Geographical Routing in Intermittently Connected MANETs with Guaranteed Delivery at Void Locations
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
The major challenges in MANETs are finding the destination, routing and robust communication dealing with constant topology change. When there is no end to end path at any given time between source and destination via intermediate peers then it forms partitions in the network. It is said to be intermittently connected network. LAROD is the geographical routing protocol designed for such type of networks. Basically greedy approach is followed in any of the routing protocol to forward the packets. LAROD-LoDiS is also based on greedy packet forwarding along with store carry forward principle. But it works until greedy forwarding is possible. When greedy forwarding fails then the protocol has to follow some other recovery strategy to move the packets from void areas. The areas where nodes do not travel are void areas. In this paper, we propose a Timer Based DFS recovery technique to handle void in LAROD-LoDiS protocol (TBD-LAROD) 1 . Our main aim is to improve it in terms of delivery ratio. We also calculate the timer function to find the next optimal node considering forwarding area, void flag and load balancing. Simulation is done in ns2. Results show that new routing protocol outperforms existing one by improving delivery ratio.
Authors and Affiliations
R. RAJA SEKHAR , S. SYED BASHA
RLC Low Pass Filters Transmission Transient Performance Characteristics Analysis
Filter is considered as a part of an optical system that has the purpose of modifying the intensity, polarization or, in particular, the spectral distribution of light. For reconfigurable filters a signal is applied to t...
Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches
Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats t...
Biclustering for Microarray Data: A Short and Comprehensive Tutorial
This paper presents a quick and very comprehensive tutorial on biclustering for the analysis of gene expression data obtained from microarray experiments. The results obtained from the conventional clustering methods...
A Novel approach for Optimizing Cross Layer among Physical Layer and MAC Layer of Infrastructure Based Wireless Network using Genetic Algorithm
Cross-layer awareness optimization is a break out from the layered approach of the OSI Layer communications model having very rigorous boundaries among layers. The CLAO approach transports response dynamically via the la...
Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application
The Internet services and different applications become vital part of every person’s life. Web services and applications have smoothened the way of users for the faster data access. To meet the user’s requirements for fa...