Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 3
Abstract
A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that causes frequent path failure and route discoveries. A mobile node instinctively rebroadcasts the route request packets and it causes the broadcast storm problem. Because of the high dynamic networks, there is routing overhead so that it consumes high network resource. So, in order to conquer this problem, a neighbor coverage-based probabilistic rebroadcast protocol is used to reduce routing overhead. Also a rebroadcast delay is used to determine rebroadcast order and then to attain additional coverage ratio by sensing neighbor coverage knowledge. By using this method, the numbers of retransmissions is decreased, reduction in routing overhead and to improve the routing performance. But the limitation is the link stability is not considered. To improve the performance the link stability and path stability is an important conception among the nodes. In addition to that energy is an important resource that needs to be preserved in order to extend the lifetime of the network. Actually, in the wireless sensor network different nodes take different amount of energy for transmitting the same data packets. Based on this energy metric the path has to be chosen. Due to the energy drain rate, improve the energy saving. So, in this manuscript to compute the link stability metric and energy metric. Based on this the path is to be chosen. An experimental result shows that when compared to the existing system in the proposed method to achieve high packet delivery ratio, low delay and less energy consumption.
Authors and Affiliations
Sreelakshmi. M Nair , B. Vivek
An Adaptive Log Based Realtime Network Scans in LAN
Network scans really are a common initial step within a network intrusion attempt. As a way to gain details about a possible network intrusion, it can be beneficial to analyze these network scans. Scanning activity is na...
Microblogging Service to Report about Earthquake
Data Mining is the extraction of hidden predictive information from large Database set. The huge amount of data is a key resource to be processed and analyzed for knowledge extraction. Volcanic action Reporting system is...
Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks
Cognitive radio (CR) is a significant communication technology in which the unlicensed users use the maximum available bandwidth. When the spectrum is not used by the licensed primary user, the obtainable channels are al...
Big Data : Overview
Big data is data that exceeds the processing capacity of traditional databases. The data is too big to be processed by a single machine. New and innovative methods are required to process and store such large volumes of...
High Throughput and Less Area AMP Architecture for Audio Signal Restoration
Audio restoration is effectively achieved by using low complexity algorithm called AMP. This algorithm has fast convergence and has lower computation intensity making it suitable for audio recovery problems. This paper f...