Civilizing the Network Lifetime Efficiently in MANETs Through DEL-CMAC Protocol
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
MANET (Mobile Ad-Hoc Network) has a dynamic topology. Due to the mobility of nodes in the network of cooperative communication is a technique for archived greater efficiency of transmission. In this paper the Network Lifetime has been improved using Cross layer Distributed Energy Adaptive Location based Cooperative MAC protocols. This DEL-CMAC protocol has been increases the network lifetime and energy efficiency. The performance is achieved by utility based best relay selection strategy selects the best relay used on location information and residual energy. In this proposed work significantly improves the network lifetime even in high circuitry energy consumption in more cases.
Authors and Affiliations
K. Seetha , Dr. K. Selvakumar , Dr. K. Kavitha
Energy Efficient Routing Protocols for MANETs: A Survey
MANET (Mobile Ad hoc Network) is a type of ad hoc network that can change location and configure itself arbitrarily. MANET is a wireless infrastructure less network environment. The nodes or devices are moves independent...
Energy Efficient Techniques In Virtualized Data Center: A Survey
Energy efficiency simply means that how efficiently energy can be used or consumed by any virtualized datacenters providing cloud services. Main aim of energy efficiency is to reduce the amount of energy consumed or requ...
Operating System Security : Security Policies
Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to...
Elliptic Curve Public-Key Cryptosystem Over Z(i)
A method to implement elliptic curve public-key cryptosystem over Z(i) is discussed. The method is in fact the same as the technique that works on Galois fields but here works on Z(i). The curve under Z(i) generates more...
Character Recognition of High Security Number Plates Using Morphological Operator
Character recognition techniques associate a symbolic identity with the image of character. Character recognition software recognizes text characters in electronic files, usually scanned documents that are saved as image...