Peak Monitoring the Egotistic Nodes in MANET During Duplication Allocation
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 9, Issue 9
Abstract
Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this causes frequent changes in the network topology. Data in one network cannot be accessed by the host in another network; the data accessibility from one network to another network becomes impossible, consequently data accessibility become lower in the wireless network than in the conventional fixed network. This leads to performance degradation. Many Duplication allocation methods are used to improve the data accessibility by duplicating data item on mobile hosts other than the original owner of the data. This improves the data accessibility but some of the mobile hosts in the network may act as egotistic nodes. These nodes use the services of other nodes but this does not cooperate with other nodes, this reduces the overall data accessibility. Egotistic node detection algorithm is used to detect the egotistic nodes and then the data duplication allocation method is used for data duplicationtion. The simulation result shows that the conducted egotistic node detection method and duplication allocation techniques outperforms the improvement in data accessibility and reduce the communication cost and query delay.
Authors and Affiliations
Mr. N. Deethshith , Mr. N. Jaya Prakash , Mr. A. Gunaseelan , Mr. S. P. Santhoshkumar
ARM7 BASED SMART CAR SECURITY SYSTEM.
main aim of this project is to offer an advance security system in CAR, which consists of a face detection subsystem, a GPS module, a GSM module and a control platform. The face detection subsystem can detect fac...
Sensor Based Assistance System for Visually Impaired
This paper is focussed to develop an electronic navigation system for visually impaired, that makes use of sensors for obstacle detection. People who are visually impaired struggle every day in performing actions that ca...
Higher Order Partial Differential Equation Based Method for Image Enhancement
Many color image enhancing techniques have been proposed to eliminate noise and uninteresting details from an image, without blurring semantically important structures such as edges. PDEbased methods have been prop...
Hiding Messages Using Motion Vector Technique In Video Steganography
Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be...
Influence of Fly Ash and Silica Fumes on the Behavior of Self Compacting Concrete
Self Compacting Concrete (SCC) is one of the most significant advances in concrete technology in the last decades. SCC was mainly developed to ensure adequate compaction through self compaction and facilitate placement o...