CPRM: Cooperative Position based Routing scheme for MANETs
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: A mobile ad hoc network is a wireless communication network, where nodes that are not within direct transmission range of each other will require other nodes to forward data. Routing is difficult in MANET because mobility may cause radio links to break frequently. Mobile nodes keep changing their position in an unpredictable manner. A routing algorithm must keep track of the destination’s position and modify routes whenever the old routes become stale. In a high mobility MANET, although every mode can move freely, they usually follow some mobility patterns. Fast changes of topology increases the complexity of routing. Due to mobility of the nodes to another location, some of the data packets will be missed and does not deliver the data packets to the destination in a reliable manner. This project proposes a Cooperative Position based Routing scheme for mobile ad hoc networks (CPRM). In this, the routing is carried out based on the positions of nodes in the network. The main objective of this project is to achieve the reliable data delivery in the network. In this scheme, the source node finds a forwarder node from its neighbor list, for transmitting data. The forwarder in turn finds the next forwarder and this process continues until the destination is reached. Performance of the proposed system is compared with that of AODV using Network Simulator.
Authors and Affiliations
Ginumol Jose , Prof. Kuttyamma A J
An Intelligent Decision Support System Using Adaptive Network-Based Fuzzy Inference System (ANFIS) For Choosing Suitable Bank Loan Installments
Abstract : Choosing the best bank to obtain a loan from has become a dilemma for many loan applicants; Thus the need to automate the process throughout establishing an intelligent decision support system (IDSS) to...
Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm
Phishing is a new type of network attack where the attacker creates a replica of an existing Web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financ...
Pose Estimation in AVI from Unknown Correspondences Using Genetic Algorithm
Abstract: In this paper we propose a model based approach to determine correspondences and pose of objects in automated visual inspection applications. The method does not consider correspondence and pose estimation prob...
Image Steganography and Global Terrorism
This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims t...
Load Balancing In Cloud Computing:A Review
As the IT industry is growing day by day, the need of computing and storage is increasing rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this increasi...