slugAutonomous Network Reconfiguration System with CA-AOMDV in Wireless Mesh Networks
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 5
Abstract
Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. WMN is a promising wireless technology for numerous applications e.g., broadband home networking, community and neighbourhood networks, enterprise networking, building automation, etc. It is gaining significant attention as a possible way for cash strapped Internet service providers (ISPs), carriers, and others to roll out robust and reliable wireless broadband service access in a way that needs minimal up-front investments. Also there occurs some link failures which degrade the performance of the WMNs. In this paper, we have made use of Autonomous Network Reconfiguration System(ARS) and to route the packets we have used Channel Aware Ad-hoc On-Demand Multipath Distance Vector ( CA-AOMDV) for route selection. Through our experimental results, it is known that the ARS along with CA-AOMDV enhances the performance of WMNs in times of link failures in the network.
Authors and Affiliations
G. R. Ezhil and S. Muthukumar
slugQuantitative Marketing Research in Product Sales Data Analysis Using Development and Diffusion of the Innovation Concept
Quantitative marketing research is the application of quantitative research techniques to the field of marketing. in the modern marketing viewpoint[16] that marketing is an interactive process in which both the buyer a...
Different Types of Matrices in Intuitionistic Fuzzy Soft Set Theory and Their Application in Predicting Terrorist Attack
The purpose of this paper is to introduce different types of intuitionistic fuzzy soft matrices along with some new operations in the parlance of intuitionistic fuzzy soft set theory. Then based on some of these new ma...
slugIMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT INSERTION TECHNIQUE
Transferring information on internet or on any public network is very common now-a-days. However I is not a secure mean of transformation for transmitting any important information. Anyone can hack, peek or copy the in...
Impact of Information communication technology on Entrepreneurial Traits among exporters in Coimbatore region
An entrepreneur is an originator, a challenger and a driver. Creating new innovation with innovative ideas or thoughts is main character of an entrepreneur in business or a company. The entrepreneur is a leader and a p...
slugPerformance Evaluation of On-demand AODV and DSR Routing Protocols in Mobile Ad-hoc Network
Wireless networks history began in the period of 1970s and the awareness has been increasing ever since. Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes, which build network dynamically, and does...