RWP Mobility Model Based Performance Evaluation of DSR, Dymo and FSR in Manet
This paper aims to compare some routing protocols in Mobile ad-hoc network (MANET). A MANET is a dynamic network in which collection of mobile nodes forms a temporary network without using any existing centralized administration or fixed infrastructure. The availability of routes at an instant can increase or decrease due to mobility of nodes. Therefore, the path availability and stability of routes at an instance is an issue in an Ad-hoc network. To support these types of issue in MANET, many routing protocols are designed, such as AODV, DSR, DSDV, FSR, DYMO, LAR etc. In this paper, we analyzed three different types of routing protocols: DSR, DYMO and FSR using QualNet 5.0.2 simulator. Several simulations were conducted in different traffic patterns (CBR and FTP) to analyze the performance of these routing protocols on the basis of performance matrices such as end-to-end dealy, jitter and throughput.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Wireless Sensor Network for Energy Efficient Target Coverage
A critical aspect of applications with wireless sensor network lifetime. Power –constrained wireless sensor networks are usable as long as they can communicate sensed data to a processing node. In this paper, we have depicted the over view of the blocks required for the wireless sensor network information about the hardware parts to some extent .These hardware parts are the necessary requirement for enhancement of our work further sensing and communications consume energy, therefore judicious power management and sensor scheduling can effectively extend network lifetime.[1] Moreover, in existed paper which only had few sensor and 8051 processor have been replaced by the efficiently proposed method having PIC processor to be processed along with sensor module which can be of any type based on their availability.[7] This paper propose an efficient method to extend the sensor network life time by organizing the Sensors into a maximal number of set covers that are activated successively. Only the sensors from the current active set are responsible for monitoring all targets and for transmitting the collected data, while all other nodes are in a low-energy sleep mode. By allowing sensors to participate in multiple sets, our problem formulation increases the network lifetime. [3]
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey of Mobile Ad hoc Routing Protocols
Mobile Ad-hoc Networks (MANET) are self organizing network which exchange Data among themselves through single hope or multi hope. Data transfer happens in single hope whenever the destination is available within the transmission region of source, multi hope is used when destination is not available within the transmission region of source. Designing a routing protocol is a crucial issue in MANET because of dynamic topology. Active research works has been carried in the area of Ad-hoc routing protocols to address this issue. In this paper first we focus about the design challenges for routing protocols followed by a survey of various routing protocols for Ad-hoc network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Distance Vector Routing Algorithm for Detection and Correction of Grey & Black Hole Attack by Implementing IDS
Mobile Ad hoc Networks is a collection of wireless mobile nodes, which form temporary networks without relying on any existing infrastructure or centralized administration or standard support services regularly available in wide area networks to which the host may normally be connected. In this paper we proposed new distance vector routing algorithm (DVRA) for detecting and correcting the black hole and grey hole attack made by intruding nodes.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Speed analysis for QOS in ATM network – a comparison
The approaches to QoS support of ATM networks are explained, The Performance of several kinds of schemes such as ABR CBR and VBR are compared based on transit delay and total delay based on all the six Qos parameters. Some simulation work is done and related results are shown and discussed.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design and simulation of folded printed dipole antenna with PBG structure for Ultra Wide Band (UWB) applications
In this paper folded printed dipole antenna with PBG operating for Ultra wide band applications ,The geometry of the antenna is very simple for fabrication and printed circuit board integration that is only 42*36 mm, the proposed antenna are simplified structure with 50 ? feed line .the PBG structure antenna working in the frequency at 3.2 GHz and 3.9GHz with the bandwidth 68% and 50 % respectively ,In this proposed antenna has maximum gain 4.664 dBi and 3.8 dBi at 3.2 GHz and 3.9 GHz respectively .The proposed radiation pattern is omnidirectional in the E-plane and H-plane due to the orthogonal configuration of the dipole strips. The folded printed dipole antenna with PBG structure antenna should be useful for the UWB applications, The radiation characteristics examined in further sections.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Detection of misbehaving and selfish node in optimized link state routing (OLSR) in mobile adhoc network
Mobile Ad-hoc Networks (MANET) is the self organizing collection of mobile nodes. The Optimized Link State Routing (OLSR) protocol was designed to improve scalability of Mobile Ad-Hoc Networks (MANETs). OLSR protocol implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Nevertheless, OLSR was designed without security measures. There-fore, a misbehaving node can affect the topology map acquisition process by interrupting the flooding of control information or disturbing the MPR selection process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Detection of Online Phishing Attacks Using a Transparent Proxy System
The Internet has increasingly become a valuable tool. Despite the benefit, the Internet can often represent an insecure channel for exchange of information. Among the challenges that have now affected the Internet user is phishing. This study propose a secure Anti-Phishing system using a Transparent Proxy System. The proposed system is a middleware that is located between the clients and a content provider. The proposed system was able to detects, alerts novice and experienced users of potential phishing content.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Wireless mesh networks rate adaptation joint scheduling, routing and power control
We present a number of significant engineering insights on what makes a good configuration for medium- to large size wireless mesh networks when the objective function is to maximize the minimum throughput among all flows. For this, we first develop efficient and exact computational tools using column generation with greedy pricing that allow us to compute exact solutions for networks significantly larger than what has been possible so far. We also develop very fast approximations that compute nearly optimal solutions for even larger cases. Finally, we adapt our tools to the case of proportional fairness and show that the engineering insights are very similar.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A three-stage heuristic combined Hopfield neural network for channel assignment problem in cellular mobile system
A three-stage algorithm of combining sequential heuristic methods into a Hopfield neural network is presented for the channel assignment problem in cellular mobile communication systems in this paper. The goal of this problem is to find a channel assignment to requested calls with the minimum number of channels subject to interference constraints between channels. The three-stage algorithm consists of: 1) the regular interval assignment stage; 2) the greedy assignment stage; and 3) the neural-network assignment stage. In the first stage, the calls in a cell determining the lower bound on the total number of channels are assigned channels at regular intervals. In the second stage, the calls in a cell with the largest degree and its adjacent cells are assigned channels by a greedy heuristic method. In the third stage, the calls in the remaining cells are assigned channels by a Hopfield neural network. The performance is verified through solving well-known benchmark problems. Especially for Sivarajan’s benchmark problems, my three-stage algorithm first achieves the lower bound solutions in all of the 12 instances.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]