File Sharing System between P2P

Size: px
Start display at page:

Download "File Sharing System between P2P"

Transcription

1 Impact Factor Value: ISSN: International Journal of Computer Engineering In Research Trends Volume 4, Issue 8, August-2017, pp File Sharing System between P2P 1 Ashayyagari Geyasri, 2 Dr. S. Govinda Rao 1,2 Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and Technology Hyderabad, India geyasrigoud@gmail.com, govind.griet@gmail.com Abstract: - In this paper, making a framework which will share the record from one hub to another hub with high recurrence. Record sharing applications in portable impromptu systems (MANETs) have pulled in more consideration lately. The effectiveness of document questioning experiences the properties of systems including hub portability and restricted correspondence range and asset. An instinctive technique to reduce this issue is to make document reproductions in the system, however, despite the endeavors on record replication, no exploration has concentrated on the worldwide ideal copy creation with least normal questioning deferral. To begin with, do not have a run to designate limited assets to various documents to limit the normal questioning postponement. Second, they consider capacity as available assets for copies, however, disregard the way that the record holders' recurrence of meeting different hubs likewise assumes a critical part in deciding document accessibility. Hypothetically examine the impact of asset assignment on the regular questioning postponement and infer an asset allotment administer to limit the normal questioning deferral. In this paper present another idea of an asset for record replication, which considers both hubs are stockpiling and meeting recurrence. In this paper additionally, propose an appropriated record replication convention to understand the proposed run the show. Broad follow driven examinations with blended follows and genuine follows demonstrate that our convention can accomplish shorter normal questioning postponement at a lower cost than current replication agreements. Keywords MANETs, querying delay, sparsely distributed MANETs Introduction In this paper, we present another idea of an asset for document replication, which considers both hubs are stockpiling and hub meeting capacity. We hypothetically ponder the impact of property designation on the regular questioning postponement and determine an ideal record replication manager (OFRR) that distributes assets to each document given its prominence and size. We at that point propose a record replication convention in light of the control, which approximates the base worldwide questioning postponement in a completely circulated way we propose a conveyed document replication convention that can roughly understand the ideal record replication administer with the two portability models in a disseminated way. What is MANET? The term MANET (Mobile Ad hoc Network) alludes to a multi hop parcel based remote system made out of an arrangement of versatile hubs that can impact and move in the meantime, without utilizing any settled wired foundation. MANET is self-sorting out, and versatile systems that can be framed and twisted on-the fly without the need of any incorporated organization. Something else, a remain for "Portable Ad Hoc Network" A MANET is a kind of specially appointed system that can change areas and design itself on the fly. Since 2017, IJCERT All Rights Reserved Page 325

2 MANETS are versatile, they utilize remote associations with an interface with different regimes. This can be a standard Wi-Fi association, or another medium, for example, a cell or satellite transmission. Dynamic Connectivity based Grouping (DCG). In SAF, every node duplicates it is as often as possible questioned files until it is accessible storage is spent. SAF may prompt many copy replicas among neighboring nodes when they have the same intrigued files. DAFN disposes of copy replicas among neighbors. DCG further reduces duplicate replicas in a group of nodes with frequent connections. It sums the access frequencies of all nodes in a group and creates replicas for files in the descending order. Though DAFN and DCG enable replicas to be shared among neighbors, neighboring nodes may separate from each other due to node mobility. File Sharing in Disconnected MANETs/DTNs: How MANET works? The reason for the MANET working gathering is to institutionalize IP steering convention usefulness appropriate for remote directing application inside both static and dynamic topologies with expanded elements because of hub movement and different variables. Methodologies are proposed to be lightweight in nature, reasonable for various equipment and remote conditions, and address situations where MANETs are conveyed at the edges of an IP framework. Half breed work frameworks (e.g., a blend of settled and versatile switches) ought to likewise be bolstered by MANET particulars and administration highlights. Utilizing full grown segments from past work on test receptive and proactive conventions, the WG will create two Standards track steering convention details: Reactive MANET Protocol(RMP) Proactive MANET Protocol(PMP) 2. Related wok: File Sharing in Normal MANETs: The topic of file replication for efficient file sharing applications in MANETs has been studied recently. In [10] [12], individual or a group of nodes decide the list of files to replicate according to file visiting frequency. Hara [10] proposed three file replication protocols: Static Access Frequency (SAF), Dynamic Access Frequency and Neighborhood (DAFN) and Huang et al. [13] discussed how to cache files in servers to realize the optimal file availability to mobile users in Wi-Fi-based wireless networks based on node mobility pattern, AP topology, and file popularity. However, the file servers in this paper are fixed nodes connecting to APs, while we consider a more general P2P scenario, in which all mobile nodes are both file servers and clients. Pitkanen and Ott [17] proposed the DTN storage module to leverage the DTN store-carry-andforward paradigm and make DTN nodes keep a copy of a message for a longer period required by forwarding. 3. Implementation: Optimal File Replication with the RWP Model: In the RWP show, we can accept that the intermeeting time among hubs takes after exponential dispersion. At that point, the likelihood of meeting a hub is autonomous with the past experienced hub. Subsequently, we characterize the meeting capacity of a hub as the usual number of hubs it meets in a unit time and utilizes it to explore the ideal document replication. In particular, if a hub can meet more hubs, it has a higher likelihood of being experienced by different hubs later. A hub's probability of being experienced by various hubs is corresponding to the meeting capacity of the hub. This shows records living in hubs with higher meeting capacity have higher accessibility than documents in hubs with bringing down meeting capacity. So we consider both 2017, IJCERT All Rights Reserved Page 326

3 meeting capability and ability in measuring a hub's asset. At the point when a copy is made on a hub, it involves the memory on the hub. Additionally, its likelihood of being met by others is chosen by the hub's meeting capacity. This implies the imitation normally devours both the capacity asset and the meeting capacity asset of the hub. Community-Based Mobility Model: In this module, we direct the investigation under the group based versatility show. We consider every hub's fantastic capacity. It is characterized by a hub's capacity to fulfill inquiries in the framework and is ascertained in light of the hub's ability to fulfill questions in every group. In this model, since hubs' record advantages are stable amid a specific era, we expect that every hub's document questioning example (i.e., questioning rates for various records) stays stable in the considered timeframe. At that point, the quantity of hubs in a group speaks to the quantity of issues for a given document created in this group. Therefore, a record holder has low capacity to fulfill inquiries from a little group. Along these lines, we incorporate every team's portion of hubs into the computation of the fantastic capacity. Meeting Ability Distribution: We gauged the meeting capacity appropriation from genuine follows to affirm the need to consider hub meeting capacity as a vital factor in the asset distribution in our plan. For each follow, we quantified the meeting abilities of all hubs and positioned them in diminishing request. We see that in all follow; hub meeting capacity is appropriated in a wide range. This matches with our past claim that hubs, as a rule, have distinctive meeting capabilities. Likewise, it checks the need of considering hub meeting capacity as an asset in record replication since if all hubs have similar meeting capacity, limitations on various hubs have the comparative likelihood to meet requesters, and thus there is no compelling reason to consider meeting capacity in asset portion. The design of the File Replication Protocol: We propose the need rivalry and split file replication convention (PCS). We initially present how a hub recovers the parameters required in PCS and after that present the detail of PCS. In PCS, every hub powerfully refreshes its meeting capacity and the regular meeting capacity of all hubs in the framework. Such data is traded among neighbor hubs. We present the procedure of the replication of a record in PCS. Given OFRR, since a document with a higher P ought to get more assets, a hub ought to allocate higher need to its records with higher P to content asset with different hubs. Along these lines, every hub arranges the greater part of its documents in diving request of their Ps and makes reproductions for the scraps in a best down way occasionally. The record replication stops when the communication session of the two included hubs closes. At that point, every hub proceeds with the replication procedure for its documents after barring the detached hub from the neighbor hub list. Since document ubiquity, Ps, and available framework assets change over the long haul, every hub occasionally executes PCS to deal with these time-shifting components powerfully. Every hub likewise intermittently ascertains the notoriety of its records (qj) to mirror the progressions on document ubiquity (because of hub questioning example and rate changes) in various eras. The periodical document prevalence refresh can consequently deal with record dynamism 4. Experimental Results: Techniques: Optimal File Replication with the Community Based Mobility Model: In this section, we analyze the community-based mobility model. Unless otherwise specified, we use the same notations in Table (which is for the RWP model) but add 0 to each notation to denote that it is for the community-based mobility model. Recall that in the RWP model, we can assume that the inter-meeting time of nodes follows an exponential distribution. Based on this assumption, we can calculate the probability that a newly met node is node i (i.e., mi), which is used to find the expected time T to satisfy a request and finally deduce OFRR to minimize T. However, under the community-based mobility model, this assumption does not hold. This makes it difficult to calculate mi, which makes the process of minimizing the overall delay T0 a formidable problem. To manage this issue, as opposed to considering meeting capacity, we 2017, IJCERT All Rights Reserved Page 327

4 believe every node s satisfying capacity. It is defined as a node's capacity to fulfill questions in the system (signified by V 0 I) and is figured given the node's ability to fulfill queries in each group. 5. Results: First, we are going to create 4 nodes. You can see each node with a unique name. Also with distance value and port numbers. Each node also displays the neighbor nodes details. Now first we are going to upload a file in one node. Based on OFFR rule the file is being uploaded replica node. Here replica node is assigned as node N4454 based on meeting frequency. Now after the file is uploaded you can see the file name, file size and replica node details too. Now we will query the file from another node. Now here we can see the query status is a failure it is updated in all nodes. We have shown using our system; file is available in all neighbors nodes. Algorithm: Pseudo-code of PCS between node i and k. i.createreplicason(k) //node i tries to create a replica on node k k.createreplicason(i) //node k tries to create a replica on node i Procedure createreplicason (node) ncount 0 //initialize a count this.orderfilesbyp() //order files by priority value For (each file f in current node) //try to replica each file If (node.compete4file (f) == true) //competition node. createareplica4 (f) //create a replica if win else ncount ncount+1 If ncount K //try at most K times Break end Procedure Procedure compete4file () //Compete for file j While (nremainningmem < j.size()) nsum ntotal nrandom ffile 0 //initilization For (each file f (including j) in current node) ntotal ntotal+1/pf nrandom generatearandomnumber () % ntotal For (each file f (including j) in current node) nsum nsum+1/pf If (nsum >= nrandom) File = f Break //pick the file If (ffile = j) //j is the picked file, competition fails return false Else //win the competition Select ffile delselectedfiles () //delete the selected files return true end Procedure. 6. Conclusion: In this paper, we researched the issue of how to allow restricted assets for record replication with the end goal of ideal worldwide document seeking productivity in MANETs. Dissimilar to past conventions that lone consider stockpiling as assets, we additionally consider record holder's capacity to meet hubs as available assets since it likewise influences the accessibility of documents on the hub. We first hypothetically broke down the impact of copy dissemination on the usual questioning deferral under obliged available assets with two portability models, and afterward inferred an ideal replication decide that can dispense assets to record reproductions with the insignificant normal questioning postponement. At last, we outlined the need rivalry and split replication convention (PCS) that understands the ideal replication govern in a completely conveyed way. Broad trials on both GENI testbed, NS-2, and occasion driven test system with genuine follows and orchestrated portability affirm both the rightness of our theoretical investigation and the viability of PCS in MANETs. In this examination, we concentrate on a static arrangement of records in the system. In our future work, we will hypothetically examine a more mind-boggling condition including document progression (record expansion and erasure, record time out) and dynamic hub questioning example. References: [1] Qik, [2] Flixwagon, [3] C. Palazzi and A. Bujari, A Delay/Disruption Tolerant Solution for Mobile to Mobile File Sharing, Proc. IFIP/IEEE Wireless Days, , IJCERT All Rights Reserved Page 328

5 [4] Y. Tseng, S. Ni, and E. Shih, Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network, Proc. 21st Int l Conf. Distributed Computing Systems (ICDCS), pp , [5] B. Chiara et al., HiBOp: A History Based Routing Protocol for Opportunistic Networks, Proc. IEEE Int l Symp. World of Wireless, Mobile and Multimedia Networks (WoWMoM), [6] A. Lindgren, A. Doria, and O. Schelen, Probabilistic Routing in Intermittently Connected Networks, ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp , [7] F. Li and J. Wu, MOPS: Providing Content-Based Service in Disruption-Tolerant Networks, Proc. IEEE 29th Int l Conf. Distributed Computing Systems (ICDCS), [8] S. Moussaoui, M. Guerroumi, and N. Badache, Data Replication in Mobile Ad Hoc Networks, Proc. Second Int l Conf. Mobile Ad-hoc and Sensor Networks (MSN), pp , [9] L. Yin and G. Cao, Supporting Cooperative Caching in Ad Hoc Networks, IEEE Trans. Mobile Computing, vol. 5, no. 1, pp , Jan [10] C.V.Anchugam,Dr.K.Thangadurai, Link quality based Ant based Routing Algorithm (LARA) in MANETs, International Journal of Computer Engineering In Research Trends.,vol.4,no.1,pp.52-60,2017. [14] Jalagam Nagamani,K.Sumalatha, EAACK: Secure IDS for Wireless Sensor Networks, International Journal of Computer Engineering In Research Trends.,vol.1,no.6,pp ,2014. [15] Komal Patil, Geeta Mahajan, Disha Patil, Chitra Mahajan, Implementation of Motion Model Using Vanet, International Journal of Computer Engineering In Research Trends.,vol.3,no.4,pp ,2016. [11] Nilima N. Patil, Kuldeep K. Vartha, Ashwini W. Wankhade, Sagar A. Patil, Secure Routing for MANET in Adversarial Environment, International Journal of Computer Engineering In Research Trends.,vol.3,no.4,pp ,2016. [12] Priya Manwani, Deepty Dubey, Hybrid Protocol for Security Peril Black Hole Attack in MANET, International Journal of Computer Engineering In Research Trends.,vol.3,no.3,pp ,2016. [13] N.Asha Jyothi, G.Ramya, G.Mounika, R.Sandeep Kumar, Enhance the QoS capability of Hybrid Networks using QoS-Oriented Distributed Routing Protocol, International Journal of Computer Engineering In Research Trends.,vol.1,no.4,pp , , IJCERT All Rights Reserved Page 329

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK 1 MARATI ESHWARI, 2 P.SRINIVAS 1 M. Tech Student, Department of IT, Joginpally B R Engineering College, Village Yenkapally,

More information

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING ASRAF 1*, K A LAXMI PRASAD 2* ABSTRACT: 1. MTech-Student, Dept of CSE. 2. Asst.Prof, Dept

More information

WITH the increasing popularity of mobile devices, e.g.,

WITH the increasing popularity of mobile devices, e.g., IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 4, APRIL 2015 1029 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Kang Chen, Student Member,

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 10 (October 2013), PP. 56-60 A Co-Operative Cluster Based Data Replication Technique

More information

International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): (2015)

International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): (2015) e t International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): 155-162(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Minimizing Routing Overhead through Availability

More information

Enhanced Distributed File Replication Protocol for Efficient File Sharing in Wireless Mobile Ad-Hoc Networks.

Enhanced Distributed File Replication Protocol for Efficient File Sharing in Wireless Mobile Ad-Hoc Networks. Enhanced Distributed File Replication Protocol for Efficient File Sharing in Wireless Mobile Ad-Hoc Networks. Patil Ajinkya K. B.E.Computer BVCOERI,Nashik patil.ak93@gmail.com Gaikwad Rutuja K. B.E.Computer

More information

OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM Chauhan Ajitkumar 1, Asst. Prof. Jignesh V. Patel 2 1PG Scholar, EC Dept., SPCE, Visnagar, Gujarat, India. 2Assistant

More information

Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks

Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks Clemson University TigerPrints All Dissertations Dissertations 8-2014 Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks Kang Chen Clemson University, kangc@g.clemson.edu

More information

EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION

EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION Mrs. Sri Devi.S 1, S.Narasimman 2, R.Ashwinmuthiya 3, C.GopalaKrishnana 4, H.Prabhakaran 5 1 Assistant professor, Department

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

Security User Data in Local Connectivity Using Multicast Key Agreement

Security User Data in Local Connectivity Using Multicast Key Agreement Security User Data in Local Connectivity Using Multicast Key Agreement Shahela A. Khan Dept. Of Computer Science And Engg. ACE Nagthana Shahelakhan27@yahoo.in Prof. Dhananjay M. Sable Dept. Of Computer

More information

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final

More information

Reducing Routing Overhead in Mobile Ad Hoc Networks Using Cluster Scheme

Reducing Routing Overhead in Mobile Ad Hoc Networks Using Cluster Scheme e-issn 2455 1392 Volume 2 Issue 2, February 2016 pp. 1-7 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Reducing Routing Overhead in Mobile Ad Hoc Networks Using Cluster Scheme Paranjape

More information

Sorted out POR Protocol for MANETS with Destination Driven Strategies

Sorted out POR Protocol for MANETS with Destination Driven Strategies International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 1-7 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Sorted

More information

File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency

File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency Sundeep Uppaleti 1, INB.Jyotsna 2, Swathi Voddi 3 1 M.Tech (cse), Dhanekula Institute of

More information

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS 1 V.Narayanarao, M.tech student, Aitam college, Tekkali, India 2 Promod kumar sahu, Associate professor, Aitam college, Tekkali, India 1 narayanarao.mtech@gmail.com

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

Tracing down Black hole attack in MANETS

Tracing down Black hole attack in MANETS IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 5, Ver. III (Sep.- Oct. 2017), PP 06-10 www.iosrjournals.org Dr. G. Krishna Kishore 1, K. Jahnavi 2,

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

OPTIMAL ONLINE SCHEDULING WITH ARBITRARY HARD DEADLINES IN MULTIHOP COMMUNICATION NETWORKS

OPTIMAL ONLINE SCHEDULING WITH ARBITRARY HARD DEADLINES IN MULTIHOP COMMUNICATION NETWORKS OPTIMAL ONLINE SCHEDULING WITH ARBITRARY HARD DEADLINES IN MULTIHOP COMMUNICATION NETWORKS S.Darwin Department of computer science and engineering SRM University, Chennai. darpart19@gmail.com D.G.Ilayaraja

More information

Based on Distance Comparison Shortest Path Algorithm

Based on Distance Comparison Shortest Path Algorithm Volume 118 No. 20 2018, 853-860 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Based on Distance Comparison Shortest Path Algorithm 1 Y. NavyaSri, 2 K. Meghana, 3 D. Nageswari and

More information

Group Key Agreement with Local Connectivity using multicast key Management

Group Key Agreement with Local Connectivity using multicast key Management Group Key Agreement with Local Connectivity using multicast key Management Abstract Sharyu Awachat & Jayant Adhikari Email id:-vaishanaviawachat@gmail.com Email id:-adhikari.jayant@gmail.com Department

More information

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Priyadharshini.A #1 and Uvaraj Arutkumaran.S, *2 # ME, Information Technology, Sri Venkateswara

More information

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs Computer Networks Vol x, Issue y 1 Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs P. Yang, Member, IEEE M. Chuah 1, Senior Member, IEEE Abstract Mobile nodes in some challenging

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Efficient Data Transfer from Source to Receiver s using Ipath Router

Efficient Data Transfer from Source to Receiver s using Ipath Router Efficient Data Transfer from Source to Receiver s using Ipath Router Ch.Shekhar 1, J.Sireesha 2 M. Tech, Dept. of CSE, Mallareddy Engineering College (Autonomous) Hyderabad, Telangana, India 1 Associate

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

Sangeeta Anjana, Bharati S.Pochal Department of Studies in Computer Applications (MCA), VTU Centre for Post-Graduation Studies Kalaburagi,

Sangeeta Anjana, Bharati S.Pochal Department of Studies in Computer Applications (MCA), VTU Centre for Post-Graduation Studies Kalaburagi, International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 6 ISSN : 2456-3307 The Intrusion Detection Mechanism Based on a Self-Adaptive

More information

Query Result Extraction Using Dynamic Query Forms

Query Result Extraction Using Dynamic Query Forms Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering

More information

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

A Review of Cooperative Cache Management in MANETs

A Review of Cooperative Cache Management in MANETs A Review of Cooperative Cache Management in MANETs Prashant Kumar prashantkumar32@gmail.com Techniques Naveen Chauhan naveen@nitham.ac.in Department of Computer Science and Engineering National Institute

More information

Review Data management issues in mobile ad hoc networks

Review Data management issues in mobile ad hoc networks 27 Proc. Jpn. Acad., Ser. B 93 (217) [Vol. 93, Review Data management issues in mobile ad hoc networks By Takahiro HARA *1, (Communicated by Makoto NAGAO, M.J.A.) Abstract: Research on mobile ad hoc networks

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

CAPACITY ANALYSIS AND CONGESTION CONTROL IN TOLERANT NETWORK

CAPACITY ANALYSIS AND CONGESTION CONTROL IN TOLERANT NETWORK CAPACITY ANALYSIS AND CONGESTION CONTROL IN DELAY TOLERANT NETWORK Harminder Singh Bindra Assistant Professor, Department of IT, MIMIT Malout Bindra.harminder@gmail.com Abstract -In this quick evolving

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Accessing the Location Based Details

Accessing the Location Based Details ISSN:2348-2079 Volume-6 Issue-2 International Journal of Intellectual Advancements and Research in Engineering Computations Accessing the Location Based Details 1 Mr. S. Jagadeesan, M.Sc., M.C.A., M.Phil.,

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

An Efficient Data Routing Protocol for WSN with high Network Capacity and Scalability

An Efficient Data Routing Protocol for WSN with high Network Capacity and Scalability An Efficient Data Routing Protocol for WSN with high Network Capacity and Scalability Radhika BG 1, Shalini S 2 P.G. Student, Department of Computer Science, AMC College of Engineering, Karnataka, India

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Data Gathering for Wireless Sensor Network using PEGASIS Protocol Data Gathering for Wireless Sensor Network using PEGASIS Protocol Kumari Kalpna a, Kanu Gopal b, Navtej katoch c a Deptt. of ECE, College of Engg.& Mgmt.,Kapurthala, b Deptt. of CSE, College of Engg.&

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

A Fuzzy Optimized, Bee inspired Routing Protocol for Improved QoS in Mobile Ad Hoc Networks

A Fuzzy Optimized, Bee inspired Routing Protocol for Improved QoS in Mobile Ad Hoc Networks , pp.169-174 http://dx.doi.org/10.14257/astl.2016.135.41 A Fuzzy Optimized, Bee inspired Routing Protocol for Improved QoS in Mobile Ad Hoc Networks Anush Baskaran, Sushant Ramesh, Ronnie D. Caytiles*

More information

ERHR-EFFICIENT AND RELIABLE HETEROGENEOUS ROUTING PROTOCOL FOR SENSOR NETWORKS

ERHR-EFFICIENT AND RELIABLE HETEROGENEOUS ROUTING PROTOCOL FOR SENSOR NETWORKS ERHR-EFFICIENT AND RELIABLE HETEROGENEOUS ROUTING PROTOCOL FOR SENSOR NETWORKS 1 THOTA SIVA RATNA SAI, 2 DR. SRIKANTHVEMURI 1 M.Tech Student, Department of Computer Science and Engineering, KL University,

More information

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short

More information

A METHOD TO DETECT PACKET DROP ATTACK IN MANET

A METHOD TO DETECT PACKET DROP ATTACK IN MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained

More information

Data Replication for Improving Data Accessibility in Ad Hoc Networks

Data Replication for Improving Data Accessibility in Ad Hoc Networks Missouri University of Science and Technology Scholars' Mine Computer Science Faculty Research & Creative Works Computer Science 1-1-2006 Data Replication for Improving Data Accessibility in Ad Hoc Networks

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-8,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-8, A NOVEL HOP-BY-HOP ROUTING SYSTEM FOR GREEN INTERNET Dr. Anuradha M S 1, Bhagyashree 2 Prof., P.G. Student Department of Electronics and communication engineering, GNDEC, Karnataka (India) Abstract The

More information

Content Receiving and Planning in Wireless Networks Assessment of Content Distribution

Content Receiving and Planning in Wireless Networks Assessment of Content Distribution Content Receiving and Planning in Wireless Networks Assessment of Content Distribution 1 kare. Venkateswararao, 2 M.NARESH 2 Associate Professor 1 venky537gmail.com, 2 nareshmtech08@gmail.com Abstract-The

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

Buffer Aware Routing in Interplanetary Ad Hoc Network

Buffer Aware Routing in Interplanetary Ad Hoc Network Buffer Aware Routing in Interplanetary Ad Hoc Network Kamal Mistry (Wipro Technologies, Bangalore) Sanjay Srivastava (DA-IICT, Gandhinagar) R. B. Lenin (DA-IICT, Gandhinagar) January 8, 2009 Buffer Aware

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information

Advanced Internet Architectures

Advanced Internet Architectures Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

Social-Based Cooperative Caching in multi-hop wireless networks

Social-Based Cooperative Caching in multi-hop wireless networks Social-Based Cooperative Caching in multi-hop wireless networks 1 Kothagundla Divya, 2 S.Suresh 1,2 D ept. of CSE, Sree Rama Institute of Technology & Science, SKuppenakuntla, Penuballi, K hammam, AP,

More information

Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET

Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET Er. Ravneet Singh Sahota 1, Er. Madan lal 2 1 M.Tech Student, Department of Computer engineering, Punjabi University Patiala,India

More information

MDR Based Cooperative Strategy Adaptation in Wireless Communication

MDR Based Cooperative Strategy Adaptation in Wireless Communication MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among

More information

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1.

Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN. U.Kavitha 1. Detection and Localization of Multiple Spoofing using GADE and IDOL in WSN U.Kavitha 1 1 PG Student, Department of ECE, CK College of Engineering & Technology, Cuddalore, Tamil Nadu, India Abstract Wireless

More information

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network

A Survey on Resource Allocation policies in Mobile ad-hoc Computational Network A Survey on policies in Mobile ad-hoc Computational S. Kamble 1, A. Savyanavar 2 1PG Scholar, Department of Computer Engineering, MIT College of Engineering, Pune, Maharashtra, India 2Associate Professor,

More information

A SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND POCKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS

A SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND POCKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS A SECURE SCHEME FOR DETECTING PROVENANCE FORGERY AND POCKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS KODURU VINOD KUMAR 1, M VENKATESH NAIK 2 1M.Tech Scholar, Crit, Anantapur. 2Assistant Professor, Crit,

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE

COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE Puneet Mittal 1, Paramjeet Singh 2 and Shaveta Rani 3 1 Dept. of Computer Engg. Govt. Poly. College,

More information

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information