Performance Analysis of Improved ODMRP with Motion Detection (IOMD) in Mobile Ad Hoc Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 4
Abstract
Multicast transmission is a more effective mechanism when more effective mechanism to unicasts for group communication based applications and of due importance to future network development. Multicasting in ad hoc networks is more complex due to host mobility, interference of wireless signals and broadcast nature of the communication. Tree based Protocols are not suitable for dynamic topology scenarios due to frequent updation overhead, isolation and partition problems. It always needs cooperations among neighbouring nodes. Mesh based Protocols are suitable for frequent topology changes, can adapt to partitions and isolations and exploit the broadcast nature of the environment. Adaptation of multicast communication to environments with mobility and link failures is still a challenge. Improved ODMRP with motion detection (IOMD) optimizes on communication overhead and performance improvisation in mobile Ad-Hoc Network with respect to mobility. In this paper we make a comparative performance analysis of multicast protocols of Mobile Ad hoc Networks – ODMRP, ADMR and MAODV with IOMD by increasing number of receivers or sources and increasing the number of nodes with different mobility.
Authors and Affiliations
S. Vasundara, A. Damodaram, B. Sathyanarayana
Invalid Detachment centered Outlier Recognition acquired from Reverse Nearest Neighbors
Data Mining essentially alludes to the extraction of exceptionally fascinating examples of the Data from the gigantic Data sets. Anomaly recognition is one of the imperative parts of Data mining which really discover...
Medium Voltage High-Power Converter Topology for the Large Permanent Magnet Wind Generator Systems
This paper proposes a modular, medium voltage, highpower converter topology for the large permanent magnet wind generator system, eliminating the grid-side step-up transformer, which is desirable for both onshore and o...
Homomorphic Token and Distributed Erasure-Code for cloud
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechani...
mplementation of HMI-Guided Tracked Wheel Wireless Network Surveillance of a Weapon Robot
As one of the major steps toward fully intelligent autonomous robotic weapon, this paper works have accomplished in three major areas: (1) design of the surveillance system by DM3730 processor (Beagleboard-xM), (2) i...
Reliable Algorithm for Extracting Web Data
Web usage mining is a process of extracting useful information from server logs i.e. users history. Web usage mining is the process of finding out what users are looking for on the Internet. Some users might be look...