Performance Analysis of RENUM and ENUM in Lossy and Lossless Mobile Ad-hoc Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 7
Abstract
In lossy Mobile Ad-hoc Networks (MANETs) the data rate of a given flow becomes lower and lower along its routing path. One of the main challenges in lossy Mobile Ad-hoc Networks is how to achieve the conflicting goal of increased network utility and reduced power consumption, while without following the instantaneous state of a fading channel. To address this problem, two effective techniques are taken by literature survey namely Effective Network Utility Maximization (ENUM) and a cross-layer Rate-Effective Network Utility Maximization (RENUM). In this paper the performance analysis of ENUM and RENUM are analyzed based on four parameters namely Average Delay, Average Throughput, Energy Spent and Packet Delivery Ratio (PDR) with different data rates (0.3, 0.4 and 0.5). Simulations are performed by Network Simulator (NS-2); results are analyzed for both ENUM and RENUM in lossy and lossless Mobile Ad-hoc networks. Results demonstrate that in both the cases (Lossy and Lossless) RENUM produces better results compared to ENUM in terms of Average Throughput, PDR, Average Delay, and Energy Spent.
Authors and Affiliations
R. Chandrasekhar, P. Sandhya Rani
Hop and Route
In this paper, The PEFT (Penalize Exponential Flow Splitting) achieves optimal traffic engineering with compare to other protocols like OSPF, DEFT. While DEFT is also new link state routing protocol provably achieves op...
Comparison of MCS and GA in Term of Iteration and Time Constraint
In radio communication industry Frequency assignment [13] is main problem. In the communication there are transmitter and receiver that transmit data between sources to destination. For this we use a radio network that...
Effective Relevance Feedback for Content Based Image Retrieval Using Mining Navigation Pattern and SEO Tools
with a rapid increase of images that are available in social blog and media, image annotation has evolved as an important thing due to its application in image toning and retrieval. Most studies cast image annotation in...
Authentication Anonymous Secure On Demand Routing Protocol Using Vanets
When an oversized variety of beacons arrive in a very short time, vehicles are at risk of computation-based Denial of Service attacks that excessive signature verification exhausts their procedure resources. We tend to...
PSO Algorithm based Loss Minimization Approach for Optimal Placement and Sizing of Renewable Energy Source
In this research paper, PSO is joint with Newton Raphson method of power flow to optimize optimal location along with size of renewable energy source. A NR method is used to measure the losses and find the voltage at ea...