Efficient Algorithms for Distributed Mutual Exclusion in Mobile Ad-Hoc Network
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 6
Abstract
For distributed mutual exclusion problem in mobile environment we presented two algorithms.Both the algorithms are token based. The first algorithm is providing tokens to the nodes which are in critical section and the second one is hierarchical clustering based. A mobile ad-hoc networks (MANET) is hierarchically (two level) clustered to get logical tree network through which the token is passed from one node to another. However, we simulate the second algorithm only. The evaluation of the proposed algorithms show that its message requirement is optimal, and thus the second algorithm is an energy efficient algorithm.
Authors and Affiliations
R. Karthick , B. Gopinathan
LOCAL UPDATE ROUTING USING HIERARCHICAL WPANS IN WIRELESS UNDERWATER SENSOR NETWORKS
The developments of micro and nano sensors lead the sensor networking technology to be used in all kinds of study. In underwater communications and study, wireless sensor network plays a major role. One among the charact...
DEVELOPING A SECURITY PROTOCOL FOR A WIRELESS COMPUTER VIRTUAL LABORATORY (WCVLAB)
For a Virtual Computer Laboratory (VCLAB) to operate effectively within a Wireless intranet setup, a lot of protocols are employed to function. This write-up is aimed at developing a protocol to secure a Wireless Compute...
Performance Evaluation of Internet Routing Protocols in Wireless Mesh Networks
Wireless Mesh Networks are considered as a feasible solution for transformation into next generation wireless network to offer Internet services for large variety of applications. These types of networks are used for pro...
Identification of Images Using Digital Image Processing
General image identification is essential in many applications. Defects identification in industries is mostly manual and time consuming. To reduce error in detecting defects, image identification can be used in industri...
COMPARISON AND EVALUATION ON METRICS BASED APPROACH FOR DETECTING CODE CLONE
Many techniques were proposed for detecting code clone. In this paper we have compared the metrics based on speed, quality and their cost as these are the most that affects due to code clone. The strength and weakness of...