An Efficient Routing scheme for reliable path establishment among Mobile Devices in Heterogeneous Networks
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
In heterogeneous networks, devices available with varying connectivity help to provide many new opportunities for efficiently utilizing new resources. In mobile ad hoc networks with varying layered architecture, not much interest is given yet in establishing path among devices with increasing or decreasing in number of mobile devices in the network and the complexity in using them because of their mobility. In this paper, we have considered the various aspects of routing in order to find out the proper nodes in the network and establish a reliable link in a heterogeneous environment. A new Routing scheme called SFUSP (Self-eliminating Faulttolerant based Un-interrupted reliable Service switching mobile Protocol) is discussed which is specially designed for establishing path among devices in heterogeneous environment in pervasive spaces. Our routing scheme is based on proactive routing characteristics with further added dynamism in selecting better nodes in the routing path in the heterogeneous networks. Performance analysis of our routing scheme is compared to other existing manet protocols such as AODV, DSR and OLSR in Random Waypoint, Brownian and Manhattan mobility models under MAC layers IEEE 802.11, 802.15 and 802.16 for WIFI, WPAN and WIMAX networks. Our routing scheme shows better performance for the above mentioned standards and is well suited for pervasive environment.
Authors and Affiliations
R S Shaji , R S Rajesh , B. Ramakrishnan
A comparison between Public key authority and certification authority for distribution of public key
The key management of public key defines two aspects first one is the distribution of public key and the second one is the use of public key to distribute secret keys for encryption. In this paper we are presenting the...
Knowledge Engineering-an overview
Knowledge Engineering is an important concept in recent years. Knowledge Engineering is the aspect of system engineering which addresses uncertain process requirements by emphasizing the acquisition of kno...
Combined Text Watermarking
There is a vast amount of digital text data exchanged over the internet for the past few years. Such exchanges necessitate a very robust copyright protection mechanism. This paper presents a new idea on how one can effec...
Four Walsh Transform Sectors Feature Vectors for Image Retrieval from Image Databases
The work of this paper presents the new idea of using Walsh transform to generate the feature vector for content based image retrieval. The complex Walsh transform is conceived by multiplying Sal functions...
Software Architectures Design Patterns Mining for Security Engineering
Data Mining for Software Engineering involves Architectural mining intelligence operations, which are knowledge gathering procedures. These intelligence operations go beyond basic data collection (assembling uncorrelate...