This document summarizes a research paper that proposes using a hotspot algorithm to improve node stability in mobile ad hoc networks (MANETs). The paper first provides background on MANETs and challenges with routing in dynamic network topologies. It then discusses the importance of node stability and proposes using a hotspot algorithm to identify stable nodes. The algorithm calculates stability factors for nodes based on their mobility and neighbors' mobility. Routing is done through stable nodes to improve efficiency. The paper models this approach in a network simulator and analyzes results on parameters like packet loss and throughput. Future work involves further optimizing the network using this routing method.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
Wireless operations allow services, such as long-range communications, that are impossible or
impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol
[1]. The term is commonly used in the telecommunications industry to refer to telecommunications systems e.g.
radio transmitters and receivers, remote controls etc. which use some form of energy e.g. radio waves, acoustic
energy, etc. to transfer information without the use of wires.[1] Information is transferred in this manner over
both short and long distances.In this, routes may be detached due to lively movement of nodes. So route
assortment and topology grouping is not easy and demanding issue. This type of networks is more vulnerable to
both internal and external attacks due to presence of wicked neighbour nodes[1][2s. Paper see the sights new
method using AODV protocol to find out good neighbour node and finding reliable path according to their
signal strength, flow capacity relative position of node in network.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Mobile ad-hoc networks (MANETs) are particular type of networks in which the nodes mobility is quite high. No node can join or leave to the network any time as there is no centralized control and static infrastructure in MANETs. All nodes are considered to be equal in processing power. ant colony optimization basics
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
This paper presents an investigation on the optimum number of neighbors for mobile ad hoc networks
(MANETs). The MANETs are self-configuring and self-organizing networks. In such a network, energyconstrained mobile nodes share limited bandwidth to send their packets to the destinations. The mobile nodes
have a limited transmission range and they rely on their neighbors to deliver their packets. Hence, the mobile
nodes must be associated with the required (i.e., optimum) number of neighbors. As the number of neighbors
is varied, a trade-off exists between the network connectivity and available bandwidth per mobile node. To
investigate this issue, we consider Dynamic Source Routing (DSR) as the routing protocol and IEEE 802.11
as the MAC layer protocol in this work. We consider both static and dynamic scenarios in this work. We
simulated the ad hoc networks via network simulator (NS-2) and the simulation results show that there exists
an optimum number of neighbors for the static case. We also show that mobility has a grave impact on the
performance of the MANETs in terms of network throughput, end-to-end delay, energy consumption, and
packet loss. Hence, we need to increase the number of neighbors under mobility conditions. However, there
is no global optimum number of neighbors for the mobility case.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
In wireless networks to improve the competence for event account. Due to the in complete transmission size of nodes, a single path often cannot meet the condition of data transmission. Consequently, multipath show is needed. However, not every path originate by multipath routing algorithms maybe appropriate for conveying image, because a extended routing pathway with a long end to end show delay may not satisfied the time constraint. Furthermore, each data stream includes two kinds of material data handover. We have coming a novel explicit rate-based congestion control method, for supportive requests hand over process. Handover Streaming based Congestion Control (HSBCC), a new adaptive media handover streaming congestion organization in which the assembly packet broadcast rate is adjusted rendering to the active bandwidth share of the connection. They prepare not maintain or continually inform their route tables with the newest route in network. If a node requirements to send a pack to another node then this protocol explorations for the route in an on-demand method and begins the joining in order to communicate and receive the packet. The route detection usually happens by flooding the route application packets throughout the network. It makes sense to simply disregard a packet loss due to random frequency errors than to multiplicatively reduction the current transport rate and it is more suitable to periodically investigation the network during interruption period for a prompt retrieval than to slow down and exponentially increase the retransmission timer.
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
Wireless operations allow services, such as long-range communications, that are impossible or
impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol
[1]. The term is commonly used in the telecommunications industry to refer to telecommunications systems e.g.
radio transmitters and receivers, remote controls etc. which use some form of energy e.g. radio waves, acoustic
energy, etc. to transfer information without the use of wires.[1] Information is transferred in this manner over
both short and long distances.In this, routes may be detached due to lively movement of nodes. So route
assortment and topology grouping is not easy and demanding issue. This type of networks is more vulnerable to
both internal and external attacks due to presence of wicked neighbour nodes[1][2s. Paper see the sights new
method using AODV protocol to find out good neighbour node and finding reliable path according to their
signal strength, flow capacity relative position of node in network.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Mobile ad-hoc networks (MANETs) are particular type of networks in which the nodes mobility is quite high. No node can join or leave to the network any time as there is no centralized control and static infrastructure in MANETs. All nodes are considered to be equal in processing power. ant colony optimization basics
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
This paper presents an investigation on the optimum number of neighbors for mobile ad hoc networks
(MANETs). The MANETs are self-configuring and self-organizing networks. In such a network, energyconstrained mobile nodes share limited bandwidth to send their packets to the destinations. The mobile nodes
have a limited transmission range and they rely on their neighbors to deliver their packets. Hence, the mobile
nodes must be associated with the required (i.e., optimum) number of neighbors. As the number of neighbors
is varied, a trade-off exists between the network connectivity and available bandwidth per mobile node. To
investigate this issue, we consider Dynamic Source Routing (DSR) as the routing protocol and IEEE 802.11
as the MAC layer protocol in this work. We consider both static and dynamic scenarios in this work. We
simulated the ad hoc networks via network simulator (NS-2) and the simulation results show that there exists
an optimum number of neighbors for the static case. We also show that mobility has a grave impact on the
performance of the MANETs in terms of network throughput, end-to-end delay, energy consumption, and
packet loss. Hence, we need to increase the number of neighbors under mobility conditions. However, there
is no global optimum number of neighbors for the mobility case.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Networkinventionjournals
In wireless networks to improve the competence for event account. Due to the in complete transmission size of nodes, a single path often cannot meet the condition of data transmission. Consequently, multipath show is needed. However, not every path originate by multipath routing algorithms maybe appropriate for conveying image, because a extended routing pathway with a long end to end show delay may not satisfied the time constraint. Furthermore, each data stream includes two kinds of material data handover. We have coming a novel explicit rate-based congestion control method, for supportive requests hand over process. Handover Streaming based Congestion Control (HSBCC), a new adaptive media handover streaming congestion organization in which the assembly packet broadcast rate is adjusted rendering to the active bandwidth share of the connection. They prepare not maintain or continually inform their route tables with the newest route in network. If a node requirements to send a pack to another node then this protocol explorations for the route in an on-demand method and begins the joining in order to communicate and receive the packet. The route detection usually happens by flooding the route application packets throughout the network. It makes sense to simply disregard a packet loss due to random frequency errors than to multiplicatively reduction the current transport rate and it is more suitable to periodically investigation the network during interruption period for a prompt retrieval than to slow down and exponentially increase the retransmission timer.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
Video transmission over wireless network requires
link reliability. Videos are having more data to be transmitted
during communication. The criticality and load of the network
increases when some video data is communicated over the
network. Firstly, describes the characteristics of Mobile Ad hoc
Networks and their Routing protocol, and second a mobile ad
hoc network (MANET) which consists of set mobile wireless
nodes and one fixed wireless server are design using ns-2. In this
research we will simulate three MANET routing protocols such
as AODV against three different parameters i.e. delay, network
load, throughput and retransmission.
Engineering Research Publication
Best International Journals, High Impact Journals,
International Journal of Engineering & Technical Research
ISSN : 2321-0869 (O) 2454-4698 (P)
www.erpublication.org
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.JohnWilson47710
Mobile ad hoc network(MANET) is an advance technology of mobile allowing communication without the help of base framing or station. For more detail visit: https://myassignmenthelp.com/free-samples/comp7055-mobile-and-wireless-networks/proactive-and-reactive-routing-file-A1E62A9.html
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksjake henry
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Paper id 28201444
1. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014
E-ISSN: 2321-9637
Improving Node Stability Using Hotspot Algorithm in
87
Mobile Ad-hoc Network
Amanpreet Kaur Amandeep Kaur
Department of Computer Science and Engineering, Sri Guru Granth Sahib World University, Fatehgarh sahib.
cheemaaman84@yahoo.com
Abstract- MANETs can manage without fixed infrastructure and can stay active rapid changes in the network topology. The
primary challenge in building a MANETS is equipping each device to continuously maintain the information required to
appropriately route traffic. Routing with high scalability and robust performance are the key challenges in deploying Mobile
Ad-Hoc Networks. In order to operate the Ad-Hoc Networks more efficiently, suitable on-demand routing protocols have to
be incorporated, to find more suitable routes between source and destination. The dynamic topology of a mobile ad hoc
network (MANETS) poses a real challenge in the design of a MANETS routing protocol. Over the last many years, a variety
of routing protocols have been developed and their performance simulations are made by network researchers. In the paper,
we have used DSR protocol for the network. We have also emphasized on node stability which is an important consideration
to enhance network efficiency.
Keywords: MANETs, Routing in MANETs, Stability of Nodes, Hotspot Algorithm.
1. INTRODUCTION
As the importance of computers in our daily life is
the following factors: for the installation, reliability factor,
increases, it also need new demands for connectivity.
cost, bandwidth, required power, security and
Wired connectivity have been around for a long time but
performance between nodes of network. All networks
there is increasing demand on working wireless solutions.
were based on fixed infrastructures of nodes. Most
Wireless communication between mobile users is growing
common infrastructure based wireless networks are
more popular than ever before. This growth is due to the
cordless telephone, cellular networks, Wireless Fidelity,
technological advancements in the field of computers and
Microwave communication, Worldwide Interoperability
communicating devices. Technology has enabled
for Microwave Access, Satellite communication and
computers and communicating devices (like wireless
Radio Detection and Ranging etc.
devices such as laptops, mobile phones, tablets, wireless
modems, etc. To be equipped with radio interfaces to
communicate on fly. Wireless networking increased the
utility of carrying a computing device. It provides the
mobile user with versatile and flexible communication
and continuous access of networked services.
Network without having a fixed infrastructure is another
promising type of network used in communication. It is
used for any areas, planned or unplanned events like in
war fields or in a meeting of business people scattered
geographically. This type of network can be created or
destroyed when we needed and that is why it is called
mobile ad-hoc network and it has no central and
Figure 1: Infrastructure based wireless network
controlling authority.
Wireless networks are playing a major role in the area of
communication network. Now we are using wireless
networks for the military applications, industrial
applications and also in personal area networks. The main
difference between wireless and wired networks was only
in communication channel. In wired networks, there exist
physical medium while on the other side physical medium
doesn’t exist on the wireless networks. Wireless networks
became very famous in different applications considering
1.1 MANETs
MANETs stand for Mobile Ad hoc Networks. Mobile
implies “mobility”. Ad hoc is a Latin word and it means
“for this only”. MANETs is an collection of mobile
routers or nodes that communicate over wireless links.
MANETs is an Infrastructure-less wireless network. The
routers or nodes moves randomly and organize
themselves arbitrarily. The nodes directly communicate
through the wireless links between each other’s radio
2. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014
E-ISSN: 2321-9637
88
range of nodes, while that are distant apart use other nodes
as relay, in a multi-hop routing function in network. As
the nodes are mobile and not stable, the structure of the
network changes dynamically and unpredictably over
time. Ad-hoc networks are self-configuring and self-organizing,
so to provide communication between nodes
in the network, each node behaves as a transmitter, a host
and a router in a network.
Figure 2: Mobile Ad-Hoc Network
1.2 Routing in MANETs
Described routing is an act of moving information from a
source to a destination in an internetwork. At least one
intermediate node in the internetwork is encountered
during the transfer of information. Basically two process
are involved in the concept of considered the optimal
routing paths for nodes and transferring the packets
through the internetwork. The transferring of the packets
through the internetwork is called as packet switching
which is straight forward, and the route determination
could be difficult.
Routing protocols use several metrics as standard
measurement to determine the best path for routing the
packets to its destination node that could be number of
hops between nodes, which are used by the routing
algorithm to determine the optimal route for the packet to
its destination in network. The process of path
determination is that, routing algorithms find out and hold
routing tables, which contain the route information for the
packets in network. The information of route varies from
one routing algorithm to another between nodes. The
routing tables are filled with entries in the routing table
are internet protocol address prefix and the next hop.
Destination/next hop optimally by sending the packet to a
route representing the address prefix specifies a set of
destinations for which the routing entry is valid. Routing
is mainly classified into static and dynamic routing.
1.3 Stability of Nodes
To improve routing efficiency is to select the most
stable path so as to reduce the latency and the overhead
due to route reconstruction. To maximize throughput
and reduce traffic latency, it is essential to ensure
reliable source-destination connections overtime. A
route should therefore be selected based on some
knowledge of the nodes motion and on a probability
model of the path future availability.
In MANETs, neighbors that do not change too
frequently will not impose large control overhead in
constructing a path from source to the destination as
well as provide better packet delivery ratio. The
mobility of the nodes is a complicating factor that
significantly affects the Effectiveness and
performance of the routing Hence it is needed to find
out the mobility of the node with respect to itself and
considers neighbor mobility. We propose a stability
factor that will be computed based on self stability and
neighbor node stability. Once after finding the stability
factor of a node, if the node is stable, then we can
establish a path from the source to the destination
through intermediate stable nodes for routing the
packets to obtain less control overheads, less delays and
higher packet delivery ratio. A node is said to be stable,
if a node movement is restricted to half/quarter of
transmission range with reference to previous position.
The stability factor of only stable nodes will be
computed and calculated stable timing of nodes.
Stable nodes: - To maximize throughput and reduce
traffic latency, it is essential to ensure reliable source-destination
connections over time. A route should therefore
be selected based on some knowledge of the nodes motion
and on a probability model of the path future availability.
Efficient route repair: - If an estimate of the path duration
is available, service disruption due to route failure can be
avoided by creating an alternative path before the current
one breaks. Note that having some information on the path
duration avoids waste of radio resources due to pre-allocation
of backup paths.
Network connectivity: - Connectivity and topology
characteristics of a MANETs are determined by the link
dynamics between nodes. These are fundamental issues to
network design, since they determine the system capability
to support user communications and their reliability level.
Performance evaluation: - The performances achieved by
high-layer protocols, such as transport and application
protocols, intemperately depend on the quality of service
metrics obtained at the network layer. For an example, the
duration and frequency of route disruptions have a
significant effect on TCP behavior, video streaming and
VoIP services. Thus, characterizing nodes stability is the
basis to evaluate the quality of service perceived by the
users.
1.4 Hotspot algorithm
3. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014
E-ISSN: 2321-9637
89
The purpose of the hotspot algorithm is to identify regions
of local enrichment of short-read 27-mer sequence tags
mapped to the genome. Improvement is gauged in a
small window (250bp) relative to a local background
model based upon the binomial distribution, by using the
observed tags in a 50kb surrounding window. Each
mapped tag gets a z-score for the 250bp and 50kb
windows centered on the tag. A hotspot is defined as a
sequence of neighboring tags within a 250bp window,
each of those compared having z-score greater than 2.
When the hotspot is identified in network then hotspot
itself is assigned a z-score relative to the 250bp and 50kb
windows centered on the average position of the tags
forming the hotspot.
Two-pass hotspots. A problem occurs with hotspot
scoring in regions of very high enrichment. These
“monster hotspots” inflate the background for neighboring
regions in network, and deflate neighboring z-scores. The
effect of this is regions of otherwise high enrichment can
be shadowed by the monster. For this problem, we
implement a two-pass hotspot scheme. After the first
round completed of hotspot detection in area, we delete all
tags falling in the first-pass hotspots. Then we compute a
second round of hotspots with this deleted background.
The hotspots from the first and second passes computed
are then combined with each other, and all are re-scored
using the deleted background: the number of tags in each
hotspot is computed using all tags, but 50kb background
windows are used only the deleted background.
2. RELATED WORK
Shrivastava (2013) et al. [31] in the paper “Overview of
Routing Protocols in MANETs’s and Enhancements in
Reactive Protocols”. An ad hoc network doesn’t have any
centralized arbitrator or server. In MANETs each and
every mobile node is assumed to be moving with more or
less relative speed in arbitrary direction. MANETs have
very enterprising use in emergency scenarios like military
operations & disaster relief operation where there is need
of communication network immediately following some
major event, or some temporary requirement like
conference & seminar at new place where there is no
earlier network infrastructure exist and need alternative
solution.
Abedalmotaleb Zadin (2013)et al. [32] paper “Maintaining
Path Stability with Node Failure in Mobile Ad Hoc
Networks” As the demand for mobile ad hoc wireless
network (MANET) applications grows, so does their use
for many important services where reliability and stability
of the communication paths are of great importance. One
approach or existing failure recovery protocols is based on
using backup paths, or multi-paths. Our work is focused on
protecting the route of mobile wireless communications in
the presence of node failure in order to improve their use in
MANETs applications by discovering efficient stable
communication channels with longer lifetimes and
increased number of packets delivered.
Basarkod(2013) et al [33] this paper “Mobility Based
Estimation of Node Stability in MANETs” providing an
efficient, robust and low overhead unicast path from source
node to destination node in MANETs is a critical issue due
to frequent changes in the network topology and mobility
of the nodes . The stability factor of a node may be used to
establish a path from the source to the destination. The
stable nodes in the path will
provide higher packet delivery ratio and lower latency
Richard (2013) et al. [34] in this paper “On the Selection
of Management/Monitoring Nodes in Highly Dynamic
Networks” the problem of provisioning
management/monitoring nodes within highly dynamic
network environments, particularly virtual networks. A
subset of nodes has to be chosen for
management/monitoring, each of which will manage a
subset of the nodes in the network. A new, simple, and
locally optimal greedy algorithm called Pressure is
provided for choice of node position to minimize traffic.
This algorithm is combined with a system for predicting
the lifespan of nodes, and a tunable parameter is also given
so that a system operator could express a preference for
elected nodes to be chosen to reduce traffic, to be “stable,”
or some compromise between these positions. The
combined algorithm called Pressure Time is lightweight
and could be run in a distributed manner. They perform
well, both at reducing traffic and at choosing long lifespan
nodes.
3. PROPOSED METHODOLOGY:-
Mobile ad hoc network is wireless network of mobile
nodes, with no centralized management and control. In this
work, we present a protocol with an enhanced route
discovery mechanism that avoids the congestion in the
route. This protocol selects route on the basis of traffic
load on the node and resets path as the topology changes.
Instead of transmitting entire data through one route, new
efficient paths are discovered from time to time during
transmission. This is an efficient technique for
transmissions that requires a link for longer period of time.
In this work, we will use opportunistic routing scheme to
manage the nodes in highly dynamic networks. In this
work, we also use optimization technique to optimize the
network.
4. PROPOSED MODEL
ı To improve stability of nodes in MANETs with the
use of Hotspot algorithm.
ı To improve other network parameters Congestion
control, to maintain Quality of service in MANETs.
ı Analyze the proposed solution using network
simulator-2 (NS-2)
In this work, the scenario of virtual private network is
created. We are basically focusing on the stability of
nodes. Stability of nodes is checked by applying
4. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014
E-ISSN: 2321-9637
Hotspot algorithm. We are applying Routing on Nodes
in Virtual Network and stability is checked on the
basis of parameters. The DSV protocol is used for
routing in the network which provides better routing
between etween nodes. It also help for controlling traffic of
packets between en nodes in network. This protocol
selects route on the basis of traffic load on the node
and resets path as the topology changes. Instead of
transmitting entire data through one route, new
efficient paths are discovered from time to time during
transmission. on. In this work, we are using routing
scheme for the management of nodes in networks.
Optimization technique is used for the optimization.
Congestion control and quality of service is improved
in MANETs by this work. We have also analyzed a
the
proposed solution olution using Network Simulator
Simulator-2 (NS-2)
under different network parameters.
4.1 Flow of Work
4.2 Algorithmic Steps
Step 1. Develop a ad-hoc scenario.
Step 2. Apply and deploy nodes to scenario.
Step 3. Create hotspot effective area.
Step 4. Hotspot area, random compromise model.
Step 5. According to detection rate, analyze the
probability of attack.
Step 6. Efficiency measure, finding average
number of false hotspots per trackback session.
Step 7. High compromise level of filter index in
static scenario.
Step 8. As to suppress new route request of hotspot
to ensure that routed traffic doesn’t compound
congestion problem.
Step 9. To throttle traffic locally at hotspot to force
tcp flows to slow down.
Step 10. Design and evaluate mechanism, that can
seamlessly interwork with existing routing
protocols to migrate the impact of hotspot.
Step 11. An efficient routing is done according to
hotspot.
Step 12. Quality of service factor is obtained.
5. RESULTS AND FUTURE WORK
5.1 Simulation Table
Parameter Name Value
Channel Wireless channel
Number of Nodes 10
Antenna Omni antenna
Network Simulator NS2.35
Mac version 802.11
Simulation Time 90s
Routing protocol DSR
Area 1000m*1000m
Packet Size 512
Hello Interval 2s
Traffic Rate(packets/s) 10s
Network Interface Physical
Scenario 1
Scenario 1 is shown below in figure.In this scenario
number of nodes are deployed are 10. In this
scenario blue line shows that data is transfer
between nodes.
90
mlessly
5. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014
Fig 3. data Transmission Between Node0 and
Node4 with Node1(hotspot)
Scenario 2
Scenario 2 in figure 4.2 shows data transfer and
the red line between node1 to node 3 shows that it
is next node to transfer data.
Fig 4. Acknowledgement send by another node to
hotspot node
5.2 Graphs
1. Packet Loss
Fig 5 Graph represent packet loss.
E-ISSN: 2321-9637
This graph represents loss in wireless sensor network
in case of hotspot algorithm. These graphs represent
that the loss become low at later levels.
2.Throughput
Fig 6. Represent throughput
In above graph (figure) the throughput is shown for
the network with hot spot or network without hotspot.
Throughput with hotspot is higher than the
throughput without hotspot which is representing by
red arc and green arc representing throughp
hotspot.
3. Lifetime
throughput without
Fig 7 Graph represent various lifetime
In this graph the lifetime is shown here the red line
shows lifetime for ideal condition
5. CONCLUSION
In this work, the scenario of virtual private network
is created. Basically focusing on the stability of
nodes. Stability of nodes is checked by applying
Hotspot algorithm. We are applying Routing on
Nodes in Virtual Network and stability is checked
on the basis of parameters.
route on the basis of traffic load on the node and
resets path as the topology changes. Instead of
91
condition.
. This protocol selects
7. International Journal of Research in Advent Technology, Vol.2, No.8, August 2014
E-ISSN: 2321-9637
93
International Journal of Computer Application,
VoL-56, 2012.
28. Mohan R, “A Stable Mobility Model Evaluation
Strategy for MANETs Routing Protocol ”,
IJARCS, VoL-2,Issue 12, Dec 2012.
29. Ramasubramanian V, “A Hybrid Adaptive
Routing Protocol For MANETS”, Mobihoc’03,
June2012.
30. Shrivastava A, “Overview of Routing Protocol in
MANETs & Enhancements in reactive
Protocols”, IJSRD, Vol-2, 2013.
31. Zadin A, “Maintaining Path Stability with Node
Failure in Mobile Ad –hoc Networks”,
International Conference & Ambient System and
Network Tech, June 2013.
32. Basarkod P.I, “Mobility Based stimation of Node
Stability in MANETs”, IEEE 2013.
33. Richard G., Clayman S., Pavlou G., Mamatas L.,
Galis A. “On the Selection of
Management/Monitoring Nodes in Highly
Dynamic Networks” IEEE Transactions on
Computers, Vol. 62, No. 6, 2013