Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV Protocol
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Wireless operations allow services, such as long-range communications, that are impossible or impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol [1]. The term is commonly used in the telecommunications industry to refer to telecommunications systems e.g. radio transmitters and receivers, remote controls etc. which use some form of energy e.g. radio waves, acoustic energy, etc. to transfer information without the use of wires. [1] Information is transferred in this manner over both short and long distances.In this, routes may be detached due to lively movement of nodes. So route assortment and topology grouping is not easy and demanding issue. This type of networks is more vulnerable to both internal and external attacks due to presence of wicked neighbour nodes[1][2s. Paper see the sights new method using AODV protocol to find out good neighbour node and finding reliable path according to their signal strength, flow capacity relative position of node in network
Authors and Affiliations
Supriya Bamane
A Hierarchical and Grid Based Clustering Method for Distributed Systems (Hgd Cluster)
Abstract: In distributed peer-to-peer systems, huge amount of data are dispersed. Grouping of those data from multiple sources is a tedious task. By applying effective data mining techniques the clustering of distributed...
A survey on Fully Homomorphic Encryption
Abstract:Cloud computing is an ever-growing field in today‘s era.With the accumulation of data and the advancement of technology,a large amount of data is generated everyday.Storage, availability and security of the data...
Music-Map: A Music Recommendation System Based On Data Mining Technique
Abstract: This report describes the design, implementation and protocol of a Music Recommendation System in details. I have used python programming language to develop the proposed system and SQLite to design and c...
Data Protection Based On Dynamic Encryption for Secure Cloud Computing
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared poo...
Intelligent Database Driven Reverse Dictionary
Abstract: The reverse dictionary identifies a concept/idea/definition to words and phrases used to describe that concept. You can enter a single word, phrase, or a few words to get the correct meanings for that sen...