SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
469
AN IMPROVED NODE-INITIATED MESSAGE FERRYING
APPROACH FOR DATA DISSEMINATION IN DISCONNECTED
MOBILE AD HOC NETWORKS
K Muralidhar
Assistant Professor, Dept. of Computer Science & Engineering,
Anantha Lakshmi Institute of Tech. & Sciences, Anantapur, A.P., India.
ABSTRACT
Message Ferrying is a new approach developed to assist communication in Mobile ad-
hoc networks. Mobile ad-hoc networks are typically deployed with limited infrastructure. In
addition, due to various conditions like limited radio range, physical obstacles or inclement
weather, some nodes in the network might not be able to communicate with others. This
could result in a disconnected network. In such situations, a typical network protocol might
not yield good results. Message Ferrying is an approach which works around such problems.
The message ferrying technique makes use of mobile nodes, called “ferries”, which are able
to collect and transport data from one node to another. There are two approaches to deliver a
message, Node-Initiated Message Ferrying (NIMF) and Ferry-Initiated Message Ferrying
(FIMF). In NIMF approach a node will move towards known route of ferry if it has data to
transmit or receive. The node comes close so that ferry will be in normal range of node. In
FIME approach the ferry broadcast its location periodically. When a node wants to send or
receive messages via the ferry, it sends a service request message to the ferry using its long
range radio. This message contains the information of node location. According to this
information ferry will adjust their trajectory to meet the node. After finishing the data transfer
ferry will return to its default route.
This paper propose an improved version of NIMF, called Improved NIMF where the
source/receiver nodes makes no movement towards the ferry, instead they select other nodes
in their connected network which are nearer to the ferry with enough buffer space to send or
receive their data to/from that node. Then that particular node transmits/receives the data
to/from the ferry and receive/pass from/to actual sender/receiver. Through simulation
experiments it is proved that the proposed approach works better than the NIMF.
Keywords: MANETs, message ferrying, disconnected network, ferries, improved NIMF.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 469-476
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
470
1. INTRODUCTION
Mobile Ad hoc Networks (MANETs) are networks in which wireless mobile nodes
cooperate to establish network connectivity and perform routing functions in the absence of
infrastructure using self-organization [1, 2]. Since these networks do not require existing
infrastructure and a priori planning, they can be rapidly deployed and have applications in a
number of critical areas, such as, disaster relief, battle fields, and wide-area sensor networks.
Disconnected Mobile Ad hoc Networks are a class of Ad hoc networks where the
node deployment is sparse, and the contacts between the nodes in the network do not occur
very frequently. As a result, the network can remain partitioned for extended periods of time.
Network partitioning happens due to limited transmission range, node failure, and topology
changes.
Previous researchers in MANET have concentrated on routing algorithms which are
designed for fully connected networks. In this case, the usual way to deal with disconnected
network is to wait for network reconnection passively, which may lead to unacceptable
transmission delay. One of the research challenges in MANET is the potentially frequent
network partitioning which leads to no end-to-end connectivity. In literature [3, 4, 5, 6, 7, 8,
9, 10, 11, 12, 13, 14] we find a number of possible solutions for this problem. The Store-
Carry-Forward paradigm or Message Ferrying (MF) is one of the solutions that the
researchers have suggested.
Message Ferrying (MF) [15] is a proactive mobility assisted approach which utilizes a
set of special mobile nodes called message ferries (or ferries for short) to provide
communication services for nodes in the network. Message ferries move around the
deployment area and take responsibility for carrying data between nodes. Message ferrying
can be used effectively in a variety of applications including battlefields, disaster relief, wide
area sensing, non-interactive internet access and anonymous communication. For example, in
the earthquake disaster scenario, unmanned aerial vehicles or ground vehicles that are
equipped with large storage and short range radios can be used as message ferries to gather
and carry data among disconnected areas. This enables rescue participants and victims to use
available devices such as cell phones, PDAs or smart tags for communication.
There are two variations of MF schemes, depending on whether ferries or nodes
initiate non-random proactive movement. In the Node-Initiated MF (NIMF) scheme, ferries
move around the deployed area according to known routes and communicate with other
nodes they meet. With knowledge of ferry routes, nodes periodically move close to a ferry
and communicate with the ferry.
Fig.1. An example of message delivery in the node-initiated MF scheme (taken from [15]).
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
471
In the Ferry-Initiated MF (FIMF) scheme, ferries move proactively to meet nodes.
When a node wants to send packets to other nodes or receive packets, it generates a
service request and transmits it to a chosen ferry using a long range radio. Upon reception
of a service request, the ferry will adjust its trajectory to meet up with the node and
exchange packets using short range radios. In both schemes, nodes can communicate with
distant nodes that are out of range by using ferries as relays, so that routing is efficient
without the energy cost and the network load burden involved in other mobility-assisted
schemes that use flooding.
A key problem under the Node-Initiated Message Ferrying model is that,
sender/receiver nodes has to periodically move close to a ferry to communicate with the
ferry. This is a difficult problem. The difficulty in this context arises from the fact that the
sender/receiver nodes has to move close to the ferry to deliver/receive the message i.e.
they have to move purposely towards the ferry and the entire data dissemination is a
synchronous type of mechanism. They have to synchronize with the ferry to
deliver/receive the data to/from the ferry which may detain the other processing in those
nodes. Such collaboration may disrupt the actual node mobility and processing and may
not always be feasible or desirable.
To overcome this difficulty, this paper propose an Improved Node-Initiated
Message Ferrying Approach (I-NIMF), where the nodes cooperate each other to
deliver/receive the message to/from the ferry and the node which want to deliver/receive
the data to/from the ferry makes no movement towards the ferry and there is no need to
synchronize with the ferry.
2. IMPROVED NODE-INITIATED MESSAGE FERRYING APPROACH (I-
NIMF)
In the proposed Improved Node-Initiated MF (I-NIMF) scheme, the ferry moves
according to a specific route. The ferry route is known by nodes, e.g., periodically
broadcast by the ferry or conveyed by other out-of-band means. Node which wants to
deliver/receive the data to/from the ferry finds a node in their connected network which
are nearer to the ferry with enough buffer space and forwards/receives their data to/from
that node. Then that particular node transmits/receives the data to/from the ferry. Fig. 2
shows an example of how I-NIMF operates. In Fig. 2(a), the ferry F moves on a known
route, part of which is illustrated. As the sending node S wants to deliver the data to the
ferry, approaches a node which is nearer to the ferry with enough buffer space and
forwards its messages to that node and that node will be responsible for delivery to the
ferry. In Fig. 2(b), the receiving node R finds a node which is nearer the ferry and assigns
the job of receiving data from ferry and delivering data to it. By using the intermediate
nodes and ferry as a relay, S can send messages to R and R receives messages from S even
there is no end-to-end path between them.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
472
Fig. 2. An example of data dissemination in I-NIMF
The following sections describe the operations of I-NIMF and how nodes cooperate to
transmit/receive data to/from the ferry.
2.1. I-NIMF OPERATIONS (SOURCE TO FERRY)
1. Ferry F moves on a known route and sends out Hello messages periodically using a
short range radio, and nodes simply listen to the channel to detect the ferry.
2. Node S (sender) receives Hello message from the ferry, finds an intermediate node I
nearer to the ferry with enough buffer space.
3. Sender S forwards data to node I.
4. Now node I by hearing Hello message from ferry replies with an echo message.
5. After identifying each other, the node I and the ferry F initiate a message exchange
conversation.
6. The node I will transmit all its buffered messages to the ferry F, which will be
responsible for delivery.
2.2. I-NIMF OPERATIONS (FERRY TO RECEIVER)
1. Ferry F moves on a known route and sends out Hello messages periodically using a
short range radio, and nodes simply listen to the channel to detect the ferry.
2. Node R (receiver) receives Hello message from the ferry, finds an intermediate node J
nearer to the ferry with enough buffer space and assigns the job of receiving data from
ferry.
3. Now node J by hearing Hello message from ferry replies with an echo message.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
473
4. After identifying each other, the node J and the ferry F initiate a message exchange
conversation.
5. The ferry F will then deliver to the node J the messages buffered at the ferry which
are destined to R.
6. The node J then transmits all its buffered messages to the receiver R.
2.3. HANDLING BUFFER
Nodes are having limited buffer to store messages. Epidemic scheme [16] is a
flooding scheme due to this sometimes nodes memory will be exhausted. To deal with this
kind of situation, authors of "Wearable computers as packet transport mechanisms in highly-
partitioned ad-hoc networks" [17] proposed to drop the message whenever there is shortage
of memory. They talk about four different kinds of dropping strategies. They are:
• Drop-Random (DRA): The packet to be dropped is chosen at random.
• Drop-least-Recently-Received (DLR): The packet that has been in the host buffer
for longest time duration is dropped.
• Drop-oldest (DOA): The packet that has been in the network for longest duration is
dropped.
• Drop-Least-Encountered (DLE): The packet is dropped on the basis of the
likelihood of delivery.
3. PERFORMANCE EVALUATION
This section evaluates the performance of the Message Ferrying schemes through ns
simulations. The setup is with small number of nodes based on the premise that the node
deployment is sparse. Please note that this framework can easily accommodate more number
of nodes. Assume that there is a single ferry in the system. The main objective has been to
evaluate message delay, which is defined as the average delay between the time a message is
generated and the time the message is received at the destination.
The following default settings are used in simulation. Each simulation run has 40
nodes on a 5000m×5000m area. 25 nodes are randomly chosen as sources which send
messages to randomly chosen destinations every 20 seconds. Messages are of size 500 bytes
and the timeout value is 8000sec. Nodes move in the area according to the random waypoint
model [18] with a maximum speed 5m/s and pause time 50sec. The node buffer size is 400
messages and the ferry speed is 15m/s. The default ferry route follows a rectangle with (1250,
1250) and (3750, 3750) as diagonal points. The WTP threshold controls how much time a
node is allowed for proactive movement.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May
Fig. 3. Performance of
As can be seen from Fig.
I-NIMF. This is because in I-NIMF, there is no need for the node to move to the ferry, which
delays the delivery of message, instead it routes
nearer to the ferry.
4. RELATED WORK
In 2004, Zhao et al. [19] studied the problem of efficient data delivery in sparse
mobile ad hoc networks; they develop two variations of the MF schemes, depending on
whether ferries or nodes initiate non
scheme, ferries move around the deployed area according to known routes and communicate
with other node they meet. With knowledge of ferry routes, nodes periodically move close to
a ferry and communicate with the ferry. In the Ferry
move proactively to meet nodes. When a node wants to send packets to other nodes or
receive packets, it generates a service request and transmits it to a chosen ferry using a long
range radio. Upon reception of a service request, the ferry wil
with the node and exchange packets using short range radios. In both schemes, nodes can
communicate with distant nodes that are out of range by using ferries as relays. They also
adopted their algorithms from TSP, but her
message drops instead of optimizing the length of the route.
Also, [20] proposes a combination of high
high altitude aircraft or satellites to provide communication for part
messages are first routed within a connected component to the gateway, and then relayed via
the aircraft or satellite to other components.
5. CONCLUSION
Message ferrying is a key routing technology for
networks. MF is a mobility-assisted approach which utilizes a set of special mobile nodes
called message ferries to provide communication service for nodes in the area. There are two
approaches to deliver a message, Node
Initiated Message Ferrying (FIMF) approach. T
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
474
Performance of I-NIMF compared to NIMF
As can be seen from Fig. 3, the message delay is decreased through
NIMF, there is no need for the node to move to the ferry, which
delays the delivery of message, instead it routes/receives the messages to/from
In 2004, Zhao et al. [19] studied the problem of efficient data delivery in sparse
mobile ad hoc networks; they develop two variations of the MF schemes, depending on
whether ferries or nodes initiate non-random movement. In the Node-Initiated MF (NIMF)
scheme, ferries move around the deployed area according to known routes and communicate
with other node they meet. With knowledge of ferry routes, nodes periodically move close to
a ferry and communicate with the ferry. In the Ferry-Initiated MF (FIMF) sch
move proactively to meet nodes. When a node wants to send packets to other nodes or
receive packets, it generates a service request and transmits it to a chosen ferry using a long
range radio. Upon reception of a service request, the ferry will adjust its trajectory to meet up
with the node and exchange packets using short range radios. In both schemes, nodes can
communicate with distant nodes that are out of range by using ferries as relays. They also
adopted their algorithms from TSP, but here the TSP is used to optimize the expected
message drops instead of optimizing the length of the route.
] proposes a combination of high-power ground nodes called gateways and
high altitude aircraft or satellites to provide communication for partitioned networks
messages are first routed within a connected component to the gateway, and then relayed via
the aircraft or satellite to other components.
Message ferrying is a key routing technology for disconnected m
assisted approach which utilizes a set of special mobile nodes
called message ferries to provide communication service for nodes in the area. There are two
approaches to deliver a message, Node-Initiated Message Ferrying (NIMF) and Fer
ge Ferrying (FIMF) approach. This paper described a new framework for
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
June (2013), © IAEME
, the message delay is decreased through the proposed
NIMF, there is no need for the node to move to the ferry, which
/from the node
In 2004, Zhao et al. [19] studied the problem of efficient data delivery in sparse
mobile ad hoc networks; they develop two variations of the MF schemes, depending on
Initiated MF (NIMF)
scheme, ferries move around the deployed area according to known routes and communicate
with other node they meet. With knowledge of ferry routes, nodes periodically move close to
Initiated MF (FIMF) scheme, ferries
move proactively to meet nodes. When a node wants to send packets to other nodes or
receive packets, it generates a service request and transmits it to a chosen ferry using a long
l adjust its trajectory to meet up
with the node and exchange packets using short range radios. In both schemes, nodes can
communicate with distant nodes that are out of range by using ferries as relays. They also
e the TSP is used to optimize the expected
power ground nodes called gateways and
itioned networks—
messages are first routed within a connected component to the gateway, and then relayed via
disconnected mobile ad-hoc
assisted approach which utilizes a set of special mobile nodes
called message ferries to provide communication service for nodes in the area. There are two
Initiated Message Ferrying (NIMF) and Ferry-
his paper described a new framework for
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
475
NIMF known as Improved NIMF (I-NIMF). In this scheme mobile nodes cooperate each
other to deliver/receive data to/from the ferry. Extensive simulations proved that the
proposed scheme performs significantly better than NIMF. This process provides a valuable
insight regarding how the message delay can be overcome by using I-NIMF.
ACKNOWLEDGEMENTS
I wish to acknowledge K. Archana and A. Bhanutheja for their work, useful feedback,
and comments during the preparation of this paper.
REFERENCES
[1]. C. Perkins and P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-vector
Routing (DSDV) for mobile computers. Computer Communications Review. 24. Oct.
1994.
[2]. D. Johnson and D. Maltz. Dynamic Source Routing in Ad hoc Wireless Networks. In
proc. ACM SIGCOMM. 1996.
[3]. A. Beaufour, M. Leopold, P. Bonnet. Smart-tag Based Data Dissemination. In proc.
First ACM International Workshop on Wireless Sensor Networks and Applications
(WSNA). Sep. 2002.
[4]. Z. Chen, H. Kung, and D. Vlah. Ad hoc Relay Wireless Networks Over Moving
Vehicles on Highways. In proc. The 2001 ACM Symposium on Mobile Ad Hoc
Networking and Computing (Mobihoc'2001). Oct. 2001.
[5]. J. Davis, A. Fagg, and B. Levine. Wearable Computers as Packet Transport
Mechanisms in Highly-partitioned Ad hoc Networks. In proc. IEEE International
Symposium on Wearable Computing. Oct. 2001.
[6]. S. Jain, K. Fall, R. Patra. Routing in Delay Tolerant Networks.In proc. ACM
SIGCOMM 2003.
[7]. S. Jain, M. Demmer, R. Patra, and K. Fall. Using Redundancy to Cope with Failures in
a Delay Tolerant Network. In proc.ACM SIGCOMM 2005.
[8]. J. Leguay, T. Friedman and V. Conan. DTN Routing in a Mobility Pattern Space. In
proc. ACM SIGCOMM 05 Workshop on Delay Tolerant Networking and Related
Topics (WDTN-05) 2005.
[9]. Q. Li, and D. Rus. Sending Messages to Mobile Users in Disconnected Ad hoc Wireless
Networks. In. proc. 4th
ACM/IEEE Internation Conference on Mobile Computing and
Networking (Mobicom'98). Nov. 1998.
[10]. A. Vahdat and D. Becker. Epidemic Routing for Partically-Connected Ad hoc
Networks. Technical Report. Duke University. 2000.
[11]. R. Shah, S. Roy, S. Jain, and W. Brunette. Data MULEs: Modeling a Three-tier
Architecture for Sparse Sensor Networks. Elsevier Ad Hoc Networks Journal, vol. 1,
issues 2-3, Sept. 2003, pp. 215-233.
[12]. T. Small, Z. Haas. The Shared Wireless Infostation Model {A New Ad Hoc Networking
Paradigm (or Where there is a Whale, there is a Way). In proc. The Fourth ACM
International Symposium on Mobile Ad hoc Networking and Computing. (Mobihoc
2003). June, 2003.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
476
[13]. T. Small and Z. Haas, Resource and Performance Tradeoffs in Delay-Tolerant Wireless
Networks. In proc. ACM SIGCOMM 05 Workshop on Delay Tolerant Networking and
Related Topics (WDTN-05) August 2005.
[14]. W. Zhao, M. Ammar, and E. Zegura. Proactive Routing in Highly-partitioned Wireless
and Ad hoc Networks. In proc. 9th
IEEE Workshop on Future Trends in Distributed
Computing Systems (FTDCS). May, 2003.
[15]. W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery
in Sparse Mobile Ad Hoc Networks. In proc. The 5th ACM International Symposium
on Mobile Ad Hoc Networking and Computing (MobiHoc'2004). May, 2004.
[16]. In SIGCOMM ’04: Proceedings of the 2004 conference on Applications, technologies,
architectures, and protocols for computer communications, 2004.
[17]. J. Davis, A. Fagg, and B. Levine. Wearable computers as packet transport mechanisms
in highly-partitioned ad-hoc networks. In Wearable Computers, 2001. Proceedings.
Fifth International Symposium on, pages 141–148, 2001.
[18]. D. Johnson and D. Maltz. Dynamic source routing in ad-hoc wireless networks. In
ACM SIGCOMM, August 1996.
[19]. W. Zhao, M. Ammar, E. Zegura, and C. Computing, “A Message Ferrying Approach
for Data Delivery in Sparse Mobile Ad Hoc Networks Categories and Subject
Descriptors,” in Proceedings of the 5th ACM International Symposium on Mobile Ad
Hoc Networking and Computing (MoBiHoc ’04), pp. 187-198, 2004.
[20]. M. Ahmed, S. V. Krishnamurthy, R. H. Katz, and S. Dao. Trajectory control of mobile
gateways for range extension in ad hoc networks. Computer Networks Journal
(COMNET), August 2002.
[21]. Priti Bhardwaj and Rahul Johari, “Routing in Delay Tolerant Network using Genetic
Algorithm”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 2, 2013, pp. 590 - 597, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[22]. Shiva Prakash, J. P. Saini, S.C. Gupta and Sandip Vijay, “Design and Implementation
of Variable Range Energy Aware Dynamic Source Routing Protocol for Mobile Ad
Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 1, 2013, pp. 105 - 123, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.

Mais conteúdo relacionado

Mais procurados

ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
 
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...IOSR Journals
 
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBORouting Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBOIJERA Editor
 
Multipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recoveryMultipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recoveryIJARBEST JOURNAL
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Modeling and Simulation of Wavelength-Routed optical Networks
Modeling and Simulation of Wavelength-Routed optical NetworksModeling and Simulation of Wavelength-Routed optical Networks
Modeling and Simulation of Wavelength-Routed optical Networksijceronline
 
Route Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc NetworksRoute Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc Networksarpublication
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 

Mais procurados (18)

ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
J0935461
J0935461J0935461
J0935461
 
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
 
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBORouting Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
 
Multipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recoveryMultipath routing protocol for effective local route recovery
Multipath routing protocol for effective local route recovery
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
E0942531
E0942531E0942531
E0942531
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Modeling and Simulation of Wavelength-Routed optical Networks
Modeling and Simulation of Wavelength-Routed optical NetworksModeling and Simulation of Wavelength-Routed optical Networks
Modeling and Simulation of Wavelength-Routed optical Networks
 
journal_doublecol
journal_doublecoljournal_doublecol
journal_doublecol
 
Route Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc NetworksRoute Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc Networks
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 

Destaque

Tips for beginner and struggling basketball coaches
Tips for beginner and struggling basketball coachesTips for beginner and struggling basketball coaches
Tips for beginner and struggling basketball coachesHoop Skills
 
Manejo de la Informacion 2
Manejo de la Informacion 2Manejo de la Informacion 2
Manejo de la Informacion 2Karol0704
 
Virus y vacunas informaticas
Virus y vacunas informaticasVirus y vacunas informaticas
Virus y vacunas informaticassairabaron
 
La investigación científica
La investigación científicaLa investigación científica
La investigación científicaFilomeno Carvajal
 
Implementation and financial accounting of quality training and education
Implementation and financial accounting of quality training and educationImplementation and financial accounting of quality training and education
Implementation and financial accounting of quality training and educationIAEME Publication
 
Realization of ternary logic based shift up, shift down using mosfet-2
Realization of ternary logic based shift up, shift down using mosfet-2Realization of ternary logic based shift up, shift down using mosfet-2
Realization of ternary logic based shift up, shift down using mosfet-2IAEME Publication
 
Study of localization techniques in vehicular ad hoc networks
Study of localization techniques in vehicular ad hoc networksStudy of localization techniques in vehicular ad hoc networks
Study of localization techniques in vehicular ad hoc networksIAEME Publication
 
Retrofitting of damaged industrial buildings
Retrofitting of damaged industrial buildingsRetrofitting of damaged industrial buildings
Retrofitting of damaged industrial buildingsIAEME Publication
 
Power flow solution with flexible ac transmission system devices
Power flow solution with flexible ac transmission system devicesPower flow solution with flexible ac transmission system devices
Power flow solution with flexible ac transmission system devicesIAEME Publication
 

Destaque (10)

Tips for beginner and struggling basketball coaches
Tips for beginner and struggling basketball coachesTips for beginner and struggling basketball coaches
Tips for beginner and struggling basketball coaches
 
Manejo de la Informacion 2
Manejo de la Informacion 2Manejo de la Informacion 2
Manejo de la Informacion 2
 
Virus y vacunas informaticas
Virus y vacunas informaticasVirus y vacunas informaticas
Virus y vacunas informaticas
 
La investigación científica
La investigación científicaLa investigación científica
La investigación científica
 
Nticii
NticiiNticii
Nticii
 
Implementation and financial accounting of quality training and education
Implementation and financial accounting of quality training and educationImplementation and financial accounting of quality training and education
Implementation and financial accounting of quality training and education
 
Realization of ternary logic based shift up, shift down using mosfet-2
Realization of ternary logic based shift up, shift down using mosfet-2Realization of ternary logic based shift up, shift down using mosfet-2
Realization of ternary logic based shift up, shift down using mosfet-2
 
Study of localization techniques in vehicular ad hoc networks
Study of localization techniques in vehicular ad hoc networksStudy of localization techniques in vehicular ad hoc networks
Study of localization techniques in vehicular ad hoc networks
 
Retrofitting of damaged industrial buildings
Retrofitting of damaged industrial buildingsRetrofitting of damaged industrial buildings
Retrofitting of damaged industrial buildings
 
Power flow solution with flexible ac transmission system devices
Power flow solution with flexible ac transmission system devicesPower flow solution with flexible ac transmission system devices
Power flow solution with flexible ac transmission system devices
 

Semelhante a Improved Node-Initiated Message Ferrying for Disconnected MANETs

PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...IAEME Publication
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEijasuc
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...
Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...
Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...IJCNCJournal
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET Journal
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 
Data gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsData gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsijwmn
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...ijmnct
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
 

Semelhante a Improved Node-Initiated Message Ferrying for Disconnected MANETs (20)

PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVEROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
ROUTING IN OPTICAL MESH NETWORKS-A QOS PERSPECTIVE
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...
Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...
Investigating Multilayer Omega-Type Networks Operating with the Cut-Through T...
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANETIRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
IRJET-Mobility Aware Refined Counter Based Broadcasting Model of MANET
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
Data gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsData gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elements
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...
 
C0354021025
C0354021025C0354021025
C0354021025
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivity
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Último (20)

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

Improved Node-Initiated Message Ferrying for Disconnected MANETs

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 469 AN IMPROVED NODE-INITIATED MESSAGE FERRYING APPROACH FOR DATA DISSEMINATION IN DISCONNECTED MOBILE AD HOC NETWORKS K Muralidhar Assistant Professor, Dept. of Computer Science & Engineering, Anantha Lakshmi Institute of Tech. & Sciences, Anantapur, A.P., India. ABSTRACT Message Ferrying is a new approach developed to assist communication in Mobile ad- hoc networks. Mobile ad-hoc networks are typically deployed with limited infrastructure. In addition, due to various conditions like limited radio range, physical obstacles or inclement weather, some nodes in the network might not be able to communicate with others. This could result in a disconnected network. In such situations, a typical network protocol might not yield good results. Message Ferrying is an approach which works around such problems. The message ferrying technique makes use of mobile nodes, called “ferries”, which are able to collect and transport data from one node to another. There are two approaches to deliver a message, Node-Initiated Message Ferrying (NIMF) and Ferry-Initiated Message Ferrying (FIMF). In NIMF approach a node will move towards known route of ferry if it has data to transmit or receive. The node comes close so that ferry will be in normal range of node. In FIME approach the ferry broadcast its location periodically. When a node wants to send or receive messages via the ferry, it sends a service request message to the ferry using its long range radio. This message contains the information of node location. According to this information ferry will adjust their trajectory to meet the node. After finishing the data transfer ferry will return to its default route. This paper propose an improved version of NIMF, called Improved NIMF where the source/receiver nodes makes no movement towards the ferry, instead they select other nodes in their connected network which are nearer to the ferry with enough buffer space to send or receive their data to/from that node. Then that particular node transmits/receives the data to/from the ferry and receive/pass from/to actual sender/receiver. Through simulation experiments it is proved that the proposed approach works better than the NIMF. Keywords: MANETs, message ferrying, disconnected network, ferries, improved NIMF. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 469-476 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 470 1. INTRODUCTION Mobile Ad hoc Networks (MANETs) are networks in which wireless mobile nodes cooperate to establish network connectivity and perform routing functions in the absence of infrastructure using self-organization [1, 2]. Since these networks do not require existing infrastructure and a priori planning, they can be rapidly deployed and have applications in a number of critical areas, such as, disaster relief, battle fields, and wide-area sensor networks. Disconnected Mobile Ad hoc Networks are a class of Ad hoc networks where the node deployment is sparse, and the contacts between the nodes in the network do not occur very frequently. As a result, the network can remain partitioned for extended periods of time. Network partitioning happens due to limited transmission range, node failure, and topology changes. Previous researchers in MANET have concentrated on routing algorithms which are designed for fully connected networks. In this case, the usual way to deal with disconnected network is to wait for network reconnection passively, which may lead to unacceptable transmission delay. One of the research challenges in MANET is the potentially frequent network partitioning which leads to no end-to-end connectivity. In literature [3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14] we find a number of possible solutions for this problem. The Store- Carry-Forward paradigm or Message Ferrying (MF) is one of the solutions that the researchers have suggested. Message Ferrying (MF) [15] is a proactive mobility assisted approach which utilizes a set of special mobile nodes called message ferries (or ferries for short) to provide communication services for nodes in the network. Message ferries move around the deployment area and take responsibility for carrying data between nodes. Message ferrying can be used effectively in a variety of applications including battlefields, disaster relief, wide area sensing, non-interactive internet access and anonymous communication. For example, in the earthquake disaster scenario, unmanned aerial vehicles or ground vehicles that are equipped with large storage and short range radios can be used as message ferries to gather and carry data among disconnected areas. This enables rescue participants and victims to use available devices such as cell phones, PDAs or smart tags for communication. There are two variations of MF schemes, depending on whether ferries or nodes initiate non-random proactive movement. In the Node-Initiated MF (NIMF) scheme, ferries move around the deployed area according to known routes and communicate with other nodes they meet. With knowledge of ferry routes, nodes periodically move close to a ferry and communicate with the ferry. Fig.1. An example of message delivery in the node-initiated MF scheme (taken from [15]).
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 471 In the Ferry-Initiated MF (FIMF) scheme, ferries move proactively to meet nodes. When a node wants to send packets to other nodes or receive packets, it generates a service request and transmits it to a chosen ferry using a long range radio. Upon reception of a service request, the ferry will adjust its trajectory to meet up with the node and exchange packets using short range radios. In both schemes, nodes can communicate with distant nodes that are out of range by using ferries as relays, so that routing is efficient without the energy cost and the network load burden involved in other mobility-assisted schemes that use flooding. A key problem under the Node-Initiated Message Ferrying model is that, sender/receiver nodes has to periodically move close to a ferry to communicate with the ferry. This is a difficult problem. The difficulty in this context arises from the fact that the sender/receiver nodes has to move close to the ferry to deliver/receive the message i.e. they have to move purposely towards the ferry and the entire data dissemination is a synchronous type of mechanism. They have to synchronize with the ferry to deliver/receive the data to/from the ferry which may detain the other processing in those nodes. Such collaboration may disrupt the actual node mobility and processing and may not always be feasible or desirable. To overcome this difficulty, this paper propose an Improved Node-Initiated Message Ferrying Approach (I-NIMF), where the nodes cooperate each other to deliver/receive the message to/from the ferry and the node which want to deliver/receive the data to/from the ferry makes no movement towards the ferry and there is no need to synchronize with the ferry. 2. IMPROVED NODE-INITIATED MESSAGE FERRYING APPROACH (I- NIMF) In the proposed Improved Node-Initiated MF (I-NIMF) scheme, the ferry moves according to a specific route. The ferry route is known by nodes, e.g., periodically broadcast by the ferry or conveyed by other out-of-band means. Node which wants to deliver/receive the data to/from the ferry finds a node in their connected network which are nearer to the ferry with enough buffer space and forwards/receives their data to/from that node. Then that particular node transmits/receives the data to/from the ferry. Fig. 2 shows an example of how I-NIMF operates. In Fig. 2(a), the ferry F moves on a known route, part of which is illustrated. As the sending node S wants to deliver the data to the ferry, approaches a node which is nearer to the ferry with enough buffer space and forwards its messages to that node and that node will be responsible for delivery to the ferry. In Fig. 2(b), the receiving node R finds a node which is nearer the ferry and assigns the job of receiving data from ferry and delivering data to it. By using the intermediate nodes and ferry as a relay, S can send messages to R and R receives messages from S even there is no end-to-end path between them.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 472 Fig. 2. An example of data dissemination in I-NIMF The following sections describe the operations of I-NIMF and how nodes cooperate to transmit/receive data to/from the ferry. 2.1. I-NIMF OPERATIONS (SOURCE TO FERRY) 1. Ferry F moves on a known route and sends out Hello messages periodically using a short range radio, and nodes simply listen to the channel to detect the ferry. 2. Node S (sender) receives Hello message from the ferry, finds an intermediate node I nearer to the ferry with enough buffer space. 3. Sender S forwards data to node I. 4. Now node I by hearing Hello message from ferry replies with an echo message. 5. After identifying each other, the node I and the ferry F initiate a message exchange conversation. 6. The node I will transmit all its buffered messages to the ferry F, which will be responsible for delivery. 2.2. I-NIMF OPERATIONS (FERRY TO RECEIVER) 1. Ferry F moves on a known route and sends out Hello messages periodically using a short range radio, and nodes simply listen to the channel to detect the ferry. 2. Node R (receiver) receives Hello message from the ferry, finds an intermediate node J nearer to the ferry with enough buffer space and assigns the job of receiving data from ferry. 3. Now node J by hearing Hello message from ferry replies with an echo message.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 473 4. After identifying each other, the node J and the ferry F initiate a message exchange conversation. 5. The ferry F will then deliver to the node J the messages buffered at the ferry which are destined to R. 6. The node J then transmits all its buffered messages to the receiver R. 2.3. HANDLING BUFFER Nodes are having limited buffer to store messages. Epidemic scheme [16] is a flooding scheme due to this sometimes nodes memory will be exhausted. To deal with this kind of situation, authors of "Wearable computers as packet transport mechanisms in highly- partitioned ad-hoc networks" [17] proposed to drop the message whenever there is shortage of memory. They talk about four different kinds of dropping strategies. They are: • Drop-Random (DRA): The packet to be dropped is chosen at random. • Drop-least-Recently-Received (DLR): The packet that has been in the host buffer for longest time duration is dropped. • Drop-oldest (DOA): The packet that has been in the network for longest duration is dropped. • Drop-Least-Encountered (DLE): The packet is dropped on the basis of the likelihood of delivery. 3. PERFORMANCE EVALUATION This section evaluates the performance of the Message Ferrying schemes through ns simulations. The setup is with small number of nodes based on the premise that the node deployment is sparse. Please note that this framework can easily accommodate more number of nodes. Assume that there is a single ferry in the system. The main objective has been to evaluate message delay, which is defined as the average delay between the time a message is generated and the time the message is received at the destination. The following default settings are used in simulation. Each simulation run has 40 nodes on a 5000m×5000m area. 25 nodes are randomly chosen as sources which send messages to randomly chosen destinations every 20 seconds. Messages are of size 500 bytes and the timeout value is 8000sec. Nodes move in the area according to the random waypoint model [18] with a maximum speed 5m/s and pause time 50sec. The node buffer size is 400 messages and the ferry speed is 15m/s. The default ferry route follows a rectangle with (1250, 1250) and (3750, 3750) as diagonal points. The WTP threshold controls how much time a node is allowed for proactive movement.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May Fig. 3. Performance of As can be seen from Fig. I-NIMF. This is because in I-NIMF, there is no need for the node to move to the ferry, which delays the delivery of message, instead it routes nearer to the ferry. 4. RELATED WORK In 2004, Zhao et al. [19] studied the problem of efficient data delivery in sparse mobile ad hoc networks; they develop two variations of the MF schemes, depending on whether ferries or nodes initiate non scheme, ferries move around the deployed area according to known routes and communicate with other node they meet. With knowledge of ferry routes, nodes periodically move close to a ferry and communicate with the ferry. In the Ferry move proactively to meet nodes. When a node wants to send packets to other nodes or receive packets, it generates a service request and transmits it to a chosen ferry using a long range radio. Upon reception of a service request, the ferry wil with the node and exchange packets using short range radios. In both schemes, nodes can communicate with distant nodes that are out of range by using ferries as relays. They also adopted their algorithms from TSP, but her message drops instead of optimizing the length of the route. Also, [20] proposes a combination of high high altitude aircraft or satellites to provide communication for part messages are first routed within a connected component to the gateway, and then relayed via the aircraft or satellite to other components. 5. CONCLUSION Message ferrying is a key routing technology for networks. MF is a mobility-assisted approach which utilizes a set of special mobile nodes called message ferries to provide communication service for nodes in the area. There are two approaches to deliver a message, Node Initiated Message Ferrying (FIMF) approach. T International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 474 Performance of I-NIMF compared to NIMF As can be seen from Fig. 3, the message delay is decreased through NIMF, there is no need for the node to move to the ferry, which delays the delivery of message, instead it routes/receives the messages to/from In 2004, Zhao et al. [19] studied the problem of efficient data delivery in sparse mobile ad hoc networks; they develop two variations of the MF schemes, depending on whether ferries or nodes initiate non-random movement. In the Node-Initiated MF (NIMF) scheme, ferries move around the deployed area according to known routes and communicate with other node they meet. With knowledge of ferry routes, nodes periodically move close to a ferry and communicate with the ferry. In the Ferry-Initiated MF (FIMF) sch move proactively to meet nodes. When a node wants to send packets to other nodes or receive packets, it generates a service request and transmits it to a chosen ferry using a long range radio. Upon reception of a service request, the ferry will adjust its trajectory to meet up with the node and exchange packets using short range radios. In both schemes, nodes can communicate with distant nodes that are out of range by using ferries as relays. They also adopted their algorithms from TSP, but here the TSP is used to optimize the expected message drops instead of optimizing the length of the route. ] proposes a combination of high-power ground nodes called gateways and high altitude aircraft or satellites to provide communication for partitioned networks messages are first routed within a connected component to the gateway, and then relayed via the aircraft or satellite to other components. Message ferrying is a key routing technology for disconnected m assisted approach which utilizes a set of special mobile nodes called message ferries to provide communication service for nodes in the area. There are two approaches to deliver a message, Node-Initiated Message Ferrying (NIMF) and Fer ge Ferrying (FIMF) approach. This paper described a new framework for International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- June (2013), © IAEME , the message delay is decreased through the proposed NIMF, there is no need for the node to move to the ferry, which /from the node In 2004, Zhao et al. [19] studied the problem of efficient data delivery in sparse mobile ad hoc networks; they develop two variations of the MF schemes, depending on Initiated MF (NIMF) scheme, ferries move around the deployed area according to known routes and communicate with other node they meet. With knowledge of ferry routes, nodes periodically move close to Initiated MF (FIMF) scheme, ferries move proactively to meet nodes. When a node wants to send packets to other nodes or receive packets, it generates a service request and transmits it to a chosen ferry using a long l adjust its trajectory to meet up with the node and exchange packets using short range radios. In both schemes, nodes can communicate with distant nodes that are out of range by using ferries as relays. They also e the TSP is used to optimize the expected power ground nodes called gateways and itioned networks— messages are first routed within a connected component to the gateway, and then relayed via disconnected mobile ad-hoc assisted approach which utilizes a set of special mobile nodes called message ferries to provide communication service for nodes in the area. There are two Initiated Message Ferrying (NIMF) and Ferry- his paper described a new framework for
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 475 NIMF known as Improved NIMF (I-NIMF). In this scheme mobile nodes cooperate each other to deliver/receive data to/from the ferry. Extensive simulations proved that the proposed scheme performs significantly better than NIMF. This process provides a valuable insight regarding how the message delay can be overcome by using I-NIMF. ACKNOWLEDGEMENTS I wish to acknowledge K. Archana and A. Bhanutheja for their work, useful feedback, and comments during the preparation of this paper. REFERENCES [1]. C. Perkins and P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-vector Routing (DSDV) for mobile computers. Computer Communications Review. 24. Oct. 1994. [2]. D. Johnson and D. Maltz. Dynamic Source Routing in Ad hoc Wireless Networks. In proc. ACM SIGCOMM. 1996. [3]. A. Beaufour, M. Leopold, P. Bonnet. Smart-tag Based Data Dissemination. In proc. First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA). Sep. 2002. [4]. Z. Chen, H. Kung, and D. Vlah. Ad hoc Relay Wireless Networks Over Moving Vehicles on Highways. In proc. The 2001 ACM Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc'2001). Oct. 2001. [5]. J. Davis, A. Fagg, and B. Levine. Wearable Computers as Packet Transport Mechanisms in Highly-partitioned Ad hoc Networks. In proc. IEEE International Symposium on Wearable Computing. Oct. 2001. [6]. S. Jain, K. Fall, R. Patra. Routing in Delay Tolerant Networks.In proc. ACM SIGCOMM 2003. [7]. S. Jain, M. Demmer, R. Patra, and K. Fall. Using Redundancy to Cope with Failures in a Delay Tolerant Network. In proc.ACM SIGCOMM 2005. [8]. J. Leguay, T. Friedman and V. Conan. DTN Routing in a Mobility Pattern Space. In proc. ACM SIGCOMM 05 Workshop on Delay Tolerant Networking and Related Topics (WDTN-05) 2005. [9]. Q. Li, and D. Rus. Sending Messages to Mobile Users in Disconnected Ad hoc Wireless Networks. In. proc. 4th ACM/IEEE Internation Conference on Mobile Computing and Networking (Mobicom'98). Nov. 1998. [10]. A. Vahdat and D. Becker. Epidemic Routing for Partically-Connected Ad hoc Networks. Technical Report. Duke University. 2000. [11]. R. Shah, S. Roy, S. Jain, and W. Brunette. Data MULEs: Modeling a Three-tier Architecture for Sparse Sensor Networks. Elsevier Ad Hoc Networks Journal, vol. 1, issues 2-3, Sept. 2003, pp. 215-233. [12]. T. Small, Z. Haas. The Shared Wireless Infostation Model {A New Ad Hoc Networking Paradigm (or Where there is a Whale, there is a Way). In proc. The Fourth ACM International Symposium on Mobile Ad hoc Networking and Computing. (Mobihoc 2003). June, 2003.
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 476 [13]. T. Small and Z. Haas, Resource and Performance Tradeoffs in Delay-Tolerant Wireless Networks. In proc. ACM SIGCOMM 05 Workshop on Delay Tolerant Networking and Related Topics (WDTN-05) August 2005. [14]. W. Zhao, M. Ammar, and E. Zegura. Proactive Routing in Highly-partitioned Wireless and Ad hoc Networks. In proc. 9th IEEE Workshop on Future Trends in Distributed Computing Systems (FTDCS). May, 2003. [15]. W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks. In proc. The 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'2004). May, 2004. [16]. In SIGCOMM ’04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, 2004. [17]. J. Davis, A. Fagg, and B. Levine. Wearable computers as packet transport mechanisms in highly-partitioned ad-hoc networks. In Wearable Computers, 2001. Proceedings. Fifth International Symposium on, pages 141–148, 2001. [18]. D. Johnson and D. Maltz. Dynamic source routing in ad-hoc wireless networks. In ACM SIGCOMM, August 1996. [19]. W. Zhao, M. Ammar, E. Zegura, and C. Computing, “A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Categories and Subject Descriptors,” in Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MoBiHoc ’04), pp. 187-198, 2004. [20]. M. Ahmed, S. V. Krishnamurthy, R. H. Katz, and S. Dao. Trajectory control of mobile gateways for range extension in ad hoc networks. Computer Networks Journal (COMNET), August 2002. [21]. Priti Bhardwaj and Rahul Johari, “Routing in Delay Tolerant Network using Genetic Algorithm”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 590 - 597, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [22]. Shiva Prakash, J. P. Saini, S.C. Gupta and Sandip Vijay, “Design and Implementation of Variable Range Energy Aware Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 105 - 123, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.