Performance analysis of an Adaptive Relay Selection protocol for energy constrained networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Relay selection is crucial in improving the performance of wireless cooperative networks. Most of current works related to relay selection algorithms in cooperative communications use the Channel State Information (CSI) to decide whether to use one or another neighbor as a relay. Motivated by the benefits of cooperative relaying we explored an idea of adaptive relay selection scheme which selects the relay based on CSI and the energy remaining in the nodes. In this paper, we propose a cooperative multihop routing for the purpose of energy savings i.e.,if a node is centrally located and has that dispose of the best channels to its neighbors in a given network, it will be continuously sought to relay its neighbor’s packets, in addition to its own traffic. Consequently the battery of this node will be quickly empty and the network can be divided into two disjointed parts. System outage probability, energy at nodes and average bit error rate (BER) are analyzed.
Authors and Affiliations
Mrs Swapna. T ,Dr. Kosaraju. Sivani ,Prof. K. Kishan Rao
High Speed Implementation Of Fused Floating Point Add-Subtract Unit
Most universally useful processors (GPP) and application particular processors (ASP) utilize the coasting guide number-crunching due toward its wide and exact number framework. In any case, the coasting point operatio...
Performance evaluation of different Segmentation techniques for Underwater and Arial images
The quality of underwater images is directly affected by water medium, atmosphere medium, pressure and Temperature. Arial images are affected by space temperature and solar noise. The segmentation is the most challen...
Preventing Information Lose and Membership Disclosure on Highdimensional Data
The existing methods generalization and bucketization could not give a satisfactory result for privacy preserving on microdata. It results loss of information and some does not prevent the membership disclosure. In t...
Novel Approach To Cell-Counting-Based Attack Against Tor
Different low-latency unidentified communication systems such as Tor and Anonymizer have been deliberate to make available anonymity service for users. In order to hide from view the communication of users, most of t...
Implementation of Trust Aware Routing Framework With Link Failure Consideration and Recovery
Wireless Sensor Network has now huge scope for research and application development but sensor networks are vulnerable to different attack. Hence security is key issue while using Sensor networks. Identity deceptions...