Energy Efficient Geographical Routing Protocol with Location Aware Routing in MANET
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 5
Abstract
A Mobile Ad hoc Network (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the network's wireless topology may change rapidly and unpredictably. Energy is a vital resource for MANET. The amount of work one can perform while mobile node is fundamentally constrained by the limited energy supplied by one’s battery. Dynamic Source Routing (DSR) protocol is one of the most well known routing algorithms for ad hoc wireless networks. DSR uses source routing, which allows packet routing to be loop free. DSR increases its efficiency by allowing nodes that are either forwarding route discovery requests or overhearing packets through having frequent listening mode to cache the routing information. This paper suggests an approach to utilize location information using Geographical Routing Protocol (GRP) to improve performance of Dynamic Source routing protocols for mobile ad hoc networks. By using location information, the proposed GRP with Location Aware Routing (LAR) protocols limit the search for a new route to a smaller request zone of the mobile ad hoc network. Our experimental results show the effectiveness of performance on power consumption than existing works.
Authors and Affiliations
Shwaita Kodesia , Asst. Prof. PremNarayan Arya
The Blu-ray Disc Technology - An Optical Storage Medium
As technology becomes more advanced, the demand for compact disc units with a higher quality becomes greater. The thrust for an advanced format of data storage on optical disc led to revolutionary introduction of...
Implementation of Enhanced CloSpan Algorithm for CP-Miner
Copy-pasted code is very common in large software and product line software because programmers prefer reusing code via copy-paste in order to reduce programming effort. Copy pasted code is prone to introducing error...
VisualRank for Image Retrieval from Large-Scale Image Database
VisualRank provide ranking among images to be retrieved by measuring common visual features of the images. The similarity between images is measured by measuring similarity within extracted features like Texture, C...
Secret Sharing Image Between End Users by using Cryptography Technique
In this Secret Sharing Image(SSI) we are divide the complete image into n shares distributed to n participants. Only authorized persons access the secret image without any cryptography knowledge and the end use...
PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI
In computer science distributed systems could be more secured with a distributed trust model based on PKI. PKI provides a framework to verify the identities of each entities of given domain. Network and device heterogene...