Survey on Energy-Based Geographic Routing Protocols and Position Update Strategies in Ad-Hoc Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 4
Abstract
Mobile Ad-hoc Network (MANET) is a wireless network with no infrastructure, used in vital places such as battle fields, disaster areas, remote areas etc. This emergency aiding network is formed on-demand by mobile nodes to accomplish communication and information sharing activities. Since there is no centralized control to oversee the ongoing activities, each node operates with the responsibility of acting as router to forward data. In MANETs, there are many challenges such as routing, security, bandwidth etc. are still under research. Among them routing with minimum energy is a predominant task because all the nodes operate with embedded batteries. In MANET routing protocols, Geographic Routing Protocols (GRPs) are the popular energy efficient, location-based routing protocols, which operate with the help of Global Positioning System (GPS) and Grid Location Systems (GLS). The mandatory requirement of GRPs, location information dissemination is the most energy consuming activity, as the beacon packets are exchanged among nodes. Greedy Perimeter Stateless Routing (GPSR) is a well-known GRP and its main goal is to reduce the number of hops in packet forwarding. The drawback of GPSR is the diffusion hole problem. This paper analyses GPSR, energy efficient geographic routing protocols which solve diffusion holes, other power management techniques and various position update schemes.
Authors and Affiliations
V. Kamala , T. Sathya Prabha , Mrs B. Vinodhini , Dr S. Karthik
TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS
Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...
Methodology and Analysis for Various SQL Injection Techniques
Now day’s online transaction is done by most of web applications. These applications have vulnerabilities which make its security weak. Every application has provided authentication and authorization functionality, secur...
Development of a Speech Recognition System for Speaker Independent Isolated Malayalam Words
In this paper, a speech recognition system is developed for recognizing speaker-independent, isolated words. Speech recognition is a fascinating application of Digital Signal Processing and is a pattern classification ta...
A review of Coupling and Cohesion metrics in Object Oriented Environment
Software metrics are used to check and evaluate various aspects of the complexity of a software product. Coupling and Cohesion are considered to be the most important attributes. The increasing need for software quality...
Cloud Computing and its challenges: A Review
Cloud computing is today’s one of the most recent topics due to its cost-efficiency and flexibility and ubiquitous computing. This paper gives a review our early of Cloud computing, its major characteristics and some iss...