Mobility Prediction: A review of Techniques used in MANETS
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he will move to next future position. The prediction of the mobility of nodes in mobile ad hoc networks becomes a key solution for the delivery of data in real time operations; which enables the reformation of the routes just prior to the modify of the topology which occurs a seamless and wellorganized data delivery that meet the expectations of the real time constraints. The mobility prediction is very significant for equally homogeneous networks and heterogeneous networks, determined by applications in mobility management, smooth handoffs, call admission control, and resource reservation for improved quality of service. One way to address the truth of node mobility is devising proactive solutions that make use of mobility prediction algorithms to estimate the movement of the nodes. At the application level, user mobility prediction in combination with user’s profile may provide the user with enhanced location-based wireless services, such as route guidance, local traffic information and on-line advertising. In this paper we present the most significant mobility prediction techniques for MANETs focusing on their major design principles and description.
Authors and Affiliations
Amit Savyanavar, Ram Kale
Design of Trust Model For Efficient Cyber Attack Detection on Fuzzified Large Data using Data Mining techniques
Recently Network Intrusion Detection System (IDS), is being used as the main security defending technique. It is second guard for a network after firewall. Various approaches from data mining to soft computing fields...
A comparison Approach in Image Optimization Techniques
The capturing of multiple low-resolution images taken of the same scene results in a distortion between each image. Image registration is the process of determining this distortion. In this paper, we examine the hypo...
Performance Analysis of Different Space Time Block Codes in MIMO Systems
The main limitations of wireless transmission are fading and associated reduction in bit error rate. To mitigate these effects several techniques are employed. It is well known that the performance of the wireless com...
Integrated Data Mining Approach for Security Alert System
The need for automatic detection of deceptive Emails is increasing due to the rapid usage of Email communication in the Internet world. The proposed “Security Alert System” provides a way to identify the future terro...
A Hybrid Routing Protocol for Unobservable Security in Mobile Ad-hoc Networks
Security of mobile ad hoc network is crucial due to infra structure less network and mobility of wireless media. In this paper, we propose an Hybrid Routing Protocol for Unobservable Secured (HRPUS) to offer privacy...