Updating the Routing Position in Adhoc Networks by using Adaptive Position
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 3
Abstract
In geographic routing, nodes to theirinstantaneous neighbors call for to maintain up-to-date positions for making successfulforwarding decisions. The geographic location coordinates of the nodes by the periodic broadcasting of beacon packetsis atrendy method used by the majority geographic routing protocols to preserve neighbor positions. We contend and display that periodicbeaconing apart from of the node mobility and traffic patterns in the network is not nice-looking from both update cost and routingrecital points of view. We recommend the Adaptive Position Update (APU) strategy for geographic routing, which enthusiasticallyadjusts the occurrence of position updates based on the mobility dynamics of the nodes and the forwarding patterns in the system. APUis based on two easy principles: 1) nodes whose arrangements are harder to guess update their positions more recurrently (and viceversa), and (ii) nodes faster to forwarding paths update their positions more recurrently (and vice versa). Our speculative analysis, whichis validated by NS2 simulations of a well-known geographic routing procedure, Greedy Perimeter Stateless Routing Protocol (GPSR),shows that APU can drastically reduce the update cost and pick up the routing performance in terms of packet delivery ratio andregular end-to-end delay in assessment with periodic beaconing and other recently proposed updating schemes. The benefits of APUare additional confirmed by responsibility evaluations in realistic network scenarios, which account for localization error, practical radiopropagation, and sparse system.
Authors and Affiliations
Ravi Kumar Poluru , T. Sunil Kumar Reddy , D. Nagaraju
Efficient Fault-Tolerant Strategy Selection Algorithm in Cloud Computing
Cloud computing is upcoming a mainstream feature of information technology. More progressively enterprises deploy their software systems in the cloud environment. The applications in cloud are usually large scale and con...
Robust Watermarking Framework with DCT Based Encryption
Since several years,, the protection of multimedia data is becoming extremely important. The protection of the multimedia data might be performed with encryption or data hiding algorithms. To address the transmission tim...
Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy
During the last two decades Information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of Social networking websites...
An Approach for Load Balancing Among Multi-Agents to Protect Cloud Against DDos Attack
Cloud Computing is widely used technology in present era. Cloud Computing is mainly used for on demand services over the distributed servers. So it is necessary to manage the working load of participating servers for uni...
Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and...