A Performance Analysis of Energy Aware and Link Stability based Routing Protocols for MANET
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Energy efficient routing is be one of the most important design criterion for MANET since mobile nodes are battery powered with limited capacity and which cannot be recharged when ever needed. So, MANET routing is challenged by power and bandwidth constraints. When mobile nodes run out of power, the network gets partitioned and thus some sessions are disconnected. In order to solve this problem and to achieve efficient energy consumption, many solutions have been proposed. All those works are done as the extension of the already existing ad hoc routing protocols such as Reactive, Proactive and Hybrid Routing. Since table-driven protocols consume more energy compared to on-demand protocols, the proposals made modifications to existing reactive protocols. Most of the energy-aware protocols referenced here are implemented as modifications of the basic routing protocols using energy-sensitive metrics. Link stability is also an important challenge of MANET routing. Many routing algorithms have been proposed for providing QoS in terms of link stability. In this work we concentrated on evaluating how these approaches and algorithms affect the energy consumption in the mobile devices and how stable routes are established in the network.
Authors and Affiliations
Manuscript , S Kannan, , Dr. S. Karthik,
Biometrics using Electronic Voting System with Embedded Security
Abstract-An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are two types of e-voting: On-Line and Offline. On-l...
“A Survey on Different Fingerprint Recognition Systems”
In this paper we are comparing various fingerprint recognition system which are based on minutiae and ridge feature extraction. Here we are comparing various methods using minutiae features only or ridge features o...
TOSCA ENABLING CLOUD PORTABILITY
The cloud is a computing architecture characterized by a large number of interconnected identical computing devices that can scale on demand and that communicate via an IP network. Many technologies commonly associated w...
2ACK-Scheme: Routing Misbehavior Detection in MANETs Using OLSR
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes such as routers. Due to the dynamic change in t...
STUDY AND PERFORMANCE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS
Today’s world, for secure data transmission via Internet or any public network, there is no alternative to cryptography. The role of Cryptography is most important in the field of network security. The main goal...