Temporary centralized network Using On-Demand Routing Protocol
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 8
Abstract
Applications such as conferences, meetings, lectures, crowd control, search and rescue, disaster recovery, and Army battlefields typically do not have central administration or central infrastructure available.In these situations, ad hoc networks, without any wired base stations. Nodes in such a network move arbitrarily,thus network topology changes frequently and unpredictably. Moreover, bandwidth and power are limited. These constraints, in combination with network topology dynamics make routing in ad hoc networks challenging. In this paper introduces a wireless temporary network without any fixed infrastructure with centralized node called as by-passer. Design a network all the communication between the nodes through bypasser. Implement some predefined text message related to situation and feed all the nodes involved in temporary network, because in emergency situation they don't to talk or type message , they will use the predefined text messages.
Authors and Affiliations
S. Tharani , Dr. G. Arutchelvan
Credential Proactive Protection Guard: A Proactive Password Checking Tool
Over the internet, user profiling is one of the key activity in which user is asked to provide personal as well as professional information. The user is not aware about the misuse of profiling. It has been observed that...
Review on Authorization control for a semantic data repository and database management system
Due to the increasing amount of data available online, the World Wide Web has becoming one of the most valuable resources for information retrievals and knowledge discoveries. The Semantic Web is well recognized as an ef...
An Adoptive approach in Demosaicing True Color from Digital Camera having Bayer Color Filter
Single sensor with Bayer pattern color filters are used to reduce size and cost of consumer digital cameras. These cameras use various demosaicing algorithms to construct the entire image with true colors from the acquir...
Security Scheme for Data Authentication Based on Elliptic Curve Cryptography
An encryption is providing authentication and security for illicit manipulation of digital data. In this paper the security scheme for authentication and secrecy of digital data through ElGamal public key cryptographic a...
BER and Channel Capacity Improvement of MIMO-OFDM and Adaptive MIMOOFDM System By Modulation Technique(QAM)
In the present scenario, with the growing demand for wireless communication in today’s life, along with the parallel rapid growth of digital communication technology, new innovative ideas are coming into existence which...