Energy Secure Dynamic Source Routing (ESDSR) Protocol For (MANET)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract : MANET (Mobile Ad-hoc Network) is an unstructured, self-organized and self-deployment network. It can be set up anywhere, anytime because there is no need of centralize base station. Nodes in MANET are connected by one another via wireless medium. In most cases node’s life is limited due to its power resource, therefore to limit the power consumption is a critical issue in MANET. This study analyzes performance of Dynamic Source Routing protocol (DSR) which is one of the most popular protocols in MANET, on the basis of energyconsumption by using a mechanism in which nodes having less energy will not use in route selection to prolong the life time of network. This Energy Secure DSR (ESDSR) uses basic mechanism of existing DSR with little modification to optimize DSR performance in the sense of energy consumption as well when ESDSR is compared with some additional parameters like delay, throughput and packet delivery ratio and it showedbetter performance than DSR. For the analysis of result and simulation, NS-3 has been used. Simulation has run for two scenarios. In both scenarios ESDSR showed better performance in contrast DSR in case of energy consumption as well as delay, throughput and packet delivery ratio.
Authors and Affiliations
Hina Khalid , Tahir Nawaz
Efficient and Accurate Target Sensor Tracking in Wireless Sensor Networks
Abstract: In the tracking scheme illustrated, where the sensors are deployed in a triangular fashion in a hexagonal mesh such that the hexagon is divided into a number of equilateral triangles. Where the technique is use...
A Business Oriented Framework For Enhancing Web Security Service (BOF4EWSS) Network And Features For E-Businesses Classification Techniques.
Abstract: In the field of web security service is an extremely complex and very contemporary issue. As soon as the considering this current technology suite to assist the interacting e-businesses challenges for security...
A New Modified Fatha Method For Arabic Text Steganography Hybrid With Aes Encryption
Abstract: Growing the size of attacks that listed during the passing of data between the sending and the receiving has really demand to get high robust method for transfer information in secure manner. Both of cryptogra...
Drowsy Driver Detection System: A Novel Approach Using Haar Like Features
There are many instances of road accidents round the world due to driver’s lack of attention in driving. One of the prime reasons can be drowsiness. In this paper, a drowsiness detection system using Haar like fe...
Twitter Sentiment Classification on Sanders Data using HybridApproach
Abstract : Sentiment analysis is very perplexing and massive issue in the field of social data mining. Twitter isone of the mostly used social media where people discuss on various issues in a dense way. The tweets about...