Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1

Abstract

We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on the unicast scheme with DHT. CM-Chord might be efficiently used to not only provide conventional direct routing, but additionally indirect, key-based overlay routing. Our simulation suggests that CM-Chord can markedly outperform conventional reactive Random routing (AODV). For that reason, MANET nodes can run CM-Chord for software objective, particularly P2P applications

Authors and Affiliations

Veeraswamy. Devalla , Mr. P. Pra sanna Murali Krishna

Keywords

Related Articles

Journey from Data Mining to Web Mining to Big Data

This paper describes the journey of big data starting from data mining to web mining to big data. It discusses each of this method in brief and also provides their applications. It states the importance of mining big dat...

Computer Aided Detection Algorithm for Digital Mammogram Images – A Survey

In worldwide, Breast cancer is one of the leading disease among the women, under the age group of 15- 54. An automatic detection of micro calcifications is performed in magnetic resonance imaging system. Here discuss abo...

OSI Reference Model: An Overview

A reference model is a conceptual blueprint of how communication should take place. It addresses all the process required for effective communication and divides these processes into logical grouping called layers. When...

Significance of Web 2.0 Technology and its Application in Academic Libraries

The objective of this paper is to provide information of web 2.0 technology in context of academic libraries. Web 2.0 technologies have seen the sudden increase of social networking sites or tools, which provide a medium...

A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting

One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers fo...

Download PDF file
  • EP ID EP151989
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

Veeraswamy. Devalla, Mr. P. Pra sanna Murali Krishna (2014). Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 7(1), 6-10. https://europub.co.uk/articles/-A-151989