SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 216
STABILITY ROUTING IN FSO-MANETS
Deena George1
, S Perumal Sankar2
1
M Tech, ECE, TIST, Kochi, Kerala, India
2
Professor, ECE, TIST, Kochi, Kerala, India
Abstract
Routing in MANET is one of the most researched areas in the field of networking; moreover it is one of the most complex tasks.
RF based transmission techniques are widely used in wireless communication networks. Due to the availability of sophisticated
optical components, the networking domain could be merged with optical domain to have a higher capacity and better
transmission. So in order to overcome the disadvantages of RF domain, we can use light as a medium between nodes. i.e, FSO-
MANET. This work is aimed at designing an efficient routing in FSO MANET. This paper proposes a method to find the stable
path as well as stable nodes between the source and destination. The steps are as follows. i) Topology Management ii) Trust Level
Calculation iii) Award and Reward ranking iv)Path Selection. The proposed technique will be implemented in the working
platform of MATLAB.
Keywords: Mobile Ad Hoc Network, Free Space Optics, Link Stability, Delay Tolerant Networking, Clustering
Technique, Award and Reward
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Free space optics is a line of sight technology which uses air
as a medium between transmitter and receiver. In 1960 the
FSO technology was developed for military applications[3].
At the beginning of the 21st
centuary FSO communication
started to see considerable shares in commercial
telecommunication systems. The major advantage of FSO is
high bandwidth and no spectrum licensing. Free-space
optics (FSO) is a technology for transmitting data using
optical signals propagating through the air.
Mobile Adhoc Networks (MANETs) is an emerging
technology that allows establishing instant communication
infrastructures for military and civilian applications [11].
MANET is a network architecture that can be rapidly
deployed without pre-existing fixed network infrastructure.
Usually nodes in a MANET can frequently join and leave
the network, often without warning, and without any
disruption to other node‟s communication.
Mobile ad hoc network (MANET) also called short lived
network can be defined as a type of ad hoc network that can
change locations and configure itself randomly. Because
MANETS are mobile, they use wireless connections to
connect to various networks. This can be a Wi-Fi
connection, or another medium, such as a cellular or satellite
communication. It can also be defined as a collection of
mobile nodes communicating in a multi-hop way without
any fixed infrastructure such as access points or base
stations. Simply stating, a Mobile Ad hoc Networks
(MANET) is one that comes together when required, but it
is not necessary that it requires support from existing
Internet infrastructure or any other kind of fixed stations.
Formally, an ad hoc network can be defined as an
autonomous system of mobile hosts (also serving as routers)
connected by wireless links, which leads to the formation of
a communication network.
Due to the continuous change in network topology,
analyzing the stable path between source and destination is
one of the important issues in adhoc networks. And also
interference from other light sources effects the
transmission. So in order to overcome this we propose a new
method for finding the path between source and destination.
The paper is organized as follows; Section 2 introduces the
concept of stability. Section 3 discusses the stability analysis
methodology. Finally the concluding remarks are given in
section 4.
2. STABILITY
In FSO-MANET, the mobile nodes are continuously
moving. So the shortest path is not the safest path in the
network. If we are not considered the stability of the path,
the link may be broken. Link stability indicates not only
how stable the link is and also shows how long it can
support communications between two nodes. In this paper
we propose a new method for finding the [7] stable path as
well as stable nodes with the help of award and reward
scheme. This will provide a better path between two end
points. So the connectivity problems can be avoided.
3. METHODOLOGY
An adhoc network consists of some thousands of sensor
nodes that are deployed over a geographic area for
monitoring the environment which have the ability to
communicate among them. In a geographic area the nodes
are deployed randomly. For an effective transmission we
need a clustering approach. The communication between
base station and sensor nodes can take place either in flat
fashion or hierarchial fashion. In hierarchial architecture
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 217
which is also known as clustering, sensor nodes are first
grouped into a cluster. In cluster based architectures, mobile
nodes are divided into virtual groups. Each cluster has
various adjacent clusters. All the clusters have the same
rules. A cluster can be made up of a Cluster Head node and
Cluster Members. Here, Cluster Head nodes are used for
controlling the cluster and the area of the cluster is usually
about one or two hops from the Cluster Head node. There
are many cluster based architectures. Clustering schemes
can be classified according to various criteria. For example,
they can be classified according to architectures dependency
on Cluster Head or on Non Cluster Head. The first
architecture requires a Cluster Head for controlling and
managing the group, and the second one does not have a
particular node to perform this task. The other way to
classify the cluster-based architectures is observing the hop
distance between node pairs in a cluster [10].
For this cluster-head selection procedure we are using DTN
(Delay Tolerant Networking) approach. Delay-tolerant
networking (DTN) is an approach to computer network
infrastructure that seeks to address the technical issues in
heterogeneous networks that may cause lack of continuous
network connectivity. Examples of such networks are those
operating in mobile or terrestrial environments or planned
networks in space. DTNs have the potential to interconnect
devices in regions where current networking technology
cannot reach. The idea is that an end-to-end connection may
never be present. To make transmission of packets possible,
intermediate nodes take custody of the data being
transferred and forward it as the opportunity arises. Both
links and nodes may be inherently unreliable and
disconnections may be long-lived. To realize the DTN
vision, path must be found over multiple unreliable,
intermittently connected hops. In this paper a novel routing
approach is developed for the DTNs, the proposed approach
comprises of four phases they are topology management,
trust level calculation, award-reward setting and path
selection. The architecture of the proposed approach is given
in figure below,
Figure 1: Process follows the proposed method
In DTNs proving constant link between nodes is very
complex task, hence in this proposed system a virtual
topology is formed and based on this topology further
routing procedure is carry out. The k-means algorithm is
applied to maintain the topology and the topology is formed
based on the distance. Then the trust level of every node is
determined by sending and receiving sample packets.
Subsequently based on the trust level the award-reward
value is defined for the nodes then based on this value the
routing path is selected.
3.1 Topology Management
In DTN to realize the management of the overall delivery
topology and the formation of specific delivery graphs the
topology management is employed. In the proposed method
k-means algorithm is applied for the topology management.
K-means algorithm is a soft computing Clustering technique
which groups the nodes or objects based on the similarity.
Clustering is a method of grouping a set of objects in such a
way that objects in the same group are more similar to each
other than to those in other groups (Clusters). In general the
Cluster in formed based any one or more attributes of the
particular objects. In our proposed method the Cluster is not
made of any object instead of that the nodes are grouped in
DTN. The attribute we are considering here to group the
node is distance and energy. Hence in this paper the nodes
are Clustered based on the distance between the nodes, i.e.
the shortest distance nodes with closer energy are kept in a
same Cluster. In every Clustering operation the selection of
Cluster is one of the challenging tasks. The effectiveness of
Cluster is completely depends on the Cluster head. In the
proposed method we are using the k-means algorithm for the
selection of Cluster head as well as for the Clustering.
Figure 2: Flow chart for clustering the nodes in DTN
The Clustering algorithm can group the nodes in the nearby
region in a single group and the Cluster head is assumed as a
base node, so that the connection can provide easily. Then
Path Selection
Award-Reward Setting
Trust Level Calculation
Topology Management
START
Place initial „k‟ group of
centroids
Assign each node to the centroid nearest to
it and form initial clusters
Recalculate the positions of
centroid in each cluster
Position of centroid
change ?
END
YES
NO
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 218
the trust level for every node in DTN has to calculate it is
discussed in the subsequent section.
3.2. Trust Level Calculation
In this phase the trust ability of every node in the DTN, it
ensure the denial-of-service (DoS) attach. The DoS attack is
an attempt to make device or network resource unavailable
to its intended users. A DoS attack generally consists of
efforts to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet. Hence in order
to ensure the trust ability of a node in DTN, a sample set of
packets is sent and receive it back by the same node, the
sending and receiving ratio represents the trust level of the
particular node. For example, consider two node A and B,
here A wants to verify the trust level of the node B means,
initially the node sent a set of sample packets to B, then the
node B retransmit the sample packets to B. If the number of
packets transmitted by A and received from the B is same
then the trust level of node B is 100%. In our work the
center node is consider as the base node, so that it alone
send sample packets to its group node for calculating the
trust level [12].
3.3. Award-reward Setting
In general term the award and reward is a kind of
appreciation, to motivate and our best participant in
everywhere. In this paper the award and reward is a kind of
ranking based on the trust ability of nodes in DTN.
For example if the nodes N1, N2, N3, N4, N5, N6, N7, N8,
N9 and N10 having AR values as 10, 9, 8, 7, 6, 5, 4, 3, 2 and
1 respectively, then the award-reward setting become A5,
A4, A3, A2, A1, R1, R2, R3, R4 and R5 respectively, where
A5 means Award-5 and R5 means Reward-5. Hence the
highest awarded node is highly trusted for routing and
highest rewarded node is never considered for routing.
3.4. Path Selection
Selection of path is one of the crucial processes in every
network and it became a challenging task in DTN. In the
proposed system the path is selected on the basis of award-
reward setting. The operation of path selection based on the
proposed approach is shown in figure.
Figure 3: Path Selection
Base node
Node
Source
Node
R A
Destination
Node
R
R (low) R (high)
A (low)
A (high)
CLUSTER 1
CLUSTER 2
Active link
Terminated link
Award Value
Reward Value
Award Value high
Reward Value high
R
A
A (low) Award Value low
Reward Value low
A (high)
R (high)
R (low)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 219
The path selection is a major process in the DTN so in the
proposed system the path is selected based on the award-
reward setting. Initially the nodes in the DTN are grouped
based on the distance and the trust value for every node is
calculated by sending a sample packets. Then based on the
trust level the award-reward value is provided for every
nodes and this value is consider for the path selection the
operation of the path selection is shown in figure 3. Let us
consider a DTN having 18 nodes; initially it is clustered into
two by applying k-means algorithm, so the Cluster1 contain
7 nodes and Cluster2 contains 11 nodes. A node from
Cluster1 is considered as a source node and node in Cluster2
is considered as destination shown in figure 3. First the
source node sends the information to its base node and it
forward it to the corresponding base node, then the
corresponding base node convey the information to
destination node through the award-reward procedure. For
sending the information from source to its base it analyzes
the award-reward value of its adjacent node and the
appropriate node is selected. The source nodes never send
directly to its base unless it is in adjacent. Here the source
node check the award-reward value of adjacent, where two
nodes are adjacent to the source among them one have
reward value and another has award value, so the awarded
node is selected. Base node is adjacent to the selected node,
so it directly sends the information to the base.
After receiving the information by the base node it analyses
the destination address, that whether the destination is also
present in its group otherwise it transmit the information to
the adjacent base nodes, then the process is repeated to reach
the destination in Cluster2 shown in figure3. The format of
the packet is shown in figure 4.
Figure 4: Packet format
The Header and Trailer are fixed size and having the sender
and destination address. The nodes in the DTN receive the
packet and check whether the destination address is same as
its address otherwise it transmits it to the base node. The
base node checks whether the destination node exists in its
group otherwise transmit it to the other group. While
selecting the path based on the award-reward values the loss
can minimized by preventing from the DoS attacks.
Moreover the path is in short rage so the continuity can
maintain for a long time than the normal DTN. Hence form
this overall system the proper routing can achieved in DTN,
by enhancing the security and reducing the loss.
Figure 5: Simulation Results in MATLAB
The figure 5 shows the network scenario which is created in
MATLAB and analyze the path which is more stable based
on the trust value and award reward calculation.
4. CONCLUSION
Due to the frequent changes in network topology, in FSO-
MANET networks to identify the stable path is one of the
important issues in the network. In this paper we introduce a
new method to identify the stable path as well as stable
nodes with the help of Delay Tolerant Networking. This
method helps to find out the suitable path based on trust
value and award reward calculation process. We have
simulated the network scenario in MATLAB and identify
the suitable path. From this paper we can concluded that the
award and reward scheme provides the better solution to
avoid the connectivity issues in FSO-MANET networks. So
we can transmit the information without any connectivity
problems.
REFERENCE
[1] Matthias R. Brust, Steffen Rothkugel, and Adrian
Andronache, “Node Stability in Dynamic Communication
Networks”. in Proceedings of the First Asia International
Conference on Modelling & Simulation (AMS'07)0-7695-
2845-7/07 $20.00 © 2007
[2] Sudip Misra, Sanjay K. Dhurandher, Mohammad S.
Obaidat, “Node Stability-Based Location Updating in
Mobile Ad-Hoc Networks”.in ieee systems journal, Vol. 2,
No. 2,June 2008
[3]. Priyanka Jangir and Bhuperdra Suman “Survey on
Performance of Free Space Optical Communication Links
under Various Field Parameters” e-ISSN: 2278-1676,p-
ISSN: 2320-3331, Volume 9, Issue 2 Ver. V (Mar – Apr.
2014), PP 71-75
[4] Navid Nikaein, Christian Bonnet, “Improving Routing
and Network Performance in Mobile Ad Hoc Networks
Using Quality of Nodes”. https://hal.inria.fr/inria-00466593
Submitted on 24 Mar 2010.
[5] Mandeep Kaur Gulati and Krishan Kumar, “Survey of
Stability Based Routing Protocols in Mobile Ad-hoc
Networks” International Journal of Computer Science
Engineering and Technology( IJCSET)2011
[6] T. Rajamohan Reddy and N. Sobharani“ Selective on-
demand protocol for finding reliable nodes to form stable
Header Information Trailer
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 220
paths in ADHOC networks”. International Journal of
Advanced Research in Computer Engineering & Technology
Vol 1, Issue 5, July 2012.
[7]P. I. Basarkod, S. S. Manvi, D.S.Albur , “Mobility Based
Estimation of Node Stability in MANETs.” 2013 IEEE
International Conference on Emerging Trends in
Computing, Communication and Nanotechnology (ICECCN
2013).
[8] Devideen ahirwar and Prof. Sarvesh Singh Rai,
“Improvement of AODV Routing Protocol Algorithm with
Link Stability and Energy Efficient Routing for MANET”.
International Journal of Computer Science Engineering and
Technology( IJCSET)
[9] G.Madhukar Rao and ,T.santhosh, “ Quality of service
Routing Using Stable Nodes in Mobile Ad hoc Networks”.
ISSN (e): 2250 – 3005, Vol, 04 , Issue, 11 . November –
2014.
February 2014 .
[10].Lloret, Jaime,Miguel Garcia,Diana Bri, and Juan R
Diaz.” A Cluster Bases Architecture to Structure the
Topology of Parallel Wireless Sensor Networks”.
[11]Yanhui Chen. “Performane evaluation of modified IEEE
802.11 MAC for multi-hop adhoc network”,17th
internaqtional conference on Advanced Information
Networking and Applications 2003 AINA 2003 AINA-
03,2003
[12] Advances in Intelligent Systems and Computing,2012

More Related Content

What's hot

Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
M H
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
M H
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
CSCJournals
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs
IJECEIAES
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Publishing House
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
ijwmn
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
eSAT Journals
 
Paper id 21201414
Paper id 21201414Paper id 21201414
Paper id 21201414
IJRAT
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
cscpconf
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
M H
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
International Journal of Science and Research (IJSR)
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
ijwmn
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
M H
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
M H
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networks
IAEME Publication
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Yayah Zakaria
 
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
IJCNCJournal
 

What's hot (18)

Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
Paper id 21201414
Paper id 21201414Paper id 21201414
Paper id 21201414
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networks
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
ENERGY-EFFICIENT MULTI-HOP ROUTING WITH UNEQUAL CLUSTERING APPROACH FOR WIREL...
 

Viewers also liked

Ob notes
Ob notesOb notes
Ob notes
Saira Arshad
 
Branchless banking by corporation bank marketing strategy
Branchless banking by corporation bank   marketing strategyBranchless banking by corporation bank   marketing strategy
Branchless banking by corporation bank marketing strategy
Pankaj Soni
 
Reward system hr management od interventions - Organizational Change and D...
Reward system   hr management od interventions -  Organizational Change and D...Reward system   hr management od interventions -  Organizational Change and D...
Reward system hr management od interventions - Organizational Change and D...
manumelwin
 
reward system of tata co
reward system of tata coreward system of tata co
reward system of tata co
Akash Rana
 
Reward system
Reward systemReward system
Reward system
gayathriyuvaraj
 
Axis Bank
Axis BankAxis Bank
Axis Bank
guest60535459
 

Viewers also liked (6)

Ob notes
Ob notesOb notes
Ob notes
 
Branchless banking by corporation bank marketing strategy
Branchless banking by corporation bank   marketing strategyBranchless banking by corporation bank   marketing strategy
Branchless banking by corporation bank marketing strategy
 
Reward system hr management od interventions - Organizational Change and D...
Reward system   hr management od interventions -  Organizational Change and D...Reward system   hr management od interventions -  Organizational Change and D...
Reward system hr management od interventions - Organizational Change and D...
 
reward system of tata co
reward system of tata coreward system of tata co
reward system of tata co
 
Reward system
Reward systemReward system
Reward system
 
Axis Bank
Axis BankAxis Bank
Axis Bank
 

Similar to Stability routing in fso manets

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
IAESIJEECS
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Iasir Journals
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
IJERA Editor
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
Iasir Journals
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET Journal
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
ijtsrd
 
B05630814
B05630814B05630814
B05630814
IOSR-JEN
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
eSAT Publishing House
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
IRJET Journal
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
50120140501004
5012014050100450120140501004
50120140501004
IAEME Publication
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
ijcsit
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
ijait
 
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
IJCNCJournal
 
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
IJCNCJournal
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
IJERA Editor
 

Similar to Stability routing in fso manets (20)

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
B05630814
B05630814B05630814
B05630814
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
50120140501004
5012014050100450120140501004
50120140501004
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
 
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
 
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection bas...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
Prakhyath Rai
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
Yasser Mahgoub
 

Recently uploaded (20)

2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...Software Engineering and Project Management - Software Testing + Agile Method...
Software Engineering and Project Management - Software Testing + Agile Method...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
 

Stability routing in fso manets

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 216 STABILITY ROUTING IN FSO-MANETS Deena George1 , S Perumal Sankar2 1 M Tech, ECE, TIST, Kochi, Kerala, India 2 Professor, ECE, TIST, Kochi, Kerala, India Abstract Routing in MANET is one of the most researched areas in the field of networking; moreover it is one of the most complex tasks. RF based transmission techniques are widely used in wireless communication networks. Due to the availability of sophisticated optical components, the networking domain could be merged with optical domain to have a higher capacity and better transmission. So in order to overcome the disadvantages of RF domain, we can use light as a medium between nodes. i.e, FSO- MANET. This work is aimed at designing an efficient routing in FSO MANET. This paper proposes a method to find the stable path as well as stable nodes between the source and destination. The steps are as follows. i) Topology Management ii) Trust Level Calculation iii) Award and Reward ranking iv)Path Selection. The proposed technique will be implemented in the working platform of MATLAB. Keywords: Mobile Ad Hoc Network, Free Space Optics, Link Stability, Delay Tolerant Networking, Clustering Technique, Award and Reward --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Free space optics is a line of sight technology which uses air as a medium between transmitter and receiver. In 1960 the FSO technology was developed for military applications[3]. At the beginning of the 21st centuary FSO communication started to see considerable shares in commercial telecommunication systems. The major advantage of FSO is high bandwidth and no spectrum licensing. Free-space optics (FSO) is a technology for transmitting data using optical signals propagating through the air. Mobile Adhoc Networks (MANETs) is an emerging technology that allows establishing instant communication infrastructures for military and civilian applications [11]. MANET is a network architecture that can be rapidly deployed without pre-existing fixed network infrastructure. Usually nodes in a MANET can frequently join and leave the network, often without warning, and without any disruption to other node‟s communication. Mobile ad hoc network (MANET) also called short lived network can be defined as a type of ad hoc network that can change locations and configure itself randomly. Because MANETS are mobile, they use wireless connections to connect to various networks. This can be a Wi-Fi connection, or another medium, such as a cellular or satellite communication. It can also be defined as a collection of mobile nodes communicating in a multi-hop way without any fixed infrastructure such as access points or base stations. Simply stating, a Mobile Ad hoc Networks (MANET) is one that comes together when required, but it is not necessary that it requires support from existing Internet infrastructure or any other kind of fixed stations. Formally, an ad hoc network can be defined as an autonomous system of mobile hosts (also serving as routers) connected by wireless links, which leads to the formation of a communication network. Due to the continuous change in network topology, analyzing the stable path between source and destination is one of the important issues in adhoc networks. And also interference from other light sources effects the transmission. So in order to overcome this we propose a new method for finding the path between source and destination. The paper is organized as follows; Section 2 introduces the concept of stability. Section 3 discusses the stability analysis methodology. Finally the concluding remarks are given in section 4. 2. STABILITY In FSO-MANET, the mobile nodes are continuously moving. So the shortest path is not the safest path in the network. If we are not considered the stability of the path, the link may be broken. Link stability indicates not only how stable the link is and also shows how long it can support communications between two nodes. In this paper we propose a new method for finding the [7] stable path as well as stable nodes with the help of award and reward scheme. This will provide a better path between two end points. So the connectivity problems can be avoided. 3. METHODOLOGY An adhoc network consists of some thousands of sensor nodes that are deployed over a geographic area for monitoring the environment which have the ability to communicate among them. In a geographic area the nodes are deployed randomly. For an effective transmission we need a clustering approach. The communication between base station and sensor nodes can take place either in flat fashion or hierarchial fashion. In hierarchial architecture
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 217 which is also known as clustering, sensor nodes are first grouped into a cluster. In cluster based architectures, mobile nodes are divided into virtual groups. Each cluster has various adjacent clusters. All the clusters have the same rules. A cluster can be made up of a Cluster Head node and Cluster Members. Here, Cluster Head nodes are used for controlling the cluster and the area of the cluster is usually about one or two hops from the Cluster Head node. There are many cluster based architectures. Clustering schemes can be classified according to various criteria. For example, they can be classified according to architectures dependency on Cluster Head or on Non Cluster Head. The first architecture requires a Cluster Head for controlling and managing the group, and the second one does not have a particular node to perform this task. The other way to classify the cluster-based architectures is observing the hop distance between node pairs in a cluster [10]. For this cluster-head selection procedure we are using DTN (Delay Tolerant Networking) approach. Delay-tolerant networking (DTN) is an approach to computer network infrastructure that seeks to address the technical issues in heterogeneous networks that may cause lack of continuous network connectivity. Examples of such networks are those operating in mobile or terrestrial environments or planned networks in space. DTNs have the potential to interconnect devices in regions where current networking technology cannot reach. The idea is that an end-to-end connection may never be present. To make transmission of packets possible, intermediate nodes take custody of the data being transferred and forward it as the opportunity arises. Both links and nodes may be inherently unreliable and disconnections may be long-lived. To realize the DTN vision, path must be found over multiple unreliable, intermittently connected hops. In this paper a novel routing approach is developed for the DTNs, the proposed approach comprises of four phases they are topology management, trust level calculation, award-reward setting and path selection. The architecture of the proposed approach is given in figure below, Figure 1: Process follows the proposed method In DTNs proving constant link between nodes is very complex task, hence in this proposed system a virtual topology is formed and based on this topology further routing procedure is carry out. The k-means algorithm is applied to maintain the topology and the topology is formed based on the distance. Then the trust level of every node is determined by sending and receiving sample packets. Subsequently based on the trust level the award-reward value is defined for the nodes then based on this value the routing path is selected. 3.1 Topology Management In DTN to realize the management of the overall delivery topology and the formation of specific delivery graphs the topology management is employed. In the proposed method k-means algorithm is applied for the topology management. K-means algorithm is a soft computing Clustering technique which groups the nodes or objects based on the similarity. Clustering is a method of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups (Clusters). In general the Cluster in formed based any one or more attributes of the particular objects. In our proposed method the Cluster is not made of any object instead of that the nodes are grouped in DTN. The attribute we are considering here to group the node is distance and energy. Hence in this paper the nodes are Clustered based on the distance between the nodes, i.e. the shortest distance nodes with closer energy are kept in a same Cluster. In every Clustering operation the selection of Cluster is one of the challenging tasks. The effectiveness of Cluster is completely depends on the Cluster head. In the proposed method we are using the k-means algorithm for the selection of Cluster head as well as for the Clustering. Figure 2: Flow chart for clustering the nodes in DTN The Clustering algorithm can group the nodes in the nearby region in a single group and the Cluster head is assumed as a base node, so that the connection can provide easily. Then Path Selection Award-Reward Setting Trust Level Calculation Topology Management START Place initial „k‟ group of centroids Assign each node to the centroid nearest to it and form initial clusters Recalculate the positions of centroid in each cluster Position of centroid change ? END YES NO
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 218 the trust level for every node in DTN has to calculate it is discussed in the subsequent section. 3.2. Trust Level Calculation In this phase the trust ability of every node in the DTN, it ensure the denial-of-service (DoS) attach. The DoS attack is an attempt to make device or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Hence in order to ensure the trust ability of a node in DTN, a sample set of packets is sent and receive it back by the same node, the sending and receiving ratio represents the trust level of the particular node. For example, consider two node A and B, here A wants to verify the trust level of the node B means, initially the node sent a set of sample packets to B, then the node B retransmit the sample packets to B. If the number of packets transmitted by A and received from the B is same then the trust level of node B is 100%. In our work the center node is consider as the base node, so that it alone send sample packets to its group node for calculating the trust level [12]. 3.3. Award-reward Setting In general term the award and reward is a kind of appreciation, to motivate and our best participant in everywhere. In this paper the award and reward is a kind of ranking based on the trust ability of nodes in DTN. For example if the nodes N1, N2, N3, N4, N5, N6, N7, N8, N9 and N10 having AR values as 10, 9, 8, 7, 6, 5, 4, 3, 2 and 1 respectively, then the award-reward setting become A5, A4, A3, A2, A1, R1, R2, R3, R4 and R5 respectively, where A5 means Award-5 and R5 means Reward-5. Hence the highest awarded node is highly trusted for routing and highest rewarded node is never considered for routing. 3.4. Path Selection Selection of path is one of the crucial processes in every network and it became a challenging task in DTN. In the proposed system the path is selected on the basis of award- reward setting. The operation of path selection based on the proposed approach is shown in figure. Figure 3: Path Selection Base node Node Source Node R A Destination Node R R (low) R (high) A (low) A (high) CLUSTER 1 CLUSTER 2 Active link Terminated link Award Value Reward Value Award Value high Reward Value high R A A (low) Award Value low Reward Value low A (high) R (high) R (low)
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 219 The path selection is a major process in the DTN so in the proposed system the path is selected based on the award- reward setting. Initially the nodes in the DTN are grouped based on the distance and the trust value for every node is calculated by sending a sample packets. Then based on the trust level the award-reward value is provided for every nodes and this value is consider for the path selection the operation of the path selection is shown in figure 3. Let us consider a DTN having 18 nodes; initially it is clustered into two by applying k-means algorithm, so the Cluster1 contain 7 nodes and Cluster2 contains 11 nodes. A node from Cluster1 is considered as a source node and node in Cluster2 is considered as destination shown in figure 3. First the source node sends the information to its base node and it forward it to the corresponding base node, then the corresponding base node convey the information to destination node through the award-reward procedure. For sending the information from source to its base it analyzes the award-reward value of its adjacent node and the appropriate node is selected. The source nodes never send directly to its base unless it is in adjacent. Here the source node check the award-reward value of adjacent, where two nodes are adjacent to the source among them one have reward value and another has award value, so the awarded node is selected. Base node is adjacent to the selected node, so it directly sends the information to the base. After receiving the information by the base node it analyses the destination address, that whether the destination is also present in its group otherwise it transmit the information to the adjacent base nodes, then the process is repeated to reach the destination in Cluster2 shown in figure3. The format of the packet is shown in figure 4. Figure 4: Packet format The Header and Trailer are fixed size and having the sender and destination address. The nodes in the DTN receive the packet and check whether the destination address is same as its address otherwise it transmits it to the base node. The base node checks whether the destination node exists in its group otherwise transmit it to the other group. While selecting the path based on the award-reward values the loss can minimized by preventing from the DoS attacks. Moreover the path is in short rage so the continuity can maintain for a long time than the normal DTN. Hence form this overall system the proper routing can achieved in DTN, by enhancing the security and reducing the loss. Figure 5: Simulation Results in MATLAB The figure 5 shows the network scenario which is created in MATLAB and analyze the path which is more stable based on the trust value and award reward calculation. 4. CONCLUSION Due to the frequent changes in network topology, in FSO- MANET networks to identify the stable path is one of the important issues in the network. In this paper we introduce a new method to identify the stable path as well as stable nodes with the help of Delay Tolerant Networking. This method helps to find out the suitable path based on trust value and award reward calculation process. We have simulated the network scenario in MATLAB and identify the suitable path. From this paper we can concluded that the award and reward scheme provides the better solution to avoid the connectivity issues in FSO-MANET networks. So we can transmit the information without any connectivity problems. REFERENCE [1] Matthias R. Brust, Steffen Rothkugel, and Adrian Andronache, “Node Stability in Dynamic Communication Networks”. in Proceedings of the First Asia International Conference on Modelling & Simulation (AMS'07)0-7695- 2845-7/07 $20.00 © 2007 [2] Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat, “Node Stability-Based Location Updating in Mobile Ad-Hoc Networks”.in ieee systems journal, Vol. 2, No. 2,June 2008 [3]. Priyanka Jangir and Bhuperdra Suman “Survey on Performance of Free Space Optical Communication Links under Various Field Parameters” e-ISSN: 2278-1676,p- ISSN: 2320-3331, Volume 9, Issue 2 Ver. V (Mar – Apr. 2014), PP 71-75 [4] Navid Nikaein, Christian Bonnet, “Improving Routing and Network Performance in Mobile Ad Hoc Networks Using Quality of Nodes”. https://hal.inria.fr/inria-00466593 Submitted on 24 Mar 2010. [5] Mandeep Kaur Gulati and Krishan Kumar, “Survey of Stability Based Routing Protocols in Mobile Ad-hoc Networks” International Journal of Computer Science Engineering and Technology( IJCSET)2011 [6] T. Rajamohan Reddy and N. Sobharani“ Selective on- demand protocol for finding reliable nodes to form stable Header Information Trailer
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Issue: 01 | Jan-2016, Available @ http://www.ijret.org 220 paths in ADHOC networks”. International Journal of Advanced Research in Computer Engineering & Technology Vol 1, Issue 5, July 2012. [7]P. I. Basarkod, S. S. Manvi, D.S.Albur , “Mobility Based Estimation of Node Stability in MANETs.” 2013 IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN 2013). [8] Devideen ahirwar and Prof. Sarvesh Singh Rai, “Improvement of AODV Routing Protocol Algorithm with Link Stability and Energy Efficient Routing for MANET”. International Journal of Computer Science Engineering and Technology( IJCSET) [9] G.Madhukar Rao and ,T.santhosh, “ Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks”. ISSN (e): 2250 – 3005, Vol, 04 , Issue, 11 . November – 2014. February 2014 . [10].Lloret, Jaime,Miguel Garcia,Diana Bri, and Juan R Diaz.” A Cluster Bases Architecture to Structure the Topology of Parallel Wireless Sensor Networks”. [11]Yanhui Chen. “Performane evaluation of modified IEEE 802.11 MAC for multi-hop adhoc network”,17th internaqtional conference on Advanced Information Networking and Applications 2003 AINA 2003 AINA- 03,2003 [12] Advances in Intelligent Systems and Computing,2012