A study of Adaptive Replication Technique in routing time-constrained messages (VoIP) in MANET
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message must travel, it is difficult to guarantee the timely delivery of such messages. In case of faulty links or node, it is likely impossible for messages to reach at required destination in time. To handle such type of faults, the idea of sending multiple copies or replicated copies is used. The probability of successful message delivery within time will be increased through sending multiple copies through disjoint routes, as at least one copy will be reached within time. But this will degrade the network performance due to congestion and other problems. Therefore, it is require sending only optimum number of copies through disjoint routes. Such copies are estimated on the basis of network load and message deadline. In this paper, we present the method to estimate the optimum number of copies. The system is designed for developing replication strategy named as Adaptive Fault Tolerance Replication Technique (AFTRT) for VoIP applications used for Mobile Ad hoc Network. The parameters such as end-to-end latency, node delivery index and message delivery probability are determine by the destination and send as feedback to the source. Based on this information, source replicates the message. The performance study is conducted through simulation using NS2 simulator.
Authors and Affiliations
SWATI SAXENA , Dr. MADHAVI SINHA
Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches
In any organization, fraud detection and prevention is daunting task because millions of dollars lost with the different nature of fraudulent activities. Organizations got to engage intelligent and innovative techniques...
An Efficient Adaptive Filtering for CFA Demosaicking
Most digital still cameras acquire imagery with a color filter array (CFA), ampling only one color value for each pixel and interpolating the other two color values afterwards. The nterpolation process is commonly known...
Generation of a pool of variable size symmetric keys through Image
This paper introduces a new concept of the generation of a unending pool of keys through an image leaving behind the idea of sending keys every time for encryption and decryption. This can help in avoiding the problem of...
Fault Detection of Reachability Testing with Game Theoretic Approach
This paper presents a game theoretic approach to fault detection of reachability testing. Physical systems are susceptible to fault at any time. Due to this reason the problem of determining and reacting to fault detecti...
Exploring Issues for QoS Based Routing Algorithms
The Internet is growing at an astonishing rate, nearly doubling its enormous size every year. There is an increasing demand for using real time multimedia applications over the Internet. One of the challenging issues in...