Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs

Size: px
Start display at page:

Download "Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs"

Transcription

1 Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Priyadharshini.A #1 and Uvaraj Arutkumaran.S, *2 # ME, Information Technology, Sri Venkateswara college of Engineering,India * Assistant Professor, Information Technology, Sri Venkateswara college of Engineering,India Abstract Current peer-to-peer (P2P) file sharing methods in mobile ad hoc networks (MANETs) can be classified into three groups: flooding-based, local broadcasting based advertisement and contact-based. The first two techniques can simply be high overhead and low scalability. They are mainly developed for associated MANETs, in which end-to-end connectedness among nodes is ensured. The third group of method,the social contact-based method adapt to the opportunistic nature of disconnected MANETs. A P2P content based file sharing system, namely Social network based P2P content file sharing system in disconnected Mobile adhoc Networks (SPOON) is used to derive a node s interests from its files for content-based file searching using interest extraction algorithm. For competent file searching, SPOON gathered common-interest nodes that frequently meet with each other as communities. It takes the benefit of node mobility by designating constant nodes, which have the most frequent contact, with neighborhood members, as community coordinators for searching within the community, and hugely mobile nodes tat visit other communities frequently as community ambassadors for search in other community. The Work proposes Gossiping algorithm based on pull and push mechanism, so that it gives time slot to each individual node to achieve good relation between ambassadors and coordinators and to avoid transmission overhead and also get efficient file sharing. Keywords MANETs, content-based file sharing, Mobility, Coordinator, Ambassador, Community. I. INTRODUCTION In the past few years, personal mobile devices such as laptops, PDAs and smart phones have been more popular. so, the number of smart-phone users increased by 118 million across the world in 2007 [1], and expected to reach around 300 million by 2013 [2]. The rapid growth of mobile users is leading to a promising future, in which they can share files between each other whenever and wherever. The mobile searching users (through smart phones, tablets, etc.) is estimated to reach million in 2013 [3]. Nowadays, mobile users interact with each other and share 18 files via an infrastructure formed by geographically distributed base stations. However, users has find themselves in an area without wireless service (e.g., mountain areas and rural areas). Moreover, They may hope to reduce the cost on the expensive infrastructure network data. A Mobile Ad-hoc Network(MANET) have received significant attention in recent years.it has usually consists of wireless mobile nodes that communicate with each other, in the absence of a stable infrastructure. hence, it is suitable for use in situations where an infrastructure is unavailable or to deploy one is not cost effective. Current applications of MANETs include outdoor business meeting, disaster relief operations, battlefield, and so on. Mobile and wireless, each of these two words enforces a list of requirements, and the difficult task is to fulfill them to their best. The mobility means that nodes I the networks moves at any time, which implies the short duration of neighbor-hood and topology information received at any moment. In order to handle mobility correctly, the information need to be updated regularly for efficient file sharing. The P2P file sharing model makes large-scale networks a blessing, in which nodes share files directly with each other without a centralized server. Wired P2P file sharing systems (e.g., BitTorrent [4] and Kazaa [5]) have already become a popular and success-ful paradigm for file sharing among millions of users. II. RELATED WORK Peer to Peer System: P2P systems may be categorized into centralized, brokered, and decentralized systems. Centralized systems require peers to connect to a server, which coordinates and manages all communication.in Brokered systems,it require peers to connect to a server to discover other peers, but peers manage communication between themselves. In decentralized

2 systems, there are no servers; peers operate independently and perform both discovery and communication in a decentralized manner. Peer to Peer (P2P) networks are increasingly popular and their uses vary over many different types of applications, such as file sharing, Voice over IP, video streaming,gaming and instant messaging. A. Peer To Peer File Sharing in MANET We have mention the former approach of the P2P file sharing algorithms designed for connected MANETs Fig.1 Data transmission in Connected MANETs 1) Flooding Based Method: In flooding-based methods, 7DS [6] is one of the first approaches to port P2P technology to mobile environments. It utilize the mobility of nodes within a geographic area to disseminate web content among neighbors. Passive distributed indexing (PDI) [8] is a general-purpose distributed file searching algorithm. It uses local broadcastin for content searching and sets up content indexes on nodes along the reply path to guide subsequent searching. Klemm et al. [7] implemented a special-purpose on-demand file searching and transferring algorithm based on an application layer overlay network.hereby, the algorithm transparently aggregates query results from other peers to eliminate redundant routing paths. Hayes [9] extended the Gnutella system to mobile environments and proposed the use of a set of keywords to represent user interests. Anyways, these flooding-based methods produce high overhead due to broadcasting. 2) Advertisement Based Method: Tchakarov and Vaidya [10] proposed GCLP for efficient content discovery in location-aware ad hoc networks. It disseminates the contents and requests in crossed directions to ensure their encountering. P2PSI [11] combines both advertisement (push) and discovery (pull) processes. It acquires the idea of swarm intelligence by regarding shared files as food sources and routing tables as pheromone. Each file holde regularly broadcasts an advertisement message to inform surrounding nodes about its files. Repantis and Kalogeraki [12] proposed a file sharing mechanism in which nodes use the Bloom filter to build content synopses of their data and adaptively disseminate them to other nodes to guide queries. Though the advertisement-based methods reduces the overhead of flooding-based methods, they still generating high overhead for advertising and cannot guarantee the success of file searching due to node mobility. B. Peer To Peer File Sharing in Disconnected MANET: The disconnected MANETs are featured by sparse node density and intermittent node connection, which make previously introduced methods infeasible in such networks.then,we further introduce two categories of P2P file sharingmethods for disconnected MANETs. 1) Cache/Replication-Based Methods: Huang et al. [13] proposed a method that considers multiple factors (e.g., node mobility, file popularity, and file server topology) in which creating file replicas in file servers to realize optimal file availability in content distribution community. Gao et al. [14] implemented cooperative caching in disruption tolerant networks. It replicas each files to network central locations which are frequently visited by nodes in the system, to ensure efficient data access. QCR [15] uses file caching to realize effective multimedia content dissemination in opportunistic networks.thereby in addition to node mobility and file popularity, it also considering the impatience of users when creating replicas. Though these methods improve file availability, In these methods, nodes passively wait for contents they are interested in rather than actively search files, which may leads to search delay. 2) Social Network-Based Methods: Currently,social networks have been utilized in content publishing/dissemination algorithms [18], [19], [20], [21] in opportunistic networks. MOPS [18] provides content-based sub/pub service by utilizing the long-term neighboring relationship between nodes.thereby,it groups nodes with frequent contacts and selects nodes that connect different groups as brokers which are responsible for intercommunity communication. Then the contents and subscriptions are relayed through brokers to reach different communities. MOPS only considers node mobility, while SPOON is advantageous by considering both node interest and mobility as described previously. Unlike MOPS that only depends on the meeting of brokers for intercommunity search, SPOON escalates the efficiency of intercommunity search by 1) assigning one ambassador for each known foreign community, which assists to forward a query directly to the destination community, and 2) utilizing stable nodes (coordinator) to receive messages from ambassadors.therefore, these methods cannot be applied to file searching directly. III. DESIGN OF SPOON 19

3 The Trace data analysis to verify the social network properties in a real MANET. A P2P MANET file sharing system usually consists of 1) a method to represent contents, 2) a node management structure, and 3) a file searching method A. Interest Extraction Without loss of generality, we assume that node contents can be classified to different interest categories. It was found that users usually have a few file categories that they query for files frequently in a file sharing system. Specifically, for the majority of users, 80% of their shared files fall into only 20% of total file categories. Like other file sharing systems we consider that a node s stored files can reflect its file interests. Thus, SPOON derives the interests of a node from its files. coordinator in the community finds that the home community cannot satisfy a request,then, it launches the inter-community searching and forwards the request to an ambassador that will travel to the foreign community that matches the request s interest. A request is deleted when its TTL (Time To Live) expires. During the search, a node sends a message to another node using the interest-oriented routing algorithm (IRA), in which a message is always forwarded to the node that is likely to hold or to meet the queried keywords. The received file is routed along the search path or through IRA if the route expires. B. Community Construction Social network theory reveals that people with the same interest tend to meet frequently. By exploiting this property, SPOON classifies nodes with common interests and frequent contacts into a community to facilitates interest based file searching, as introduced. Nodes with multiple interests belong to multiple communities. The community construction can easily be conducted in a centralized manner by collecting node interests and contact frequencies from all nodes to a central node. However, considering that the proposed system is for distributed disconnected MANETs, in which timely information collection and distribution is non-trivial, we further propose a decentralized method to ensure the adaptivity of SPOON in real environment. C. Node Role Assignment It defines Community coordinator and ambassador nodes in the view of a social network. A community coordinator is popular and important node in the community. It keeps the indexes of all files in its community. Each and every community has one ambassador for each known foreign community, which act as a bridge to the community. A Community coordinator maintains the of foreign communities and corresponding ambassador to map queries to ambassador for intercommunity searching. A number of ambassadors and coordinators can be adjusted based on the network size and workload to avoid overloading these nodes. Thereby. ambassadors and coordinators take more responsibility. Fig.2 File Searching in SPOON E. Push Pull Gossipping Technique To facilitate an efficient gossiping operation, The Distributed Discovery algorithm,it first identifies highly influential peers (called seers) in a community. Then, A Push Phase multicasts information to these seers so that peers can easily and quickly retrieve this information via a pull phase. The gossip information to only a small number of seers allows a large percentage of peer members to obtain (pull) the information within just two hops. The work proposes Gossiping algorithm based on Push and Pull Mechanism and uses TDMA,It gives time slot to each individual node to achieve good relation between ambassadors and coordinators. It avoids transmission overhead and packet loss and also get efficient file sharing. Architecture Diagram D.. File Searching In SPOON The interest-oriented file searching has two steps: Intra- Community and Inter-community searching.firstly, A node first searches files in its home community. If the 20

4 The PDR(Packet Delivery Ratio) is calculated using following formula, Throughput is the number of packet that is passing through the channel in a particular unit of time. This performance metric shows the total number of packets that have been successfully delivered from source node to destination node. The Factors that affect throughput include frequent topology changes, unreliable communication, limited bandwidth and limited energy. Fig.3 Architecture Diagram IV. RESULT The Results are based on the implementation of the SPOON Technique with Gossiping Push and Pull Mechanism. The Result shown is packet loss graph. A. Input Specifications The simulation employs IEEE MAC. The nodes move with a random speed. The simulation parameters are shown in table below A specific packet is transmitting from source to destination node and calculates the difference between send times and received times. This metric describes the packet delivery time. Delays due to Queueing, route discovery, propagation and transfer time are included metric TABLE I SIMULATION PARAMETERS PARAMETER SPECIFICATION Simulator NS-2 (version 2.34) Traffic type Constant Bit Rate (CBR) Number of nodes 20 Area 670m*670m Packet Size 512 Channel data rate 0.02 Mbps Speed 20 m/s Routing protocol SPOON The Packet Loss Ratio Graph is shown below B. Output Analysis The proposed system was executed and the results are analyzed using Network Simulator The number of nodes is 20 and there is one malicious node. The nodes move randomly with a speed of 20m/s. 21

5 Fig 5. Electing Ambassador and Coordinator V. CONCLUSION AND FUTURE WORK Fig.4 Packet loss Ratio graph Figure 4.4 shows the packet loss ratio in the graph, it achieves 83% packet delivery effectively.in that packet loss,delay,time are used as parameters in it. Here coordinate x axis as packet loss and y axis is time. This project explored a Social network based P2P content file sharing system in disconnected Mobile adhoc Networks(SPOON) with Gossiping Pull and Push Mechanism. SPOON considers both node interest and contact frequency for efficient file sharing.hereby, We introduce four main components of SPOON: Interest extraction identifies nodes interests; Community construction builds common-interest nodes with frequent contacts into communities. The node role assignment component utilizes nodes with tight connection with community members for intra-community file searching and highly mobile nodes that visit external communities frequently for inter-community file searching. In interestoriented file searching scheme,it selects forwarding nodes for queries based on interest similarities. Using Gossiping Pull and Push Mechanism it allots time slot to each individual node to achieve good relation between ambassadors and coordinators and to avoid transmission overhead and also get efficient file sharing. 22 The propose scheme enhances good relationship between ambassadors and Coordinators relationship with allotted time slot for each individual node. This proposed schemed extended to implement in Decentralized approach for intra and inter community phases, mobility enhancement and also providing simple node prevention scheme. This

6 part of work has been planned for implementation of second phase of this project. Symp. Modeling, Analysis and Simulation Wireless and Mobile Systems (MSWiM 08), REFERENCES [1] J. B. Tchakarov and N. H. Vaidya, Efficient Content Location in Wireless Ad Hoc Networks, in Proc. of MDM, [2] J. Reich and A. Chaintreau, The age of impatience: optimal replication schemes for opportunistic networks. in Proc. of CoNEXT, [3] V. Lenders, M. May, G. Karlsson, and C. Wacha, Wireless ad hoc podcasting, Mobile Computing and Communications Review, [4] E. Yoneki, P. Hui, S. Chan, and J. Crowcroft, A Socio-aware Overlay for Publish/subscribe Communication in Delay Tolerant Networks, in Proc. of MSWiM, [5] E. Yoneki, P. Hui, S. Chan, and J. Crowcroft, A socio-aware overlay for publish/subscribe communication in delay tolerant networks, in Proc. of MSWiM, [6]M. Papadopouli and H. Schulzrinne, A Performance Analysis of 7DS: A Peer-to-Peer Data Dissemination and Prefetching Tool for Mobile Users, Proc. IEEE Sarnoff Symp. Digest Advances in Wired and Wireless Comm., [7] A. Klemm, C. Lindemann, and O. Waldhorst, A Special-Purpose Peerto-Peer File Sharing System for Mobile Ad Hoc Networks, Proc. IEEE 58th Vehicular Technology Conf. (VTC 03), [8] C. Lindemann and O.P. Waldhort, A Distributed Search Service for Peer-to-Peer File Sharing, Proc. Int l Conf. Peer-to-Peer Computing (P2P 02), [9] D.W.A. Hayes, Peer-to-Peer Information Sharing in a Mobile Ad Hoc Environment, Proc. IEEE Sixth Workshop Mobile Computing Systems and Applications (WMCSA 04), [10] J.B. Tchakarov and N.H. Vaidya, Efficient Content Location in Wireless Ad Hoc Networks, Proc. IEEE Int l Conf. Mobile Data Management (MDM 04), [11] C. Hoh and R. Hwang, P2P File Sharing System over MANET based on Swarm Intelligence: A Cross-Layer Design, Proc. IEEE Wireless Comm. and Networking Conf. (WCNC 07), pp ,2007. [12] T. Repantis and V. Kalogeraki, Data Dissemination in Mobile Peerto-Peer Networks, Proc. Sixth Int l Conf. Mobile Data Management (MDM 05), [13] Y. Huang, Y. Gao, K. Nahrstedt, and W. He, Optimizing File Retrieval in Delay-Tolerant Content Distribution Community, Proc. IEEE 29th Int l Conf. Distributed Computing Systems (ICDCS 09), [14] W. Gao, G. Cao, A. Iyengar, and M. Srivatsa, Supporting Cooperative Caching in Disruption Tolerant Networks, Proc. 31st Int l Conf. Distributed Computing Systems (ICDCS 11), [15] J. Reich and A. Chaintreau, The Age of Impatience: Optimal Replication Schemes for Opportunistic Networks, Proc. Fifth Int l Conf. Emerging Networking Experiments and Technologies (CoNEXT 09), [16] V. Lenders, M. May, G. Karlsson, and C. Wacha, Wireless Ad Hoc Podcasting, ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 12, pp , [17] K. Chen and H. Shen, Global Optimization of File Availability through Replication for Efficient File Sharing in MANETs, Proc. IEEE 19th Int l Conf. Network Protocols (ICNP), [18] F. Li and J. Wu, MOPS: Providing Content-Based Service in Disruption-Tolerant Networks, Proc. IEEE 29th Int l Conf. Distributed Computing Systems (ICDCS 09), [19] P. Costa, C. Mascolo, M. Musolesi, and G.P. Picco, Socially- Aware Routing for Publish-Subscribe in Delay-Tolerant Mobile Ad Hoc Networks, IEEE J. Selected Areas in Comm., vol. 26, no. 5, pp , June [20] E. Yoneki, P. Hui, S. Chan, and J. Crowcroft, A Socio-Aware Overlay for Publish/Subscribe Communication in Delay Tolerant Networks, Proc. 10th ACM Symp. Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM 07), [21] C. Boldrini, M. Conti, and A. Passarella, ContentPlace: Social- Aware Data Dissemination in Opportunistic Networks, Proc. 11 th Int l 23

LEVERAGING SOCIAL NETWORKS FOR P2P CONTENT-BASED FILE SHARING IN DISCONNECTED MANETs

LEVERAGING SOCIAL NETWORKS FOR P2P CONTENT-BASED FILE SHARING IN DISCONNECTED MANETs LEVERAGING SOCIAL NETWORKS FOR P2P CONTENT-BASED FILE SHARING IN DISCONNECTED MANETs A.Vigneshkumar P.Padmapriya A.Poornima S.Selvarani Assistant Professor BE-CSE BE-CSE BE-CSE vigneshkumara@bitsathy.ac.in

More information

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet K. Swathi Research Scholar, Dept of computer science, Sri Ramakrishna College of Arts & Science for Women Coimbatore-

More information

Accessing the Location Based Details

Accessing the Location Based Details ISSN:2348-2079 Volume-6 Issue-2 International Journal of Intellectual Advancements and Research in Engineering Computations Accessing the Location Based Details 1 Mr. S. Jagadeesan, M.Sc., M.C.A., M.Phil.,

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks

Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 29631

More information

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness 1 Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness Kang Chen, Haiying Shen, Senior Member, IEEE,, Li Yan Abstract Distributed file searching in delay tolerant

More information

Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks

Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks Clemson University TigerPrints All Dissertations Dissertations 8-2014 Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks Kang Chen Clemson University, kangc@g.clemson.edu

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING ASRAF 1*, K A LAXMI PRASAD 2* ABSTRACT: 1. MTech-Student, Dept of CSE. 2. Asst.Prof, Dept

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION

EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION Mrs. Sri Devi.S 1, S.Narasimman 2, R.Ashwinmuthiya 3, C.GopalaKrishnana 4, H.Prabhakaran 5 1 Assistant professor, Department

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Improved Dominating Set Indices for Mobile Peer-to-Peer Networks

Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Shanping Li, Wei Shi, Xin Lin, and Channa Nizamuddin College of Computer Science Zhejiang University Hangzhou, P.R.China 310027 shan@cs.zju.edu.cn,

More information

Optimizing Social Networks For P2P Content Based File Sharing In Detached MANET S

Optimizing Social Networks For P2P Content Based File Sharing In Detached MANET S Optimizing Social Networks For P2P Content Based File Sharing In Detached MANET S Akalya K S, Pavithra B, Mr.Vimal S, B.Tech.,Information Technology, Jeppiaar Engineering College Chennai,India Abstract:

More information

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK 1 MARATI ESHWARI, 2 P.SRINIVAS 1 M. Tech Student, Department of IT, Joginpally B R Engineering College, Village Yenkapally,

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS

A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS 1 LILLY SHEEBA S, 2 YOGESH P 1 Assistant Professor, Department of Information Technology, Anna University, Jerusalem College of Engineering,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Supporting Cooperative Caching in Disruption Tolerant Networks

Supporting Cooperative Caching in Disruption Tolerant Networks 0 3st International Conference on Distributed Computing Systems Supporting Cooperative Caching in Disruption Tolerant Networks Wei Gao and Guohong Cao Department of Computer Science and Engineering The

More information

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,

More information

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks 2015 Fifth International Conference on Advanced Computing & Communication Technologies An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs Computer Networks Vol x, Issue y 1 Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs P. Yang, Member, IEEE M. Chuah 1, Senior Member, IEEE Abstract Mobile nodes in some challenging

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala Spandana* 1, Sesha Bhrgavi 2

RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala Spandana* 1, Sesha Bhrgavi 2 ISSN 2277-2685 IJESR/August 2015/ Vol-5/Issue-8/1126-1134 Teegala Spandana et.al.,/ International Journal of Engineering & Science Research RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario Uttara Vyas 1, Prof. Kamlesh Chopra 2, Prof. Prashant Lakkadwala 3 1 Computer Science and Engineering,Acropolis Technical

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network

Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network American Journal of Applied Sciences 9 (8): 1307-1315, 2012 ISSN 1546-9239 2012 Science Publications Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network 1 Kuppusamy,

More information

Routing in Ad-Hoc Networks

Routing in Ad-Hoc Networks Routing in Ad-Hoc Networks Ramesh Patil Computer Science Department, University of Texas at Arlington Abstract In this paper, we deal with the basic concept of ad-hoc networks and the need for it. We present

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM

SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM ABSTRACT: SECURED SOCIAL TUBE FOR VIDEO SHARING IN OSN SYSTEM J.Priyanka 1, P.Rajeswari 2 II-M.E(CS) 1, H.O.D / ECE 2, Dhanalakshmi Srinivasan Engineering College, Perambalur. Recent years have witnessed

More information

Social-Based Cooperative Caching in multi-hop wireless networks

Social-Based Cooperative Caching in multi-hop wireless networks Social-Based Cooperative Caching in multi-hop wireless networks 1 Kothagundla Divya, 2 S.Suresh 1,2 D ept. of CSE, Sree Rama Institute of Technology & Science, SKuppenakuntla, Penuballi, K hammam, AP,

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Keywords: Distributed systems, mobile peer-to-peer networks, Bloom filters, contentdriven routing, adaptive data dissemination.

Keywords: Distributed systems, mobile peer-to-peer networks, Bloom filters, contentdriven routing, adaptive data dissemination. Data Dissemination and Query Routing in Mobile Peer-to- Peer Networks Thomas Repantis, Vana Kalogeraki Department of Computer Science & Engineering University of California, Riverside Riverside, CA 92521,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2 International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 INC-BEAT 2016 An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M.

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Max-Pivot Routing for Opportunistic Networks

Max-Pivot Routing for Opportunistic Networks Max-Pivot Routing for Opportunistic Networks Tamer Dag Computer Engineering Department Kadir Has University Istanbul, Turkey tamer.dag@khas.edu.tr Abstract Opportunistic networks are challenging types

More information

Performance Improvement of Wireless Network Using Modern Simulation Tools

Performance Improvement of Wireless Network Using Modern Simulation Tools Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning Sapna B Kulkarni,B.E,MTech (PhD) Associate Prof, Dept of CSE RYM Engg.college, Bellari VTU Belgaum Shainaj.B

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

High Throughput in MANET Using relay algorithm and rebroadcast probability

High Throughput in MANET Using relay algorithm and rebroadcast probability RESEARCH ARTICLE OPEN ACCESS High Throughput in MANET Using relay algorithm and rebroadcast probability Mr. Marvin Mark M Dept of Electronics and Communication, Francis Xavier Engineering College, Tirunelveli-627003,

More information

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME 44 PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME Ibrahim Saidu a, *,Idawaty Ahmad a,b, Nor Asila Waty Abdul Hamid a,b and Mohammed waziri Yusuf b a Faculty of Computer Science

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Reducing End to End per Packet Energy Consumption

Reducing End to End per Packet Energy Consumption Reducing End to End per Packet Energy Consumption N.Annapurna #1, M.V.Vijaya saradhi *2 # PG Scholar, Department of IT, Aurora s Engineering College, Bhongir, Andhra Pradesh, India # HOD, Department of

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering

More information

Reliable and Efficient flooding Algorithm for Broadcasting in VANET

Reliable and Efficient flooding Algorithm for Broadcasting in VANET Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,

More information