Novel Approach To Adaptive Opportunistic Routing For Wireless Adhoc Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
A wireless ad hoc network is a decentralized type of wireless network. If the network is adhoc since it does not rely on a pre accessible infrastructure, such as routers in wired networks and access points in managed wireless networks. As a alternate for, each node contribute in routing by forwarding data for remaining nodes, so the determination of which nodes forward data is made energetically on the basis of network connectivity. In adding together to the characteristic routing, ad hoc networks can use flooding for forwarding the data. A distributed adaptive opportunistic routing design for multihop wireless adhoc networks is projected. The projected scheme makes use of a support learning framework to opportunistically route the packets even in the absence of dependable information about channel statistics and network model. The proposed scheme is to be most select with respect to an expected average per-packet recompense criterion. The proposed routing scheme in cooperation addresses the issues of knowledge and routing in an opportunistic background, where the network structure is characterized by the transmission success probabilities. In exacting, this knowledge framework leads to a stochastic routing scheme that optimally “explores” and “exploits” the opportunities in the network.
Authors and Affiliations
Ch Venu, K. V. Subbaiah
Double Compression Of JPEG Image Using DWT Over RDWT
Reconstruction of the history of an image is a difficult process with visual document analysis. Suppose, if an image undergo double compression, then the compressed image is not the exact bit stream generated by the...
A Study on Security Advances for LEACH in WSN
Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks....
Single sample Overlapping Doppler filter bank for processing Real Time Continuous Data
Real time continuous Doppler filtering is used to calculate the spectrum of the input signal to detect the presence of random disturbances and properly isolate them. For continuous input data this can be done in two...
Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study
Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc netw...
Enabling Secure File Sharing On Untrusted Servers Using Mona
Identity privacy is one of the most important obstruction for the wide operation of cloud computing. Without the guarantee of identity privacy users may be reluctant to join in cloud computing systems since their rea...