MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING

Size: px
Start display at page:

Download "MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING"

Transcription

1 MAXIMIZING P2P FILE ACCESS AVAILABILITY IN MOBILE AD HOC NETWORKS THOUGH REPLICATION FOR EFFICIENT FILE SHARING ASRAF 1*, K A LAXMI PRASAD 2* ABSTRACT: 1. MTech-Student, Dept of CSE. 2. Asst.Prof, Dept of CSE. Khader Memorial College of Engineering & Technology, Devarakonda (M), Nalgonda Dist. Applications have attracted sharing files in a dedicated mobile networks (network from hackers) more and more attention in recent years. The Querying file efficiency suffers from the characteristics of these networks, including node mobility and communication limited Groups and resources. Intuitive way to alleviate this problem is to create replicas of a file in the network. However, despite efforts to Repeat Folder, focused on any research to create a global optimization with minimum average delay query. specially, Protocols recurrence of the current files in a dedicated mobile networks and a couple of shortcomings. First, it lacks the base for the allocation of limited resources for Different files in order to reduce the average query delay. Second, it is considering simply stored as resources available to counterfeit, But the neglect of the fact that the frequency files owners in terms of the fulfillment of the other nodes also plays an important role in determining the availability of a file. In fact, a node that has a higher frequency of meeting with others to provide the highest availability of its files. This becomes even more Clear the network from hackers distributed a few, which was held to meet disruptively. In this paper, we introduce a new concept of resources to file Repetition, which is both storage node and frequency of the meeting. We theoretically study the effect of resource allocation Average query delay and derive the allocation of resources to reduce the average delay base query. We suggest further Distributed repeat to achieve the proposed rule file protocol. Wide-driven experiments with tracking the effects of synthesized and real The effects of that show our protocol can achieve a shorter average delay query at a lower cost than current protocols repeat.

2 INTRODUCTION WITH the increasing popularity of mobile devices, e.g.,smartphones and laptops, we envision the future of MANETs consisted of these mobile devices. By MANETs, we refer to both normal MANETs and disconnected MANETs, also known as delay tolerant networks (DTNs). The former has a relatively dense node distribution in an area while the latter has sparsely distributed nodes that meet each other opportunistically. On the other side, the emerging of mobile file sharing applications (e.g., Qik [1] and Flixwagon [2]) motivates the investigation on the peer-to-peer (P2P) file sharing over such MANETs. The local P2P file sharing model provides three advantages. First, it enables file sharing when no base stations are available (e.g., in rural areas). Second, with the P2P architecture, the bottleneck on overloaded servers in current client server based file sharing systems can be avoided. Third, it exploits otherwise wasted peer to peer communication opportunities among mobile nodes. As a result, nodes can freely and unobtrusively access and share files in the distributed MANET environment, which can possibly support interesting applications. For example, mobile nodes can share files based on users proximity [3] in the same building or in a local community. Tourists can share their travel In this paper, we introduce a new concept of resources for Repeat file, which is both the node and the node storage To meet capacity. We theoretically study the effect of The allocation of resources on the average query and extract delay Optimal repeat file base (OFRR) to allocate resources To each file based on its popularity and size. Then we suggest Duplication of files on the basis of the base protocol, which Approaching the minimum delay global query in full Distributed way. We have the experience and simulation results Superior performance of the proposed protocol appear in Compared with other protocols representative repeat. Is organizing the remainder of this paper is as follows. Department 2 provide relevant business. Work-Related sharing files in a network of ordinary hackers The subject of repeat applications to exchange files efficiently file In the network

3 from intruders it has been recently studied. In [10], [11],[12], a single node or group of nodes decided to list Files to repeat according to the frequency of the query for the file. Hara and Madria [10] suggested three repeat file protocols: Fixed-frequency access (SAF), and the frequency of the arrival of the dynamic Inspired (DAFN), and dynamic Gathered based connectivity (Dubai Capital Group). In the Sudanese armed forces, restores each node Often query files even available to them storage It uses up. Sudanese armed forces may lead to many of the replicas duplicate between The contract when they have the same interested neighboring files. DAFN removes duplicate replicas between neighbors. Dubai Capital Group As well as it reduces the replicas in duplicate set of the contract with the Frequent contacts by creating replicas of the files in Group descending order of their frequency query-based. Although DAFN and Dubai Capital Group replicas to be shared to enable Between neighbors, neighboring nodes may separate from the All because of some movement to the node. Also, they carry high traffic Pregnancy in identifying duplicates or management groups. Cheng and others. [11] suggested allowing each data collection knot Access from the neighbors decide to create or statistics Giving up a replica. Dong and urethral stable [12] proposed To convene a group with stable links and leave all A node checks the possibility of potential members of the group. " Order storage position to decide on the file and repeat View or not. Yin Cao suggested [9] to caching popular memory Files on the contract intersection retrieve the file paths. even though It is effective for popular files, failed to take advantage of all storage Space on the contract. Gianuzzi [21] investigate the possibility of obtaining File, which has a n replicas in the network, it is likely Network divided. He also studied the files retrieval performance When erasure coding [22] works. Chen [23] discussed How to identify a small number of mobile servers Necessary to ensure that each data element can be obtained DK within at most k? 1TH hops by any node in the system.mousavi and others. [8] proposed a two-step of a repeat of a file, Basic repeat and repeat dynamic, to spread

4 Replicas in the network evenly in order to meet the needs of users And prevent data loss in case of network division. Related Business sharing files in a network of ordinary hackers The subject of repeat applications to exchange files efficiently file In the network from intruders it has been recently studied. In [10], [11], [12], a single node or group of nodes decided to list Files to repeat according to the frequency of the query for the file. Hara and Madria [10] suggested three repeat file protocols: Fixed-frequency access (SAF), and the frequency of the arrival of the dynamic Inspired (DAFN), and dynamic Gathered based connectivity (Dubai Capital Group). In the Sudanese armed forces, restores each node Often query files even available to them storage It uses up. Sudanese armed forces may lead to many of the replicas duplicate between The contract when they have the same interested neighboring files. DAFN removes duplicate replicas between neighbors. Dubai Capital Group As well as it reduces the replicas in duplicate set of the contract with the Frequent contacts by creating replicas of the files in Group descending order of their frequency query-based. Although DAFN and Dubai Capital Group replicas to be shared to enable Between neighbors, neighboring nodes may separate from the All because of some movement to the node. Also, they carry high traffic Pregnancy in identifying duplicates or management groups. Cheng and others. [11] suggested allowing each data collection knot Access from the neighbors decide to create or statistics Giving up a replica. Dong and urethral stable [12] proposed To convene a group with stable links and leave all A node checks the possibility of potential members of the group. " Order storage position to decide on the file and repeat View or not. Yin Cao suggested [9] to caching popular memory Files on the contract intersection retrieve the file paths. even though It is effective for popular files, failed to take advantage of all storage Space on the contract. Performance evaluation in normal cases

5 Network from intruders model Thread RWP To evaluate the performance of the computers in the network from ordinary hackers, and Tests conducted on each of the Orbit GENI tests [37], [38] The simulator NS-2 [39]. GENI tests consists 400 equipped with wireless cards decade. We used Dartmouth in the real world impact of MANET [34], which states Tracking the movement of 35 laptops are moving in the open field, for The leadership of the movement node in both experiments. In order to validate Adaptability of the PCS, and we were a couple of routing protocols In experiments. We are the first to use StaticWait Protocol [40] In the experiment GENI, in each query stays on The source node waiting for the destination. We then use Probabilistic Routing Protocol (Prophet [6]), and that's Knot ways requests the neighbor highest Meeting Ability. We put TTL biggest fixed to wait because he needs More time to find the owner of the file. We were 95% confidence Break when dealing with experimental results. We evaluated the performance of the computers in the network from ordinary hackers Compared with many of the algorithms repeat MANET: Sudanese armed forces [10], Dubai Capital Group [10], PDRS [12] and CACHE [9]. TheDetails of these protocols can be found in Section 2. Best Validate our analysis, we also PCS compared with random, Which puts the replicas of the contract randomly, and OPTM, It is a centralized protocol calculates the ideal A number of replicas of each file on the basis we derive the optimum Replication rule. OPTM represents the best performance Which can be obtained by OFRR. Also we had Simulation The NS-2 with different sizes of the network and node Transfers collected by the modified RWP to evaluate the model Our protocol according to various scenarios. Due to page Limit, showed the results of these tests in Appendix A, Is available in the supplementary material on the Internet... Conclusion In this paper, we investigate the problem of how to allocate Limited resources to replicate the file for the purpose ofglobal optimal file searching efficiency in the network from intruders. Different Previous protocols that consider only store as

6 resources, We also consider the ability of the owner of the file to meet the contract as available Resources since it also affects the availability of files on node. First, we analyzed the impact theory Asymmetric distribution of the average query delay under Available resources with restricted mobility models, And then derive the optimum base repetition that can be customized Resources to file replicas with the minimum of the average query delay. Finally, we designed and competition priority Repeat division protocol (PCS) to realize the optimum repeat Rule in a manner fully distributed. Extensive testing All GENI pilot phase, NS-2, and event-driven Simulation with the real effects and synthesized mobility confirmation Each of the health of our theoretical analysis and effectiveness Of the computers in the network from intruders. In this study, we focus on A fixed set of files in the network. In our future work, we will In theory, the analysis is more complex environment including The dynamics of the file (add a file deletions, file) deadline The knot dynamic query pattern. References [1] Qik, [2] Flixwagon, ttp:// [3] C. Palazzi and A. Bujari, A Delay/Disruption Tolerant Solution for Mobile to Mobile File Sharing, Proc. IFIP/IEEE Wireless Days, [4] Y. Tseng, S. Ni, and E. Shih, Adaptive Approaches to Relieving Broadcast Storms in a Wireless Multihop Mobile Ad Hoc Network, Proc. 21st Int l Conf. Distributed Computing Systems (ICDCS), pp , [5] B. Chiara et al., HiBOp: A History Based Routing Protocol for Opportunistic Networks, Proc. IEEE Int l Symp. World of Wireless, Mobile and Multimedia Networks (WoWMoM), [6] A. Lindgren, A. Doria, and O. Schelen, Probabilistic Routing in Intermittently Connected Networks, ACM SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp , 2003.

7 [7] F. Li and J. Wu, MOPS: Providing Content-Based Service in Disruption- Tolerant Networks, Proc. IEEE 29th Int l Conf. Distributed Computing Systems (ICDCS), [8] S. Moussaoui, M. Guerroumi, and N. Badache, Data Replication in Mobile Ad Hoc Networks, Proc. Second Int l Conf. Mobile Ad-hoc and Sensor Networks (MSN), pp , [9] L. Yin and G. Cao, Supporting Cooperative Caching in Ad Hoc Networks, IEEE Trans. Mobile Computing, vol. 5, no. 1, pp , Jan [10] T. Hara and S.K. Madria, Data Replication for Improving Data Accessibility in Ad Hoc Networks, IEEE Trans. Mobile Computing, vol. 5, no. 11, pp , Nov [11] J. Zheng, J. Su, K. Yang, and Y. Wang, Stable Neighbor Based Adaptive Replica Allocation in Mobile Ad Hoc Networks, Proc. Int l Conf. Computational Science (ICCS), [12] H. Duong and I. Demeure, Proactive Data Replication Semantic Information within Mobility Groups in MANET, Proc. Second Int l Conf. MobileWireless Middleware, Operating Systems, and Applications (Mobilware), [13] Y. Huang et al., Optimizing File Retrieval in Delay-Tolerant Content Distribution Community, Proc. Int l Conf. Distributed Computing Systems (ICDCS), [14] W. Gao, G. Cao, A. Iyengar, and M. Srivatsa, Supporting Cooperative Caching in Disruption Tolerant Networks, Proc. Int l Conf. Distributed Computing Systems (ICDCS), [15] J. Reich and A. Chaintreau, The Age of Impatience: Optimal Replication Schemes for Opportunistic Networks, Proc. Fifth Int l Conf. Emerging Networking Experiments and Technologies (CoNEXT), [16] S. Ioannidis, L. Massoulie, and A. Chaintreau, Distributed Caching

8 over Heterogeneous Mobile Networks, Proc. ACM Int l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS), [17] M.J. Pitkanen and J. Ott, Redundancy and Distributed Caching in Mobile DTNs, Proc. ACM/IEEE Int l Workshop Mobility in the Evolving Internet Architecture (MobiArch), [18] X. Zhuo, Q. Li, W. Gao, G. Cao, and Y. Dai, Contact Duration Aware Data Replication in Delay Tolerant Networks, Proc. IEEE 19th Int l Conf. Network Protocols (ICNP), [19] X. Zhuo, Q. Li, G. Cao, Y. Dai, B.K. Szymanski, and T.L. Porta, Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach, Proc. IEEE Eighth Int l Conf. Mobile Adhoc and Sensor Systems (MASS), [20] Z. Li and H. Shen, SEDUM: Exploiting Social Networks in Utility-Based Distributed Routing for DTNs, IEEE Trans. Computers, vol. 62, no. 1, pp , Jan [21] V. Gianuzzi, Data Replication Effectiveness in Mobile Ad-Hoc Networks, Proc. ACM First Int l Workshop Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN), pp , [22] S. Chessa and P. Maestrini, Dependable and Secure Data Storage and Retrieval in Mobile Wireless Networks, Proc. Int l Conf. Dependable Systems and Networks (DSN), [23] X. Chen, Data Replication Approaches for Ad Hoc Wireless Networks Satisfying Time Constraints, Int l J. Parallel, Emergent and Distributed Systems, vol. 22, no. 3, pp , 2007.

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK

IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK IMPROVING PEER TO PEER FILE SHARING THROUGH REPLICATION IN MOBILE AD-HOC NETWORK 1 MARATI ESHWARI, 2 P.SRINIVAS 1 M. Tech Student, Department of IT, Joginpally B R Engineering College, Village Yenkapally,

More information

EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION

EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION EFFICIENT P2P FILE SHARING IN MOBILE AD HOC NETWORKS(MANET) USING FILE REPLICATION Mrs. Sri Devi.S 1, S.Narasimman 2, R.Ashwinmuthiya 3, C.GopalaKrishnana 4, H.Prabhakaran 5 1 Assistant professor, Department

More information

WITH the increasing popularity of mobile devices, e.g.,

WITH the increasing popularity of mobile devices, e.g., IEEE TRANSACTIONS ON COMPUTERS, VOL. 64, NO. 4, APRIL 2015 1029 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Kang Chen, Student Member,

More information

File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency

File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency File Sharing System in P2P with Access Availability for Social Networks using Node Storage and Meeting Frequency Sundeep Uppaleti 1, INB.Jyotsna 2, Swathi Voddi 3 1 M.Tech (cse), Dhanekula Institute of

More information

File Sharing System between P2P

File Sharing System between P2P Impact Factor Value: 4.029 ISSN: 2349-7084 International Journal of Computer Engineering In Research Trends Volume 4, Issue 8, August-2017, pp. 325-329 www.ijcert.org File Sharing System between P2P 1

More information

Enhanced Distributed File Replication Protocol for Efficient File Sharing in Wireless Mobile Ad-Hoc Networks.

Enhanced Distributed File Replication Protocol for Efficient File Sharing in Wireless Mobile Ad-Hoc Networks. Enhanced Distributed File Replication Protocol for Efficient File Sharing in Wireless Mobile Ad-Hoc Networks. Patil Ajinkya K. B.E.Computer BVCOERI,Nashik patil.ak93@gmail.com Gaikwad Rutuja K. B.E.Computer

More information

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs

Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Peer To Peer File Sharing For Social Networks Using Ambassador And Coordinator Relationship For Disconnected MANETs Priyadharshini.A #1 and Uvaraj Arutkumaran.S, *2 # ME, Information Technology, Sri Venkateswara

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 10 (October 2013), PP. 56-60 A Co-Operative Cluster Based Data Replication Technique

More information

Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks

Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks Clemson University TigerPrints All Dissertations Dissertations 8-2014 Towards Efficient File Sharing and Packet Routing in Mobile Opportunistic Networks Kang Chen Clemson University, kangc@g.clemson.edu

More information

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Friendship Based Routing in Delay Tolerant Mobile Social Networks Friendship Based Routing in Delay Tolerant Mobile Social Networks Eyuphan Bulut and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Social-Based Cooperative Caching in multi-hop wireless networks

Social-Based Cooperative Caching in multi-hop wireless networks Social-Based Cooperative Caching in multi-hop wireless networks 1 Kothagundla Divya, 2 S.Suresh 1,2 D ept. of CSE, Sree Rama Institute of Technology & Science, SKuppenakuntla, Penuballi, K hammam, AP,

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

On Veracious Search In Unsystematic Networks

On Veracious Search In Unsystematic Networks On Veracious Search In Unsystematic Networks K.Thushara #1, P.Venkata Narayana#2 #1 Student Of M.Tech(S.E) And Department Of Computer Science And Engineering, # 2 Department Of Computer Science And Engineering,

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Fairness-Aware Cooperative Caching Scheme for Mobile Social Networks

Fairness-Aware Cooperative Caching Scheme for Mobile Social Networks Fairness-Aware Cooperative Caching Scheme for Mobile Social Networks Dongsheng Wei [, Konglin Zhu \, and Xin Wang [ [ School of Computer Science, Fudan University, Shanghai, China Engineering Research

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet

An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet An Efficient Peer-to-Peer Distributed Scheduling for Content Based File Sharing in Manet K. Swathi Research Scholar, Dept of computer science, Sri Ramakrishna College of Arts & Science for Women Coimbatore-

More information

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness

Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness 1 Efficient File Search in Delay Tolerant Networks with Social Content and Contact Awareness Kang Chen, Haiying Shen, Senior Member, IEEE,, Li Yan Abstract Distributed file searching in delay tolerant

More information

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs

Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs Computer Networks Vol x, Issue y 1 Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs P. Yang, Member, IEEE M. Chuah 1, Senior Member, IEEE Abstract Mobile nodes in some challenging

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach

Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach Xuejun Zhuo, Qinghua Li, Guohong Cao, Yiqi Dai, Boleslaw Szymanski, Tom La Porta Tsinghua University, China, Email: zhuoxj7@mails.tsinghua.edu.cn,

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

MDR Based Cooperative Strategy Adaptation in Wireless Communication

MDR Based Cooperative Strategy Adaptation in Wireless Communication MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among

More information

Accessing the Location Based Details

Accessing the Location Based Details ISSN:2348-2079 Volume-6 Issue-2 International Journal of Intellectual Advancements and Research in Engineering Computations Accessing the Location Based Details 1 Mr. S. Jagadeesan, M.Sc., M.C.A., M.Phil.,

More information

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS 1 V.Narayanarao, M.tech student, Aitam college, Tekkali, India 2 Promod kumar sahu, Associate professor, Aitam college, Tekkali, India 1 narayanarao.mtech@gmail.com

More information

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks

Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks Cont 2 : Social-Aware Content and Contact Based File Search in Delay Tolerant Networks Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 29631

More information

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi

More information

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final

More information

TSearch: Target-Oriented Low-Delay Node Searching in DTNs with Social Network Properties

TSearch: Target-Oriented Low-Delay Node Searching in DTNs with Social Network Properties earch: Target-Oriented Low-Delay Node Searching in DTNs with Social Network Properties Li Yan, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson,

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

Data Replication for Improving Data Accessibility in Ad Hoc Networks

Data Replication for Improving Data Accessibility in Ad Hoc Networks Missouri University of Science and Technology Scholars' Mine Computer Science Faculty Research & Creative Works Computer Science 1-1-2006 Data Replication for Improving Data Accessibility in Ad Hoc Networks

More information

Impact of Social Networks on Delay Tolerant Routing

Impact of Social Networks on Delay Tolerant Routing Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 9631 Email:

More information

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)

More information

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING International Journal of Mechanical Engineering and Technology (IJMET) Volume 9 Issue 11 November 2018 pp.2226 2231 Article ID: IJMET_09_11_235 Available online at http://www.ia aeme.com/ijmet/issues.asp?jtype=ijmet&vtype=

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs Authors: Bo Wu, Haiying Shen and Kang Chen Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Background Trace

More information

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Ms. Nutan Julka 1, Prof. Dr. J.W Bakal 2 1 Dept. of Computer Science, Pillais Institute of Information Technology,

More information

Peer-to-Peer Content sharing for Smart phones over Ad-Hoc Networks.

Peer-to-Peer Content sharing for Smart phones over Ad-Hoc Networks. Peer-to-Peer Content sharing for Smart phones over Ad-Hoc Networks. Madhuri Marneni M.Tech, Student, Computer Science Engineering Department, Rao & Naidu Engineering College, Ongole. Abstract: The global

More information

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China

More information

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS

MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa

More information

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Survey of Various Protocols Used for Delay Tolerant

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME 44 PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME Ibrahim Saidu a, *,Idawaty Ahmad a,b, Nor Asila Waty Abdul Hamid a,b and Mohammed waziri Yusuf b a Faculty of Computer Science

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Yuan Xu, Xiao Chen Department of Computer Science, Texas State University, San Marcos, TX, USA Email: y x3@txstate.edu, xc@txstate.edu

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks 27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Caching Approach Foundation on Information Density Evaluation

More information

Cooperative Caching in Wireless P2P Networks. Aseel Nadhum Kadhum The Islamic University College

Cooperative Caching in Wireless P2P Networks. Aseel Nadhum Kadhum The Islamic University College Cooperative Caching in Wireless P2P Networks Aseel Nadhum Kadhum The Islamic University College (138).. Cooperative Caching in Wireless P2P Networks Cooperative Caching in Wireless P2P Networks... (139)

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EFFECTIVE DATA FORWARDING TECHNIQUE IN MOBILE SOCIAL NETWORK Ms.Yogita Y.Bhosale*, Prof.Nilesh R.Pardeshi * Department of Computer

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering

More information

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced

More information

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:239-7242 Volume 4 Issue 7 July 205, Page No. 3422-3425 A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Simulation of Intrusion Prevention System

Simulation of Intrusion Prevention System 106 Simulation of Intrusion Prevention System S.S.CHOPADE and Prof. Nitiket N.Mhala DMIETR,Wardha,M.S.,India H.O.D. of Electronics Engg, Bapurao Deshmukh COE, Sevagram,Wardha,M.S.,India ABSTRACT The security

More information

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,

More information

Integrated Routing Protocol for Opportunistic Networks

Integrated Routing Protocol for Opportunistic Networks Integrated Routing Protocol for Opportunistic Networks Anshul Verma Computer Science and Engineering Dept. ABV-Indian Institute of Information Technology and Management, Gwalior, India E-mail: anshulverma87@gmail.com

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) DWEEPNA GARG 1 & PARTH GOHIL 2 1,2 Dept. Of Computer Science and Engineering, Babaria Institute of Technology, Varnama, Vadodara, India E-mail

More information

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Lunan Zhao Fan Li Chao Zhang Yu Wang School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China. Department

More information

Opportunistic Routing Algorithms in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems

Effective File Replication and Consistency Maintenance Mechanism in P2P Systems Global Journal of Computer Science and Technology Volume 11 Issue 16 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (215 ) 1367 1375 3rd International Conference on Recent Trends in Computing 215 (ICRTC-215) Location Information and

More information

Active source routing for ad-hoc network: seamless integration of wireless environment

Active source routing for ad-hoc network: seamless integration of wireless environment Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

A DTN Packet Forwarding Scheme Inspired by Thermodynamics

A DTN Packet Forwarding Scheme Inspired by Thermodynamics A DTN Packet Forwarding Scheme Inspired by Thermodynamics Mehdi Kalantari and Richard J. La Department of Electrical and Computer Engineering University of Maryland {mehkalan, hyongla}@umd.edu Abstract

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang

More information

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information