Energy Aware Congestion Control Multipath Routing: A Survey
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 8
Abstract
Mobile An ad hoc network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The life time of the network is an important criterion. The nodes in an ad hoc wireless network are powered by batteries. These will have limited power supply. The conservation of energy and the improvement in lifetime of the network are the most important issues. Many energy aware routing protocols have been proposed from variety of considerations. The multipath routing is new method to reduce the possibility of congestion by that also reduces the packet dropping and energy consumption. Multipath procedure moves traffic from the most congested paths to the more lightly loaded paths, as well as from higher energy cost paths to the lower ones, thus achieving load- balancing and energy-savings. The work is a study of the energy aware routing protocols in mobile ad hoc wireless networks and classification of the protocols
Authors and Affiliations
Varun Mishra , Gajendra Singh Chandel
Implementation of Citation Parser on the Basis of Knowledge Base Hierarchy
Use of the bibliographical information of publications available on the Internet is an important task in academic research. Accurate reference metadata extraction for publications is essential for the integration...
Intelligent System for detecting, Modeling, Classification of human behavior using image processing, machine vision and OpenCV
Surveillance Cameras has proven to be a key factor in enhancing the public security in many countries around the world . In spite of advancements in image processing and machine vision techniques very less is app...
A SECURED SEARCHING IN CLOUD DATA USING CRYPTOGRAPHIC TECHNIQUE
Cloud computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of c...
Virtualizing the Private Cloud for Maximum Resource Utilization
Cloud computing ,now- a- days is a trend in the IT industry.We normally deploy cloud based infrastructure, applications on Bare-metal hardware. But still the resource utilization is not at its maximum .There is sti...
A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms
In the information technology and communication, the most important factor has been the security of information and one of the methods is watermarking. The Watermarking aims to validate the host and the undeniabl...