Energy Consumption of Intermediate node in AODV
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: An A MANET(Mobile Ad-Hoc NETwork)is a network of wireless mobile nodes,without a centralizedcontrol.MANET can be characterized as unstructured Ad-Hoc,mobile nodes with limited resources includingenergy.AODV is one of the most popular,widely accepted and researched reactive protocol of MANET.AODVdoesn’t consider the residual energy and local situation of the nodes while route selection.So,sometimes thechoosen route gets fail because either the node starts acting selfishly(because of their low energy) or the nodegets disconnected(because of battery life). To analyse this problem,in this paper, authors have studied in detailrole of the nodein a communication for AODV protocol i.e source,intermediate and destination.The goal of thiswork is to find out where are the chances of energy being more consumed.Either as source or intermediate or asdestination.For this NS-2 simulator has been used.The simulator study/research can concluded thatintermediate node consume more energy
Authors and Affiliations
Shah Bhavisha , Khushboo Parmar , Asmita Patel , Parita Savaliya , Nital H. Mistry
Passive Image Forensic Method to Detect Resampling Forgery inDigital Images
Abstract: The digital images are becoming important part in the field of information forensics and security,because of the popularity of image editing tools, digital images can be tampered in a very efficient mannerwitho...
Modeling and Processing of Cloud Computing and It’s Performance Measurement
Abstract: Cloud computing is the growing technology of large scale distributed computing. It provides ondemand access to distributed resources, which are available in open environment on paid basis. Because all most all...
Optimizing Neuro-Fuzzy Fault Diagnostic Algorithm for Photovoltaic Systems
Abstract: The main goal of this research is to develop a novel optimum neuro-fuzzy system for diagnosis the complex and dynamic systems. .It has used the Particle Swarm Optimization (PSO) technique for training the Adapt...
Achieving Privacy in Publishing Search logs
The “database of intentions,” collects by the search engine companies for the histories of their users search queries. These searchlogs are a gold mine for researchers. The Search engine companies, howev...
Removal of Gaussian noise on the image edges using the Prewitt operator and threshold function technical
Image edge detection algorithm is applied on images to remove Gaussian noise that is present in the image during capturing or transmission using a method which combines Prewitt operator and threshold function te...