Ideal Node Enquiry Search Algorithm (INESH) in MANETS
Journal Title: Annals of Emerging Technologies in Computing - Year 2017, Vol 1, Issue 1
Abstract
The different routing protocols in Mobile Ad hoc Networks take after various methodologies to send the data starting from one node then onto the next. The nodes in the system are non-static and they move arbitrarily and are inclined to interface disappointment which makes dependably to discover new routes to the destination. During the forwarding of packets to the destination, various intermediate nodes take part in routing, where such node should be an ideal node. An algorithm is proposed here to know the ideal node after studying the features of the reactive routing protocols. The malicious node can be eliminated from the networking function and the overhead on the protocol can be reduced. The node chooses the neighbor which can be found in less number of bounces and with less time delay and keeping up the QoS.
Authors and Affiliations
Mohammad Riyaz Belgaum, Safeeullah Soomro, Zainab Alansari, Muhammad Alam
Applications of Blockchain Technology beyond Cryptocurrency
Blockchain (BC), the technology behind the Bitcoin crypto-currency system, is considered to be both alluring and critical for ensuring enhanced security and (in some implementations, non-traceable) privacy for diverse ap...
Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation
This second part covers the implementation, testing, critical evaluation, conclusion and further study. It concentrates on the actual implementation details of hardening of network devices by referring to the hardware an...
The British Electronics and Computing Industries: Past, Present and Future
A brief review of key milestones in the development of the British Electronics and Computing industries is presented, together with some thoughts about future directions.
Filling Factors of Sunspots in SODISM Images
The calculated filling factors (FFs) for a feature reflect the fraction of the solar disc covered by that feature, and the assignment of reference synthetic spectra. In this paper, the FFs, specified as a function of rad...
Comparing the Complexity of Two Network Architectures
A Service Provider has different methods to provide a VPN service to its customers. But which method is the least complex to implement? In this paper, two architectures are described and analysed. Based on the analyses,...