Analysis of Routing in Mobile Ad-hoc Networks
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2012, Vol 12, Issue 3
Abstract
An ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any standalone infrastructure or centralized administration. Routing in Ad hoc networks is a challenging problem because nodes are mobile and links are continuously being created and broken.In this model we not only improves the reputation of the network but also provide a routing approach for reliable data transmission and also avoid the loop occurs in the communication. The mobile network is the dynamic network that provides the solution for the inclusion and exclusion of dynamic nodes in the network. AODV and DSR are the two most popular routing protocols for ad-hoc network that we discussed here. In this paper we describe the way to find the node having packet loss and to perform the elimination of node from the network without performing the rerouting and provide the reliable data transfer over the network. In this paper, we design and evaluate cooperative caching techniques to efficiently support data access in the ad-hoc network.
Authors and Affiliations
Shweta , Vinit Kumar
IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S IMPLEMENTATION OF PEAP ON MICROSOFT WINDOW’S
In today’s world most organizations are moving from wireconnected LAN’s to wireless LAN’s. WLANs are changing the landscape of computer networking. Wireless communications are inherently more open to attack than wired da...
REANALYSIS OF BER FOR WAVELET BASED MC-CDMA COMMUNICATION
As demand for higher data rates is continuously rising, there is always a need to develop more efficient wireless communication systems. The work described in this paper is my effort in this direction. We developed and...
ANALYTICAL PERFORMANCE COMPARISON OF DIFFERENT ROUTING PROTOCOLS IN MOBILE AD HOC WIRELESS NETWORKS
Mobile Ad-Hoc Networks (MANETs) are becoming increasingly popular as more and more mobile devices find their way to the public, besides “traditional” uses such as military battlefields and disaster situations they...
Biometric Authentication System based on Iris Patterns
In the present age of digital impersonation, biometric techniques are being used increasingly to prevaricate against identity thefts. Iris recognition is a proven, accurate means to identify people. Iris is regarded as t...
Energy Efficient, Multi-hop Routing scheme, within Network Aggregation for WSN
This paper introduces an energy efficient, multi-hop routing scheme, with in-network aggregation. The technique uses clustering as the base of our algorithm. Ant Colony Optimization (ACO) is implemented over clustering...