Nodes distribution and selection of accurate mobility Framework to systematically analyze its impact for improving performance of routing protocols for mobile ad hoc networks through Simulations
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 8
Abstract
Research on mobile ad hoc routing protocols performance based on simulation relies on choice of realistic mobility model. However, in the absence of realistic data movement, Synthetic models may be used for generating movement pattern. In order to capture the behavior of individuals moving in groups and between groups, there is a need for defining models for clearly representing group mobility based on the dimension of the relationships among the people carrying the mobile devices in mobile ad hoc networking scenarios. Sociability and attractivity between each group of hosts are the two main issues which may govern the pattern of movement of mobile hosts. Different mobility models have been proposed by researchers in the recent past for describing the movement pattern of mobile users, showing variation in their location, velocity and acceleration over time but most of them lack realistic behavior .As mobile ad hoc networks are not currently deployed on a very large scale and research in this area is mostly simulation based focusing on Mobility pattern constituting an important parameter in analyzing the performance of Mobile ad hoc routing protocols. Hence, it becomes necessary to study the behavior of mobility models and their impact on MANET routing protocols. In this paper we surveyed and examined different categories of mobility models proposed in the recent research literature and attempted to provide an overview of current research status of mobility modeling along with design principles for a perfect mobility model.
Authors and Affiliations
Sonika Kandari , Dr. M. K. Pandey
Design And Implementation of Reconfigurable Rijndael Encryption Algorithms For Reconfigurable Mobile Terminals
In any wireless communication security is crucial during data transmission. The encryption and decryption of data is the ajor role in the wireless communication for security of the data. ncryption algorithms are used t...
Analysis of Dependencies of Checkpoint Cost and Checkpoint Interval of Fault Tolerant MPI Applications
In this paper, we have analysed i) the relationship between the checkpoint cost and the optimal checkpoint interval and ii) the relationship between the checkpoint cost and the number of processors (processes) and we hav...
Optimizing Live Digital Evidence Mining Using Structural Subroutines of Apriori Algorithm
The Scope and Complexity of the Internet has grown exponentially. This growth has made digital forensic investigation a very challenging task. Even the modest intra-organizational networks have sufficient network traffic...
Gradual Evolution of Sequential Sequence Mining for Customer relation database
The sequential sequence mining takes time interval between various transactions. Here we have discussed various techniques for finding large sequence from the historical database. Based on various methods the sequence wi...
Impulse denoising using Hybrid Algorithm
Many real time images facing a problem of salt and pepper noise contaminated,due to poor illumination and environmental factors. Many filters and algorithms are used to remove salt and pepper noise from the image, but it...