Power and Delay Aware On-Demand Routing For Ad Hoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
Wide implementation of IEEE 802.11 based networks could ead to deployment of localized wireless data communication environments with a limited number of mobile hosts, called ad hoc networks. Implementation of a proper routing methodology in ad hoc networks makes it efficient in terms of performance A wide spectrum of routing protocols has been contributed by several researchers. Real time applications have been most popular among the applications, run by ad hoc networks. Such applications strictly adhere to the Quality of Service (QoS) equirements such as overall throughput, end-toend delay and power level. Support of QoS requirements becomes more challenging due to dynamic nature of MANETs, where mobility of nodes results in frequent change in topology. QoS aware routing protocols can serve to the QoS support, which oncentrate on determining a path between source and estination with the QoS requirements of the flow being satisfied. We propose a protocol, called Power and Delay aware Temporally Ordered Routing Algorithm (PDTORA), based on Temporally Ordered Routing Algorithm (TORA) Protocol, where verification of power and delay requirements is carried out with a query packet at each node along the path between source and destination. Simulations justify better erformance of the proposed new protocol in terms of network lifetime, nd-to-end delay and packet delivery ratio as ompared to TORA.
Authors and Affiliations
Alok Kumar Jagadev , Manoj Kumar Mishra , Binod Kumar Pattanayak , Manojranjan Nayak
An Efficient Watermarking Algorithm Based on DWT and FFT Approach
Multimedia and Internet have become our daily needs. It has become a common practice to create copy, transmit and spread digital data .It leads to unauthorized duplication problem. Digital image watermarking provides a p...
A Probabilistic Approach of Coverage prediction in Mobile Ad hoc Networks
A fundamental issue arising in mobile ad-hoc networks (MANETs) is the selection of the optimal path between any two nodes. It’s very difficult to select of optimal path due to different factors affects the stability of t...
Semantic Inference Model For DatabaseInference Detection Violation
Database Security has become a major problem in modern day’s applications. Generally for Information security everybody tries to protect sensitive data by using different security techniques. Despite these security measu...
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
An ad hoc wireless network consists of mobile terminals communicating with each other without the help of traditional infrastructure for communication. Optimized Link State Protocol (OLSR) is a proactive routing protoco...
Safety Measures Using Sextic Curve Cryptography
This paper proposes Sextic Curve Cryptography, which is used to increase the safety measures. The methods to find the critical points in the SCC based on Atriphtaloid symmetric curve using point addition and point doubli...