Adaptive Integration of P2P and Mobile-Ad-hoc-Networks by a Cross Modeled CHORD Protocol
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1
Abstract
We set DHT (Distributed Hash Table) centered P2P (Peer to Peer) program-Chord in to MANET (Mobile Ad-hoc Network) in this paper. Then, we propose a new routing modified scheme Cross Modeled Chord(CM-Chord) which bases on the unicast scheme with DHT. CM-Chord might be efficiently used to not only provide conventional direct routing, but additionally indirect, key-based overlay routing. Our simulation suggests that CM-Chord can markedly outperform conventional reactive Random routing (AODV). For that reason, MANET nodes can run CM-Chord for software objective, particularly P2P applications
Authors and Affiliations
Veeraswamy. Devalla , Mr. P. Pra sanna Murali Krishna
Journey from Data Mining to Web Mining to Big Data
This paper describes the journey of big data starting from data mining to web mining to big data. It discusses each of this method in brief and also provides their applications. It states the importance of mining big dat...
Computer Aided Detection Algorithm for Digital Mammogram Images – A Survey
In worldwide, Breast cancer is one of the leading disease among the women, under the age group of 15- 54. An automatic detection of micro calcifications is performed in magnetic resonance imaging system. Here discuss abo...
OSI Reference Model: An Overview
A reference model is a conceptual blueprint of how communication should take place. It addresses all the process required for effective communication and divides these processes into logical grouping called layers. When...
Significance of Web 2.0 Technology and its Application in Academic Libraries
The objective of this paper is to provide information of web 2.0 technology in context of academic libraries. Web 2.0 technologies have seen the sudden increase of social networking sites or tools, which provide a medium...
A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting
One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers fo...