Routing in Highly Dynamic Ad Hoc Networks: Issues and Challenges
Journal Title: International Journal on Computer Science and Engineering - Year 2016, Vol 8, Issue 4
Abstract
The aim of this research paper is to analyze the various issues and challenges involved in routing of data packets in highly mobile ad hoc networks. Routing in ad hoc networks has always been a challenging and tough task due to the dynamic topology and error prone wireless channel. There are a number of issues like lack of centralized control, constantly moving nodes etc that has to be considered while routing a data packet from the source to the destination in the ad hoc network. Routing of data packets becomes much more difficult with increased mobility of nodes. This paper analyses the various issues in routing of data packets from the source to the destination node and also lists down the parameters that has to be considered while designing and selecting a routing protocol for highly mobile ad hoc networks.
Authors and Affiliations
Varun G Menon , Joe Prathap P M
STUDY OF THE BEHAVIOR MODELS BASED ON PROBABILITY AND TIME BY USING MARKOV PROCESS AND TRANSITION MATRIX.
This paper suggests an approach to software system architecture specification based on behavior models. The behavior of the system is defined as an event occurring probability and time. The behavior of the system over a...
Intelligent Public Transport Information System
To increase the usability of a public transport system it needs to go under revolutionary changes in its operating procedure. It is an attempt to make this possible using recent computer technology, mobile computing adva...
A Voice Priority Queue (VPQ) Fair Scheduler for the VoIP over WLANs
Transmission of VoIP over packet switching networks is one of the rapidly emerging real-time Internet Protocol. The real-time application of the Voice over Internet Protocol (VoIP) is growing rapidly for it is more flexi...
Approaches for Managing and Analyzing Unstructured Data
Large volumes of data that will be stored and accessed in future is unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value f...
Two Factor Biometric Key for Secure Wireless Networks
The applications of wireless networks is steadily increasing through out the world. Wireless transactions are now appening in highly secure banking networks. To have more reliable networks, security of wireless networks...