RWP Mobility Model Based Performance Evaluation of DSR, Dymo and FSR in Manet
This paper aims to compare some routing protocols in Mobile ad-hoc network (MANET). A MANET is a dynamic network in which collection of mobile nodes forms a temporary network without using any existing centralized administration or fixed infrastructure. The availability of routes at an instant can increase or decrease due to mobility of nodes. Therefore, the path availability and stability of routes at an instance is an issue in an Ad-hoc network. To support these types of issue in MANET, many routing protocols are designed, such as AODV, DSR, DSDV, FSR, DYMO, LAR etc. In this paper, we analyzed three different types of routing protocols: DSR, DYMO and FSR using QualNet 5.0.2 simulator. Several simulations were conducted in different traffic patterns (CBR and FTP) to analyze the performance of these routing protocols on the basis of performance matrices such as end-to-end dealy, jitter and throughput.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Wireless Sensor Network for Energy Efficient Target Coverage
A critical aspect of applications with wireless sensor network lifetime. Power –constrained wireless sensor networks are usable as long as they can communicate sensed data to a processing node. In this paper, we have depicted the over view of the blocks required for the wireless sensor network information about the hardware parts to some extent .These hardware parts are the necessary requirement for enhancement of our work further sensing and communications consume energy, therefore judicious power management and sensor scheduling can effectively extend network lifetime.[1] Moreover, in existed paper which only had few sensor and 8051 processor have been replaced by the efficiently proposed method having PIC processor to be processed along with sensor module which can be of any type based on their availability.[7] This paper propose an efficient method to extend the sensor network life time by organizing the Sensors into a maximal number of set covers that are activated successively. Only the sensors from the current active set are responsible for monitoring all targets and for transmitting the collected data, while all other nodes are in a low-energy sleep mode. By allowing sensors to participate in multiple sets, our problem formulation increases the network lifetime. [3]
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey of Mobile Ad hoc Routing Protocols
Mobile Ad-hoc Networks (MANET) are self organizing network which exchange Data among themselves through single hope or multi hope. Data transfer happens in single hope whenever the destination is available within the transmission region of source, multi hope is used when destination is not available within the transmission region of source. Designing a routing protocol is a crucial issue in MANET because of dynamic topology. Active research works has been carried in the area of Ad-hoc routing protocols to address this issue. In this paper first we focus about the design challenges for routing protocols followed by a survey of various routing protocols for Ad-hoc network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Distance Vector Routing Algorithm for Detection and Correction of Grey & Black Hole Attack by Implementing IDS
Mobile Ad hoc Networks is a collection of wireless mobile nodes, which form temporary networks without relying on any existing infrastructure or centralized administration or standard support services regularly available in wide area networks to which the host may normally be connected. In this paper we proposed new distance vector routing algorithm (DVRA) for detecting and correcting the black hole and grey hole attack made by intruding nodes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Speed analysis for QOS in ATM network – a comparison
The approaches to QoS support of ATM networks are explained, The Performance of several kinds of schemes such as ABR CBR and VBR are compared based on transit delay and total delay based on all the six Qos parameters. Some simulation work is done and related results are shown and discussed.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design and simulation of folded printed dipole antenna with PBG structure for Ultra Wide Band (UWB) applications
In this paper folded printed dipole antenna with PBG operating for Ultra wide band applications ,The geometry of the antenna is very simple for fabrication and printed circuit board integration that is only 42*36 mm, the proposed antenna are simplified structure with 50 ? feed line .the PBG structure antenna working in the frequency at 3.2 GHz and 3.9GHz with the bandwidth 68% and 50 % respectively ,In this proposed antenna has maximum gain 4.664 dBi and 3.8 dBi at 3.2 GHz and 3.9 GHz respectively .The proposed radiation pattern is omnidirectional in the E-plane and H-plane due to the orthogonal configuration of the dipole strips. The folded printed dipole antenna with PBG structure antenna should be useful for the UWB applications, The radiation characteristics examined in further sections.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Detection of misbehaving and selfish node in optimized link state routing (OLSR) in mobile adhoc network
Mobile Ad-hoc Networks (MANET) is the self organizing collection of mobile nodes. The Optimized Link State Routing (OLSR) protocol was designed to improve scalability of Mobile Ad-Hoc Networks (MANETs). OLSR protocol implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Nevertheless, OLSR was designed without security measures. There-fore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Detection of Online Phishing Attacks Using a Transparent Proxy System
The Internet has increasingly become a valuable tool. Despite the benefit, the Internet can often represent an insecure channel for exchange of information. Among the challenges that have now affected the Internet user is phishing. This study propose a secure Anti-Phishing system using a Transparent Proxy System. The proposed system is a middleware that is located between the clients and a content provider. The proposed system was able to detects, alerts novice and experienced users of potential phishing content.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Minimizing the delay and delay variation constraints for collaborative applications based on overlay networks
The main objective of this research is to minimize delay in collaborative applications by setting tight bounds. Examples of collaborative applications include video-conferencing, distributed database replication, and online games. The efficiency of this project is analyzed and shown to be superior to its counterparts in the execution time. To provide an efficient heuristic to obtain a multicast sub network on an overlay network, given a source and a set of destinations that is within a specified maximum delay and a specified maximum variation in the delays from a source to the destinations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Wireless mesh networks rate adaptation joint scheduling, routing and power control
We present a number of significant engineering insights on what makes a good configuration for medium- to large size wireless mesh networks when the objective function is to maximize the minimum throughput among all flows. For this, we first develop efficient and exact computational tools using column generation with greedy pricing that allow us to compute exact solutions for networks significantly larger than what has been possible so far. We also develop very fast approximations that compute nearly optimal solutions for even larger cases. Finally, we adapt our tools to the case of proportional fairness and show that the engineering insights are very similar.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]