SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 25-31
www.iosrjournals.org


An Efficient and Active Data Delivery for Highly Dynamic Mobile
                        Ad Hoc Networks
                 G. Vivek Ananth1, S. Mohana Rangan2 Dr.D.Sivakumar3
                         1(StudentCSE, Arunai College of Engg, Tamil Nadu, India)
                   2(Associate Professor(CSE), Arunai College of Engg, Tamil Nadu, India)
                   3(Associate Professor(ECE),Arunai College of Engg, Tamil Nadu, India)

Abstract: In highly dynamic mobile ad hoc networks occurred transmission problems like delivering data
packets, packet delay, time delay and so on. Most of the existing ad hoc routing protocols are affected by node
mobility, especially for large-scale networks [1]. Large-scale networks mean that wireless network at the
dynamic time. Propel by this issue, position-based opportunistic routing(POR) protocol is efficient to
introducing further advantage of the stateless property of Geo graphing routing and the broadcast environment
of wireless medium. This POR having the right qualities in delivering the data to destination in highly energetic
or forceful MANET. But it is susceptible by the over heading problem and also no data confidentiality. When a
data packet is sent out, the neighbor nodes that have overhead the transmission, then serve as forwarding
candidates. The specific best forwarder take turn the packets if it is not relayed by best forwarding candidates wit
in a certain period of time, so the duplicate relaying caused by packet reroute. Many routing protocols are
recommend by mobile-ad-hoc networks. In which the proactive Fish Eye State Routing(FSR) protocol is
proposed for provides excellent solution to delivering data to highly dynamic MANETs, by updating and
communicating nodes and nodes position and delivering data without over heading. The proposed scheme works
well in large network of high mobility nodes. But still we susceptibleness to security threaten. Our security
scheme is proposed to minimize the number of black holes or malicious nodes or selfish nodes in the path to
destination, thus the number of data packet dropping may be minimized, we secured the FSR protocol with
security. In the case of communication break, a Virtual Destination-based Void Handling (VDVH)[9] scheme is
further proposed to work together with FSR.
Keywords: Ad-hoc Network, FSR, GR, MANET, POR, VDVH

                                               I. INTRODUCTION
          A Mobile ad hoc network is a distributed wireless network. A MANET has several silent characteristics
such as dynamic topologies, bandwidth obligated, lessen physical security, power-constrained operation etc[1]. In
this network the nodes are moving dynamically without any centralized infrastructure each and every node
behaving a self-organizing and self-configuring node acts as router. The MANET have expand in wide range
mobile network transmission. But the challenged environments toil with high mobility. No end-to-end routes
need to be handled, guiding to GR’s high efficiency and scalability. However, GR is very susceptible to the quality
of location information[3].
          The existing routing protocols(DSDV,AODV,DSR) are affected by node mobility[2]. The concept of
such multicast-like routing strategy has already been demonstrated in opportunistic routing Because of the stable
and even quick changing network topology[5][6], it is very exhausting to maintain established route. Once the
path breaks when the packets are transmitting, the data packets will get lost or be delayed of a lengthy time until
the rebuild of the route, this is occurred in hop-by-hop routing manner[7]. Greedy forwarding method used to
select next hop forwarder for transmitting the packets to next best forwarder in the large scale wireless
environments[4]. But in existing the hop counts are very high. Thus the FSR protocol proposed new qualities for
the reliable data delivering in highly dynamic MANETs and to overcome the limitations of POR. The protocol
can checks packet over heading and provides security in data transmission in highly dynamic networks. The
Virtual Destination-Based Void Handling (VDVH) is one of the further propped work for handling the
communication voids. The new system has improved over POR in data delivery, packet transmitting rate, security
etc. This paper analyzes the performance of Fish Eye state routing protocol and also organized as follows section
3 deals with the classification of routing, section 4 presents the Working principle section 5 coevals the
Simulation Environment Section 6 deals with the Outputs and Section 7 Concludes with the Conclusion and
Future Prospects.



                                          www.iosrjournals.org                                            25 | Page
An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks




                                        Figure.1 Architecture of MANET

                     II. CLASSIFICATION OF FISH EYE STATE ROUTING PROTOCOL
          The system has mobile nodes which are present in highly dynamic network. Each node has its own
power resource and computing power and location finding routing mechanism of next hop node.
Each node has specific speed of movement and direction and communication range. The system has “n” number
of nodes. A node communicates with each other through Ad-hoc mode thus it is free of any infrastructure based
communication. The fisheye technique is used to reduce the routing overhead. The fish eye has the ability to see
objects the better when they are nearer to its focal point. It explains each node maintains accurate information
about near nodes and not so accurate about far-away nodes. The nodes are exchanges topology information only
with their neighbors. The Reactive Routing Protocols are also called On demand routing protocols since they
don't maintain routing information or routing activity at the network nodes if there is no communication. If a node
craving to send a packet to alternative node then this protocol searches for the route in an on-demand manner and
establishes the connection in order to transmit and apprehend the packet. The route discovery consistently arise by
calamity the route request packets throughout the network. In the presence of an authentication protocol to protect
the upper layers, external threats are detected at the physical and data link layers. The external threats again can
be divided into two categories. Passive Threats or threats to confidentiality or Eavesdropping. Active Threats or
threats to the integrity and availability . The threats posed by internal nodes are very serious; as internal nodes are
have the necessary information to participate in distributed operations. Internal threats also can be divided into
two types; active threats and passive threats. Internal nodes can misbehave in a variety of different ways. These
can be differentiated into three categories - failed nodes, badly failed nodes, selfish nodes or malicious nodes.




                                            Figure 2 FSR Architecture

                                         III. WORKING PRINCIPLE
            The system design understandable how the mobile node can transmit a packet from source to
destination using neighbor nodes. In wireless infrastructure using the MAC layer. It is a network interface. The
neighbor nodes are selected by candidate set selection and shortlisted. The POR registered the node location and
also predetermined the virtual destination node. In between that the Fish Eye State Routing can control the
dynamic forwarding nodes for transmit the packets to virtual destination. After that the virtual destination nodes
identified the destination node. If any communication hole occurred, the virtual destination void handling has
capable to deal with this kinds of communication void, so that the transmission is frequently. The best forwarder


                                           www.iosrjournals.org                                              26 | Page
An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

ahead the packets to next nodes and find the destination timely manner. The FSR can overcomes the packet
discard problem by discover the available as another choice route and transmission.




                                 Figure 3 System design for proposed system

The fig 3 describes the working procedure of proposed system in the highly dynamic mobile ad hoc networks
using the secure FSR protocol and transmission reliable and efficient.

        IV. COMPARISON BETWEEN PROPOSED AND EXISTING SYSTEM BLOCK DIAGRAM




                           Fig 4 System design for Proposed and Existing system

The Existing system design explains in POR discovery and recovery procedures for neighbor nodes are also time
and energy consuming so that the Performance degrades when node mobility increases. If Communication holes
occur the interface node can lose the connectivity and then duplicate relaying appear. So the source node can do
packet sending again so its chance to be traffic on forwarding agents. The intermediate nodes cannot correctly
identified virtual destination node. In proposed system, Uses the fisheye technique to reduce the routing overhead
Each node has its own power resource and computing power and location finding routing mechanism of next hop
node. Nodes exchange topology information only with their neighbors. The routing overhead is also reduced due
to different frequencies of updates among nodes of different scopes

                                     V. SIMULATION CIRCUMSTANCES
         This proposed routing protocol has been implemented by the Network Simulator2 (NS2). The Network
Simulator is mainly utilized to implement the routing protocols in the networking research. The Main focus of our
Fish Eye State routing is reducing the Node Mobility, duplicate relaying, traffic, and good packet deliver. The
simulation results are shown below.
                                         www.iosrjournals.org                                           27 | Page
An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks



                                  Number of Nodes         50
                                  Packet size             512bytes
                                  Antenna                 Omni antenna
                                  Channel                 Wireless channel
                                  Bandwidth               2x106
                                  Layer                   MAC layer
                                  X Width                 2200
                                  Y Width                 2200
                                  Supporting protocol     POR
                                  Bit Rate                CBR
                                          Tables 1 Simulation Framework

                        VI. DATA FORWARDING IN POSITION OPPORTUNISTIC
         In opportunistic networks, mobile nodes are enabled to communicate with each other even if a route
connecting them never exists. Likewise, nodes are not brainstorm to dominate or acquire any knowledge about the
network topology, which is preferably cardinal in traditional MANET routing protocols. Routes are stout
dynamically, while messages are en route between the sender and the destination(s), and any applicable node can
capable to be used as next hop, contribute it is likely to companion the message closer to the final destination. In
opportunistic networking no assumption is made on the existence of a complete path between two nodes wishing
to disclose. Source and destination nodes authority never be connected to the same network, at the same time.
Opportunistic networking techniques allow such nodes to exchange messages between them.




position-based opportunistic routing mechanism which can be deployed without complex modification to MAC
protocol and achieve multiple reception without losing the benefit of collision avoidance provided by 802.11. The
concept of in-the-air backup significantly enhances the robustness of the routing protocol and reduces the latency
and duplicate forwarding caused by local route repair when a source node wants to transmit a packet; it gets the
location of the destination first and then attaches it to the packet header. Mature to the destination node’s
progress, the multi hop path may diverge from the true location of the final destination and a packet would be
dropped even if it has already been delivered into the neighborhood of the destination. To conception with such
issue, collateral check for the destination node is bring out. At each hop, the node that promote the packet will
check its neighbor list to see whether the destination is within its hauling circle. If yes, the packet will be plump
forwarded to the destination. By performing such identification check before greedy forwarding based on locality
information, the effect of the path departure can be very much alleviated.

The Network Simulator outputs are following next section with suitable descriptions.




                                           www.iosrjournals.org                                            28 | Page
An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks




                                            Figure 5 Node Selection

 The Fig5 describe the selection of forwarding nodes for data transmission in a dynamic time. The mobile devices
and mobile phones are mainly used for this transmission.




                                        Figure 6 Secure Fsr node route

The fig 6 describes the secure Fish Eye State node can control and maintains accurate information about the
neibhor nodes. The nodes exchange topology only with their neighbors. It can finding the alternate path for
frequent trasmission.




                                       Figure 7 Void handling recovery
The fig 7 describes when the nodes are selfish the communication holes will be appear so the nodes can't forward
the packets. During this void handling process. So that the virtual destination is introduced for temporary target.




                                          www.iosrjournals.org                                           29 | Page
An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks




                                        Figure 8 Greedy forwarding to destination

The fig 8 describes overcome the problem of void handling and then how to switch back to greedy forwarding
during communication voids. The forwarding candidates can preferred neighbor nodes with FSR technique. After
that the packet has been forwarded to next hop. The nodes in the MANET are resource constrained; resource may
be bandwidth, activity etc. Most of the nodes in MANET relay on batteries as their source of capability; so, some
of the nodes appear maliciously to conserve their limited battery effectiveness. So, when the data packets are
ahead to the destination these selfish nodes simply do not forward the data packets towards the destination. So all
the packets move up to that node and abscond. Hence, these nodes persevere as a black hole which causes data
packet dropping. Black hole attack can be launched both on control packets and data packets, but here we have
considered the case of data packets, considering in fish eye state routing algorithm the number of control packets
are very less compared to the number of data packets. But, when forwarding data packets if some of the packets
are dropped, then alternate route is searched to forward the packets even if that route is the shortest one. This
increases the time complexity of the protocol. This is the receiving section from the virtual destination, so greedy
forwarding perform switch back, because it finds that its own location and nearer to the real destination, it makes
positive progress towards the real destination. Mainly the FSR technique reduce the hop count and make the
transmission reliable.

                                              VII. CONCLUSION
         The proposed routing protocol SECURE FISH EYE Routing Protocol [FSR] transmits a packet from
source node to transmits a packet to the destination and it moves to the destination node without communication
voids were analyzed by using NS-2. The Fish Eye State Protocol provides good packet delivery and reduce
duplicate relaying and reduces time delay compare to existing system with using POR it reduces the time to
recover the route to destination and uses few nodes to transmit so the packet loss is less. A virtual
destination-based void handling scheme is proposed, Using FSR Algorithm For Data transaction connection
Reliable For packet Sending to Destination Traditional void handling method performs poorly in mobile
environments while VDVH works quite well.

                                           VIII. FUTURE WORK
          In future we proposed for Multicasting in MANETs. And also developing wireless medium using for
reliable transmission in large wireless network topologies. In future the frequent fast changing networks can
handled the communication using intermediate nodes. To work with the multicast drive style, a virtual
destination-based void handling scheme is proposed.



                                              IX. ACKNOWLEDGMENTS
The authors are thankful to IOSR Journal for the support to develop this document. Benediction to Management, Staff of Arunai College of
Engineering for their Wonderful Support towards this paper submission.




                                                  www.iosrjournals.org                                                      30 | Page
An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks



                                                            References
[1]    Neelesh Gupta, A.P., EC Dept. TIEIT (TRUBA), Bhopal, (M.P.)-India International Journal of Computer Applications (0975 – 8887)
       Volume 17–No.5, March 2011.
[2]    J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, and J. Jetcheva, “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network
       Routing Protocols,” Proc. ACM MobiCom, pp. 85-97, 1998.
[3]    D. Son, A. Helmy, and B. Krishnamachari, “The Effect of Mobility Induced Location Errors on Geographic Routing in Mobile Ad Hoc
       Sensor Networks: Analysis and Improvement Using Mobility Prediction,” IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 233- 245,
       July/Aug.2004.
[4]    D. Chen and P. Varshney, “A Survey of Void Handling Techniques for Geographic Routing in Wireless          Networks,” IEEE Comm.
       Surveys and Tutorials, vol. 9, no. 1, pp. 50-67, Jan.-Mar. 2007.
[5]    S. Biswas and R. Morris, “EXOR: Opportunistic Multi-Hop Routing for Wireless Networks,” Proc. ACM SIGCOMM, pp. 133-144,
       2005.
[6]     S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading Structure for Randomness in Wireless Opportunistic Routing,” Proc.
        ACM SIGCOMM, pp. 169-180, 2007.
[7]    Alvin C. Valera, Student Member, IEEE, WinstonK.G. Seah, Senior Member, IEEE, and S.V. Rao, Senior Member,IEEEVOL.4,NO.5,
       September 2005
[8]    Thrasyvoulos Spyropoulos, Konstantinos Psounis, and Cauligi S. Raghavendra, “Efficient Routing in Intermittently Connected Mobile
       Networks: The Multiple-Copy Case,” IEEE/ACM transactions on networking, vol. 16, Feb. 2008.
[9]    Shengbo Yang, Chai Kiat Yeo, and Bu Sung Lee http://www.ietf.org/ rfc/rfc4726.txt VOL. 11, NO. 1, JANUARY 2012.
[10]   B. Deb, S. Bhatnagar, and B. Nath, “ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks,” Proc. Ann.
       IEEE Int’l Conf. Local Computer Networks (LCN ’03), pp. 406- 415, 2003.
[11]   F. Wu, T. Chen, S. Zhong, L.E. Li, and Y.R. Yang, “Incentive- Compatible Opportunistic Routing for Wireless Networks,” Proc. ACM
       MobiCom, pp. 03-314, 2008.
[12]   S. Mueller, R. Tsang, and D. Ghosal, “Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges,” Performance Tools and
       Applications to Networked Systems, pp. 209-234, Springer, 2004.
[13]   R. Manoharan and E. Ilavarasan, “Impact of the mobility on the performance of multicast routing protocols in MANET”, International
       Journal of wireless & mobile networks (IJWMN),vol.2 no.2, 2010.
[14]   E. Rozner, J. Seshadri, Y. Mehta, and L. Qiu, “SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks,”
       IEEE Trans. Mobile Computing, vol. 8, no. 12, pp. 1622-1635, Dec. 2009.
[15]   The Network Simulator ns-2, http://www.isi.edu/nsnam/ns, 2011.
[16]    moment.cs.ucsb.edu/AODV/ID/draft-ietf-manet-ao dv-13.txt

                                             BIOGRAPHIES
G. Vivek Ananth received his M.C.A degree in Computer Applications from the Sathyabama University,
Chennai, Tamilnadu, in 2011. Currently, he is studying M.E. Computer Science and Engineering at Arunai
College of Engineering, Thiruvannamalai. His project and research area includes networking, wireless
communication.

S.Mohaganarangan, obtained his M.Tech(IT) from Sathyabama University, Chennai. Currently he is doing his
Ph.D from Anna University and working an associate Professor and Head of the Department of Computer
Science and Engineering in Arunai College of Engineering, Tiruvannamalai. His research area is network and
Communication

Dr.D.Sivakumar B.E., M.E., Ph.D., M.I.S.T.E., F.I.E.T.E., S.I.A.C.S.I.T completed his under graduation in
Electronics and Communication from Madras University and Post graduation in Instrumentation from
Annamalai University. He was awarded doctorate under the faculty of information and Communication through
Anna University, Chennai.With 17 years of teaching and research experiences in various reputed engineering
colleges in and around Chennai in Tamil Nadu, he is presently associated with Arunai College of Engineering,
Tiruvannamalai as DEAN (Planning & Execution)and Professor in the Department of ECE. He has guided more
than 25 projects for UG and PG students.




                                                 www.iosrjournals.org                                                        31 | Page

Mais conteúdo relacionado

Mais procurados

Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Yayah Zakaria
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 

Mais procurados (17)

Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
ant2
ant2ant2
ant2
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Ant
AntAnt
Ant
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
A2546035115
A2546035115A2546035115
A2546035115
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
P15
P15P15
P15
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 

Destaque

Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsIOSR Journals
 
Smart Data Server for Smart Shops
Smart Data Server for Smart ShopsSmart Data Server for Smart Shops
Smart Data Server for Smart ShopsIOSR Journals
 
Optimization of Mining Association Rule from XML Documents
Optimization of Mining Association Rule from XML DocumentsOptimization of Mining Association Rule from XML Documents
Optimization of Mining Association Rule from XML DocumentsIOSR Journals
 
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...IOSR Journals
 
Efficient Record De-Duplication Identifying Using Febrl Framework
Efficient Record De-Duplication Identifying Using Febrl FrameworkEfficient Record De-Duplication Identifying Using Febrl Framework
Efficient Record De-Duplication Identifying Using Febrl FrameworkIOSR Journals
 
OSN: Privacy Preserving Policies
OSN: Privacy Preserving PoliciesOSN: Privacy Preserving Policies
OSN: Privacy Preserving PoliciesIOSR Journals
 
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...Thomas Gottron
 
Secure Network Discovery for Risk-Aware Framework in Manet
Secure Network Discovery for Risk-Aware Framework in ManetSecure Network Discovery for Risk-Aware Framework in Manet
Secure Network Discovery for Risk-Aware Framework in ManetIOSR Journals
 
An Adaptive Zero Voltage Mechanism for Boost Converter
An Adaptive Zero Voltage Mechanism for Boost ConverterAn Adaptive Zero Voltage Mechanism for Boost Converter
An Adaptive Zero Voltage Mechanism for Boost ConverterIOSR Journals
 
Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15watersb
 
Effects of SIP in Interoperable LMR/Cellular Heterogeneous Mobile Wireless N...
Effects of SIP in Interoperable LMR/Cellular Heterogeneous  Mobile Wireless N...Effects of SIP in Interoperable LMR/Cellular Heterogeneous  Mobile Wireless N...
Effects of SIP in Interoperable LMR/Cellular Heterogeneous Mobile Wireless N...IOSR Journals
 
Modeling and Application of a Modified Attributional Psychometric Instrument...
Modeling and Application of a Modified Attributional  Psychometric Instrument...Modeling and Application of a Modified Attributional  Psychometric Instrument...
Modeling and Application of a Modified Attributional Psychometric Instrument...IOSR Journals
 
Evaluation of Biocontrol agents against Lasiodiplodia theobromae causing Infl...
Evaluation of Biocontrol agents against Lasiodiplodia theobromae causing Infl...Evaluation of Biocontrol agents against Lasiodiplodia theobromae causing Infl...
Evaluation of Biocontrol agents against Lasiodiplodia theobromae causing Infl...IOSR Journals
 
Transmission Loss Minimization Using Optimization Technique Based On Pso
Transmission Loss Minimization Using Optimization Technique Based On PsoTransmission Loss Minimization Using Optimization Technique Based On Pso
Transmission Loss Minimization Using Optimization Technique Based On PsoIOSR Journals
 
Wastemanegement 2
Wastemanegement 2Wastemanegement 2
Wastemanegement 2laniator
 
Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data Thomas Gottron
 
и.а.крылов викторина
и.а.крылов  викторинаи.а.крылов  викторина
и.а.крылов викторинаNatalya Dyrda
 

Destaque (20)

A0510108
A0510108A0510108
A0510108
 
Privacy and Security in Online Examination Systems
Privacy and Security in Online Examination SystemsPrivacy and Security in Online Examination Systems
Privacy and Security in Online Examination Systems
 
Smart Data Server for Smart Shops
Smart Data Server for Smart ShopsSmart Data Server for Smart Shops
Smart Data Server for Smart Shops
 
Optimization of Mining Association Rule from XML Documents
Optimization of Mining Association Rule from XML DocumentsOptimization of Mining Association Rule from XML Documents
Optimization of Mining Association Rule from XML Documents
 
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...Performance Comparison of Various Filters and Wavelet Transform for Image De-...
Performance Comparison of Various Filters and Wavelet Transform for Image De-...
 
Efficient Record De-Duplication Identifying Using Febrl Framework
Efficient Record De-Duplication Identifying Using Febrl FrameworkEfficient Record De-Duplication Identifying Using Febrl Framework
Efficient Record De-Duplication Identifying Using Febrl Framework
 
OSN: Privacy Preserving Policies
OSN: Privacy Preserving PoliciesOSN: Privacy Preserving Policies
OSN: Privacy Preserving Policies
 
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
 
Secure Network Discovery for Risk-Aware Framework in Manet
Secure Network Discovery for Risk-Aware Framework in ManetSecure Network Discovery for Risk-Aware Framework in Manet
Secure Network Discovery for Risk-Aware Framework in Manet
 
An Adaptive Zero Voltage Mechanism for Boost Converter
An Adaptive Zero Voltage Mechanism for Boost ConverterAn Adaptive Zero Voltage Mechanism for Boost Converter
An Adaptive Zero Voltage Mechanism for Boost Converter
 
Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15Ndta mentor protege program 2-2-15
Ndta mentor protege program 2-2-15
 
Effects of SIP in Interoperable LMR/Cellular Heterogeneous Mobile Wireless N...
Effects of SIP in Interoperable LMR/Cellular Heterogeneous  Mobile Wireless N...Effects of SIP in Interoperable LMR/Cellular Heterogeneous  Mobile Wireless N...
Effects of SIP in Interoperable LMR/Cellular Heterogeneous Mobile Wireless N...
 
Modeling and Application of a Modified Attributional Psychometric Instrument...
Modeling and Application of a Modified Attributional  Psychometric Instrument...Modeling and Application of a Modified Attributional  Psychometric Instrument...
Modeling and Application of a Modified Attributional Psychometric Instrument...
 
Evaluation of Biocontrol agents against Lasiodiplodia theobromae causing Infl...
Evaluation of Biocontrol agents against Lasiodiplodia theobromae causing Infl...Evaluation of Biocontrol agents against Lasiodiplodia theobromae causing Infl...
Evaluation of Biocontrol agents against Lasiodiplodia theobromae causing Infl...
 
Transmission Loss Minimization Using Optimization Technique Based On Pso
Transmission Loss Minimization Using Optimization Technique Based On PsoTransmission Loss Minimization Using Optimization Technique Based On Pso
Transmission Loss Minimization Using Optimization Technique Based On Pso
 
Wastemanegement 2
Wastemanegement 2Wastemanegement 2
Wastemanegement 2
 
K0946269
K0946269K0946269
K0946269
 
Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data
 
Audition
AuditionAudition
Audition
 
и.а.крылов викторина
и.а.крылов  викторинаи.а.крылов  викторина
и.а.крылов викторина
 

Semelhante a E0942531

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...IAESIJAI
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolIOSR Journals
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 

Semelhante a E0942531 (20)

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
Location-aware hybrid microscopic routing scheme for mobile opportunistic net...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
G1063841
G1063841G1063841
G1063841
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
Aodv
AodvAodv
Aodv
 
E010322531
E010322531E010322531
E010322531
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
 
B010130508
B010130508B010130508
B010130508
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Último (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

E0942531

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 25-31 www.iosrjournals.org An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks G. Vivek Ananth1, S. Mohana Rangan2 Dr.D.Sivakumar3 1(StudentCSE, Arunai College of Engg, Tamil Nadu, India) 2(Associate Professor(CSE), Arunai College of Engg, Tamil Nadu, India) 3(Associate Professor(ECE),Arunai College of Engg, Tamil Nadu, India) Abstract: In highly dynamic mobile ad hoc networks occurred transmission problems like delivering data packets, packet delay, time delay and so on. Most of the existing ad hoc routing protocols are affected by node mobility, especially for large-scale networks [1]. Large-scale networks mean that wireless network at the dynamic time. Propel by this issue, position-based opportunistic routing(POR) protocol is efficient to introducing further advantage of the stateless property of Geo graphing routing and the broadcast environment of wireless medium. This POR having the right qualities in delivering the data to destination in highly energetic or forceful MANET. But it is susceptible by the over heading problem and also no data confidentiality. When a data packet is sent out, the neighbor nodes that have overhead the transmission, then serve as forwarding candidates. The specific best forwarder take turn the packets if it is not relayed by best forwarding candidates wit in a certain period of time, so the duplicate relaying caused by packet reroute. Many routing protocols are recommend by mobile-ad-hoc networks. In which the proactive Fish Eye State Routing(FSR) protocol is proposed for provides excellent solution to delivering data to highly dynamic MANETs, by updating and communicating nodes and nodes position and delivering data without over heading. The proposed scheme works well in large network of high mobility nodes. But still we susceptibleness to security threaten. Our security scheme is proposed to minimize the number of black holes or malicious nodes or selfish nodes in the path to destination, thus the number of data packet dropping may be minimized, we secured the FSR protocol with security. In the case of communication break, a Virtual Destination-based Void Handling (VDVH)[9] scheme is further proposed to work together with FSR. Keywords: Ad-hoc Network, FSR, GR, MANET, POR, VDVH I. INTRODUCTION A Mobile ad hoc network is a distributed wireless network. A MANET has several silent characteristics such as dynamic topologies, bandwidth obligated, lessen physical security, power-constrained operation etc[1]. In this network the nodes are moving dynamically without any centralized infrastructure each and every node behaving a self-organizing and self-configuring node acts as router. The MANET have expand in wide range mobile network transmission. But the challenged environments toil with high mobility. No end-to-end routes need to be handled, guiding to GR’s high efficiency and scalability. However, GR is very susceptible to the quality of location information[3]. The existing routing protocols(DSDV,AODV,DSR) are affected by node mobility[2]. The concept of such multicast-like routing strategy has already been demonstrated in opportunistic routing Because of the stable and even quick changing network topology[5][6], it is very exhausting to maintain established route. Once the path breaks when the packets are transmitting, the data packets will get lost or be delayed of a lengthy time until the rebuild of the route, this is occurred in hop-by-hop routing manner[7]. Greedy forwarding method used to select next hop forwarder for transmitting the packets to next best forwarder in the large scale wireless environments[4]. But in existing the hop counts are very high. Thus the FSR protocol proposed new qualities for the reliable data delivering in highly dynamic MANETs and to overcome the limitations of POR. The protocol can checks packet over heading and provides security in data transmission in highly dynamic networks. The Virtual Destination-Based Void Handling (VDVH) is one of the further propped work for handling the communication voids. The new system has improved over POR in data delivery, packet transmitting rate, security etc. This paper analyzes the performance of Fish Eye state routing protocol and also organized as follows section 3 deals with the classification of routing, section 4 presents the Working principle section 5 coevals the Simulation Environment Section 6 deals with the Outputs and Section 7 Concludes with the Conclusion and Future Prospects. www.iosrjournals.org 25 | Page
  • 2. An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Figure.1 Architecture of MANET II. CLASSIFICATION OF FISH EYE STATE ROUTING PROTOCOL The system has mobile nodes which are present in highly dynamic network. Each node has its own power resource and computing power and location finding routing mechanism of next hop node. Each node has specific speed of movement and direction and communication range. The system has “n” number of nodes. A node communicates with each other through Ad-hoc mode thus it is free of any infrastructure based communication. The fisheye technique is used to reduce the routing overhead. The fish eye has the ability to see objects the better when they are nearer to its focal point. It explains each node maintains accurate information about near nodes and not so accurate about far-away nodes. The nodes are exchanges topology information only with their neighbors. The Reactive Routing Protocols are also called On demand routing protocols since they don't maintain routing information or routing activity at the network nodes if there is no communication. If a node craving to send a packet to alternative node then this protocol searches for the route in an on-demand manner and establishes the connection in order to transmit and apprehend the packet. The route discovery consistently arise by calamity the route request packets throughout the network. In the presence of an authentication protocol to protect the upper layers, external threats are detected at the physical and data link layers. The external threats again can be divided into two categories. Passive Threats or threats to confidentiality or Eavesdropping. Active Threats or threats to the integrity and availability . The threats posed by internal nodes are very serious; as internal nodes are have the necessary information to participate in distributed operations. Internal threats also can be divided into two types; active threats and passive threats. Internal nodes can misbehave in a variety of different ways. These can be differentiated into three categories - failed nodes, badly failed nodes, selfish nodes or malicious nodes. Figure 2 FSR Architecture III. WORKING PRINCIPLE The system design understandable how the mobile node can transmit a packet from source to destination using neighbor nodes. In wireless infrastructure using the MAC layer. It is a network interface. The neighbor nodes are selected by candidate set selection and shortlisted. The POR registered the node location and also predetermined the virtual destination node. In between that the Fish Eye State Routing can control the dynamic forwarding nodes for transmit the packets to virtual destination. After that the virtual destination nodes identified the destination node. If any communication hole occurred, the virtual destination void handling has capable to deal with this kinds of communication void, so that the transmission is frequently. The best forwarder www.iosrjournals.org 26 | Page
  • 3. An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks ahead the packets to next nodes and find the destination timely manner. The FSR can overcomes the packet discard problem by discover the available as another choice route and transmission. Figure 3 System design for proposed system The fig 3 describes the working procedure of proposed system in the highly dynamic mobile ad hoc networks using the secure FSR protocol and transmission reliable and efficient. IV. COMPARISON BETWEEN PROPOSED AND EXISTING SYSTEM BLOCK DIAGRAM Fig 4 System design for Proposed and Existing system The Existing system design explains in POR discovery and recovery procedures for neighbor nodes are also time and energy consuming so that the Performance degrades when node mobility increases. If Communication holes occur the interface node can lose the connectivity and then duplicate relaying appear. So the source node can do packet sending again so its chance to be traffic on forwarding agents. The intermediate nodes cannot correctly identified virtual destination node. In proposed system, Uses the fisheye technique to reduce the routing overhead Each node has its own power resource and computing power and location finding routing mechanism of next hop node. Nodes exchange topology information only with their neighbors. The routing overhead is also reduced due to different frequencies of updates among nodes of different scopes V. SIMULATION CIRCUMSTANCES This proposed routing protocol has been implemented by the Network Simulator2 (NS2). The Network Simulator is mainly utilized to implement the routing protocols in the networking research. The Main focus of our Fish Eye State routing is reducing the Node Mobility, duplicate relaying, traffic, and good packet deliver. The simulation results are shown below. www.iosrjournals.org 27 | Page
  • 4. An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Number of Nodes 50 Packet size 512bytes Antenna Omni antenna Channel Wireless channel Bandwidth 2x106 Layer MAC layer X Width 2200 Y Width 2200 Supporting protocol POR Bit Rate CBR Tables 1 Simulation Framework VI. DATA FORWARDING IN POSITION OPPORTUNISTIC In opportunistic networks, mobile nodes are enabled to communicate with each other even if a route connecting them never exists. Likewise, nodes are not brainstorm to dominate or acquire any knowledge about the network topology, which is preferably cardinal in traditional MANET routing protocols. Routes are stout dynamically, while messages are en route between the sender and the destination(s), and any applicable node can capable to be used as next hop, contribute it is likely to companion the message closer to the final destination. In opportunistic networking no assumption is made on the existence of a complete path between two nodes wishing to disclose. Source and destination nodes authority never be connected to the same network, at the same time. Opportunistic networking techniques allow such nodes to exchange messages between them. position-based opportunistic routing mechanism which can be deployed without complex modification to MAC protocol and achieve multiple reception without losing the benefit of collision avoidance provided by 802.11. The concept of in-the-air backup significantly enhances the robustness of the routing protocol and reduces the latency and duplicate forwarding caused by local route repair when a source node wants to transmit a packet; it gets the location of the destination first and then attaches it to the packet header. Mature to the destination node’s progress, the multi hop path may diverge from the true location of the final destination and a packet would be dropped even if it has already been delivered into the neighborhood of the destination. To conception with such issue, collateral check for the destination node is bring out. At each hop, the node that promote the packet will check its neighbor list to see whether the destination is within its hauling circle. If yes, the packet will be plump forwarded to the destination. By performing such identification check before greedy forwarding based on locality information, the effect of the path departure can be very much alleviated. The Network Simulator outputs are following next section with suitable descriptions. www.iosrjournals.org 28 | Page
  • 5. An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Figure 5 Node Selection The Fig5 describe the selection of forwarding nodes for data transmission in a dynamic time. The mobile devices and mobile phones are mainly used for this transmission. Figure 6 Secure Fsr node route The fig 6 describes the secure Fish Eye State node can control and maintains accurate information about the neibhor nodes. The nodes exchange topology only with their neighbors. It can finding the alternate path for frequent trasmission. Figure 7 Void handling recovery The fig 7 describes when the nodes are selfish the communication holes will be appear so the nodes can't forward the packets. During this void handling process. So that the virtual destination is introduced for temporary target. www.iosrjournals.org 29 | Page
  • 6. An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Figure 8 Greedy forwarding to destination The fig 8 describes overcome the problem of void handling and then how to switch back to greedy forwarding during communication voids. The forwarding candidates can preferred neighbor nodes with FSR technique. After that the packet has been forwarded to next hop. The nodes in the MANET are resource constrained; resource may be bandwidth, activity etc. Most of the nodes in MANET relay on batteries as their source of capability; so, some of the nodes appear maliciously to conserve their limited battery effectiveness. So, when the data packets are ahead to the destination these selfish nodes simply do not forward the data packets towards the destination. So all the packets move up to that node and abscond. Hence, these nodes persevere as a black hole which causes data packet dropping. Black hole attack can be launched both on control packets and data packets, but here we have considered the case of data packets, considering in fish eye state routing algorithm the number of control packets are very less compared to the number of data packets. But, when forwarding data packets if some of the packets are dropped, then alternate route is searched to forward the packets even if that route is the shortest one. This increases the time complexity of the protocol. This is the receiving section from the virtual destination, so greedy forwarding perform switch back, because it finds that its own location and nearer to the real destination, it makes positive progress towards the real destination. Mainly the FSR technique reduce the hop count and make the transmission reliable. VII. CONCLUSION The proposed routing protocol SECURE FISH EYE Routing Protocol [FSR] transmits a packet from source node to transmits a packet to the destination and it moves to the destination node without communication voids were analyzed by using NS-2. The Fish Eye State Protocol provides good packet delivery and reduce duplicate relaying and reduces time delay compare to existing system with using POR it reduces the time to recover the route to destination and uses few nodes to transmit so the packet loss is less. A virtual destination-based void handling scheme is proposed, Using FSR Algorithm For Data transaction connection Reliable For packet Sending to Destination Traditional void handling method performs poorly in mobile environments while VDVH works quite well. VIII. FUTURE WORK In future we proposed for Multicasting in MANETs. And also developing wireless medium using for reliable transmission in large wireless network topologies. In future the frequent fast changing networks can handled the communication using intermediate nodes. To work with the multicast drive style, a virtual destination-based void handling scheme is proposed. IX. ACKNOWLEDGMENTS The authors are thankful to IOSR Journal for the support to develop this document. Benediction to Management, Staff of Arunai College of Engineering for their Wonderful Support towards this paper submission. www.iosrjournals.org 30 | Page
  • 7. An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks References [1] Neelesh Gupta, A.P., EC Dept. TIEIT (TRUBA), Bhopal, (M.P.)-India International Journal of Computer Applications (0975 – 8887) Volume 17–No.5, March 2011. [2] J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, and J. Jetcheva, “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” Proc. ACM MobiCom, pp. 85-97, 1998. [3] D. Son, A. Helmy, and B. Krishnamachari, “The Effect of Mobility Induced Location Errors on Geographic Routing in Mobile Ad Hoc Sensor Networks: Analysis and Improvement Using Mobility Prediction,” IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 233- 245, July/Aug.2004. [4] D. Chen and P. Varshney, “A Survey of Void Handling Techniques for Geographic Routing in Wireless Networks,” IEEE Comm. Surveys and Tutorials, vol. 9, no. 1, pp. 50-67, Jan.-Mar. 2007. [5] S. Biswas and R. Morris, “EXOR: Opportunistic Multi-Hop Routing for Wireless Networks,” Proc. ACM SIGCOMM, pp. 133-144, 2005. [6] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading Structure for Randomness in Wireless Opportunistic Routing,” Proc. ACM SIGCOMM, pp. 169-180, 2007. [7] Alvin C. Valera, Student Member, IEEE, WinstonK.G. Seah, Senior Member, IEEE, and S.V. Rao, Senior Member,IEEEVOL.4,NO.5, September 2005 [8] Thrasyvoulos Spyropoulos, Konstantinos Psounis, and Cauligi S. Raghavendra, “Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-Copy Case,” IEEE/ACM transactions on networking, vol. 16, Feb. 2008. [9] Shengbo Yang, Chai Kiat Yeo, and Bu Sung Lee http://www.ietf.org/ rfc/rfc4726.txt VOL. 11, NO. 1, JANUARY 2012. [10] B. Deb, S. Bhatnagar, and B. Nath, “ReInForM: Reliable Information Forwarding Using Multiple Paths in Sensor Networks,” Proc. Ann. IEEE Int’l Conf. Local Computer Networks (LCN ’03), pp. 406- 415, 2003. [11] F. Wu, T. Chen, S. Zhong, L.E. Li, and Y.R. Yang, “Incentive- Compatible Opportunistic Routing for Wireless Networks,” Proc. ACM MobiCom, pp. 03-314, 2008. [12] S. Mueller, R. Tsang, and D. Ghosal, “Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges,” Performance Tools and Applications to Networked Systems, pp. 209-234, Springer, 2004. [13] R. Manoharan and E. Ilavarasan, “Impact of the mobility on the performance of multicast routing protocols in MANET”, International Journal of wireless & mobile networks (IJWMN),vol.2 no.2, 2010. [14] E. Rozner, J. Seshadri, Y. Mehta, and L. Qiu, “SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 12, pp. 1622-1635, Dec. 2009. [15] The Network Simulator ns-2, http://www.isi.edu/nsnam/ns, 2011. [16] moment.cs.ucsb.edu/AODV/ID/draft-ietf-manet-ao dv-13.txt BIOGRAPHIES G. Vivek Ananth received his M.C.A degree in Computer Applications from the Sathyabama University, Chennai, Tamilnadu, in 2011. Currently, he is studying M.E. Computer Science and Engineering at Arunai College of Engineering, Thiruvannamalai. His project and research area includes networking, wireless communication. S.Mohaganarangan, obtained his M.Tech(IT) from Sathyabama University, Chennai. Currently he is doing his Ph.D from Anna University and working an associate Professor and Head of the Department of Computer Science and Engineering in Arunai College of Engineering, Tiruvannamalai. His research area is network and Communication Dr.D.Sivakumar B.E., M.E., Ph.D., M.I.S.T.E., F.I.E.T.E., S.I.A.C.S.I.T completed his under graduation in Electronics and Communication from Madras University and Post graduation in Instrumentation from Annamalai University. He was awarded doctorate under the faculty of information and Communication through Anna University, Chennai.With 17 years of teaching and research experiences in various reputed engineering colleges in and around Chennai in Tamil Nadu, he is presently associated with Arunai College of Engineering, Tiruvannamalai as DEAN (Planning & Execution)and Professor in the Department of ECE. He has guided more than 25 projects for UG and PG students. www.iosrjournals.org 31 | Page