Peak Monitoring the Egotistic Nodes in MANET During Duplication Allocation

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 9, Issue 9

Abstract

Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this causes frequent changes in the network topology. Data in one network cannot be accessed by the host in another network; the data accessibility from one network to another network becomes impossible, consequently data accessibility become lower in the wireless network than in the conventional fixed network. This leads to performance degradation. Many Duplication allocation methods are used to improve the data accessibility by duplicating data item on mobile hosts other than the original owner of the data. This improves the data accessibility but some of the mobile hosts in the network may act as egotistic nodes. These nodes use the services of other nodes but this does not cooperate with other nodes, this reduces the overall data accessibility. Egotistic node detection algorithm is used to detect the egotistic nodes and then the data duplication allocation method is used for data duplicationtion. The simulation result shows that the conducted egotistic node detection method and duplication allocation techniques outperforms the improvement in data accessibility and reduce the communication cost and query delay.

Authors and Affiliations

Mr. N. Deethshith , Mr. N. Jaya Prakash , Mr. A. Gunaseelan , Mr. S. P. Santhoshkumar

Keywords

Related Articles

 ARM7 BASED SMART CAR SECURITY SYSTEM.

 main aim of this project is to offer an advance security system in CAR, which consists of a face detection subsystem, a GPS module, a GSM module and a control platform. The face detection subsystem can detect fac...

Sensor Based Assistance System for Visually Impaired

This paper is focussed to develop an electronic navigation system for visually impaired, that makes use of sensors for obstacle detection. People who are visually impaired struggle every day in performing actions that ca...

 Higher Order Partial Differential Equation Based Method for Image Enhancement

 Many color image enhancing techniques have been proposed to eliminate noise and uninteresting details from an image, without blurring semantically important structures such as edges. PDEbased methods have been prop...

 Hiding Messages Using Motion Vector Technique In Video Steganography

 Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be...

Influence of Fly Ash and Silica Fumes on the Behavior of Self Compacting Concrete

Self Compacting Concrete (SCC) is one of the most significant advances in concrete technology in the last decades. SCC was mainly developed to ensure adequate compaction through self compaction and facilitate placement o...

Download PDF file
  • EP ID EP162727
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

Mr. N. Deethshith, Mr. N. Jaya Prakash, Mr. A. Gunaseelan, Mr. S. P. Santhoshkumar (2014). Peak Monitoring the Egotistic Nodes in MANET During Duplication Allocation. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 9(9), 454-459. https://europub.co.uk/articles/-A-162727