Temporary centralized network Using On-Demand Routing Protocol 

Abstract

Applications such as conferences, meetings, lectures, crowd control, search and rescue, disaster recovery, and Army battlefields typically do not have central administration or central infrastructure available.In these situations, ad hoc networks, without any wired base stations. Nodes in such a network move arbitrarily,thus network topology changes frequently and unpredictably. Moreover, bandwidth and power are limited. These constraints, in combination with network topology dynamics make routing in ad hoc networks challenging. In this paper introduces a wireless temporary network without any fixed infrastructure with centralized node called as by-passer. Design a network all the communication between the nodes through bypasser. Implement some predefined text message related to situation and feed all the nodes involved in temporary network, because in emergency situation they don't to talk or type message , they will use the predefined text messages.

Authors and Affiliations

S. Tharani , Dr. G. Arutchelvan

Keywords

Related Articles

Credential Proactive Protection Guard: A Proactive Password Checking Tool

Over the internet, user profiling is one of the key activity in which user is asked to provide personal as well as professional information. The user is not aware about the misuse of profiling. It has been observed that...

Review on Authorization control for a semantic data repository and database management system

Due to the increasing amount of data available online, the World Wide Web has becoming one of the most valuable resources for information retrievals and knowledge discoveries. The Semantic Web is well recognized as an ef...

An Adoptive approach in Demosaicing True Color from Digital Camera having Bayer Color Filter

Single sensor with Bayer pattern color filters are used to reduce size and cost of consumer digital cameras. These cameras use various demosaicing algorithms to construct the entire image with true colors from the acquir...

Security Scheme for Data Authentication Based on Elliptic Curve Cryptography

An encryption is providing authentication and security for illicit manipulation of digital data. In this paper the security scheme for authentication and secrecy of digital data through ElGamal public key cryptographic a...

BER and Channel Capacity Improvement of MIMO-OFDM and Adaptive MIMOOFDM System By Modulation Technique(QAM)

In the present scenario, with the growing demand for wireless communication in today’s life, along with the parallel rapid growth of digital communication technology, new innovative ideas are coming into existence which...

Download PDF file
  • EP ID EP95367
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

S. Tharani, Dr. G. Arutchelvan (2015). Temporary centralized network Using On-Demand Routing Protocol . International Journal of Computer Science & Engineering Technology, 6(8), 500-503. https://europub.co.uk/articles/-A-95367