Problem Analysis of Routing Protocols in MANET in Constrained Situation
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
A Mobile Ad-hoc network (MANET) consists of a number of mobile wireless nodes, among which the communication is carried out without having any centralized control. MANET is a self organized, self configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. The mobile nodes can receive and relay packets as a router. Routing is a critical issue and an efficient routing protocol makes the MANET reliable. The AODV out-perform DSR in the normal situation but in the constrained situation DSR out-performs AODV, the degradation is as severe as (30%) in AODV whereas DSR degrades marginally (10%) as observed through simulation in Glomosim. This problem has been analyzed in both on-demand protocols and the improvements, has been suggested in a proposed local congestion control algorithm.
Authors and Affiliations
Manish Bhardwaj , Sachi Pandey , R. P Mahapatra
Design of an Energy Efficient and Delay Tolerant Routing Protocol for Wireless Body Area Network
The Wireless Body Area Network provide continuous health monitoring and real-time feedback to the medical personnel. The devices used for WBAN have limited energy resources. For most devices it is impossible to recharge...
Implementation of Web-Based Chilli Expert Advisory System Using ABC Optimization Algorithm
The presently developed paper deals with the concepts of web based online expert systems and machine learning Algorithms in the field of Artificial Intelligence. An expert system follows the methodology of task-based spe...
A Novel Pair of Replacement Algorithms for L1 and L2 Cache for FFT
Processors speed is much faster than memory; to bridge this gap cache memory is used. This paper proposes a preeminent pair of replacement algorithms for Level 1 cache (L1) and Level 2 cache (L2) respectively for the Fas...
Visual Cryptographic Applications
Visual Cryptography is a special kind of cryptographic scheme where the decryption of the encrypted secret is done by the human vision and not by complex mathematical calculations. Visual Cryptography deals with any secr...
Entropy Based Lossless Fractal Image Compression using Irregular Rectangular Partitions
Entropy of an image can be taken as a parameter of variation among pixel values. Equal value for all pixels in an image results in zero entropy. This idea is incorporated at the time of partitioning the image. Partitions...