Performance Enhancement in Power aware Ad hoc Routing using Highly Probable Link
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 2
Abstract
In today’s fast-moving world connectivity is the biggest trend to look out for and connecting devices with varying specifications is not a simple task. This becomes more of a problem in an environment where all devices, nodes, are in constant motion and the ability of nodes to retain links with another becomes an important factor. In this paper, not only we try to implement a way to find the path with minimum effect on simultaneous communications, avoiding high power nodes, we also look for the path or link between nodes that can have a high probability of being in use in subsequent transmissions. Our method is to remove any interference during route discovery by finding a route that can be maintained during the entire transmission. Using simulation and by comparing with competing protocols we establish that our method has a notable advantage
Authors and Affiliations
Jerrin Joe Francis , K. Sudhakar
Deterministic Routing in OSPF for Post Single Link Failure
In the Internet, link-state routing protocols, that are commonly deployed tend to converge globally after any of real-time applications. Topological change in the network i.e. news of the change is propagated to all the...
Maximizing Communication Quality with Bandwidth Guarantees in Wireless Mesh Networks
Wireless Mesh Network (WMN) helps remote areas to gain access to Internet. There might be number of paths to gain access to Internet. Finding a path with maximum bandwidth is the problem to be addressed. Many solutions t...
To Improve Data Security by Using Secure Data Transmission
The “Secure data transmission” is a software solution which provides security during transmission .Present day security is the main issue that the third person attacks on the data. To provide security Tiny Encsryption Al...
Securing Web Accounts Using Graphical Password Authentication through Watermarking
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security research...
Security Strategies for Online Social Networks
In this decade online social networks (OSNs) have marvelous enlargement per hundred of millions of users on the internet. The internet users are more good-looking about OSNs for information sharing and social interaction...