Reliable Link-Based Routing Protocol for Highly Dynamic Mobile Adhoc Networks
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5
Abstract
Traditional topology-based MANET routing protocols use stateful routing which increases the processing, communication and memory overheads. The high mobility of nodes in MANETs makes it difficult to maintain a deterministic route. To overcome this, stateless geographic routing protocols which ensure reliable data delivery have been proposed. It is found that link instability can be a major factor for unreliable data delivery. Driven by this issue, Link and Position based Opportunistic Routing (L-POR) protocol which chooses a forwarder based on the reception power of a node has been proposed. A back-up scheme is also proposed to handle communication holes. Simulation results show that the proposed protocol achieves excellent performance even under high node mobility.
Authors and Affiliations
Sahaya Rose Vigita. E#1 , Golden Julie. E
Bluejacking Technology: Overview, Key Challenges and Initial Research
The mobile phone technology has developed tremendously in the past forty years since its invention in 1973 owing to its unique, wiring sans and fixation free networked system. Mobile phones have been espoused as an...
DFT-based channel estimation for OFDM system and comparison with LS and MMSE over Rayleigh and Rician fading channel
Orthogonal Frequency Division multiplexing is a high data rate transmission scheme for wireless communication systems. The received signal is not only coming directly from the transmitter, but the combination of mu...
An Overview of MANETs: Issues and Security Solutions
Mobile ad hoc network (MANETs) are the mobile nodes which are self configured and don’t have any fixed infrastructure or pattern of deployment. They don’t have any base station or central access point and this is the key...
A Review on Classical and Modern Encryption Techniques
Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information secur...
Area Efficient Low Power Compressor Design Using GDI Technique
Compressors are major components of the present multiplier designs. In multipliers maximum amount of power is consumed during the partial product addition. For higher order multiplication, a huge number of adders or comp...