Energy Aware Congestion Control Multipath Routing: A Survey
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 8
Abstract
Mobile An ad hoc network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The life time of the network is an important criterion. The nodes in an ad hoc wireless network are powered by batteries. These will have limited power supply. The conservation of energy and the improvement in lifetime of the network are the most important issues. Many energy aware routing protocols have been proposed from variety of considerations. The multipath routing is new method to reduce the possibility of congestion by that also reduces the packet dropping and energy consumption. Multipath procedure moves traffic from the most congested paths to the more lightly loaded paths, as well as from higher energy cost paths to the lower ones, thus achieving load- balancing and energy-savings. The work is a study of the energy aware routing protocols in mobile ad hoc wireless networks and classification of the protocols
Authors and Affiliations
Varun Mishra , Gajendra Singh Chandel
“A Survey on Different Fingerprint Recognition Systems”
In this paper we are comparing various fingerprint recognition system which are based on minutiae and ridge feature extraction. Here we are comparing various methods using minutiae features only or ridge features o...
BER Performance of OFDM System over Nakagami-m Fading Channels with Different Modulation Schemes
In this paper, we investigate the bit error rate (BER) performance of Orthogonal frequency division multiplexing (OFDM)-Binary phase shift keying (BPSK) OFDM-Quadrature phase shift keying (QPSK), OFDM-Quadrature...
New techniques to enhance FPGA based system security
Field Programmable Gate Arrays (FPGAs) are used as a primary element for various applications like aero-space, automotive, military etc which require them to operate in different types of environments. Security of...
Design of RC5 Algorithm using Pipelined Architecture
Data transmission through a channel requires more security, so security gaining is more importance than simply transmission. In this document RC5 algorithm is used for encryption and decryption of data to have secu...
ESW-FI: An Improved Analysis of Frequent Itemsets Mining
Frequent itemsets mining play an essential role in many datamining tasks. The frequent itemset mining over data streams is to find an approximate set of frequent itemsets in transaction with respect to a given supp...