Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis
Journal Title: International Journal on Computer Science and Engineering - Year 2016, Vol 8, Issue 7
Abstract
This paper discuss various opportunistic routing algorithm which is based on broadcast nature of opportunistic network and also provide novel solution of routing which have less data loss. This research work proposed broadcasting nature of wireless network to implement Opportunistic routing algorithm. This is Extension of ExOR routing protocol which is based on opportunisticrouting. Here introducing new algorithm which is resource aware. In This algorithm capacity will calculate at each node and according to capacity it will provide privilege rank. High prioritynode act as a forwarder among the candidates. When destination will reached, it will send acknowledgement that is destitution reached. Paper discuss various merits and demerits of existing mobile opportunistic routing protocol .paper also introduced novel improved resource aware protocol which maximize the throughput and minimize the packet loss.In a last section of paper RAOR (resource aware opportunistic routing protocol) resulthas compare with other previous opportunistic routing protocol.
Authors and Affiliations
Prof. SmitaShukla Patel , Dr. M. Mohanpriya
Smart phone Application using Morse Code and Inaudible Frequency
In this paper, the wireless communication using Morse code and inaudible frequency has been discussed. The application of this project is to transfer the limited information with the help of inaudible frequency and AAC....
A Novel Approach for Text Categorization of Unorganized data based with Information Extraction
Internet has made a profound change in the lives of many enthusiastic innovators and researchers. The information available on the web has knocked the doors of Knowledge Discovery leading to a new Information era. Unfort...
Implementing Ant Colony Optimization for Test Case Selection and Prioritization
Regression Testing is an inevitable and a very costly activity to be performed, often in a time and resource constrained environment. Thus we use techniques like Test Case Selection and Prioritization, to select and prio...
Enhanced Component Retrieval Scheme Using Suffix Tree in Object Oriented Paradigm
In today’s world software are used everywhere i.e. every electronic devices use software. So there is a large demand of software but in the same proportion the development is not growing. It is similar to the supply dema...
CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks
Mobile Adhoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of stablished infrastructure. Mobile Adhoc network are vulnerable to attacks compared to wired networks...