An Efficient Routing scheme for reliable path establishment among Mobile Devices in Heterogeneous Networks
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
In heterogeneous networks, devices available with varying connectivity help to provide many new opportunities for efficiently utilizing new resources. In mobile ad hoc networks with varying layered architecture, not much interest is given yet in establishing path among devices with increasing or decreasing in number of mobile devices in the network and the complexity in using them because of their mobility. In this paper, we have considered the various aspects of routing in order to find out the proper nodes in the network and establish a reliable link in a heterogeneous environment. A new Routing scheme called SFUSP (Self-eliminating Faulttolerant based Un-interrupted reliable Service switching mobile Protocol) is discussed which is specially designed for establishing path among devices in heterogeneous environment in pervasive spaces. Our routing scheme is based on proactive routing characteristics with further added dynamism in selecting better nodes in the routing path in the heterogeneous networks. Performance analysis of our routing scheme is compared to other existing manet protocols such as AODV, DSR and OLSR in Random Waypoint, Brownian and Manhattan mobility models under MAC layers IEEE 802.11, 802.15 and 802.16 for WIFI, WPAN and WIMAX networks. Our routing scheme shows better performance for the above mentioned standards and is well suited for pervasive environment.
Authors and Affiliations
R S Shaji , R S Rajesh , B. Ramakrishnan
Selecting type of clusters that are most appropriate for capturing overlapping interests of different types of users in personalization tasks using Web Usage Mining
Clustering is one of the most important phase of the web personalization, so selecting proper types of cluster to justify the user interest for creating user profile is again very important. In this paper, we address th...
Security Issues on Banking Systems
Bank is one of the example of institute that using Information Technology (IT) in its daily task to fulfill the organization’s and customers’ need. Business transaction, money transfer, ATM, cr...
A new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...
A Model of MULTI-VERIFIER channel e-mailing system using Steganographic scheme
In this paper, we presented a model of privileged channel e-mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret m...
CHALLENGES IN COMPUTING TODAY
This paper reviews the challenges faced by ordinary users in the domain of computing today.As there are numerous problems in computing,with each problem centered around different issues and each one r...