A BPR based Routing in Presence of Selfish Nodes for MANET
Journal Title: GRD Journal for Engineering - Year 2016, Vol 1, Issue 0
Abstract
Mobile Ad-hoc Networks (MANETs) is self-configured and decentralized wireless network without any prior infrastructure. Every node in it acts as a router as well as end system and hence each node in MANET is allowed to move freely which makes routing difficult. Most of the MANET routing algorithms like AODV and DSR assume that every node will forward every packet it receives. In opportunistic routing, a node selects and prioritizes multiple nodes which can act as potential packet forwarders. Source node will relay packets to the destination node through the intermediate node. However, misbehavior of the selfish nodes is a common phenomenon in MANET. These nodes use the network and its services and do not provide any services to intermediate nodes in order to save energy such as battery, CPU Power and bandwidth for relaying data from other nodes and reserve for themselves. These selfish nodes will degrade the performances of wireless ad hoc networks. In this thesis, Using OR and BPR routing protocols to overcome the presence of selfish nodes and also BPR routing protocol used to avoid malicious nodes. These protocols used to avoid congestion and perform the simulation using Network Simulator.
Authors and Affiliations
M. Kaveri, S. Ramesh
Effect of TiCp on AA2219 metal matrix composite
Composite plays a vital role in material science especially in the field of aerospace, marine, automobile, military and structural applications. It consists of two or more physically and chemically distinct phases. The c...
Comparing the Structural and Electrical Properties of Barium Hexaferrite after Substituting Co-Sn and Zn -Sn
Barium Hex ferrite (BaFe12O19 ) is widely used in recording media and as permanent magnets. The Fe ion is partially substituted by Co-Sn and Zn-Sn to get BaFe10.4Co+2.8Sn+4.8O19 and BaFe10.4Zn+2.8Sn+4.8O19 which are prep...
Authorized Public Auditing of Dynamic Storage on Cloud with Efficient Verifiable Fine-Grained Updates with MHT
One of the top technology concept is Cloud Computing. Cloud storage servers plays an important role in the technology buzz – cloud computing where clients can store their data at cloud servers and can access this data fr...
RNN (Reverse Nearest Neighbour) in Unproven Reserve Based Outlier Discovery
Outlier detection refers to task of identifying patterns. They don’t conform establish regular behavior. Outlier detection in high-dimensional data presents various challenges resulting from the “curse of dimensionality”...
Scour and Deposition around Causeways and Bed Bars
This paper presents the experimental investigations of effect of bend on scour and deposition patterns around causeways and bed bars. Data have been collected in a re-circulatory open channel flow system on three causewa...