Performance Analysis of RENUM and ENUM in Lossy and Lossless Mobile Ad-hoc Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 7
Abstract
In lossy Mobile Ad-hoc Networks (MANETs) the data rate of a given flow becomes lower and lower along its routing path. One of the main challenges in lossy Mobile Ad-hoc Networks is how to achieve the conflicting goal of increased network utility and reduced power consumption, while without following the instantaneous state of a fading channel. To address this problem, two effective techniques are taken by literature survey namely Effective Network Utility Maximization (ENUM) and a cross-layer Rate-Effective Network Utility Maximization (RENUM). In this paper the performance analysis of ENUM and RENUM are analyzed based on four parameters namely Average Delay, Average Throughput, Energy Spent and Packet Delivery Ratio (PDR) with different data rates (0.3, 0.4 and 0.5). Simulations are performed by Network Simulator (NS-2); results are analyzed for both ENUM and RENUM in lossy and lossless Mobile Ad-hoc networks. Results demonstrate that in both the cases (Lossy and Lossless) RENUM produces better results compared to ENUM in terms of Average Throughput, PDR, Average Delay, and Energy Spent.
Authors and Affiliations
R. Chandrasekhar, P. Sandhya Rani
Increasing Reliability in Grid Computing By Layered Security Architecture
In this paper we described four layer architecture of Grid Computing System, analyzes security requirements and problems existing in Grid Computing System. This paper presents a new approach of five layer security archi...
Design and Implementation of Finger Writing In Air by Using Open CV (Computer Vision) Library on Arm Platform
The Main Aim of the project is to design “A Kinect Sensor for Finger Writing in the Air” Evaluating the performance of an operating system on an embedded before delving into its implementation, an introduction is needed...
An Efficient Virtual Machine Migration Technique in Cloud Datacenter
The gist of cloud computing come from the concept of virtualization. It is a way of materializing a number of guest OS on a single host server such that CPU and memory resources of the host machine are shared with the g...
SQL Injection Attacks, Detection and Prevention
Sql injection is the most dangerous way in which our important and protected data can be hacked. Anybody having a little amount of knowledge can get into the database through web interfaces and can modify or delete the...
A Genetic Algorithm for Resource Contrained Project Scheduling Problem
Resource constrained project scheduling in a well know NP hard problem of Operation Research which has attracted a lot of research in last decade. This paper deals with a metaheuristic methodology for solving a RCPSP (R...