A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message must travel, it is difficult to guarantee the timely delivery of such messages. In case of faulty links or node, it is likely impossible for messages to reach at required destination in time. To handle such type of faults, the idea of sending multiple copies or replicated copies is used. The probability of successful message delivery within time will be increased through sending multiple copies through disjoint routes, as at least one copy will be reached within time. But this will degrade the network performance due to congestion and other problems. Therefore, it is require sending only optimum number of copies through disjoint routes. Such copies are estimated on the basis of network load and message deadline. In this paper, we present the method to estimate the optimum number of copies. The system is designed for developing replication strategy named as Adaptive Fault Tolerance Replication Technique (AFTRT) for VoIP applications used for Mobile Ad hoc Network. The parameters such as end-to-end latency, node delivery index and message delivery probability are determine by the destination and send as feedback to the source. Based on this information, source replicates the message. The performance study is conducted through simulation using NS2 simulator.
Authors and Affiliations
SWATI SAXENA , Dr. MADHAVI SINHA
Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization
From the very beginning various measures are taken or consider for better utilization of available limited resources in he computer system for operational environment, this is came n consideration because most of the...
Comparative Study a Performance and Capability Scheduling Techniques in Grid Computing
This paper shows the comparative study about existing scheduling technique in grid computing. This paper also shows the performance and capability for each scheduling technique. Four existing scheduling technique are App...
The Role and Issues of Clustering Technique in Designing Maintainable Object Oriented System
Object Oriented Software development technique has become very popular and is being used by most of the software development companies. Although maintenance may be turn out to be easier for Object Oriented System. But it...
Populating domain specific words from Academic web pages of Tamil Nadu Universities to build domain ontology for educational websites.
Machine translation from one natural language to the other is a challenging task. One of the methods of doing machine translation is using Interlingua based approach. In that approach the source language can be represent...
Biometric Template Security Using Invisible Watermarking With Minimum Degradation in Quality of Template
In this paper, we present an approach to enhance the Biometric Template Security by using Invisible Watermarking. For embedding the watermark in the Biometric Template, we used Parity Checker Method [2]. The use of Parit...