SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Engineering Research and Development 
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com 
Volume 10, Issue 7 (July 2014), PP.45-47 
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network 
for improving data accessibility 
Kotarki Shruti1, Asha S2 
1Computer Science and Engineering, GNDEC Bidar , Karnataka. 
2Computer Science and Engineering, GNDEC Bidar , Karnataka. 
Abstract:- In a mobile ad hoc network, the mobility and resource constraints of mobile nodes lead to network 
partitioning. Several data replication techniques have been proposed to minimize network partitioning. All 
mobile nodes collaborate fully in terms of sharing their memory space. In reality, some nodes may selfishly 
decide only to cooperate partially with other nodes. The nodes which act selfishly to conserve their memory 
space are called selfish nodes.To over come these selfish nodes selfish node detection algorithm has been used 
which uses two techniques known as partial selfishness and novel replication allocation technique. 
Keywords:- Mobile ad hoc networks, degree of selfishness, selfish replica allocation. 
I. INTRODUCTION 
In Mobile ad-hoc networks they do not have any fixed infrastructure.These mobile nodes can move 
freely around the network.A MANET can be used in natural disasters or military conflicts. One such MANET 
application is Peer-to-Peer file sharing application where all the mobile nodes can share their data with each 
other. A node can access the data available with the other nodes by using queries.Network partitions can occur 
frequently, since nodes move freely in a MANET.To improve data accessibility, Data Reproduction techniques 
are used. Data are usually reproducted at nodes, other than the original owners, to increase data accessibility to 
cooperate with network partitions. A node act as selfishly, i.e., node uses limited resource only for their own 
benefit, such as battery and storage limitations. A node enjoy the benefits provided by the resources of other 
nodes, but it may not provide its own resource to help others nodes. Such selfish nodes can potentially lead a 
wide range of problems in a MANET.There are different methods has been proposed to identify the selfish 
nodes in a network. One such method is using SCF Tree. Each node detects the selfish nodes based on the 
calculated credit risk scores of the other nodes.Each node makes its own topology graph and builds its own 
SCF-tree by excluding selfish nodes. Based on SCF-tree, each node allocates replica in a fully distributed 
manner. 
II. EXISTING SYSTEM 
In a network there are several nodes, One node act as a server and the rest of nodes act as a client. If a 
server wants to send a packet to any of the node and a node does not accept that packet even that node has a 
memory space to store that packet then such node is called as a selfish node and drop that packets. It is 
necessary to consider partial selfish behavior to handle selfish replica allocation. Therefore there are three types 
of nodes from selfish replica allocation perspective. 
1.Type-1 node: The nodes are nonselfish nodes.The nodes hold replicas allocated by other nodes within their 
memory space. 
2.Type-2 node:The nodes are fully selfish nodes. The nodes do not hold replicas allocated by other nodes,but 
allocate replicas to other nodes within their memory space. 
3.Type-3 node: The nodes are partially selfish nodes.Their memory space is divided into two parts:selfish and 
public area.These nodes allocate replicas to other nodes for their accessibility. 
The detection of type-3 node is complex,because they are not always selfish.some time type-3 node is 
considered as nonselfish ,since the node shares part of its memory space. 
III. PROPOSED SYSTEM 
To overcome the problem of existing system proposed system consists of three parts 
1. Detecting selfish nodes 
2. Building the SCF-tree 
3. Allocating replica 
45
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network for improving data accessibility 
1. Detecting selfish nodes: 
Selfish nodes can be detected based on the credit risk score. Credit risk score can be given as follows 
Credit Risk = expected risk/expected value 
Each node estimate the “degree of selfishness” for all of its connected nodes based on the score.First 
describe the selfish node characterstics that may force the selfish replica allocation problem to determine both 
expected value and expected risk. Selfish characters are divided into two types node specific and query 
processing-specific. 
Node-specific characterstic is a selfish node,this selfish node share part of its own memory space, or a 
small number of data items, like the partial selfish node. The size of shared memory space and/or the number of 
shared data items can be used to represent the degree of selfishness. 
46 
2. Building the SCF-tree: 
The main objective of our novel replica allocation techniques is to reduce traffic overhead, To achieve 
the high data accessibility. If the novel replica allocation techniques can allocate replica without discussion with 
other nodes then the traffic overhead will decrease.Consider the simple SCF-tree topology G which includes 
nodes and its links ,which is given as G=(N,L).Where N is number of nodes and L is number of links.The SCF-tree 
includes only nonselfish nodes,need to measure the selfishness degree for the replica allocation in the 
MANET. The sample topology G is given as shown in fig.a. By making use of this sample topology G, the 
SCF-tree of node N1 can be constructed as shown in fig.b. 
Fig 1 Example of self-centered friendship tree 
3. Allocating replica: 
After constructing the SCF-tree, at every relocation period a node allocates its replica.When the node 
does not have space to store its replica it asks nonselfish node to store the replica in its memory. Since the SCF-tree 
based replica allocation is performed in a fully distributed manner, each node determines replica allocation 
individually without any communication with other nodes.Every node has its own SCF-tree and it can perform 
replica allocation on its own decision. 
IV. RELATED WORK 
Closed and open are two categories in the MANETs. In a closed MANET all the nodes participate in 
organizing the network voluntarily. In the open MANET some nodes can be selfish to store their own resources 
because some of the nodes have different objectives. From the network perspective to overcome or to handle the 
problem of selfish behavior various techniques have been proposed . handling selfish nodes can be divided into 
three parts: reputation-based, credit-payment, and game theory-based techniques. In reputation-based 
techniques, each node observes the behaviors of others and uses the surrounding information for routing. In 
credit payment techniques, each node gives a credit to others, as a reward for data forwarding . The collected 
surrounding credit is then used to send data to others. The game theory-based techniques assume that all rational 
nodes can determine their own optimal strategies to maximize their profit . All these techniques concentrate on 
packet forwarding.
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network for improving data accessibility 
Data replication techniques that address both query delay and data accessibility in a MANET and it 
demonstrates a trade-off and proposes techniques to balance it. Dynamic Connectivity based Grouping (DCG) 
introduces the cooperative caching based data access methods, including cache path , cache data, and hybrid. 
V. RESULT 
In this module, the performance of the proposed method is analyzed. Based on the analyzed results X-graphs 
are plotted. Delay is the basic parameters considered here and X-graph is plotted for this parameters. 
In this graph we are comparing existing system with proposed system. By observing this graph we 
conclude that the delay proposed system is better than existing system. 
VI. CONCLUSION 
The problem in the existing system is selfish nodes from the replica allocation perspective this problem 
is referred as selfish replica allocation to overcome this problem two techniques has been used selfish node 
detection method and novel replica allocation technique. Every node in the MANET calculates the credit risk 
information to measure the degree of selfishness to detect the selfish nodes, by these selfish nodes can be 
detected and are not used in transferring the packets from one node to the other node. 
REFERENCES 
[1]. Jae-Ho Choi, Kyu-Sun Shim, SangKeun Lee, and Kun-Lung Wu,”Handling Selfishness in Replica 
Allocation over a Mobile Ad Hoc Network”,IEEE Trans. Mobile computing ,vol 11,no.2,Feb 2012. 
[2]. L. Anderegg and S. Eidenbenz, “Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for 
Mobile Ad Hoc Networks with Selfish Agents,” Proc. ACM MobiCom, pp. 245-259, 2003. 
[3]. P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, “A Survey of Data Replication 
Techniques for Mobile Ad Hoc Network Databases,” The Int’l J. Very Large Data Bases, vol. 17, no. 
5, pp. 1143-1164, 2008. 
[4]. T. Hara and S.K. Madria, “Data Replication for Improving Data Accessibility in Ad Hoc Networks,” 
IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1515-1532, Nov. 2006. 
[5]. W. Wang, X.-Y. Li, and Y. Wang, “Truthful Multicast Routing in Selfish Wireless Networks,” Proc. 
47 
ACM MobiCom, pp. 245-259,2004. 
[6]. S.-Y. Wu and Y.-T. Chang, “A User-Centered Approach to Active Replica Management in Mobile 
Environments,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1606-1619, Nov. 2006. 
[7]. J. Zhai, Q. Li, and X. Li, “Data Caching in Selfish Manets,” Proc. Int’l Conf. Computer Network and 
Mobile Computing, pp. 208-217, 2005. 
[8]. D. Hales, “From Selfish Nodes to Cooperative Networks -Emergent Link-Based Incentives in Peer-to- 
Peer Networks,” Proc. IEEE Int’l Conf. Peer-to-Peer Computing, pp. 151-158, 2004. 
[9]. T. Hara and S.K. Madria, “Consistency Management Strategies for Data Replication in Mobile Ad Hoc 
Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 7, pp. 950-967, July 2009.

More Related Content

What's hot

Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...IDES Editor
 
Nature Inspired Reasoning Applied in Semantic Web
Nature Inspired Reasoning Applied in Semantic WebNature Inspired Reasoning Applied in Semantic Web
Nature Inspired Reasoning Applied in Semantic Webguestecf0af
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107IJRAT
 
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...ijasuc
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...IEEEGLOBALSOFTTECHNOLOGIES
 
Artificial neural networks and its application
Artificial neural networks and its applicationArtificial neural networks and its application
Artificial neural networks and its applicationHưng Đặng
 
Tamil Character Recognition based on Back Propagation Neural Networks
Tamil Character Recognition based on Back Propagation Neural NetworksTamil Character Recognition based on Back Propagation Neural Networks
Tamil Character Recognition based on Back Propagation Neural NetworksDR.P.S.JAGADEESH KUMAR
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...ijcisjournal
 
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET Journal
 
A systematic review on sequence-to-sequence learning with neural network and ...
A systematic review on sequence-to-sequence learning with neural network and ...A systematic review on sequence-to-sequence learning with neural network and ...
A systematic review on sequence-to-sequence learning with neural network and ...IJECEIAES
 
ETRnew.doc.doc
ETRnew.doc.docETRnew.doc.doc
ETRnew.doc.docbutest
 
Soft computing
Soft computingSoft computing
Soft computingCSS
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
 

What's hot (18)

Neural network
Neural networkNeural network
Neural network
 
Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...Multidimensional scaling algorithm and its current applications in wireless l...
Multidimensional scaling algorithm and its current applications in wireless l...
 
Nature Inspired Reasoning Applied in Semantic Web
Nature Inspired Reasoning Applied in Semantic WebNature Inspired Reasoning Applied in Semantic Web
Nature Inspired Reasoning Applied in Semantic Web
 
Paper id 252014107
Paper id 252014107Paper id 252014107
Paper id 252014107
 
Bc32356359
Bc32356359Bc32356359
Bc32356359
 
Jack
JackJack
Jack
 
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
New Generation Routing Protocol over Mobile Ad Hoc Wireless Networks based on...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
 
Artificial neural networks and its application
Artificial neural networks and its applicationArtificial neural networks and its application
Artificial neural networks and its application
 
Ce24539543
Ce24539543Ce24539543
Ce24539543
 
Tamil Character Recognition based on Back Propagation Neural Networks
Tamil Character Recognition based on Back Propagation Neural NetworksTamil Character Recognition based on Back Propagation Neural Networks
Tamil Character Recognition based on Back Propagation Neural Networks
 
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
THE NASH’S BALANCE IN THE THEORY OF GAMES FOR A SECURE MODEL MECHANISM IN ROU...
 
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
 
A systematic review on sequence-to-sequence learning with neural network and ...
A systematic review on sequence-to-sequence learning with neural network and ...A systematic review on sequence-to-sequence learning with neural network and ...
A systematic review on sequence-to-sequence learning with neural network and ...
 
ETRnew.doc.doc
ETRnew.doc.docETRnew.doc.doc
ETRnew.doc.doc
 
Soft computing
Soft computingSoft computing
Soft computing
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 

Viewers also liked

"Planos y angulación"
"Planos y angulación""Planos y angulación"
"Planos y angulación"WeirdNathalie
 
Comparison of rebound numbers for m20 concrete with silica fume
Comparison of rebound numbers for m20 concrete with silica fumeComparison of rebound numbers for m20 concrete with silica fume
Comparison of rebound numbers for m20 concrete with silica fumeeSAT Publishing House
 
JANGAN MEMBEBANI DIRI DALAM URUSAN AGAMA
JANGAN MEMBEBANI DIRI DALAM URUSAN AGAMAJANGAN MEMBEBANI DIRI DALAM URUSAN AGAMA
JANGAN MEMBEBANI DIRI DALAM URUSAN AGAMAFirmahn Firmahn
 
Presentacion la comida de mi madre
Presentacion la comida de mi madrePresentacion la comida de mi madre
Presentacion la comida de mi madrelauraspinola
 

Viewers also liked (7)

"Planos y angulación"
"Planos y angulación""Planos y angulación"
"Planos y angulación"
 
Proyecto power point
Proyecto power pointProyecto power point
Proyecto power point
 
Comparison of rebound numbers for m20 concrete with silica fume
Comparison of rebound numbers for m20 concrete with silica fumeComparison of rebound numbers for m20 concrete with silica fume
Comparison of rebound numbers for m20 concrete with silica fume
 
JANGAN MEMBEBANI DIRI DALAM URUSAN AGAMA
JANGAN MEMBEBANI DIRI DALAM URUSAN AGAMAJANGAN MEMBEBANI DIRI DALAM URUSAN AGAMA
JANGAN MEMBEBANI DIRI DALAM URUSAN AGAMA
 
Presentacion la comida de mi madre
Presentacion la comida de mi madrePresentacion la comida de mi madre
Presentacion la comida de mi madre
 
Foros
ForosForos
Foros
 
PresentacióN1
PresentacióN1PresentacióN1
PresentacióN1
 

Similar to International Journal of Engineering Research and Development

A Survey of Techniques Used To Detect Selfish Nodes in MANET
 A Survey of Techniques Used To Detect Selfish Nodes in MANET A Survey of Techniques Used To Detect Selfish Nodes in MANET
A Survey of Techniques Used To Detect Selfish Nodes in MANETijsrd.com
 
Selfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsSelfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsIOSR Journals
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksIJARIIE JOURNAL
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...IOSR Journals
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkIJCERT
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...ijasuc
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...IJLT EMAS
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
81202015
8120201581202015
81202015IJRAT
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 

Similar to International Journal of Engineering Research and Development (20)

A Survey of Techniques Used To Detect Selfish Nodes in MANET
 A Survey of Techniques Used To Detect Selfish Nodes in MANET A Survey of Techniques Used To Detect Selfish Nodes in MANET
A Survey of Techniques Used To Detect Selfish Nodes in MANET
 
Selfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsSelfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETs
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
IEEE_SMC_2011
IEEE_SMC_2011IEEE_SMC_2011
IEEE_SMC_2011
 
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksEnergy Efficinet Intrusion Detection System in mobile ad-hoc networks
Energy Efficinet Intrusion Detection System in mobile ad-hoc networks
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...Placate packet dropping attack using secure routing protocol and incentive ba...
Placate packet dropping attack using secure routing protocol and incentive ba...
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
H1803055461
H1803055461H1803055461
H1803055461
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
 
B0330811
B0330811B0330811
B0330811
 
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
An Adaptive Cluster Head Election Algorithm for Heterogeneous Mobile Ad-hoc N...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
81202015
8120201581202015
81202015
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.45-47 Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network for improving data accessibility Kotarki Shruti1, Asha S2 1Computer Science and Engineering, GNDEC Bidar , Karnataka. 2Computer Science and Engineering, GNDEC Bidar , Karnataka. Abstract:- In a mobile ad hoc network, the mobility and resource constraints of mobile nodes lead to network partitioning. Several data replication techniques have been proposed to minimize network partitioning. All mobile nodes collaborate fully in terms of sharing their memory space. In reality, some nodes may selfishly decide only to cooperate partially with other nodes. The nodes which act selfishly to conserve their memory space are called selfish nodes.To over come these selfish nodes selfish node detection algorithm has been used which uses two techniques known as partial selfishness and novel replication allocation technique. Keywords:- Mobile ad hoc networks, degree of selfishness, selfish replica allocation. I. INTRODUCTION In Mobile ad-hoc networks they do not have any fixed infrastructure.These mobile nodes can move freely around the network.A MANET can be used in natural disasters or military conflicts. One such MANET application is Peer-to-Peer file sharing application where all the mobile nodes can share their data with each other. A node can access the data available with the other nodes by using queries.Network partitions can occur frequently, since nodes move freely in a MANET.To improve data accessibility, Data Reproduction techniques are used. Data are usually reproducted at nodes, other than the original owners, to increase data accessibility to cooperate with network partitions. A node act as selfishly, i.e., node uses limited resource only for their own benefit, such as battery and storage limitations. A node enjoy the benefits provided by the resources of other nodes, but it may not provide its own resource to help others nodes. Such selfish nodes can potentially lead a wide range of problems in a MANET.There are different methods has been proposed to identify the selfish nodes in a network. One such method is using SCF Tree. Each node detects the selfish nodes based on the calculated credit risk scores of the other nodes.Each node makes its own topology graph and builds its own SCF-tree by excluding selfish nodes. Based on SCF-tree, each node allocates replica in a fully distributed manner. II. EXISTING SYSTEM In a network there are several nodes, One node act as a server and the rest of nodes act as a client. If a server wants to send a packet to any of the node and a node does not accept that packet even that node has a memory space to store that packet then such node is called as a selfish node and drop that packets. It is necessary to consider partial selfish behavior to handle selfish replica allocation. Therefore there are three types of nodes from selfish replica allocation perspective. 1.Type-1 node: The nodes are nonselfish nodes.The nodes hold replicas allocated by other nodes within their memory space. 2.Type-2 node:The nodes are fully selfish nodes. The nodes do not hold replicas allocated by other nodes,but allocate replicas to other nodes within their memory space. 3.Type-3 node: The nodes are partially selfish nodes.Their memory space is divided into two parts:selfish and public area.These nodes allocate replicas to other nodes for their accessibility. The detection of type-3 node is complex,because they are not always selfish.some time type-3 node is considered as nonselfish ,since the node shares part of its memory space. III. PROPOSED SYSTEM To overcome the problem of existing system proposed system consists of three parts 1. Detecting selfish nodes 2. Building the SCF-tree 3. Allocating replica 45
  • 2. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network for improving data accessibility 1. Detecting selfish nodes: Selfish nodes can be detected based on the credit risk score. Credit risk score can be given as follows Credit Risk = expected risk/expected value Each node estimate the “degree of selfishness” for all of its connected nodes based on the score.First describe the selfish node characterstics that may force the selfish replica allocation problem to determine both expected value and expected risk. Selfish characters are divided into two types node specific and query processing-specific. Node-specific characterstic is a selfish node,this selfish node share part of its own memory space, or a small number of data items, like the partial selfish node. The size of shared memory space and/or the number of shared data items can be used to represent the degree of selfishness. 46 2. Building the SCF-tree: The main objective of our novel replica allocation techniques is to reduce traffic overhead, To achieve the high data accessibility. If the novel replica allocation techniques can allocate replica without discussion with other nodes then the traffic overhead will decrease.Consider the simple SCF-tree topology G which includes nodes and its links ,which is given as G=(N,L).Where N is number of nodes and L is number of links.The SCF-tree includes only nonselfish nodes,need to measure the selfishness degree for the replica allocation in the MANET. The sample topology G is given as shown in fig.a. By making use of this sample topology G, the SCF-tree of node N1 can be constructed as shown in fig.b. Fig 1 Example of self-centered friendship tree 3. Allocating replica: After constructing the SCF-tree, at every relocation period a node allocates its replica.When the node does not have space to store its replica it asks nonselfish node to store the replica in its memory. Since the SCF-tree based replica allocation is performed in a fully distributed manner, each node determines replica allocation individually without any communication with other nodes.Every node has its own SCF-tree and it can perform replica allocation on its own decision. IV. RELATED WORK Closed and open are two categories in the MANETs. In a closed MANET all the nodes participate in organizing the network voluntarily. In the open MANET some nodes can be selfish to store their own resources because some of the nodes have different objectives. From the network perspective to overcome or to handle the problem of selfish behavior various techniques have been proposed . handling selfish nodes can be divided into three parts: reputation-based, credit-payment, and game theory-based techniques. In reputation-based techniques, each node observes the behaviors of others and uses the surrounding information for routing. In credit payment techniques, each node gives a credit to others, as a reward for data forwarding . The collected surrounding credit is then used to send data to others. The game theory-based techniques assume that all rational nodes can determine their own optimal strategies to maximize their profit . All these techniques concentrate on packet forwarding.
  • 3. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network for improving data accessibility Data replication techniques that address both query delay and data accessibility in a MANET and it demonstrates a trade-off and proposes techniques to balance it. Dynamic Connectivity based Grouping (DCG) introduces the cooperative caching based data access methods, including cache path , cache data, and hybrid. V. RESULT In this module, the performance of the proposed method is analyzed. Based on the analyzed results X-graphs are plotted. Delay is the basic parameters considered here and X-graph is plotted for this parameters. In this graph we are comparing existing system with proposed system. By observing this graph we conclude that the delay proposed system is better than existing system. VI. CONCLUSION The problem in the existing system is selfish nodes from the replica allocation perspective this problem is referred as selfish replica allocation to overcome this problem two techniques has been used selfish node detection method and novel replica allocation technique. Every node in the MANET calculates the credit risk information to measure the degree of selfishness to detect the selfish nodes, by these selfish nodes can be detected and are not used in transferring the packets from one node to the other node. REFERENCES [1]. Jae-Ho Choi, Kyu-Sun Shim, SangKeun Lee, and Kun-Lung Wu,”Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network”,IEEE Trans. Mobile computing ,vol 11,no.2,Feb 2012. [2]. L. Anderegg and S. Eidenbenz, “Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents,” Proc. ACM MobiCom, pp. 245-259, 2003. [3]. P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, “A Survey of Data Replication Techniques for Mobile Ad Hoc Network Databases,” The Int’l J. Very Large Data Bases, vol. 17, no. 5, pp. 1143-1164, 2008. [4]. T. Hara and S.K. Madria, “Data Replication for Improving Data Accessibility in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1515-1532, Nov. 2006. [5]. W. Wang, X.-Y. Li, and Y. Wang, “Truthful Multicast Routing in Selfish Wireless Networks,” Proc. 47 ACM MobiCom, pp. 245-259,2004. [6]. S.-Y. Wu and Y.-T. Chang, “A User-Centered Approach to Active Replica Management in Mobile Environments,” IEEE Trans. Mobile Computing, vol. 5, no. 11, pp. 1606-1619, Nov. 2006. [7]. J. Zhai, Q. Li, and X. Li, “Data Caching in Selfish Manets,” Proc. Int’l Conf. Computer Network and Mobile Computing, pp. 208-217, 2005. [8]. D. Hales, “From Selfish Nodes to Cooperative Networks -Emergent Link-Based Incentives in Peer-to- Peer Networks,” Proc. IEEE Int’l Conf. Peer-to-Peer Computing, pp. 151-158, 2004. [9]. T. Hara and S.K. Madria, “Consistency Management Strategies for Data Replication in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 7, pp. 950-967, July 2009.