EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION

Size: px
Start display at page:

Download "EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION"

Transcription

1 EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION Mrs. Sri Devi.S 1, S.Narasimman 2, R.Ashwinmuthiya 3, C.GopalaKrishnana 4, H.Prabhakaran 5 1 Assistant professor, Department Of Computer Science and Engineering, School of Engineering, Vels University,Chennai,India 2,3,4,5 UG Student, Department Of Computer Science and Engineering,School of Engineering, Vels University,Chennai,India Abstract - File sharing applications are recently widely used in MANET. Because of limited communication range and node mobility, the file availability for sharing becomes tedious task. Peer To Peer over MANET is the most commonly used method for file sharing in MANET. In P2P file sharing system, File replication technology is mostly used to improve the file query efficiency. Most of the current file replication methods replicate files in all nodes or two end points on a client-server query path[1].thus, these methods either have low effectiveness or have highly over headed cost. File replication in server side enhances replica hit rate, hence, look up efficiency but produces overloaded nodes and cannot significantly reduce query path length[2].an intuitive method to alleviate this problem is to create file replicas in the network. Actually, a node that has a higher meeting frequency with others provides higher availability to its files. This becomes even more evident in sparsely distributed MANETs, in which nodes meet disruptively [3]. In this paper, we introduce a new concept of resource for file replication, which considers both node storage and meeting frequency. And also this paper presents an efficient file replication algorithm that achieves high query efficiency and high replica utilization at a significantly low cost. Simulation results demonstrate the efficiency and effectiveness of distributed replication protocol in comparison with other approaches in both static and dynamic environments. It dramatically reduces the overhead of file replication and yields significant improvements on the efficiency and effectiveness of file replication in terms of query efficiency, replica hit rate, and overloaded nodes reduction. Keywords: P2p,File Sharing,File Replication. I. INTRODUCTION Mobile ad hoc network (MANETs) is a mobile, dynamically and self-organizing wireless networks in absence of a fixed infrastructure, which is usually used in emergency environment such as disaster recovery, military battlefields etc. Recent years, the personal mobile devices such as smart phone, PDA, ipad are increasing rapidly. And with the rapid development in the field of wireless communication technologies, e.g., WLAN, WiMax, 3G, 3.5G and emerging 4G, mobile users now want to have access to applications and data whenever and wherever through mobile handheld devices. The mobile user would like to generate personal content, store useful information, search content from Internet or other mobile devices and share content with their friends all in handheld mobile platforms However, the limited communication capacity of the base station is not easy to satisfy the big requirement. MANETs consisted by the mobile devices which are sufficient with wireless technologies such as WIFI or Bluetooth, are effective and important supplement to the application between mobile users. The mobile devices bring new application scenario to All Rights Reserved 424

2 Normally peer-to-peer technology used for the distribution and sharing of digital documents and computer files in a network. This process is called peer-to-peer file sharing.p2p file sharing allows users to access media files such as texts, music, movies, and games using a specialized P2P software program that searches for other connected computers on a P2P network and locates the desired content. The nodes or peers of such networks are end-user computer systems that are interconnected via the Internet. In centralized system the scalability is hard to achieve but in decentralized system there is no such bottleneck. P2P over MANETs is the most popular used pattern of file sharing within MANETs. P2P system is initiated in the middle of 1990s. P2P system is deployed on the Internet which is formed by creating an overlay network. P2P overlay consists of upper-layer connections among nodes, or peers, which are independent of the underlay or substrate network, abstract peers view of the connections that make up the network. Here the interaction among peers generally appears at network and application level. P2P file sharing network is very widely used in recent Internet. And within MANETs, P2P file sharing approach is also widely adopted. File replication replicate a hot file to some other nodes, distribute the file query load among a number of nodes and avoid hot spots to improve file query efficiency. File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. With the increasing popularity of mobile devices, e.g., smart phones and laptops, we envision the future of MANETs consisted of these mobile devices. By MANETs, we refer to both normal MANETs and disconnected MANETs, also known as delay tolerant networks (DTNs). The former has a relatively dense node distribution in an area while the latter has sparsely distributed nodes that meet each other opportunistically. On the other side, the emerging of mobile file sharing applications (e.g., Qik [1] and Flixwagon [2]) motivates the investigation on the peer-to-peer (P2P) file sharing over such MANETs. The local P2P file sharing model provides three advantages. First, it enables file sharing when no base stations are available (e.g., in rural areas). Second, with the P2P architecture, the bottleneck on overloaded servers in current client server based file sharing systems can be avoided. Third, it exploits otherwise wasted peer to peer communication opportunities among mobile nodes. As a result, nodes can freely and unobtrusively access and share files in the distributed MANET environment, which can possibly support interesting applications. For example, mobile nodes can share files based on users proximity [3] in the same building or in a local community. Tourists can share their travel experiences or emergency information with other tourists through digital devices directly even when no base station is available in remote areas. Drivers can share road information through the vehicle-to-vehicle communication. Fig1.shows the system architecture However, the distinctive properties of MANETs, i.e., node mobility, limited communication range and resource, have rendered many difficulties in realizing such a P2Pfile sharing system. For example, file searching turns out to be difficult since nodes in MANETs move around freely and can exchange information only when they are within the communication range. Broadcasting can quickly discover files, but it leads to the broadcast storm problem [4] with high energy consumption. Probabilistic routing and file discovery protocols [5], [6], [7] avoid broadcasting by forwarding a query to a node with higher probability of meeting the destination. But the opportunistic encountering of nodes in MANETs makes file searching and retrieval non-deterministic. File replication is an effective way to enhance file availability and reduce file querying delay. It creates replicas for a file to improve its probability of being encountered by requests. Unfortunately, it is impractical and inefficient to enable every node to hold the replicas of all files in the system considering limited node All Rights Reserved 425

3 Fig.1 System Architecture Also, file querying delay is always a main concern in a file sharing system. Users often desire to receive their requested files quickly no matter whether the files are popular or not. Thus, a critical issue is raised for further investigation: how to allocate the limited resource in the network to different files for replication so that the overall average file querying delay is minimized? In spite of efforts, current file replication protocols lack a rule to allocate limited resources to files for replica creation in order to achieve the minimum average querying delay, i.e., global search efficiency optimization under limited resources. They simply consider storage as the resource for replicas, but neglect that a node s frequency to meet other nodes (meeting ability in short) also influences the availability of its files. Files in a node with a higher meeting ability have higher availability. II RELATED WORK 1) File Sharing in Normal MANETs The topic of file replication for efficient file sharing applications in MANETs has been studied recently. An individual node or a group of nodes decide the list of files to replicate according to file querying frequency. Hara and Madria proposed three file replication protocols: static access frequency (SAF), dynamic access frequency and neighborhood (DAFN), and dynamic connectivity based grouping (DCG). In SAF, each node replicates its frequently queried files until its available storage is used up. SAF may lead to many duplicate replicas among neighboring nodes when they have the same interested files. DAFN eliminates duplicate replicas among neighbors. DCG further reduces duplicate replicas in a group of nodes with frequent connections by creating replicas for files in the descending order of their group based querying frequencies. Though DAFN and DCG enable replicas to be shared among neighbors, neighboring nodes may separate from each other due to node mobility. Also, they incur high traffic load in identifying duplicates or managing groups. 2) File Sharing in Disconnected MANETs/DTNs Huang et al. discussed how to cache files in servers to realize the optimal file availability to mobile users in WiFi based wireless networks based on node mobility pattern, AP topology, and file popularity. However, the file servers in this paper are fixed nodes connecting to APs, while we consider a more general P2P scenario, in which all mobile nodes are both file servers and clients. Pitkanen and Ott [17] proposed the DTN storage module to leverage the DTN store-carry-and-forward paradigm and make DTN nodes keep a copy of a message for a longer period of time required by forwarding. Gao et al. [14] proposed a cooperative caching method in DTNs by copying each file to the node in All Rights Reserved 426

4 network central location, which is frequently visited by other nodes. When the central node is full, less popular replicas are moved to its neighbor nodes. However, central nodes may be frequently changed, leading to frequent file transfers and high overhead. QCR [15] leverages caching for multimedia content dissemination in opportunistic networks. It considers data retrieval delay and the probability that users will require the same content based on previously experiences to decide the caching policy. SEDUM [20] also uses replication to create redundant messages in routing for DTNs, thereby enhancing routing success rate. III PROPOSED SOLUTION Decentralized File Replication Method Instead of creating replicas on all nodes or two ends on a client to server path, Effective Decentralized File Replication(EAD)method chooses query traffic hubs (i.e., query traffic conjunction nodes) as replica nodes to ensure high replica hit rate. It achieves a comparable query efficiency to Path but creates much less replicas. It also produces higher hit rate than the client side, and dramatically reduce the lookup path length and avoids overloading replica nodes in ServerSide. EAD takes the full advantage of file replicas by dynamically choosing replica nodes based on file query rate. First the EAD aims in minimizing the replicas and to achieve high file query efficiency. More replicas leads to higher query efficiency and vice versa. How to reduce replicas without compromise query efficiency. Rather than statically replicating a file along a query path, EAD replicates a file in nodes with high query traffic of file, thus reducing more replicas while it ensures high hit rate and comparable query efficiency. Second, rather than depending on a file owner to determine replica creation and deletion in a centralized manner, the EAD aims to conduct the operations in a decentralized manner without compromising replica utilization. i.e, the EAD enables nodes themselves to determine whether and when they should create replicas or delete replicas based on their actual experienced query traffic. If a node has too high query traffic of a file, it requests to be a replica node of the file or if a replica node receive too few queries of a replica, it removes the replica. Splitting a large file into small pieces can increase the service capacity of a large file rapidly. Replicating file location hint along a query path can also improve file query efficiency V. PERFORMANCE EVALUTION We use ns2 to evaluate the performance of the Efficient and Adaptive decentralized File replication.the simulation area is a grid of 1500 meters by 320 meters. We divide this grid into 10 sub-grids of 150 meters by 320 meters and place a super-node at the center of each sub-grid. The random waypoint movement model is used in which 50 nodes move at a speed uniformly distributed between 0-20m/s. We assume the wireless bandwidth is 2 Mbps and the transmission range is 250m. The run time of the experiment is kept as 500 second. Three metrics are measured: average delay, message overhead and packet delivery ratio (PDR). Average delay is the time elapsed between the query is sent and the data is transmitted back to the requester averaged upon all the queries. Message overhead includes all the query and response messages of locating both data and optimal route. Packet delivery ratio is defined as the percentage of the data queries which receives the requested data. More work and detail plan needs to be done in this respect. There are 100 data items randomly distributed among all 50 nodes. In the P2P model, each peer can play the role of both a client and server. In our client query model, each node sends out queries with the interval of query generate time. The query generate time is uniformly distributed within (0; Tquery], where Tquery is the mean query generate time. Once a All Rights Reserved 427

5 sends out a query, it doesn t need to wait until the data returned back before launching another data query. Fig2: Server and client nodes are created Fig3- server responds to the client and leaf nodes A. Results and Performance Analysis Three key performance metrics are evaluated: Fig4:client get replica file from the server Packet delivery fraction: The ratio of the data packets delivered to the destination to those generated by the All Rights Reserved 428

6 Average end-to-end delay of data packets: This includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue, retransmission delays at the MAC, propagation and transfer times. Throughput: It is the ratio of the total amount of data that reaches a receiver from a sender to the time it takes for the receiver to get the last packet. Throughput= Received packets/end Time Fig 1.Packet Delivery Ratio. Fig2. Drop Ratio All Rights Reserved 429

7 VI. CONCLUSION This paper proposes an EAD file replication algorithm that chooses query traffic hubs and frequent requesters as replica nodes to guarantee high utilization of replicas and high query efficiency. Unlike current methods in which file servers keep track of replicas, EAD creates and deletes file replicas by dynamically adapting to no uniform and time varying file popularity and node interest in a decentralized manner based on the experienced query traffic. It leads to higher scalability and ensures high replica utilization. File replication is an effective method to deal with the problem of server overload by distributing load over replica nodes. It helps to achieve high query efficiency by reducing server response latency and lookup path length (i.e., the number of hops in a lookup path).ead relies on exponential moving average technique to reasonably measure file query rate for replica management. REFERENCES 1. S. Saroiu, P. Gummadi, and S. Gribble, "A Measurement Study of Peer-to-peer File Sharing Systems," Proc. Conf. Multimedia Computing and Networking (MMCN), V. Gopalakrishnan et al., "Adaptive Replication in Peer-to-Peer Systems," Proc. Int'l Conf. Distributed Computing Systems (ICDCS), Gnutella, M. Roussopoulos and M. Baker, "CUP: Controlled Update Propagation in Peer to Peer Networks," Proc. USENIX, L. Yin and G. Cao, "DUP: Dynamic-Tree Based Update Propagation in Peer-to-Peer Networks," Proc. Int'l Conf. Data Eng. (ICDE), A. Ghodsi, L. Alima, and S. Haridi, "Symmetric Replication for Structured Peer-toPeer Systems," Proc. Int'l Workshop Databases, Information Systems and Peer-to-Peer Computing, p. 12, T. Pitoura, N. Ntarmos, and P. Triantafillou, "Replication, Load Balancing and Efficient Range Query Processing in DHTs," Proc. Conf. Extending Database Technology(EDBT), J. Kangasharju, K.W. Ross, and D.A. Turner, "Optimizing File Availability in Peer-to-Peer Content Distribution," Proc. IEEEINFOCOM, J. Kangasharju, K.W. Ross, and D.A. Turner, "Adaptive Content Management in Structured P2P Communities," Proc. Int'l Conf.Scalable Information Systems (Infoscale), S. Tewari and L. Kleinrock, "Proportional Replication in Peer-to-Peer Networks," Proc. IEEEINFOCOM, L. Massoulie and M. Vojnovic, "Coupon ReplicationSystems,"Proc.ACM SIGMETRICS, S. Tewari and L. Kleinrock, "On Fairness, Optimal Download Performance and Proportional Replication in Peerto-Peer Networks," Proc. IFIP Networking Conf., S. Tewari and L. Kleinrock, "Analysis of Search and Replication in Unstructured Peerto-Peer Networks,"Proc.ACMSIGMETRICS, D. Rubenstein and S. Sahu, "Can Unstructured P2P Protocols Survive Flas Crowds?" IEEE/ACMTrans.Networking,vol.3,no.3,pp , H. Shen, "EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems," Proc. Int'l Conf. Peer-to-Peer Computing (P2P), S. Ioannidis, L. Massoulie, and A. Chaintreau, Distributed Caching over Heterogeneous Mobile Networks, Proc. ACM Int l Conf.Measurement and Modeling of Computer Systems (SIGMETRICS), M.J. Pitkanen and J. Ott, Redundancy and Distributed Caching in Mobile DTNs, Proc. ACM/IEEE Int l Workshop Mobility in the Evolving Internet Architecture (MobiArch), X. Zhuo, Q. Li, W. Gao, G. Cao, and Y. Dai, Contact Duration Aware Data Replication in Delay Tolerant Networks, Proc. IEEE 19th Int l Conf. Network Protocols (ICNP), X. Zhuo, Q. Li, G. Cao, Y. Dai, B.K. Szymanski, and T.L. Porta, Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach, Proc. IEEE Eighth Int l Conf. Mobile Adhoc and Sensor Systems (MASS), Z. Li and H. Shen, SEDUM: Exploiting Social Networks in Utility-Based Distributed Routing for DTNs, IEEE Trans. Computers, vol. 62, no. 1, pp , Jan V. Gianuzzi, Data Replication Effectiveness in Mobile Ad-Hoc Networks, Proc. ACM First Int l Workshop Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN), pp , S. Chessa and P. Maestrini, Dependable and Secure Data Storage and Retrieval in Mobile Wireless Networks, Proc. Int l Conf. Dependable Systems and Networks (DSN), All Rights Reserved 430

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING

MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING ASRAF 1*, K A LAXMI PRASAD 2* ABSTRACT: 1. MTech-Student, Dept of CSE. 2. Asst.Prof, Dept

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency

File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency Sundeep Uppaleti 1, INB.Jyotsna 2, Swathi Voddi 3 1 M.Tech (cse), Dhanekula Institute of

More information

EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems

EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems EAD: An Efficient and Adaptive Decentralized File Replication Algorithm in P2P File Sharing Systems Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville,

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

A Service Replication Scheme for Service Oriented Computing in Pervasive Environment

A Service Replication Scheme for Service Oriented Computing in Pervasive Environment A Service Replication Scheme for Service Oriented Computing in Pervasive Environment Sital Dash, Mridulina Nandi & Subhrabrata Choudhury National Institute of Technology, Durgapur E-mail : Sheetal.dash@gmail.com,

More information

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Priyadharshini.A #1 and Uvaraj Arutkumaran.S, *2 # ME, Information Technology, Sri Venkateswara

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

WITH the increasing popularity of mobile devices, e.g.,

WITH the increasing popularity of mobile devices, e.g., IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 4, APRIL 2015 1029 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Kang Chen, Student Member,

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS Dr.N.Kumareshan 1, Mr.N.Prakash 2 2 Assistant Professor (SG), 2 Assistant Professor 1,2 Department of ECE, 1 Sri Shakthi Institute

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Plover: A Proactive Low-overhead File Replication Scheme for Structured P2P Systems

Plover: A Proactive Low-overhead File Replication Scheme for Structured P2P Systems : A Proactive Low-overhead File Replication Scheme for Structured P2P Systems Haiying Shen Yingwu Zhu Dept. of Computer Science & Computer Engineering Dept. of Computer Science & Software Engineering University

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK 1 MARATI ESHWARI, 2 P.SRINIVAS 1 M. Tech Student, Department of IT, Joginpally B R Engineering College, Village Yenkapally,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 10 (October 2013), PP. 56-60 A Co-Operative Cluster Based Data Replication Technique

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Advanced Internet Architectures

Advanced Internet Architectures Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

Event Driven Routing Protocols For Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Enhancing Downloading Time By Using Content Distribution Algorithm

Enhancing Downloading Time By Using Content Distribution Algorithm RESEARCH ARTICLE OPEN ACCESS Enhancing Downloading Time By Using Content Distribution Algorithm VILSA V S Department of Computer Science and Technology TKM Institute of Technology, Kollam, Kerala Mailid-vilsavijay@gmail.com

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Hybrid Cooperative Caching in a Mobile Environment

Hybrid Cooperative Caching in a Mobile Environment Hybrid Cooperative Caching in a Mobile Environment Hong Va Leong 1, Chi-yin Chow 2 1 Department of Computing, The Hong Kong Polytechnic University Hong Kong cshleong@comp.polyu.edu.hk 2 Department of Computing

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME 44 PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME Ibrahim Saidu a, *,Idawaty Ahmad a,b, Nor Asila Waty Abdul Hamid a,b and Mohammed waziri Yusuf b a Faculty of Computer Science

More information

Wireless Ad-Hoc Networks

Wireless Ad-Hoc Networks Wireless Ad-Hoc Networks Dr. Hwee-Pink Tan http://www.cs.tcd.ie/hweepink.tan Outline Part 1 Motivation Wireless Ad hoc networks Comparison with infrastructured networks Benefits Evolution Topologies Types

More information

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal

More information

Evaluating Unstructured Peer-to-Peer Lookup Overlays

Evaluating Unstructured Peer-to-Peer Lookup Overlays Evaluating Unstructured Peer-to-Peer Lookup Overlays Idit Keidar EE Department, Technion Roie Melamed CS Department, Technion ABSTRACT Unstructured peer-to-peer lookup systems incur small constant overhead

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer

More information

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs Computer Networks Vol x, Issue y 1 Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs P. Yang, Member, IEEE M. Chuah 1, Senior Member, IEEE Abstract Mobile nodes in some challenging

More information

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR) IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Review Data management issues in mobile ad hoc networks

Review Data management issues in mobile ad hoc networks 27 Proc. Jpn. Acad., Ser. B 93 (217) [Vol. 93, Review Data management issues in mobile ad hoc networks By Takahiro HARA *1, (Communicated by Makoto NAGAO, M.J.A.) Abstract: Research on mobile ad hoc networks

More information

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 4, July - August 2018, pp. 77 83, Article ID: IJARET_09_04_007 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=4

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS 1 V.Narayanarao, M.tech student, Aitam college, Tekkali, India 2 Promod kumar sahu, Associate professor, Aitam college, Tekkali, India 1 narayanarao.mtech@gmail.com

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry Performance Comparison of Unicast Routing Schemes in DTNs Mooi Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng {chuah, pey204, davison, cheng}@cse.lehigh.edu Lehigh University Abstract Delay and disruption

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS

A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS 1 LILLY SHEEBA S, 2 YOGESH P 1 Assistant Professor, Department of Information Technology, Anna University, Jerusalem College of Engineering,

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-0050, P-ISSN: 2394-0042.Volume 2, Issue 1. (Mar. - Apr. 2015), PP 01-05 www.iosrjournals.org Detection and Removal of Blackhole Attack

More information

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING International Journal of Mechanical Engineering and Technology (IJMET) Volume 9 Issue 11 November 2018 pp.2226 2231 Article ID: IJMET_09_11_235 Available online at http://www.ia aeme.com/ijmet/issues.asp?jtype=ijmet&vtype=

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,

More information