Maximizing Network Capacity in MANETs through Cooperative Communications
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1
Abstract
Mobile Ad Hoc Networks are for many practical scenarios in the real world as it does not need any pre-established infrastructure. Nodes in the MANET are resource constrained. Communications over network consume energy resources of the network gradually. Therefore it is essential to have mechanisms that consume fewer resources over network. Cooperative communication is the strategy that can improve the life of MANET as it can save resources of the network. Many existing techniques that focused on cooperative communications gave importance to the issues related to link level physical layer. They mostly ignored the problems pertaining to upper layer like topology control, routing and network capacity. To overcome this problem, recently GUAN et al. came up with a scheme that ensures cooperative communications by controlling topology of the network. In this paper we implement that scheme practically using a prototype application that simulates the proof of concept. The empirical results revealed that in upper layer topology control can improve network capacity of MANET.
Authors and Affiliations
P. Phani Kumar , P. Anil Kumar
Risk Management a t Universities Illegal Residents in Hostels & Fire Cases
Every organization/institution is exposed to some kinds of risks that can affect them in many ways. Risks like fire, theft, damage of assets, illegal intruders etc. can affect them strategically, financially and operatio...
A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN
A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an...
Survey on Clustering Algorithms for Sentence Level Text
Clustering is an extensively studied data mining problem in the text domains. The difficulty finds numerous applications in customer segmentation, classification, collaborative filtering, visualization, document organiza...
Analysis of Email Fraud Detection Using WEKA Tool
Data mining is also being useful to give solutions for invasion finding and auditing. While data mining has several applications in protection, there are also serious privacy fears. Because of email mining, even inexperi...
Secure Similarity Search on Outsourced Metric Data
Cloud computing has become an affordable technology for outsourcing data. This will help individuals and organizations to have plethora benefits such as storage, platform, software and other services. In spite of the adv...