Mobile Wireless Enhanced Routing Protocol in Adhoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
Adhoc network consists of peer-to-peer communicating nodes that are highly mobile. As such, an ad-hoc network lacks nfrastructure and the topology of the network changes ynamically. The task of routing data from a source to a estination in such a network is challenging. Both proactive and reactive routing protocols prove to be inefficient under these circumstances. Most of the ad-hoc protocols support presence of the bidirectional links but in reality the Adhoc network may consists of heterogeneous nodes with different transmission ranges. Thus, unidirectional links are formed. In this paper we consider a routing protocol called the Enhanced Zone Routing Protocol (ZRP) combines the advantages of the proactive (table driven) and reactive (demand driven) approaches to provide scalable routing and to create bidirectional links in the Adhoc networks. It is also proposed that, the stable routes and a query enhancement mechanism in enhanced Zone Routing Protocol to maximize the throughput and for effective utilization of bandwidth.
Authors and Affiliations
A. Sreelatha , Dr. A. VinayaBabu , K. Madhukar , S. Nagaprasad , D. Marlene Grace Verghese , V. Mallaiah , A. Pratima
Ideal Strategy to Improve Datawarehouse Performance
Data warehouse is set up for the benefits of business analysts and executives across all functional areas. The primary goal of data warehouse is to free the information locked up in the operational database so that decis...
PERFORMANCE ANALYSIS OF ADHOC ROUTING PROTOCOLS USING RANDOM WAYPOINT MOBILITY MODEL IN WIRELESS SENSOR NETWORKS
This paper investigates and undertakes simulation based study of adhoc routing protocols in wireless sensor networks. In this paper we have compared the performance of two routing protocol AODV and DSR by using random wa...
Iris Recognition Based On Its Texture Patterns
A biometric system uniquely identifies and authenticates humans based on their physical or behavioural features. Iris recognition is one of the most reliable methods of biometric authentication that recognizes a person b...
AGE CLASSIFICATION BASED ON SIMPLE LBP TRANSITIONS
The research related to age estimation using face images has become increasingly important, due to the fact that it has a variety of potentially useful applications. An age estimation system is generally composed of agin...
A BICS Design to Detect Soft Error in CMOS SRAM
. This paper presents a Built In Current Sensor (BICS) design to detect oft error under both standby and operating condition in omplementary Metal Oxide Semiconductor (CMOS) Static Random Access Memory (SRAM). BICS con...