Performance Analysis Of Guaranteed Packet Transfer In Coverage Area And Less Coverage Area For MANET
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 2
Abstract
The main challenge in mobile adhoc network is guaranteed transfer of packet within coverage area and less coverage area. The hierarchical clustering is used to increase coverage area to reduce the packet loss in MANET.The coverage area, packet loss is analyzed and reliability of coverage area and less coverage area is increased by hierarchical clustering.The traffic can be reduced and packet loss will also be minimized and it achieves guaranteed transfer of packets. Every node is updated with the neighbored information in a timely manner to achieve guaranteed coverage and to increase the packet delivery ratio and reduce end to end delay
Authors and Affiliations
S. Gomathi , K. Duraiswamy
An Enhancing approach in MEDLINE & PubMed using Text Mining
Text mining is a new and exciting research area that attempts to solve the information overload problem. Information extraction using text mining has been applied to many different areas of bio-medici...
Security Enhancement of First Mile Wireless Access with Optimal QoS through Anonymity in Convergence Network
The first mile wireless access of convergence networks is prone to various attacks due to the broadcasting feature of transmission. Most of the existing security measures focus on protection of message contents, leaving...
Role of soft computing as a tool in data mining
we live in a world where we can be overwhelmed with information; therefore it has become increasingly important to extract relevant information from the explosive amount of data for. Data Mining is the iterative and inte...
Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol
In this paper, we develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the p...
Operating System based Compliance Validation of Trusted Computing
The concept of trusted computing given was by Anderson [2]. Trust is an expectation that a device behaves in a particular manner. A trusted component, operation or process is one whose behavior is pr...