Monitoring Selfish Nodes in MANET during Replica Allocation
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this causes frequent changes in the network topology. Data in one network cannot be accessed by the host in the another network, the data accessibility from one network to another network becomes impossible, consequently data accessibility become lower in the wireless network than in the conventional fixed network. This leads to performance degradation. Many Replica allocation methods are used to improve the data accessibility by replicating data item on mobile hosts other than the original owner of the data. This improves the data accessibility but some of the mobile hosts in the network may act as selfish nodes. These nodes use the services of other nodes but this does not cooperate with other nodes, this reduces the overall data accessibility. Selfish node detection algorithm is used to detect the selfish nodes and then the data replica allocation method is used for data replication. The simulation result shows that the conducted selfish node detection method and replica allocation techniques outperforms the improvement in data accessibility and reduce the communication cost and query delay
Authors and Affiliations
E. Jananandhini
Review of Evolutionary Algorithms in Wsn
Abstract: Diverse issues related to wireless sensor networks like energy minimization (optimization), compression schemes, network algorithms which are self-organizing, routing protocols, management of quality of service...
A Exploratory Review on Soft Computing SegmentationTechniques
Abstract: Segmentation is a process to divides the images into its regions or objects that have similar featuresor characteristics. Segmentation has no single standard procedure and it is very difficult in non-trivial im...
DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table
Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase...
An Intelligent Meta Search Engine for Efficient Web DocumentRetrieval
Abstract: In daily use of internet, when searching information we face lots of difficulty due to the rapid growthof Information Resources. This is because of the fact that a single search engine cannot index the en...
Online Voting System (Android Application)
Abstract:Voting is the HEART of democracy. Voting provides a way to select a Leader to manage problems and other issues. The basis of this project is to create an Android application based on which voting can be performe...