Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1
Abstract
We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on the unicast scheme with DHT. CM-Chord might be efficiently used to not only provide conventional direct routing, but additionally indirect, key-based overlay routing. Our simulation suggests that CM-Chord can markedly outperform conventional reactive Random routing (AODV). For that reason, MANET nodes can run CM-Chord for software objective, particularly P2P applications
Authors and Affiliations
Veeraswamy. Devalla , Mr. P. Pra sanna Murali Krishna
Novel Sensing Approach for Predicting SLA Violations
Customer contentment plays a vital role in business environment. Service level agreements (SLA’s) are signed between the service provider and the customer where SLA violation acts as a major constraint. SLA Violation is...
Significance of Web 2.0 Technology and its Application in Academic Libraries
The objective of this paper is to provide information of web 2.0 technology in context of academic libraries. Web 2.0 technologies have seen the sudden increase of social networking sites or tools, which provide a medium...
An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) – A Neural Network Approach
The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes...
Aligning Cloud Computing Security with Business Strategy
These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be help...