Enhanced Data Sharing over Mobile Ad Hoc Network Based on non-Selfish Exposure
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
A Mobile ad hoc network is a peer-to-peer multihop wireless network. MANETs are key to nomadic computing. Mobile units can set up spontaneous local networks and can remove the need for fixed network infrastructure, either as wireless access points or wired LAN. Each node in a MANET communicates with each other. Some nodes does not cooperate with each other nodes and termed as Selfish nodes. Selfish nodes are handled on the basis of replica allocation. Partial nodes are also handled. The reply from expected node holding a target data item may not reach its destination due to two reasons, disconnections and node selfishness. In a frequent time interval, replica allocation will perform based on the Self Centered Friendship tree of each node in order to avoid selfishness. In this paper we discuss about various detection algorithms including creating and modifying a SCF-tree using Self stabilize replica allocation. Our strategy consists of identification and detection of FRA when network disconnections occur in the network and results in data inaccessibility. A statistics will be displayed to identify the location of where the data will be residing after the reallocation. Data replacing and Malicious nodes which effect the security of the MANET are also discussed which increases data accessibility and decreases communication cost that caused by Query delay. The controller informs all other nodes regarding the failure of a particular node by providing an alarm named as FRA. The proposed system outperforms traditional cooperative replica allocation techniques in terms of data accessibility, communication cost, and average query
Authors and Affiliations
Amrutha b k, Mr. I. Edwin Albert
An effective citation metadata extraction process based on BibPro parser
There is a dramatic increase in academic publications and these publications are integrated to the digital libraries by making use of citation string. Any author can publish the journals conferences with the help...
Security in Body Sensor Networks for Healthcare applications
This paper offers a depth review of numerous Wireless Sensor/detector Systems. Healthcare applications are considered as talented fields for Wireless Sensor Networks, where patients can be watchedusing wireless me...
IPv4 to IPv6 Transition Complaint Mediastreaming UsingARM 11
Abstract: Internet Protocol version 6 (IPv6) is the next version of Internet Protocol (IP) which is currently inthe transition phase from its predecessor, Internet Protocol version 4 (IPv4). With the number of IPv4...
RFID based protection to newborns in the hospitals
Abstract: Many hospitals, these days depend on the Information Technology (IT) to achieve perfection in the health services and operation management. The said dependency is because of the ability of emerging techno...
Effects of Occupational Stress on Work Performance of Police Officers in Nakuru Police Division, Kenya
Abstract: A fully functioning police service is vital for maintenance of peace, provision of security, and enforcement of a country‘s laws. The work performance of police officers in Nakuru and other divisions in Kenya h...