Load Balanced Fuzzy Control based Adaptive Gateway Discovery for Ubiquitous Internet Access in MANET
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2015, Vol 14, Issue 12
Abstract
Integrating MANETs (Mobile Ad-hoc Networks) nodes to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways. For the second case if a node in a MANET has discover the gateway to connect to the fixed hosts in the Internet and it can be done either by broadcasting a gateway discovery request message initiated by nodes itself or by broadcasting periodic gateway advertisement messages from the gateways. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways.Nodes in a MANET use number of hops as metric to select a path to a gateway, if all the nodes select its nearest gateway to access the Internet then there may be situations when the network performance degrades because some nodes along the path have too many packets waiting in the queue.This paper presents a novel solution to access internet through mobile nodes in ad hoc network. Here the gateway replies with an advertisement message which is broadcasted to the whole network instead of sending a unicast reply to the requesting node. The traffic load taken into account along a path in addition with minimum hop count to select an efficient gateway. The AODV routing protocol has been used for routing in the MANET domain.A new strategy of gateway discovery was investigated and impact of new metric on the gateway selection in NS-2 was observed. Simulation results show that the proposed scheme outperforms over the existing scheme with high throughput and lower end to end delay.
Authors and Affiliations
GARGI BHARDWAJ, UDAI SHANKAR
Image Segmentation Using Signed Pressure Force Based Active Contour Model
A novel signed pressure force (SPF) based active contour model (ACM) is proposed in this work. It is implemented with help of Gaussian filtering regularized level set method, which first selectively penalizes the level s...
Formal Methods in Information Security
Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related stan...
Improving the Performance Parameters of Microstrip Patch Antenna by using HFSS
A high-directivity patch antenna with broadside directivity is appealing, since a constrict beam can be obtained without the need of using an array of antennas. Hence, the solution becomes barer as there is no need for a...
Modified Ant Colony Optimization for Workflow Scheduling in Cloud Enviornment
Cloud computing is a type of parallel and distributed system consisting of a collection of interconnected and virtual computers. This technological trend has enabled the realization of a new computing model called cloud...
Web Content Processing Method for Electronic Business Systems
The given article is devoted to the development of standardized methods and software Web content processing in e-business systems. The model of electronic content commerce systems is developed. The models of commercial W...