SlideShare a Scribd company logo
Opportunistic MANETs: Mobility Can Make Up for Low
Transmission Power
ABSTRACT:
Opportunistic mobile ad hoc networks (MANETs) are a special class of sparse and
disconnected MANETs where data communication exploits sporadic contact
opportunities among nodes. We consider opportunistic MANETs where nodes
move independently at random over a square of the plane. Nodes exchange data if
they are at a distance at most within each other, where is the node transmission
radius. The flooding time is the number of time-steps required to broadcast a
message from a source node to every node of the network. Flooding time is an
important measure of how fast information can spread in dynamic networks. We
derive the first upper bound on the flooding time, which is a decreasing function of
the maximal speed of the nodes. The bound holds with high probability, and it is
nearly tight. Our bound shows that, thanks to node mobility, even when the
network is sparse and disconnected, information spreading can be fast.
EXISTING SYSTEM:
Previous experimental works in this topic in fact show that data communication
can benefit from node mobility even though all the snapshots of the network are
not connected.
The impact of node mobility in data propagation is currently one of the major
issues in network theory. The new trend is to consider node mobility as a resource
for data forwarding rather than a hurdle. This is well captured by the model known
as opportunistic mobile ad hoc networks (opportunistic MANETs), an interesting
recent evolution of MANETs. Several emerging application scenarios can be
considered as instances of opportunistic MANETs, such as vehicular networks (at
least when traffic density is not high), certain types of mobile sensor networks, and
pocket switched networks. The latter type of network is formed by powerful
handheld devices—able to establish direct wireless communication links through,
e.g., a Wi-Fi interface—carried around by humans in their everyday life.
DISADVANTAGES OF EXISTING SYSTEM:
The term opportunistic also refers to the fact that the communication protocol
does not control node mobility (think about cars, bikes, or pedestrians),
however mobility can be exploited. This is the main reason why the energy
consumption due to node mobility is not considered in the protocol analysis.
Data communication can benefit from node mobility even though all the snap
shots of the network are not connected.
PROPOSED SYSTEM:
The aim of this work is to investigate the speed of data propagation in
opportunistic MANETs: Here, classic static concepts like global connectivity and
network diameter are not very meaningful.
In order to investigate the speed of data propagation, we consider the flooding time.
The flooding is the simple broadcast protocol where every informed node sends the
source message at every time-step (a node is said to be informed if it knows the
source message). The flooding time is the first time-step in which all nodes are
informed. It is a natural lower bound for any broadcast protocol, and it bounds the
maximal speed of data propagation: the same role of the diameter in static
networks.
ADVANTAGES OF PROPOSED SYSTEM:
Our flooding analysis does not consider the interference problem in message
transmissions: This is typically managed at the MAC layer of a wireless network
architecture.
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 512 MB(min)
 Hard Disk - 40 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - LCD/LED
SOFTWARE REQUIREMENTS:-
 Operating System : LINUX
 Tool : Network Simulator-2
 Front End : OTCL (Object Oriented Tool Command
Language)
REFERENCE:
Andrea Clementi, Francesco Pasquale, and Riccardo Silvestri ―Opportunistic
MANETs: Mobility Can Make Up for Low Transmission Power‖- IEEE/ACM
TRANSACTIONS ON NETWORKING, VOL. 21, NO. 2, APRIL 2013.

More Related Content

What's hot

Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
Manish Gupta
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
chennaijp
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
chris zlatis
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
Sunita Sahu
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Editor IJCATR
 
Wba9 Wireless Mesh En Tech
Wba9 Wireless Mesh En TechWba9 Wireless Mesh En Tech
Wba9 Wireless Mesh En Tech
imec.archive
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
ijtsrd
 
Multicast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportMulticast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure support
JPINFOTECH JAYAPRAKASH
 
Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoT
Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoTCongestion Avoidance for Smart Devices by Caching Information in MANETS and IoT
Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoT
JAYAPRAKASH JPINFOTECH
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
Thesis Scientist Private Limited
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
Tarun Varshney
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
Laili Aidi
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
MdSahwon
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applications
varun arora
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
nitesh malviya
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
Zdravko Danailov
 

What's hot (17)

Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...JPD1423  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Wba9 Wireless Mesh En Tech
Wba9 Wireless Mesh En TechWba9 Wireless Mesh En Tech
Wba9 Wireless Mesh En Tech
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Multicast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportMulticast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure support
 
Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoT
Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoTCongestion Avoidance for Smart Devices by Caching Information in MANETS and IoT
Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoT
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Assignment 01
Assignment 01Assignment 01
Assignment 01
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applications
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 

Viewers also liked

Personalized qos aware web service recommendation and visualization
Personalized qos aware web service recommendation and visualizationPersonalized qos aware web service recommendation and visualization
Personalized qos aware web service recommendation and visualization
JPINFOTECH JAYAPRAKASH
 
Optimal multicast capacity and delay tradeoffs in manets
Optimal multicast capacity and delay tradeoffs in manetsOptimal multicast capacity and delay tradeoffs in manets
Optimal multicast capacity and delay tradeoffs in manets
JPINFOTECH JAYAPRAKASH
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigm
JPINFOTECH JAYAPRAKASH
 
Evolution of social networks based on tagging practices
Evolution of social networks based on tagging practicesEvolution of social networks based on tagging practices
Evolution of social networks based on tagging practices
JPINFOTECH JAYAPRAKASH
 
Securing class initialization in java like languages
Securing class initialization in java like languagesSecuring class initialization in java like languages
Securing class initialization in java like languages
JPINFOTECH JAYAPRAKASH
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
JPINFOTECH JAYAPRAKASH
 
Preventing private information inference attacks on social networks
Preventing private information inference attacks on social networksPreventing private information inference attacks on social networks
Preventing private information inference attacks on social networks
JPINFOTECH JAYAPRAKASH
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
JPINFOTECH JAYAPRAKASH
 
Document clustering for forensic analysis an approach for improving computer ...
Document clustering for forensic analysis an approach for improving computer ...Document clustering for forensic analysis an approach for improving computer ...
Document clustering for forensic analysis an approach for improving computer ...
JPINFOTECH JAYAPRAKASH
 
ieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniquesieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniques
JPINFOTECH JAYAPRAKASH
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
JPINFOTECH JAYAPRAKASH
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
JPINFOTECH JAYAPRAKASH
 
Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...
JPINFOTECH JAYAPRAKASH
 
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
JPINFOTECH JAYAPRAKASH
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
JPINFOTECH JAYAPRAKASH
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
JPINFOTECH JAYAPRAKASH
 
On quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networksOn quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networks
JPINFOTECH JAYAPRAKASH
 
Dynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsDynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtns
JPINFOTECH JAYAPRAKASH
 
A survey of xml tree patterns
A survey of xml tree patternsA survey of xml tree patterns
A survey of xml tree patterns
JPINFOTECH JAYAPRAKASH
 

Viewers also liked (19)

Personalized qos aware web service recommendation and visualization
Personalized qos aware web service recommendation and visualizationPersonalized qos aware web service recommendation and visualization
Personalized qos aware web service recommendation and visualization
 
Optimal multicast capacity and delay tradeoffs in manets
Optimal multicast capacity and delay tradeoffs in manetsOptimal multicast capacity and delay tradeoffs in manets
Optimal multicast capacity and delay tradeoffs in manets
 
Fast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigmFast transmission to remote cooperative groups a new key management paradigm
Fast transmission to remote cooperative groups a new key management paradigm
 
Evolution of social networks based on tagging practices
Evolution of social networks based on tagging practicesEvolution of social networks based on tagging practices
Evolution of social networks based on tagging practices
 
Securing class initialization in java like languages
Securing class initialization in java like languagesSecuring class initialization in java like languages
Securing class initialization in java like languages
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
Preventing private information inference attacks on social networks
Preventing private information inference attacks on social networksPreventing private information inference attacks on social networks
Preventing private information inference attacks on social networks
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Document clustering for forensic analysis an approach for improving computer ...
Document clustering for forensic analysis an approach for improving computer ...Document clustering for forensic analysis an approach for improving computer ...
Document clustering for forensic analysis an approach for improving computer ...
 
ieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniquesieee 2013 best project titles with latest techniques
ieee 2013 best project titles with latest techniques
 
Mona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloudMona secure multi owner data sharing for dynamic groups in the cloud
Mona secure multi owner data sharing for dynamic groups in the cloud
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 
Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...
 
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
On quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networksOn quality of monitoring for multi channel wireless infrastructure networks
On quality of monitoring for multi channel wireless infrastructure networks
 
Dynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsDynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtns
 
A survey of xml tree patterns
A survey of xml tree patternsA survey of xml tree patterns
A survey of xml tree patterns
 

Similar to Opportunistic mane ts mobility can make up for low transmission power

Introduction to Networks
Introduction to NetworksIntroduction to Networks
Introduction to Networks
Aliya Saldanha
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
Sambit Dutta
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Natasha Barnett
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Editor IJMTER
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
chennaijp
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Alexander Decker
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
Week 1.ppt
Week 1.pptWeek 1.ppt
Week 1.ppt
KumarVaibhav100
 
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
Performance Analysis of TCP and SCTP For Congestion Losses In ManetPerformance Analysis of TCP and SCTP For Congestion Losses In Manet
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
IJERA Editor
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
Gicheru Onesmus
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
Jasmine Culbreth
 
Securing Mobile Ad Hoc Networks
Securing Mobile Ad Hoc NetworksSecuring Mobile Ad Hoc Networks
Securing Mobile Ad Hoc Networks
Olga Bautista
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
IJAEMSJORNAL
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
acijjournal
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
INFOGAIN PUBLICATION
 
Ad hoc networks introduction
Ad hoc networks   introductionAd hoc networks   introduction
Ad hoc networks introduction
Prof. Dr. Noman Islam
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
Thesis Scientist Private Limited
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
Sanjeev Kumar Jaiswal
 

Similar to Opportunistic mane ts mobility can make up for low transmission power (20)

Introduction to Networks
Introduction to NetworksIntroduction to Networks
Introduction to Networks
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETsJPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Week 1.ppt
Week 1.pptWeek 1.ppt
Week 1.ppt
 
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
Performance Analysis of TCP and SCTP For Congestion Losses In ManetPerformance Analysis of TCP and SCTP For Congestion Losses In Manet
Performance Analysis of TCP and SCTP For Congestion Losses In Manet
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
Securing Mobile Ad Hoc Networks
Securing Mobile Ad Hoc NetworksSecuring Mobile Ad Hoc Networks
Securing Mobile Ad Hoc Networks
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
MOBILE IP ON MOBILE AD HOC NETWORKS: AN IMPLEMENTATION AND PERFORMANCE EVALUA...
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
Ad hoc networks introduction
Ad hoc networks   introductionAd hoc networks   introduction
Ad hoc networks introduction
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 

Recently uploaded

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 

Opportunistic mane ts mobility can make up for low transmission power

  • 1. Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power ABSTRACT: Opportunistic mobile ad hoc networks (MANETs) are a special class of sparse and disconnected MANETs where data communication exploits sporadic contact opportunities among nodes. We consider opportunistic MANETs where nodes move independently at random over a square of the plane. Nodes exchange data if they are at a distance at most within each other, where is the node transmission radius. The flooding time is the number of time-steps required to broadcast a message from a source node to every node of the network. Flooding time is an important measure of how fast information can spread in dynamic networks. We derive the first upper bound on the flooding time, which is a decreasing function of the maximal speed of the nodes. The bound holds with high probability, and it is nearly tight. Our bound shows that, thanks to node mobility, even when the network is sparse and disconnected, information spreading can be fast. EXISTING SYSTEM:
  • 2. Previous experimental works in this topic in fact show that data communication can benefit from node mobility even though all the snapshots of the network are not connected. The impact of node mobility in data propagation is currently one of the major issues in network theory. The new trend is to consider node mobility as a resource for data forwarding rather than a hurdle. This is well captured by the model known as opportunistic mobile ad hoc networks (opportunistic MANETs), an interesting recent evolution of MANETs. Several emerging application scenarios can be considered as instances of opportunistic MANETs, such as vehicular networks (at least when traffic density is not high), certain types of mobile sensor networks, and pocket switched networks. The latter type of network is formed by powerful handheld devices—able to establish direct wireless communication links through, e.g., a Wi-Fi interface—carried around by humans in their everyday life. DISADVANTAGES OF EXISTING SYSTEM: The term opportunistic also refers to the fact that the communication protocol does not control node mobility (think about cars, bikes, or pedestrians), however mobility can be exploited. This is the main reason why the energy consumption due to node mobility is not considered in the protocol analysis. Data communication can benefit from node mobility even though all the snap shots of the network are not connected.
  • 3. PROPOSED SYSTEM: The aim of this work is to investigate the speed of data propagation in opportunistic MANETs: Here, classic static concepts like global connectivity and network diameter are not very meaningful. In order to investigate the speed of data propagation, we consider the flooding time. The flooding is the simple broadcast protocol where every informed node sends the source message at every time-step (a node is said to be informed if it knows the source message). The flooding time is the first time-step in which all nodes are informed. It is a natural lower bound for any broadcast protocol, and it bounds the maximal speed of data propagation: the same role of the diameter in static networks. ADVANTAGES OF PROPOSED SYSTEM: Our flooding analysis does not consider the interference problem in message transmissions: This is typically managed at the MAC layer of a wireless network architecture. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-
  • 4.  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 512 MB(min)  Hard Disk - 40 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - LCD/LED SOFTWARE REQUIREMENTS:-  Operating System : LINUX  Tool : Network Simulator-2  Front End : OTCL (Object Oriented Tool Command Language) REFERENCE:
  • 5. Andrea Clementi, Francesco Pasquale, and Riccardo Silvestri ―Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power‖- IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 2, APRIL 2013.