Implementation and Performance Evaluation of the Gateway Discovery Approaches in the Integrated MANETInternet Scenario
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self-configurability, flexibility and independence on any existing network infrastructure. But most of the research in the field of ad hoc network is limited to stand-alone isolated networks. The demand for any time anywhere connectivity has increased rapidly with the tremendous growth of the Internet in the past decade and due to the huge influx of highly portable devices such as laptops, PDAs etc. In order to facilitate the users with the huge pool of resources and the global services available from the Internet and for widening the coverage area of the MANET there is a growing need to integrate these ad hoc networks to the Internet. For this purpose we need gateways which act as bridges between these two different protocol architectures. The gateway discovery in hybrid network is considered as a critical and challenging task and with decreasing pause time and greater number of sources it becomes even more complex. Due to the scarcity of network resources in MANET, the efficient discovery of the gateway becomes is a key issue in the design and development of future hybrid networks. In this paper the AODV reactive routing protocol is extended to support the communication between the MANET and the Internet. We have carried out a systematic simulation based performance evaluation of the different gateway discovery approaches using NS2 under different network scenarios. The performance differentials are analyzed on the basis of three metrics - packet delivery fraction, average end-to-end delay and normalized routing load.
Authors and Affiliations
Koushik Majumder , Dr. Sudhabindu Ray , Prof. Subir Kumar Sarkar
Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then paste...
Comparative Study a Performance and Capability Scheduling Techniques in Grid Computing
This paper shows the comparative study about existing scheduling technique in grid computing. This paper also shows the performance and capability for each scheduling technique. Four existing scheduling technique are App...
An Algorithm for Finding Frequent Itemset based on Lattice Approach for Lower Cardinality Dense and Sparse Dataset
Whenever mining association rules work for large data sets frequently itemset always play an important role and enhance the performance. Apriori algorithm is widely used for mining association rule which uses frequent it...
Detection of Rice Leaf Diseases Using Chaos and Fractal Dimension in Image Processing
A novel method for detecting rice leaf disease using image processing technique called fractal dimension and chaos theory is proposed in this paper. The analysis of a diseased leaf is carried out according to its image p...
Colorectal Cancer MRI Image Segmentation Using Image Processing Techniques
Colorectal cancer is the third most commonly diagnosed cancer and the second leading cause of cancer death in men and women. Magnetic resonance imaging (MRI) established itself as the primary method for detection and sta...