Statistical study of performance metrics of Adaptive Fault Tolerant Replication Routing Protocol for MANET
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 11
Abstract
Ad hoc networks are multi-hop wireless networks having dynamic topology due to node mobility. Routing protocols for such networks should be able to respond rapidly to topological changes. Designing and analyzing routing protocols for handling time-constrained messages in such dynamic environment is very crucial. A number of routing protocols have been proposed that deal with time-constrained messages. But despite some faulty nodes, link failure, route breakage or some other faults, it is required that the messages reach their destination within time. An adaptive fault tolerant replication strategy has already been designed and referred as Adaptive Fault Tolerant Replication (AFTR) routing that handle time-constrained messages. This paper is an extension work to study the performance of such protocol. The performance of any protocol can be analyzed through some metrics under various influential factors. The paper presents performance study of AFTR routing protocol based on three performance metrics packet delivery ratio, routing overhead and throughput under five influential factors: network size, transmission rate, node mobility, pause time and optimal number of copies. A 2kr factorial design strategy is used to quantify the main and interactional effects of various factors on metrics. A two-way interaction is expressed as linear regression equation.
Authors and Affiliations
SWATI SAXENA , Dr. MADHAVI SINHA
AN EXTENDED METHOD FOR ORDER REDUCTION OF LARGE SCALE MULTI VARIABLE SYSTEMS
In this paper, an effective procedure to determine the reduced order model of higher order linear time invariant dynamic multivariable systems is discussed. Numerator and denominator polynomials of reduced order model ar...
Poly Substitution Method for Encryption and Decryption
In this study we explore the features of Genetic Algorithm with poly substitution methods to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography. In PS ci...
Implementation of a Secured system with Roaming Server and Roaming Ports
The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) [5] attacks. This system uses more than one server for providing security. But only...
Adoption and Utilization of Information Communication Technologies among Families in Lagos, Nigeria
Information and Communication Technology devices such as computers, Internet and cell phones are rapidly penetrating into many homes in Nigeria. Social critics have argued whether these devices result in either positive...
A Study on Block Matching Algorithms for Motion Estimation
Block matching motion estimation is the essence of video coding systems. This paper gives a review of the different block matching algorithms used for motion estimation in video compression. It compares 10 different type...