation scheme is compared with the Cooperative relay selection scheme, which results in High Performance with the Cooperative scheme. 0 2 4 6 8 10 12 14 16 18 20 75 80 85 90 95 100 No of contending nodes Probablityofcollision Collisiion Avoidance by varying contending probability CW=32(fixed-CSMA/CA) CW=4 CW=8 CW=16 Figure6. Collision reduced -varying CW size
  • 8. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 126 The Fig.5(c), illustrates the probability of collision by using the proposal. The horizontal axis is the number of contending periods. The vertical axis is the probability of collisions for each contending period. It was observed that our approach reduces the number of collisions after a few contending periods. 1 2 3 4 5 6 7 8 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 No of contending node PER Error performance: Contending probability reduced Figure7. Error performance At the first period, the probability of collision is the same as CSMA/CA. But, after each collision, the nodes reduce their contending probability in Figure6, so that the number of contending transmission is reduce which implies a reduction of collision number. 6. CONCLUSION The advantage of position-based geographic routing over other ad hoc routing protocols is the fact that nodes require only knowledge about the local neighborhood and the destination’s location instead of global route topology. Therefore, position-based routing is better suited for networks with a certain degree of mobility. Thus this paper have proposed a cross-layer protocol CoopGeo based on geographic information to effectively integrate the Network, MAC, and PHY layers for cooperative wireless ad hoc networks. Simulation demonstrates that the selected best relay contributes to the minimum SER at the destination as compared to other relays. It reveals that the smaller the selection metrics, the better the resulting SER performances. Also presented and analyzed a new contention access method to reduce collisions in scalable sensor network. Proposed method uses a fixed contention window, and changes the contending probability. Error performance is also evaluated based on contention and probability error rate. REFERENCES [1] Teck Aguilar, Syue-Ju Syue, Vincent Gauthier, Hossam Afifi, and Chin-Liang Wang; “CoopGeo: A Beaconless Geographic Cross-Layer Protocol for Cooperative Wireless Ad Hoc Networks”, IEEE Transactions on Wireless Communications, Accepted For Publication. [2] H. Shan, W. Zhuang, and Z. Wang, “Distributed cooperative MAC for multihop wireless networks,” IEEE Commun. Mag., vol. 47, no. 2, pp.126–133, Feb. 2009. [3] J. A. Sanchez, P. M. Ruiz, R. Marin-Perez, “Beacon-less geographic routing made practical: challenges, design guidelines, and protocols,”IEEE Commun. Mag., vol.47, no. 8, pp.85–91, Aug. 2009. [4] C.-L. Wang, S.J. Syue, “A geographic based approach to relay selection for wireless ad hoc relay networks,” in Proc. 2009 IEEE Vehic.Tech. Conf. (VTC 2009-Spring), Apr. 2009, pp. 1–5. [5] A. S. Ibrahim, A. K. Sadek, W. Su, K. J. R. Liu, “Cooperative communications with relay selection: when to cooperate and whom to cooperate with?” IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2814–2827, July 2008.
  • 9. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.2, April 2012 127 [6] H. Kalosha, A. Nayak, S. Ruhrup, and I. Stojmenovic, “Select-and protest-based beaconless georouting with guaranteed delivery in wireless sensor networks,” in Proc. INFOCOM 2008, Apr. 2008, pp. 346–350. [7] J. A. Sanchez, R. Marin-Perez, P. M. Ruiz, “BOSS: beacon-less on demand strategy for geographic routing in wireless sensor networks,” in Proc. 4th IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems, Oct.2007, pp. 1–10. [8] H-C. Le, H. Guyennet, N. Zerhouni, “A New Contention Access Method for Collision Avoidance in Wireless Sensor Networks”, in Proc. 6th IEEE Inter. Conf. on Networking, 0-7695-2805-8/07 -2007. [9] P. Liu, Z. Tao, Z. Lin, E. Erkip, S. Panwar, “Cooperative wireless communications: a cross-layer approach,” IEEE Trans. Wireless Commun., vol. 13, no. 4, pp. 84–92, Aug. 2006. [10] Kurtis Kredo IIa Prasant Mohapatra b, “Medium Access Control in Wireless Sensor Networks” 29 June 2006. [11] P. Liu, Z. Tao, and S. Panwar, “A cooperative MAC protocol for wireless local area networks,” in Proc. 2005 IEEE Int. Conf. Commun., May 2005, pp. 2962–2968. [12] Polastre, J., Hill, J., Culler, D.: “Versatile Low Power Media Access for Wireless Sensor Networks.” In: Proc. of the ACM sensys conf., Baltimore, MD (2004) 95-107. [13] Y. C. Tay, K. Jamieson, H. Balakrishnan, “Collision-Minimizing CSMA and Its Applications to Wireless Sensor Networks”, IEEE Journal on Selected Areas in Communications. Volume: 22, issue: 6, pages: 1048-1057, August 2004. [14] M. Heissenb uttel, T. Braun, T. Bernoulli, and M. Walchli, “BLR: beacon-less routing algorithm for mobile ad-hoc networks,” Computer Commun., vol. 27, no. 11, pp. 1076–1086, 2003. [15] H. Fubler, J. Widmer, M. Kasemann, M. Mauve, and H. Hartenstein,“Contention-based forwarding for mobile ad hoc networks,” Ad Hoc Networks, vol. 1, no. 4, pp. 351–369, Nov. 2003. [16] M. Zorzi, R. R. Rao, “Geographic random forwarding (GeRaF) for adhoc & sensor etworks: multihop performance,” IEEE Trans. Mobile Comput., vol. 2, no. 4, pp. 337–348, Dec. 2003. [17] V. Rajendran, K. Obraczka, J.J.Garcia-Luna-Aceves, “Energy –Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks”, Proc. ACM sensys 03, pages: 181 – 192, Los Angeles, California, 5-7 November 2003. [18] C. E. Perkins and E. M. Royer, “Ad-hoc On Demand Distance Vector Routing,” in Proc. of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'99), 1999. [19] Tony Larson and Nicklas Hedman, “Routing Protocols in Wireless Ad-Hoc Networks- A Simulation Study”, Master’s thesis in Computer Science and Engineering 1998:362. ISSN: 1402-1617. ISRN: LTU-EX—98/362—SE. [20] Abdelmalik Bachir and Dominique Barthel, France Telecom R&D; Martin Heusse and Andrzej Duda, LSR-IMAG Laboratory, “Hidden Nodes Avoidance in Wireless Sensor Networks”. [21] A Tanenbaum, “Computer Networks”, 4th edition, Prentice Hall, Pearson Education 2003. Author G. Srimathy received B.E in Electronics and Communication Engineering from SKP Engineering College affiliated to Anna University, Chennai. Currently pursuing her M.E (Communication Systems) at S.A. Engineering College affiliated to Anna University of Technology, Chennai. She has contributed Four Technical papers in National and International Conferences and published Two Journals. Her area of interest includes Wireless Ad hoc and Sensor Networks Cooperative Communications, Cross layer design of Wireless networks, Contention-Based Collision avoidance and Network Security.