Enhanced Data Sharing over Mobile Ad Hoc Network Based on non-Selfish Exposure
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
A Mobile ad hoc network is a peer-to-peer multihop wireless network. MANETs are key to nomadic computing. Mobile units can set up spontaneous local networks and can remove the need for fixed network infrastructure, either as wireless access points or wired LAN. Each node in a MANET communicates with each other. Some nodes does not cooperate with each other nodes and termed as Selfish nodes. Selfish nodes are handled on the basis of replica allocation. Partial nodes are also handled. The reply from expected node holding a target data item may not reach its destination due to two reasons, disconnections and node selfishness. In a frequent time interval, replica allocation will perform based on the Self Centered Friendship tree of each node in order to avoid selfishness. In this paper we discuss about various detection algorithms including creating and modifying a SCF-tree using Self stabilize replica allocation. Our strategy consists of identification and detection of FRA when network disconnections occur in the network and results in data inaccessibility. A statistics will be displayed to identify the location of where the data will be residing after the reallocation. Data replacing and Malicious nodes which effect the security of the MANET are also discussed which increases data accessibility and decreases communication cost that caused by Query delay. The controller informs all other nodes regarding the failure of a particular node by providing an alarm named as FRA. The proposed system outperforms traditional cooperative replica allocation techniques in terms of data accessibility, communication cost, and average query
Authors and Affiliations
Amrutha b k, Mr. I. Edwin Albert
Heteroleach Protocol for Improvement of Stable Operation of Wireless Sensor Networks
Abstract : Wireless sensor networks(WSN) are very much sensitive to energy consumption by the sensor nodes. Many protocols have been designed for efficient use of energy of the nodes so that the lifetime of the network c...
Positional Prediction of Individuals Present In a Crime Scene
Abstract: The scientific study/interpretation of bloodstain patterns at a crime scene, provide invaluable evidence for sequencing, reconstruction of events that might have occurred at the crime scene. the authors have tr...
Polygon Detection Method by Direction Clustering Based on the Peeling Technique
In this paper, we propose a fast real time clustering method and an algorithm for detecting polygon lines and their orientations. The content is presented in two parts. In part I, a new clustering method based on density...
A review on Visualization Approaches of Data mining in heavyspatial databases
Abstract: Data mining is the phenomenon to extract and recognized the new required pattern or types from thelarge data seta or data bases and whatever required data is being extracted and separated from large datab...
A Novel set of tools to “Extract, Rework, Batch” [ERB] Big Data with Apache Hadoop Environment
Abstract: Over the previous couple of years, organizations across public and personal sectors have created a strategic call to show massive information into competitive advantage. The challenge of extracting price...