Scalable Multicasting and Sustaining Proficient Over Mobile Ad Hoc Networks: MANET
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 6
Abstract
Cluster interactions are imperative in Mobile Ad hoc Networks (MANET). Multicast is an proficient technique for implementing cluster connections. However, it is exigent to execute competent and scalable multicast in MANET due to the intricacy in faction association supervision and multicast packet forwarding over a dynamic topology. We intend a novel Efficient Geographic Multicast Protocol (EGMP). EGMP uses a virtual-zone-based formation to execute scalable and proficient group membership supervision. A network-wide zone-based bi-directional tree is constructed to accomplish extra proficient association supervision and multicast deliverance. The situation information is used to steer the zone configuration edifice, multicast tree creation and multicast packet forwarding, which proficiently reduces the overhead for direction incisive and tree configuration maintenance. Several strategies have been anticipated to promote develop the efficiency of the protocol, for example, introducing the theory of zone intensity for edifice an optimal tree formation and integrating the position search of cluster members with the hierarchical group membership executive. Finally, we intend a scheme to lever vacant zone dilemma faced by most routing protocols using a zone constitution. The scalability and the efficiency of EGMP are evaluated through simulations and quantitative investigation. Our imitation results express that EGMP has high envelope liberation ratio, and low manage transparency and multicast group amalgamation hindrance under all test scenarios, and is scalable to both group size and network size. Compared to Scalable Position-Based Multicast (SPBM) [20], EGMP has appreciably lower control overhead, data transmission overhead, and multicast group unification delay
Authors and Affiliations
R. venkatesh , R. Swath , R. Hendra Kuma , , P. Balaji
Comparative Study of Two-way Finite Automata and Turing machine
Two-way finite Automata are termed as read only Turing machine. Two way finite automata is one of variant of Turing machine, which is blessed with an infinite tape, and could be used by tape head to read or write i...
A Novel Approach to Improve Avalanche Effect of AES Algorithm
With the rapid progression of digital data exchange in electronic way, security of information is becoming more important in data storage and transmission. Therefore numerous ways of protecting information are bein...
A Comparative Study of Conditional Privacy Preservation Approaches in VANET’S
Conditional Privacy preservation in VANETs (Vehicular Ad-hoc Networks) must be achieved in the sense that the user related privacy information, including the driver's name, the license plate, speed, position, and t...
Object Oriented to Aspect Oriented: A Case Study
This work is to present the object oriented software into the aspect oriented software. And also highlight the tangling and scattering problem in the object oriented software development. There is a problem of stru...
Review of Unmanned Aircraft System (UAS)
Unmanned Aircraft Systems (UAS) is an emerging technology with a tremendous potential to revolutionize warfare and to enable new civilian applications. It is integral part of future urban civil and military applications....