SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
464
ROUTING MANAGEMENT FOR MOBILE AD-HOC NETWORKS
Poonam Pahuja1
and Dr. Tarun Shrimali2
1
Research Scholar, Mewar University, Chittorgarh India
2
Research Supervisor, Mewar University, Chittorgarh India
ABSTRACT
A mobile ad hoc network (MANETs) is a collection of distributed nodes which
communicate using multi-hop wireless links with frequent node mobility. The frequent
mobility of nodes leads network partition and futile communication. To alleviate various
network connectivity and routing issues, we have proposed Cluster Based Distributed
Spanning Tree (CBDST) interconnection would be the better solution. CBDST structure is
organized into a hierarchy of groups. The nodes are put together in groups and groups are
gathered in groups of higher level, recursively. This organization, built on top of routing
tables allows the instantaneous creation of spanning trees rooted by any nodes and keeps the
load balanced between the nodes.
.
KEYWORDS: CBDST, MANET, Cluster Head, Mobile Node, NS-2
1. INTRODUCTION
A Mobile Ad-Hoc Network (MANET) is an autonomous collection of distributed
mobile users. Every host in a MANET works as a source and a sink, and also relays packets
for other hosts and is thus a router as well. This type of network can be used in fire, safety,
rescue, disaster recovery operations, conference and campus settings, car networks, personal
area networking, etc. MANETs have similar characteristics to other wireless communication
networks, which are mainly attributed to the wireless channel’s properties.
2. CLUSTER BASED DISTRIBUTED SPANNING TREE (CBDST)
CBDST structure is organized into a hierarchy of groups. The nodes are put together
in groups and groups are gathered in groups of higher level, recursively. This organization,
built on top of routing tables allows the instantaneous creation of spanning trees rooted by
any nodes and keeps the load balanced between the nodes.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 3, May-June (2013), pp. 464-468
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
465
2.1 Formation of Cluster
Initially each node is assigned a unique ID value. It broadcasts its ID value to its
neighbors and builds its neighborhood table. Each node calculates its own weight based on
the following factors:
i) Node connectivity: The number of nodes that can communicate directly with the given node
i.e. that are in its transmission range.
ii) Battery Power: The power currently left in each node. The energy is consumed by sending
and receiving of messages.
iii) Mobility: Running average of speed of each node. If mobility is less, the node is more
suitable to become cluster head CH.
iv) Distance: Sum of distance of the node from all its neighbors.
Each node broadcasts a beacon message to notify its presence to the neighbors. A
beacon message contains the state of the node. Each node builds its neighbor list based on the
beacon messages received. The cluster-heads election is based on the weight values of the
nodes and the node having the lowest weight is chosen as CH. Each node computes its weight
value based on the following algorithm:
2.2 Node Weight Computational Algorithm
Step 1: The coefficients used in weight calculation are assumed the following values w1=0.7,
w2=0.2, w3=0.05, w4=0.05; The sum of these co-efficient is 1.This is actually used to
normalize the factors such as spreading degree, distance with its neighbors, mobility of the
node, and power consumed used in the calculation of weight of a node. The factors node
connectivity and distance with its neighbors are given more importance and assumed higher
co-efficient values 0.7 and 0.2 respectively
Step 2: Compute the difference between the optimal cluster’s size ‘α’ and the real number of
neighbors ‘R (V)’as node connectivity ,nc= 1-(| α -R (V)| / α)
Step 3: For every node the sum of the distances, Dv, with all its neighbors is calculated.
Dv= Σdist(v,v’) where v’ €N(v)
Step 4: Calculate the average speed for every node until the current time T. This gives the
measure of the mobility Mv based on the X co-ordinate and Y co-ordinate i.e. position of the
node v at all previous time instance t.
Step 5: Determine how much battery power has been consumed as Pv. This is assumed to be
more for a Cluster-Head when compared to an ordinary node. Because Cluster-Head has
taken care of all the members of the cluster by continuously sending the signal.
Step 6: The weight Wv for each node is calculated based on
Wν = (w1× nc) + (w2× Dν ) + (w3×Mν ) + (w4× Pν )
Where nc is the node connectivity, Dv is the distance with its neighbors, Mv is the mobility
of the node, and power consumed is represented by, Pv
Step 7: The node with the smallest Wv is elected as a cluster-head. All the neighbors of the
chosen cluster-head are no more allowed to participate in the election procedure.
Step 8: All the above steps are repeated for remaining nodes which is not yet elected as a
cluster-head or assigned to a cluster.
2.3 Cluster Maintenance
The second phase is the clustering maintenance. There are defined two distinct types
of operations for cluster maintenance: the battery power threshold property and the node
movement to the outside of its cluster boundary.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
466
2.3.1 Node Movements
The node movements can be in the form of node joining or node leaving a cluster.
These operations will have only local effects on the clustered topology if the moving node is
a MN node. If the leaving node is CH node, the cluster reorganization has to be performed for
the nodes in the cluster by evoking the clustering algorithm.
Step1: Broadcast a beacon signal to all its neighbor nodes in the transmission range;
Process the signals received from the neighbor nodes in the network and form the connection
matrix, A;
Step2: Calculate the Degree R (U) using A, Spreading degree, ∆sp, Sum of the distances, Du,
with all its neighbors, Average speed, Mu, Amount of battery power that has been consumed,
Pu, and Weight of node U as Wu;
Step3: If(A Cluster head already exist in the neighborhood)
Send request to join the Cluster;
Else
Form a new cluster and declare itself as the cluster-head;
2.3.2 Battery Power Threshold
The battery power of the nodes participating in the Clustering changes continuously.
The Cluster-Heads Power decreases more rapidly when compared to the Cluster Members.
When the Cluster-Heads Battery Power falls below a threshold then the node is no longer
able to perform its activates and a New Head from the members available need to be chosen.
Step1: Verify the threshold on the Cluster -Head’s Battery power;
If (Battery power < Threshold)
Cluster-Head sends a LIFE_DOWN message to all its Neighbors;
All the Member nodes participate in the Re-Election Procedure using
Modified Weighted Clustering Algorithm and the Node with least weight is
selected as the New Cluster-Head;
Else
Re-election is not needed;
3. RESULTS AND DISCUSSION
The mobile network model assumed in this project consists of random number of
mobile nodes with each node having fixed energy and random mobility. Further each node
starts with some energy and its energy decreases each time it passes a message. A node fails
if its whole energy has been consumed. A failed node is represented as a black node. The
measured performance of the proposed algorithm was compared with AODV using NS2
simulation tool.
3.1 Packet Delivery Ratio (PDR)
The Packet Delivery ratio is based on the number of packets delivered and number of
packets sent. Higher the pause time better is the performance of the Cluster. The CBDST
technique approaches a ratio of one or 100% delivery as the network becomes more static in
figure 1. Only under dynamic conditions the packets collide or the packets are lost. As the
pause time increases the static nature is enhanced. CBDST also delivered good PDR against
the scalability.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
467
3.2 Connectivity
The connectivity of nodes gives path for data packets to be forwarded without loss
and comparison results are shown in the above graph. NS2 simulation with varying node
count ranging from 10 to 100 is used to study the percentage of connectivity in wireless
environment. Maximum possible connectivity is 100% where each node is connected with
every other node. CBDST perform well over AODV while increasing number of nodes and
pause time as shown in figure 2. CBDST has good scalability and robustness.
4. CONCLUSION
We have proposed new routing management for better connectivity, network lifetime,
less energy consumption and equally load balancing of the cluster head by re-elected the
cluster head after a threshold. The CBDST perform well over AODV for packet delivery
ratio and scalability
0
0.2
0.4
0.6
0.8
1
1.2
50
150
250
350
450
Pause Time in Sec
PacketDeliveryRatio
AODV
CBDST
0.86
0.88
0.9
0.92
0.94
0.96
0.98
1
50
150
250
350
450
Pause Time in sec
connectivityrate(%)
AODV
CBDST
0
0.2
0.4
0.6
0.8
1
1.2
10
30
50
70
90
Number of Mobile Nodes
PacketDeliveryRatio
AODV
CBDST
0
0.2
0.4
0.6
0.8
1
1.2
10
30
50
70
90
Number of Mobile Nodes
Cnnectivityratein(%)
AODV
CBDST
Fig 1. Packet Delivery Ratio Fig 2. Route Connectivity
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME
468
REFERENCES
[1] S. Lee, J. Hsu, R. Hayashida, M. Gerla, and R. Bagrodia, “Selecting a Routing
Strategy for Your Ad hoc Network,” Special issue on Advances in Computer
Communications and Networks: Algorithms and Applications, vol. 26, no. 7, pp. 723-
733, May 2003.
[2] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On Demand Distance Vector
(AODV) Yu .J.P. & Chong
[3] P.H.J. (2005).A Survey of Clustering Schemes for Mobile Ad Hoc Networks. IEEE
communications Surveys and Tutorials, Vol. 7, No. 1, pp. 32-48. Routing,” IETF
RFC3561, July 2003.
[4] Yu .J.P. & Chong P.H.J. (2005).A Survey of Clustering Schemes for Mobile Ad Hoc
Networks. IEEE Communications Surveys and Tutorials, Vol. 7, No. 1, pp. 32-48.
[5] Deniz Cokuslu Kayhan Erciyes and Orhan Dagdeviren A Dominating Set Based
Clustering Algorithm for Mobile Ad hoc Networks, Springer Computational Science –
ICCS (2006).
[6] P. Victer Paul, T. Vengattaraman, P. Dhavachelvan & R. Baskaran, Improved Data
Cache Scheme Using Distributed Spanning Tree in Mobile Adhoc Network,
International Journal of Computer Science & CommunicationVol. 1, No. 2, July-
December (2010).
[7] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for
Mobile Ad Hoc Networks”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
[8] V. Bapuji, R. Naveen Kumar, Dr. A. Govardhan and Prof. S.S.V.N. Sarma,
“Maximizing Lifespan of Mobile Ad Hoc Networks with Qos Provision Routing
Protocol”, International Journal of Computer Engineering & Technology (IJCET),
Volume 3, Issue 2, 2012, pp. 150 - 156, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.

More Related Content

What's hot

ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ijasuc
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...IJCSEIT Journal
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheIAEME Publication
 
Edd clustering algorithm for
Edd clustering algorithm forEdd clustering algorithm for
Edd clustering algorithm forcsandit
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...IJCNCJournal
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selectioniosrjce
 
Assignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmAssignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmiaemedu
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
Sector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksSector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksijwmn
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Quality of service improved in WSNs using Improved Efficient Quality of Servi...Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Quality of service improved in WSNs using Improved Efficient Quality of Servi...IJTET Journal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septianIAESIJEECS
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...IJERA Editor
 

What's hot (16)

ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
 
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
DISTRIBUTED COVERAGE AND CONNECTIVITY PRESERVING ALGORITHM WITH SUPPORT OF DI...
 
I04503075078
I04503075078I04503075078
I04503075078
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring sche
 
Edd clustering algorithm for
Edd clustering algorithm forEdd clustering algorithm for
Edd clustering algorithm for
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selection
 
Assignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmAssignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithm
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
Sector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksSector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networks
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Quality of service improved in WSNs using Improved Efficient Quality of Servi...Quality of service improved in WSNs using Improved Efficient Quality of Servi...
Quality of service improved in WSNs using Improved Efficient Quality of Servi...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septian
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
 

Viewers also liked

Investigation on halftoning methods in digital printing technology
Investigation on halftoning methods in digital printing technologyInvestigation on halftoning methods in digital printing technology
Investigation on halftoning methods in digital printing technologyIAEME Publication
 
A fast fpga based architecture for measuring the distance between
A fast fpga based architecture for measuring the distance betweenA fast fpga based architecture for measuring the distance between
A fast fpga based architecture for measuring the distance betweenIAEME Publication
 
Effect of coarse aggregate characteristics on strength properties of high
Effect of coarse aggregate characteristics on strength properties of highEffect of coarse aggregate characteristics on strength properties of high
Effect of coarse aggregate characteristics on strength properties of highIAEME Publication
 
Behavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesBehavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesIAEME Publication
 
A methodology for model driven multiplatform mobile application development
A methodology for model driven multiplatform mobile application developmentA methodology for model driven multiplatform mobile application development
A methodology for model driven multiplatform mobile application developmentIAEME Publication
 
Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...IAEME Publication
 
Performance analysis is basis on color based image retrieval technique
Performance analysis is basis on color based image retrieval techniquePerformance analysis is basis on color based image retrieval technique
Performance analysis is basis on color based image retrieval techniqueIAEME Publication
 
Novel image fusion techniques using global and local kekre wavelet transforms
Novel image fusion techniques using global and local kekre wavelet transformsNovel image fusion techniques using global and local kekre wavelet transforms
Novel image fusion techniques using global and local kekre wavelet transformsIAEME Publication
 
Experimental investigation of laminar mixed convection heat transfer
Experimental investigation of laminar mixed convection heat transferExperimental investigation of laminar mixed convection heat transfer
Experimental investigation of laminar mixed convection heat transferIAEME Publication
 

Viewers also liked (9)

Investigation on halftoning methods in digital printing technology
Investigation on halftoning methods in digital printing technologyInvestigation on halftoning methods in digital printing technology
Investigation on halftoning methods in digital printing technology
 
A fast fpga based architecture for measuring the distance between
A fast fpga based architecture for measuring the distance betweenA fast fpga based architecture for measuring the distance between
A fast fpga based architecture for measuring the distance between
 
Effect of coarse aggregate characteristics on strength properties of high
Effect of coarse aggregate characteristics on strength properties of highEffect of coarse aggregate characteristics on strength properties of high
Effect of coarse aggregate characteristics on strength properties of high
 
Behavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesBehavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniques
 
A methodology for model driven multiplatform mobile application development
A methodology for model driven multiplatform mobile application developmentA methodology for model driven multiplatform mobile application development
A methodology for model driven multiplatform mobile application development
 
Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...Design and implementation of variable range energy aware dynamic source routi...
Design and implementation of variable range energy aware dynamic source routi...
 
Performance analysis is basis on color based image retrieval technique
Performance analysis is basis on color based image retrieval techniquePerformance analysis is basis on color based image retrieval technique
Performance analysis is basis on color based image retrieval technique
 
Novel image fusion techniques using global and local kekre wavelet transforms
Novel image fusion techniques using global and local kekre wavelet transformsNovel image fusion techniques using global and local kekre wavelet transforms
Novel image fusion techniques using global and local kekre wavelet transforms
 
Experimental investigation of laminar mixed convection heat transfer
Experimental investigation of laminar mixed convection heat transferExperimental investigation of laminar mixed convection heat transfer
Experimental investigation of laminar mixed convection heat transfer
 

Similar to Routing management for mobile ad hoc networks

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...prjpublications
 
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...IJAEMSJORNAL
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSGREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSijcsit
 
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksGreedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksAIRCC Publishing Corporation
 
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksGreedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksAIRCC Publishing Corporation
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 

Similar to Routing management for mobile ad hoc networks (20)

Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
F0963440
F0963440F0963440
F0963440
 
D031202018023
D031202018023D031202018023
D031202018023
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
HCIFR: Hierarchical Clustering and Iterative Filtering Routing Algorithm for ...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
20320130406029
2032013040602920320130406029
20320130406029
 
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSGREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
 
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksGreedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor Networks
 
Greedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor NetworksGreedy Cluster Based Routing for Wireless Sensor Networks
Greedy Cluster Based Routing for Wireless Sensor Networks
 
1909 1913
1909 19131909 1913
1909 1913
 
1909 1913
1909 19131909 1913
1909 1913
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
La3518941898
La3518941898La3518941898
La3518941898
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Routing management for mobile ad hoc networks

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 464 ROUTING MANAGEMENT FOR MOBILE AD-HOC NETWORKS Poonam Pahuja1 and Dr. Tarun Shrimali2 1 Research Scholar, Mewar University, Chittorgarh India 2 Research Supervisor, Mewar University, Chittorgarh India ABSTRACT A mobile ad hoc network (MANETs) is a collection of distributed nodes which communicate using multi-hop wireless links with frequent node mobility. The frequent mobility of nodes leads network partition and futile communication. To alleviate various network connectivity and routing issues, we have proposed Cluster Based Distributed Spanning Tree (CBDST) interconnection would be the better solution. CBDST structure is organized into a hierarchy of groups. The nodes are put together in groups and groups are gathered in groups of higher level, recursively. This organization, built on top of routing tables allows the instantaneous creation of spanning trees rooted by any nodes and keeps the load balanced between the nodes. . KEYWORDS: CBDST, MANET, Cluster Head, Mobile Node, NS-2 1. INTRODUCTION A Mobile Ad-Hoc Network (MANET) is an autonomous collection of distributed mobile users. Every host in a MANET works as a source and a sink, and also relays packets for other hosts and is thus a router as well. This type of network can be used in fire, safety, rescue, disaster recovery operations, conference and campus settings, car networks, personal area networking, etc. MANETs have similar characteristics to other wireless communication networks, which are mainly attributed to the wireless channel’s properties. 2. CLUSTER BASED DISTRIBUTED SPANNING TREE (CBDST) CBDST structure is organized into a hierarchy of groups. The nodes are put together in groups and groups are gathered in groups of higher level, recursively. This organization, built on top of routing tables allows the instantaneous creation of spanning trees rooted by any nodes and keeps the load balanced between the nodes. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 3, May-June (2013), pp. 464-468 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 465 2.1 Formation of Cluster Initially each node is assigned a unique ID value. It broadcasts its ID value to its neighbors and builds its neighborhood table. Each node calculates its own weight based on the following factors: i) Node connectivity: The number of nodes that can communicate directly with the given node i.e. that are in its transmission range. ii) Battery Power: The power currently left in each node. The energy is consumed by sending and receiving of messages. iii) Mobility: Running average of speed of each node. If mobility is less, the node is more suitable to become cluster head CH. iv) Distance: Sum of distance of the node from all its neighbors. Each node broadcasts a beacon message to notify its presence to the neighbors. A beacon message contains the state of the node. Each node builds its neighbor list based on the beacon messages received. The cluster-heads election is based on the weight values of the nodes and the node having the lowest weight is chosen as CH. Each node computes its weight value based on the following algorithm: 2.2 Node Weight Computational Algorithm Step 1: The coefficients used in weight calculation are assumed the following values w1=0.7, w2=0.2, w3=0.05, w4=0.05; The sum of these co-efficient is 1.This is actually used to normalize the factors such as spreading degree, distance with its neighbors, mobility of the node, and power consumed used in the calculation of weight of a node. The factors node connectivity and distance with its neighbors are given more importance and assumed higher co-efficient values 0.7 and 0.2 respectively Step 2: Compute the difference between the optimal cluster’s size ‘α’ and the real number of neighbors ‘R (V)’as node connectivity ,nc= 1-(| α -R (V)| / α) Step 3: For every node the sum of the distances, Dv, with all its neighbors is calculated. Dv= Σdist(v,v’) where v’ €N(v) Step 4: Calculate the average speed for every node until the current time T. This gives the measure of the mobility Mv based on the X co-ordinate and Y co-ordinate i.e. position of the node v at all previous time instance t. Step 5: Determine how much battery power has been consumed as Pv. This is assumed to be more for a Cluster-Head when compared to an ordinary node. Because Cluster-Head has taken care of all the members of the cluster by continuously sending the signal. Step 6: The weight Wv for each node is calculated based on Wν = (w1× nc) + (w2× Dν ) + (w3×Mν ) + (w4× Pν ) Where nc is the node connectivity, Dv is the distance with its neighbors, Mv is the mobility of the node, and power consumed is represented by, Pv Step 7: The node with the smallest Wv is elected as a cluster-head. All the neighbors of the chosen cluster-head are no more allowed to participate in the election procedure. Step 8: All the above steps are repeated for remaining nodes which is not yet elected as a cluster-head or assigned to a cluster. 2.3 Cluster Maintenance The second phase is the clustering maintenance. There are defined two distinct types of operations for cluster maintenance: the battery power threshold property and the node movement to the outside of its cluster boundary.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 466 2.3.1 Node Movements The node movements can be in the form of node joining or node leaving a cluster. These operations will have only local effects on the clustered topology if the moving node is a MN node. If the leaving node is CH node, the cluster reorganization has to be performed for the nodes in the cluster by evoking the clustering algorithm. Step1: Broadcast a beacon signal to all its neighbor nodes in the transmission range; Process the signals received from the neighbor nodes in the network and form the connection matrix, A; Step2: Calculate the Degree R (U) using A, Spreading degree, ∆sp, Sum of the distances, Du, with all its neighbors, Average speed, Mu, Amount of battery power that has been consumed, Pu, and Weight of node U as Wu; Step3: If(A Cluster head already exist in the neighborhood) Send request to join the Cluster; Else Form a new cluster and declare itself as the cluster-head; 2.3.2 Battery Power Threshold The battery power of the nodes participating in the Clustering changes continuously. The Cluster-Heads Power decreases more rapidly when compared to the Cluster Members. When the Cluster-Heads Battery Power falls below a threshold then the node is no longer able to perform its activates and a New Head from the members available need to be chosen. Step1: Verify the threshold on the Cluster -Head’s Battery power; If (Battery power < Threshold) Cluster-Head sends a LIFE_DOWN message to all its Neighbors; All the Member nodes participate in the Re-Election Procedure using Modified Weighted Clustering Algorithm and the Node with least weight is selected as the New Cluster-Head; Else Re-election is not needed; 3. RESULTS AND DISCUSSION The mobile network model assumed in this project consists of random number of mobile nodes with each node having fixed energy and random mobility. Further each node starts with some energy and its energy decreases each time it passes a message. A node fails if its whole energy has been consumed. A failed node is represented as a black node. The measured performance of the proposed algorithm was compared with AODV using NS2 simulation tool. 3.1 Packet Delivery Ratio (PDR) The Packet Delivery ratio is based on the number of packets delivered and number of packets sent. Higher the pause time better is the performance of the Cluster. The CBDST technique approaches a ratio of one or 100% delivery as the network becomes more static in figure 1. Only under dynamic conditions the packets collide or the packets are lost. As the pause time increases the static nature is enhanced. CBDST also delivered good PDR against the scalability.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 467 3.2 Connectivity The connectivity of nodes gives path for data packets to be forwarded without loss and comparison results are shown in the above graph. NS2 simulation with varying node count ranging from 10 to 100 is used to study the percentage of connectivity in wireless environment. Maximum possible connectivity is 100% where each node is connected with every other node. CBDST perform well over AODV while increasing number of nodes and pause time as shown in figure 2. CBDST has good scalability and robustness. 4. CONCLUSION We have proposed new routing management for better connectivity, network lifetime, less energy consumption and equally load balancing of the cluster head by re-elected the cluster head after a threshold. The CBDST perform well over AODV for packet delivery ratio and scalability 0 0.2 0.4 0.6 0.8 1 1.2 50 150 250 350 450 Pause Time in Sec PacketDeliveryRatio AODV CBDST 0.86 0.88 0.9 0.92 0.94 0.96 0.98 1 50 150 250 350 450 Pause Time in sec connectivityrate(%) AODV CBDST 0 0.2 0.4 0.6 0.8 1 1.2 10 30 50 70 90 Number of Mobile Nodes PacketDeliveryRatio AODV CBDST 0 0.2 0.4 0.6 0.8 1 1.2 10 30 50 70 90 Number of Mobile Nodes Cnnectivityratein(%) AODV CBDST Fig 1. Packet Delivery Ratio Fig 2. Route Connectivity
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 3, May – June (2013), © IAEME 468 REFERENCES [1] S. Lee, J. Hsu, R. Hayashida, M. Gerla, and R. Bagrodia, “Selecting a Routing Strategy for Your Ad hoc Network,” Special issue on Advances in Computer Communications and Networks: Algorithms and Applications, vol. 26, no. 7, pp. 723- 733, May 2003. [2] C. Perkins, E. Belding-Royer, and S. Das, “Ad Hoc On Demand Distance Vector (AODV) Yu .J.P. & Chong [3] P.H.J. (2005).A Survey of Clustering Schemes for Mobile Ad Hoc Networks. IEEE communications Surveys and Tutorials, Vol. 7, No. 1, pp. 32-48. Routing,” IETF RFC3561, July 2003. [4] Yu .J.P. & Chong P.H.J. (2005).A Survey of Clustering Schemes for Mobile Ad Hoc Networks. IEEE Communications Surveys and Tutorials, Vol. 7, No. 1, pp. 32-48. [5] Deniz Cokuslu Kayhan Erciyes and Orhan Dagdeviren A Dominating Set Based Clustering Algorithm for Mobile Ad hoc Networks, Springer Computational Science – ICCS (2006). [6] P. Victer Paul, T. Vengattaraman, P. Dhavachelvan & R. Baskaran, Improved Data Cache Scheme Using Distributed Spanning Tree in Mobile Adhoc Network, International Journal of Computer Science & CommunicationVol. 1, No. 2, July- December (2010). [7] M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [8] V. Bapuji, R. Naveen Kumar, Dr. A. Govardhan and Prof. S.S.V.N. Sarma, “Maximizing Lifespan of Mobile Ad Hoc Networks with Qos Provision Routing Protocol”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 150 - 156, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.