Energy Saving Technique in Wireless Mobile Ad-hoc Network for Reliable Communication
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 2
Abstract
Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can be communicated with each other wirelessly without the need to any existed communications. Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can communicate with each other without the need of infrastructure or central controller. In link breakage prediction, a link breakage can be predicted before its real occurring so route maintenance can start before the occurring of the problem avoiding the problems that come with a link breakage. The movement of nodes in MANET is random; therefore MANETs have a forceful topology. Because of this forceful topology, the connection breakages with unreliable data delivery are very common problem in MANET environment. This problem degrade the performance of the network like data delivery, throughput and increases the drop rate and delay, for that problem resolution we proposed novel approach for routing establishment that work according to threshold as well as average energy base scheme and provide the more reliable communication, in this approach we increases the route life time and packet delivery ratio, throughput and decreases data drop, routing load and end-to-end delay. This approach has been implemented on the well-known Dynamic Source Routing protocol (DSR). This new mechanism was able to decrease the packet loss and delay that occur in the original protocol.
Authors and Affiliations
Manali Singh, Prof. Jitendra Gupta
A survey on Human Computer Interaction Mechanism Using Finger Tracking
Human Computer Interaction (HCI) is a field in which developer makes a user friendly system. User can interact with a computer system without using any conventional peripheral devices. Marker is used to recognize hand mo...
Analysis of Email Fraud Detection Using WEKA Tool
Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperi...
A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN
A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an...
Novel Design and Implementation of Topology and Orchestration Specification for Cloud Applications to enable Portability
In this paper we provide a novel design and implementation of toplogy and orchestration specification for cloud applications to enable portability
Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture
This paper presents the implementation of the high speed lifting-based two dimensional discrete wavelet transform (2D-DWT) algorithm on Field Programmable Gate Array (FPGA). Pipelining structure in DWT reduces hardware c...