An Efficient Routing scheme for reliable path establishment among Mobile Devices in Heterogeneous Networks
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
In heterogeneous networks, devices available with varying connectivity help to provide many new opportunities for efficiently utilizing new resources. In mobile ad hoc networks with varying layered architecture, not much interest is given yet in establishing path among devices with increasing or decreasing in number of mobile devices in the network and the complexity in using them because of their mobility. In this paper, we have considered the various aspects of routing in order to find out the proper nodes in the network and establish a reliable link in a heterogeneous environment. A new Routing scheme called SFUSP (Self-eliminating Faulttolerant based Un-interrupted reliable Service switching mobile Protocol) is discussed which is specially designed for establishing path among devices in heterogeneous environment in pervasive spaces. Our routing scheme is based on proactive routing characteristics with further added dynamism in selecting better nodes in the routing path in the heterogeneous networks. Performance analysis of our routing scheme is compared to other existing manet protocols such as AODV, DSR and OLSR in Random Waypoint, Brownian and Manhattan mobility models under MAC layers IEEE 802.11, 802.15 and 802.16 for WIFI, WPAN and WIMAX networks. Our routing scheme shows better performance for the above mentioned standards and is well suited for pervasive environment.
Authors and Affiliations
R S Shaji , R S Rajesh , B. Ramakrishnan
Software Architectures Design Patterns Mining for Security Engineering
Data Mining for Software Engineering involves Architectural mining intelligence operations, which are knowledge gathering procedures. These intelligence operations go beyond basic data collection (assembling uncorrelate...
Fuzzy K-mean Clustering Via J48 For Intrusiion Detection System
Due to fast growth of the internet technology there is need to establish security mechanism. So for achieving this objective NIDS is used. Datamining is one of the most effective techniques used for intrusion detection....
Effect of User-Unknown Email addresses in spammers' lists
Spam emails are an extra burden over the network and also another Issue for the security of the internet. Today lot of spam mail are coming from the different resources. Many approaches and method are there to filter th...
Performance Enhancement of MC-CDMA System through STTC based STBC Site Diversity
The combination of multiple antennas and multicarrier code division multiple access (MC-CDMA) is a strong candidate for the downlink of future mobile communications. The study of such systems, in scenarios that model rea...
Text database cleaning by filling the Missing values using Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture
Agents are software programs that perform tasks on behalf of others and they are used to clean the text database with their characteristics. Agents are task oriented with the ability to learn by them...