SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
DOI : 10.5121/ijans.2013.3202 9
AN OPTIMIZED MECHANISM FOR ADAPTIVE
AND DYNAMIC POLICY BASED HANDOVER IN
CLUSTERED MANET
1
Nidhi Parashar
Department of Information Technology, Meerut Institute of Technology, Meerut, U.P.,
India.
nidhi.csit@gmail.com
ABSTRACT
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
KEYWORDS
Mobile ad-hoc network (MANET), service discovery, Application specific threshold, Energy-Distance
Factor, Caching, Load balancing, QoS, RSSI, Handover.
1. INTRODUCTION
With the recent advances in the development of wireless communication technologies an Infra-
structure less network MANET is quickly growing for its ability to form the network of dynamic
topology without any fixed or predefined infra-structure. The mobile nodes are constrained with
high mobility and energy limitations therefore a hierarchical architecture is needed to achieve
performance guarantee in a large scale MANET thus MANET nodes are grouped into clusters.
Under a cluster structure resources can be spatially reused to increase the system capacity and two
clusters may use the same frequency or code set if they are not neighboring clusters. Internal
events in the cluster can be coordinated by its cluster head. For satisfactory performance of
MANET an effective cluster formation, cluster head selection mechanism considering all the
network dynamics is needed along with a handover mechanism that performs efficiently in
various network conditions.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
10
Policy based handover mechanisms have been done in past but no one specifies the design and
mechanisms for policies to be considered while taking handover decision. Here an adaptive and
optimized handover mechanism based on certain policies has been deduced that significantly
avoids the overhead created due to unwanted handover initiation. At the same time detail
mechanisms for different policies are optimized in terms of network throughput and QoS
parameters resulting into an optimal handover decision reducing the handover latency and
processing delay. Energy distance factor [7] facilities the energy efficient decisions in different
phases of the proposed mechanism.
Rest of the paper is organized as follows.Section-2 gives the literature review while proposed
work is discussed in section-3. Section-4 concludes the contribution of this paper along with the
future scope in Section-5.
2. BACKGROUND
Dynamic Cluster Protocol [1] having five states such as un-clustered state, orphan state, election
state, cluster node state, and cluster head state are identified for a MANET. Detection and control
mechanism for DDOS attacks over reputation and score based MANET [2] gives clustering
technique using reputation and score value of nodes but the important parameters like distance
from centroid, processing capability and mobility of a node in cluster head selection procedure
have not been considered.
A distributed directory based service discovery mechanism [6] operates in a proactive mode and
selects a provider based on distance and service capability of the provider. A probability based
node selection method [7] identifies the inter-mediate node with optimum stored energy that
could withstand through duration of connection. A handover scheme considering the current
active application in use rather than a single fixed threshold value and dynamically changing the
threshold value depending upon the currently active applications [8] have been used to avoid
unnecessary handovers.
Policy Based Fast Handover Mechanism for MANET [4] provides proactive and reactive
handover approaches based on policy for nodes of MANET but parameterized design for different
policies in changing situations have not been explored. In addition to the more dynamic and
adaptive mechanisms for cluster formation and cluster head selection, most of the policy
mechanism to provide best handover decisions and reducing the overhead caused by unnecessary
handovers.
3. PROPOSED WORK
This section presents the proposed Architecture and mechanism in the sub sections 3.1 and 3.2.
3.1 Architecture of Optimized Policy Based Handover
The proposed architecture in Fig. 1 includes the following modules.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
11
3.1.1. Cluster formation module
It co-ordinates cluster formation in MANET. All mobile nodes in MANET are organized into
clusters on the basis of Device type, Bandwidth, RSSI value, Services required, Distance
between nodes.
3.1.2. Cluster Head Selection module
It facilitates the score based weighted selection of a node as Cluster head.
Figure 1. Adaptive and Optimized Policy Based Handover
3.1.3. Policy Module
It comprises different policy mechanisms that guarantee efficient resource utilization along with
better QoS inside MANET[4].
Load Manager manages the load balancing task inside a cluster. On the basis of current load and
remaining battery power of the cluster nodes the load among them is distributed for the smooth
and efficient working of cluster.
Service Manager manages intra cluster and intra cluster service discovery to the MN while
moving from one place to another.
Next-Hop Specification Manager selects optimal cluster for a MN when it receives equal RSSI
value from two or more clusters.
Policy Manager Coordinates working of overall policy module .It collects the updated policy
management in-formation from all the managers, compiles the gathered information and gives
suggestions to MN regarding handover need and Quality of services management.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
12
3.1.4. Mobile Agent
These freely moving ad hoc network nodes collect the location and description of services
available in different clusters and make this global service information available to the CHs of all
clusters.
3.1.5. Local Observer module
It observes the local functioning of a cluster and assists the CH in various cluster maintenance
activities.
Application Specific RSSI Observer calculates the RSSI requirement of all the active mobile
nodes within a cluster according to the currently running applications in each mobile node[8]. If
more than one application is running simultaneously in a mobile node and all applications require
different RSSI values then this module selects the maximum of them as RSSIAST.
Quality of services Observer keeps track of all the network parameters like bandwidth, RSSI, load
distribution on all the mobile nodes within the cluster.
3.1.6. Handover Management module
It provides optimal handover when MN detects the need to move seamlessly within MANET.
Handover Triggering Observer receives handover request from MN and invokes handover system
discovery manager to find potential CHs.
Handover System Discovery Manager prepares list of target CHs on the basis of RSSI required,
capability of target CHs and the context for which handover need is initiated and sends this list to
Handover Decision Manager for target selection.
Handover Decision Manager selects the optimal target cluster.
Handover Execution Manager coordinates the actual handover including authentication and
association to the target cluster.
3.2 Mechanism of Optimized Policy Based Handover
3.2.1. Optimized Cluster Creation and cluster Head Selection
In this primary phase details of cluster formation and cluster head selection mechanisms are
specified.
Node Admission Control manages the entry of a new node in MANET. While a node enters
MANET it is in UN Clustered state. It sends a hello message to all neighbors. After a predefined
number of tries If it does not get reply before expiry of timer (tuc),it enters into Orphan state.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
13
NodeAdmissionControl( )
{ If (t<=tuc)
ApplyForCluster();
Else
{ Ni turns Orphan.
If(gets GetState from CH)
ApplyForCluster ();
Else
CreateNewCluster();}
}
ApplyForCluster()
{For (i=1; i<=n; i++)
If((clusterSize<MaxSize)&& (Ni=DType)&& (BWNi>=BWT)
JoinCluster ();
Elseif(clusterSize>MaxSize)
CreateNewCluster ();
Else
MergeCluster();//if no.ofnode<MinSize
}
JoinCluster( )
{//Ni is in eligibility test and Nj is the existing node
If((DNiNj<=DTHRESHOLD)&&(ClusterRangeNi<=RangeTH)&&(RSSINi>=RSSITH)&&
(ServiceRequired€ServiceOffered))
Ni is accepted in the cluster;
}
CreateNewCluster( )
{ Appoint the initiating node as CH;
If(CH does not get any message for a time
period)
CH changes its state from CH to
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
14
Orphan State;
Else
ClusterHeadSelection();}
MergeCluster( )
{//NC is total no of user clusters.
For (j=1; j<=NC-1; i++)
If(SizeCi<MinSize||SizeCj<MinSize)&&(Ci and Cj are in range)
If(SizeCi<=SizeCj)
{//CP is the processing power of node.
If((CPCH>=CPTHRESHOLD)&&(CHnotoverloaded)&&(ServicesOfferedCi €
ServiceOfferedCj))
For all nodes in Ci
ApplyForCluste
r;
ClusterHeadSel
ection();
ElseIf((CPCH>=CPTHRESHOLD)&&(LoadCH<=CapacityCH)&&(ServicesOfferedCj € ServiceOffe-
redCi)) For all nodes in Cj
ApplyForCluste
r;
ClusterHeadSel
ection();}
}
Cluster Head Selection process considers the
following scores.
Reputation Score[2] returns trust value of the node depending upon its previous record of packet
forwarding capability. Each node in cluster contains an entry {NID,STRUST,UTRUST}.Let STRUST and
UTRUST are scores for correct and In-correct packet forwarding capability STRUST (i,j)=1, if i gets
service from j and UTRUST (i,j)=-1 otherwise. Trust value can be calculated as
tValue=Σ STRUST (i,j)+Σ UTRUST(i,j) (1)
Mobility Score provides means to deduce stability factor of mobile node Di,j is the distance
between two nodes i and j and MDi is Mean distance between Ni and all its neighbors STi is the
stability of node i.
Di, j = (Xi − Xj) + (Yi − Yj) (2)
MDi = ∑ Di, j (3)
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
15
STi= MDt - MDt-1 (4)
Energy Distance Score finds node that consume less energy to communicate with rest of cluster
nodes resulting in less battery power consumption [7]. Every node calculates Energy-Distance
factor(ED) with other node. Node having highest ED can be preferred as CH. Let Ei and Di is
residual Energy and distance of a node respectively.
ED=
∗
∑ ∗
//0<=ED<=1 (5)
Degree_Score() gives the number of neighbor nodes. Node calculates no of neighbors on the basis
of received Get State messages.
DFC( ) gives the distance from cluster centroid. Let (xc,yc) are co-ordinates of cluster centroid and Di, c is the
distance of a node from centroid.
Residual Power() gives the approximation of total energy consumption to transmit a packet from
sender to receiver node and calculates the residual energy[11].
AvailableBandwidth() estimates the available bandwidth on a link[10].
ResidualPower()
{
If(Ni is Transmitter)
{ ET(n,d)=Eelec * n + Eamp * n * n2
Eresidual = Eprev
- ET(n, d)}
ReputationScore( ) EnergyDistanceScore( )
{ For(i=1;i<=n;i++) {For(i=1;i<=n;i++)
If(tValueNi>=0) Calculate EDNi
Node is trustworthy; Return(EDNi);
Else }
Node not trustworthy;
Return(tValue);
}
Degree_Score () Mobility_Score()
{ DegreeNi =0 {For (i=1; i<=n; i++)
For (i=1; i<=n; i++) Return (STi);}
//where j=1to n.
DegreeNi++;
Return (DegreeNi);
}
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
16
Else
{ ER(n,d) =Eelec * n
E residual = E prev
– ER(n ,d)
} Return (Eresidual)
}
DFC( )
{
For (i=1; i<=n; i++)
Di, c = (Xi − Xc) + (Yi − Yc)
Return (Di, c);
}
AvailableBandwidth()
{//Let LC be the link capacity related with one hop neighbor. Ragg is the aggregate of the rates
assigned all incoming and outgoing flows.
AB = MAX{0,LC - Ragg}
Return(AB); }
For each node all of these scores are assigned a weight so that summation of all weights is unity
as.
W = 1
Let WT[Ni],WS[Ni],WE[Ni]WD[Ni],WDFC[Ni],WBP[Ni] and WB[Ni] are partial weights assigned
for all scores. Global weight for each node is calculated as
WG[Ni WG[Ni])=(WT[Ni]*tValueNi)+(WS[Ni]*STNi)+(WE[Ni]*EffNi)+(WD[Ni]*DegreeNi)
+
(WDFC[Ni]* Di, c)+(WBP[Ni]* Eresidual) +( WB[Ni]* AB Ni);
ClusterHeadSelection()
{
For (i=1;i<=n;i++)//for all nodes in the cluster
{ TVNi = ReputationScore(Ni);
STNi = Mobility_Score(Ni);
EffNi = Energy_Distance_Score(Ni);
DegNi = Degree_Score(Ni);
dfcNi = DFC();
Battery_PowerNi= ResidualPower ();
BandwidthNi = AvailableBandwidth();
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
17
}
For (i=1; i<=n;i++)
{
calculate WG[Ni];}
Min_Global_Weight WGmin =MIN(WG[Ni]………WG[Nn]);
Assign node having WGmin as CH;//Node having second lowest WG is assigned as
CHBackup.
If(CH fails || LoadCH>=CapacityCH)
{
CHBackup is selected as CH.
}
If(BatteryCH< BatteryTHRESHOLD)
{
CH sends power low signal to neighbors and turns orphan.
Cluster Head Selection ();
}
}
}
Figure 2. Cluster Creation and Cluster Head Selection
3.2.2 Caching based on mobility prediction
After the weight based dynamic cluster head selection, the cluster head of every cluster maintains
a local cache table (LCT) to store the details of the cached items in the same cluster and a global
cache table (GCT) to store the cached items of adjacent clusters.CH predicts the mobility of
cluster members using Hidden Markov Model (HMM)[12] to model various hidden parameters. If
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
18
the node is about to move, the information of that node is updated on both LCT and GCT.
Caching activity at CH is depicted in Figure 3.
Figure 3. Caching
3.2.3 Optimal Policy Based Parameters
To discover accurate decision techniques for handover process, following policies are considered.
Load Balancing forces CH to periodically collect energy and load values from all cluster nodes
[5]. Considering CapacityCH is the max no of nodes CH can serve and LoadCH is the no of nodes it
is serving at present, an overloaded node generates a Relaxation Request to CH. For load
balancing among clusters we have used load balancing factor (LBF) [11] to quantitatively
measure the load distribution among clusters. n is the number of CHs. xi is the cardinality of
cluster i.µ is the average number of neighbors of a CH and N is total no of nodes.
µ = (N-n)/n (7)
LBF is inverse of the cardinality of the clusters.
LBF= n÷∑( − μ)2 (8)
Higher value of LBF implies better load distribution. Load balancing ensures balanced clusters
inside the MANET and raises the need for handover when load inside cluster is non manageable
providing optimal handover triggering.
Application Requirement results into hybrid mode service discovery given in Figure.4 all SP
nodes advertise their services to their CH proactively while SR nodes query their CH for service
information whenever it is in need of any service reactively.CH is responsible for intra cluster
service discovery and inter cluster service discovery is done with the help of mobile agents.
Optimized service discovery mechanism reduces the risk of unnecessary handovers triggered due
to requirement of services.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
19
Figure 4. Hybrid Service Discovery
Next-hop Specification helps the cluster nodes who may reach to more than one CH. Let CHcur
current CH and CHalter is alternative CH .Such nodes may obtain equal RSSI value from two
different CHs. Taking the current load and battery power intermediate hop count of each CH into
consideration the better cluster is decided.
Figure 5. Next Hop Selection
IntraClusterLoadBalance( )
{
For(i=1; i<=n; i++)//for all nodes in cluster
If(((LoadNi>=MaxLoad)&&(ENi<=MinE))
||((LoadNi>=MaxLoad)||(ENi<=MinE))
Ni sends RelaxReq to CH and CH sends address of capable nodes in
RelaxRep.
If(Ni receives more than one address in RelaxRep)
{
For(j=1; j<=k; j++)//k possible nodes
Compute Dij.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
20
MinDistance= MIN (Di1,Di2..DiK);
Nj at Minimum distance is selected
}
}
InterClusterLoadBalance( )
{
Every CH periodically calculates LBF If(LBFt<LBFmin)
Initiate load balancing among clusters.
Else
Continue;
}
Service_discovery( )
{ If (SP exists in same cluster)
Sreq is forwarded to SP that replies to SR .
Elseif(same Sreq has been cached in CHSR)
CHSR replies to SR.
Else if(SP doesn’t exist in cluster)
If(CHSR knows the SP)
CHSR forwards Sreq to CHSP which replies.
Else
CHSR sends Sreq to nearest MA who forwards Sreq to CHSP
}
NextHopSelection()
{ If(MN directly connects CHcur||MN directly connects CHalter)
CH at zero hop distance is selected as CHtarget
Else //Let k intermediate nodes to CHcur and l nodes to CHalter
ED( CHalter) = ∑ EDi
ED( CHcur) = ∑ EDi
If(ED(CHalter)==Max(ED(CHalter),ED(CHcur))&&(LoadCHalter< LoadCHcur).
CHalter is selected as CHtarget
}
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
21
3.4.4. Optimized Handover
Handover can be performed proactively or reactively according to the following stages:
Handover Triggering predicts the need for handover depending upon LoadCH, available services
and RSSIAST
Handover System discovery searches for better RSSI value proactively or reactively whenever
mobile node experience (RSSI< RSSIAST).
Handover Decision State selects the optimal cluster. In Proactive mode to reduce the handover
latency period, as soon as the mobile node gathers a number of probe advertisements it starts
comparing the QoS offered in each cluster and based on various policies and user contexts selects
the best cluster to get better QoS. A Prepare Handover request is sent to the target cluster so that
target cluster may reserve the required resources in advance. Same policy is applied in reactive
mode.
Handover Execution Phase starts with AuthenticationReq sent to target CH by MN,After receiving
AuthenticationAck MN sends the AssociationReq and waits for AssociationAck.At the end binding
update informing about its new location is sent to the old CH which replies with Binding Ack.
Trigger_Handover()
{ For (i=1; i<=n; i++)
If((LoadCH>=CapacityCH)||(!ServicesPresent)||(RSSINi<=RSSIAST))
Initiate System Discovery();
}
Handover Decision( )
{ Find CH with (RSSI>=RSSIAST)&&(LoadCHi<=LoadCHcur)
For(i=1; i<=P; i++)// P is total potential CHs
If((EDCHi==Max(EDCh1..EDChP)&&(ServicesReq€ServiceOffCHi)&&(Battery=Ba
tteryTH)&&(StabilityCHi=Max(StabilityCH1…..CHp)&& (Latency<LatencyTH)
Select CHi as target CH for handover procedure
Else
Repeat the process for the next CH.
}
Figure 6. Handover Decision Procedure
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
22
Figure 7. Reactive and Proactive Handover Procedure
4. CONCLUSION
MANET allows mobile nodes to spontaneously form a network and share their services but due to
the network’s dynamics and resource constraints of wireless nodes, It requires adequate support
for service discovery. An effective cluster formation and power efficient cluster head selection
mechanism based on reputation mobility, residual energy and link bandwidth have been proposed
in this work. Certain policy framework has been explored to achieve balanced clusters, adaptive
service discovery and best cluster selection for a freely roaming mobile node. These policies have
been enforced on all handover phases resulting in optimized handover with reduced handover,
optimal resource consumption, reduced latency and interruption time.
5. FUTURE SCOPE
This mechanism is proposed to achieve required level of flexibility and adaptability to combat
the network dynamics. Further exploration is required for a formal validation, based upon
prototype implementation and performance evaluation. There is a scope for additional policies
which can be explored and implemented as per requirements to increase the effectiveness of
proposed scheme. An effective mechanism for location prediction can be incorporated in this
framework to assure an optimized handover.
International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013
23
REFERENCES
[1] Shubha Mishra,Dr. Manish Shrivastava, (2011) “Efficient Secure Clustering Protocol For Mobile Ad-
Hoc Network”, Journal of Global Research in Computer Science, Vol. 2,No. 9,pp 39-45.
[2] Rizwan Khan, A. K. Vatsa, (2011) “Detection and Control of DDOS Attacks over Reputation and
Score Based MANET”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2,
No.11.
[3] Pradeep Kumar, A. K. Vatsa, (2011) “Novel Security Architecture and Mechanism for Identity based
Information Retrieval System in MANET”, International Journal of Mobile Adhoc Network|,Vol
1,No.3.
[4] Ankur Gupta, A. K. Vatsa,(2011) “Policy Based Fast Handover Mechanism for MANET”,World of
Computer Science and Information Technology Journal,Vol.1,No. 8,pp 339-345.
[5] Shruti Sangwan, Nitin Goel, Ajay Jangra, (2011) “AELB: Adaptive and Efficient Load Balancing
Schemes to Achieve Fair Routing in Mobile Ad hoc Networks”, IJCST Vol. 2, No.3, pp. 11-15.
[6] Cynthia Jaypal, Sumathi Vembu, (2011). “Adaptive Service Discovery Protocol for Mobile Ad Hoc
Networks”, European Journal of Scientific Research, Vol.49, No.1, pp. 6-17.
[7] Jailani Kadir, Osman Ghazali, Mohamed Firdhous, Suhaidi Hassan, (2011) “Node Selection Based on
Energy Consumption in MANET”.
[8] V. Berlin Hency, S. Aravind Prasad, Y.RA. Kannan and D. Sridhar an, (2011) “A Novel Approach
For Handover Avoidance And Qos Improvement In Wlan”. International Journal of Distributed and
Parallel Systems, Vol.2, No.5, pp. 77-86.
[9] Mohammad Faisal,Muhammad Nawaz Khan, (2012) “An enhanced Scheme for Reducing Vertical
handover latecy”, (International Journal of Advanced Computer Science and Applications, Vol. 3,
No.1,pp. 100-105.
[10] R. Venilla,V.Duraisamy,(2012)”Qos based clustering technique for multicast security in MANET”,
European Journal of Scientific Research,Vol. 81, No. 1,pp. 33-46.
[11] R. Deepa, S. Swamynatahan,(2012) “Load Balancer for Energy Efficient Clustering Protocol in
MANETs”, International Conference on Advances in Computing, Communication and
Informatics,pp. 269-275.
[12] P. Kuppusamy, K. Thirunavukkarasu, B. Kalaavathi, (2012)”Cluster Based Cooperative Caching
Technique in Mobile Ad Hoc Networks”, European Journal of Scientific Research, Vol. 69, No. 3,pp.
337-349.
AUTHOR
Nidhi Parashar has done Master in Technology in Computer Engineering. She is
presently working as Senior Lecturer in Department of Information Technology at
M.I.T., Meerut,U.P. During academic session she has coordinated and attended
variousNational Conferences and Workshops at university level.Her research area
includes MANET (Mobile Ad-hoc Network),Wireless Sensor Network(WSN) and
Congestion control.

Más contenido relacionado

La actualidad más candente

Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backupcsandit
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040IJMER
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...eSAT Journals
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...amin azari
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...M H
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
 
Clustering based performance improvement strategies for mobile ad hoc netwo
Clustering based performance improvement strategies for mobile ad hoc netwoClustering based performance improvement strategies for mobile ad hoc netwo
Clustering based performance improvement strategies for mobile ad hoc netwoIAEME Publication
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijsptm
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...ijasuc
 
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...TELKOMNIKA JOURNAL
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...M H
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
 

La actualidad más candente (16)

Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
Cu3210381040
Cu3210381040Cu3210381040
Cu3210381040
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
H0261047055
H0261047055H0261047055
H0261047055
 
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
Lifetime-Aware Scheduling and Power Control for Cellular-based M2M Communicat...
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
Clustering based performance improvement strategies for mobile ad hoc netwo
Clustering based performance improvement strategies for mobile ad hoc netwoClustering based performance improvement strategies for mobile ad hoc netwo
Clustering based performance improvement strategies for mobile ad hoc netwo
 
Eh33798804
Eh33798804Eh33798804
Eh33798804
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
A Novel Grid Based Dynamic Energy Efficient Routing Approach for Highly Dense...
 
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
Improved fuzzy c-means algorithm based on a novel mechanism for the formation...
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 

Destacado

By Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBy Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBill Dimtsas
 
Μακεδονικός Αγώνας
Μακεδονικός ΑγώναςΜακεδονικός Αγώνας
Μακεδονικός Αγώνας2lykeio
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
 
Project proposal for BRIT
Project proposal for BRITProject proposal for BRIT
Project proposal for BRITSyadur Rahaman
 
Presentation apchoo art style eng 12.05.13
Presentation apchoo art style  eng 12.05.13Presentation apchoo art style  eng 12.05.13
Presentation apchoo art style eng 12.05.13Uzak Jarkimbayev
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...pijans
 
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHAS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHpijans
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet pijans
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveypijans
 
DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.Syadur Rahaman
 
Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση 2lykeio
 
Ο Κόσμος στον Μεσαίωνα
Ο Κόσμος στον ΜεσαίωναΟ Κόσμος στον Μεσαίωνα
Ο Κόσμος στον Μεσαίωνα2lykeio
 
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetEarth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetSyadur Rahaman
 
Η Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώναΗ Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώνα2lykeio
 

Destacado (20)

By Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global PresentationBy Nature Franchise Concept - Global Presentation
By Nature Franchise Concept - Global Presentation
 
Μακεδονικός Αγώνας
Μακεδονικός ΑγώναςΜακεδονικός Αγώνας
Μακεδονικός Αγώνας
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Task 6
Task 6Task 6
Task 6
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
 
Project proposal for BRIT
Project proposal for BRITProject proposal for BRIT
Project proposal for BRIT
 
Presentation apchoo art style eng 12.05.13
Presentation apchoo art style  eng 12.05.13Presentation apchoo art style  eng 12.05.13
Presentation apchoo art style eng 12.05.13
 
The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACHAS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.DRR Component Incorporate With 7FYP Bangladesh Govt.
DRR Component Incorporate With 7FYP Bangladesh Govt.
 
Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση Θρησκευτική Μεταρρύθμιση
Θρησκευτική Μεταρρύθμιση
 
Ο Κόσμος στον Μεσαίωνα
Ο Κόσμος στον ΜεσαίωναΟ Κόσμος στον Μεσαίωνα
Ο Κόσμος στον Μεσαίωνα
 
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhetEarth sciences field work along jointiapur tamabil-jaflong section; sylhet
Earth sciences field work along jointiapur tamabil-jaflong section; sylhet
 
Η Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώναΗ Τέχνη τον 19ο και 20ο αιώνα
Η Τέχνη τον 19ο και 20ο αιώνα
 

Similar a AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUSTERED MANET

Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...IJCNCJournal
 
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks   Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks pijans
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...IJNSA Journal
 
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...ijassn
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...ijassn
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksEswar Publications
 
Network Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyNetwork Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyEswar Publications
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...ijwmn
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
 
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...ijwmn
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks IJCSES Journal
 
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...IDES Editor
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 

Similar a AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUSTERED MANET (20)

Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks   Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...Current issues - International Journal of Network Security & Its Applications...
Current issues - International Journal of Network Security & Its Applications...
 
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
 
2012an20
2012an202012an20
2012an20
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...
 
Camp finall
Camp finallCamp finall
Camp finall
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
Network Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent TechnologyNetwork Monitoring and Traffic Reduction using Multi-Agent Technology
Network Monitoring and Traffic Reduction using Multi-Agent Technology
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...A novel resource efficient dmms approach for network monitoring and controlli...
A novel resource efficient dmms approach for network monitoring and controlli...
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...
BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EME...
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks
 
C1804011117
C1804011117C1804011117
C1804011117
 
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
Analysis and Enhancements of Leader Elections algorithms in Mobile Ad Hoc Net...
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 

Más de pijans

Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Networkpijans
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -pijans
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...pijans
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparisonpijans
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...pijans
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...pijans
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routingpijans
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETpijans
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...pijans
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXpijans
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 

Más de pijans (20)

Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient NodePerformance Analysis of Mtpr Routing Protocol in Power Deficient Node
Performance Analysis of Mtpr Routing Protocol in Power Deficient Node
 
Path Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc NetworkPath Duration Analysis in Vehicular Ad Hoc Network
Path Duration Analysis in Vehicular Ad Hoc Network
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -Dynamic Ridesharing Using Social Media -
Dynamic Ridesharing Using Social Media -
 
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
Performance Analysis of Improved Autonomous Power Control Mac Protocol (IAPCM...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance ComparisonWireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A...
 
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
Multilayer Perceptron Guided Key Generation through Mutation with Recursive R...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Securing Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and RoutingSecuring Mobile Ad hoc Networks: Key Management and Routing
Securing Mobile Ad hoc Networks: Key Management and Routing
 
Different Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANETDifferent Ways to Achieve Trust in MANET
Different Ways to Achieve Trust in MANET
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
Throughput and Delay Analysis of Next-HOP Forwarding Method for Non-Linear Eh...
 
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAXPuzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
Puzzle Based Approach for Solving Denial of Service Attack in Mobile WIMAX
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 

Último

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Último (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUSTERED MANET

  • 1. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 DOI : 10.5121/ijans.2013.3202 9 AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUSTERED MANET 1 Nidhi Parashar Department of Information Technology, Meerut Institute of Technology, Meerut, U.P., India. nidhi.csit@gmail.com ABSTRACT On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring, rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that meets the requirements. At the same time MANET’s random behavior and absence of any central intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy driven handover approaches have been proposed for MANET but none of them explores a comprehensive policy design. Therefore in this paper we propose an adaptive and optimized policy based handover mechanism which is based on explicitly designed policies like load balancing, service discovery and next hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of handover need on the basis of application specific needs of individual freely roaming mobile nodes, avoiding unnecessary handovers and provides efficient handover procedure with optimized resource consumption, reduced latency and interruption time. KEYWORDS Mobile ad-hoc network (MANET), service discovery, Application specific threshold, Energy-Distance Factor, Caching, Load balancing, QoS, RSSI, Handover. 1. INTRODUCTION With the recent advances in the development of wireless communication technologies an Infra- structure less network MANET is quickly growing for its ability to form the network of dynamic topology without any fixed or predefined infra-structure. The mobile nodes are constrained with high mobility and energy limitations therefore a hierarchical architecture is needed to achieve performance guarantee in a large scale MANET thus MANET nodes are grouped into clusters. Under a cluster structure resources can be spatially reused to increase the system capacity and two clusters may use the same frequency or code set if they are not neighboring clusters. Internal events in the cluster can be coordinated by its cluster head. For satisfactory performance of MANET an effective cluster formation, cluster head selection mechanism considering all the network dynamics is needed along with a handover mechanism that performs efficiently in various network conditions.
  • 2. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 10 Policy based handover mechanisms have been done in past but no one specifies the design and mechanisms for policies to be considered while taking handover decision. Here an adaptive and optimized handover mechanism based on certain policies has been deduced that significantly avoids the overhead created due to unwanted handover initiation. At the same time detail mechanisms for different policies are optimized in terms of network throughput and QoS parameters resulting into an optimal handover decision reducing the handover latency and processing delay. Energy distance factor [7] facilities the energy efficient decisions in different phases of the proposed mechanism. Rest of the paper is organized as follows.Section-2 gives the literature review while proposed work is discussed in section-3. Section-4 concludes the contribution of this paper along with the future scope in Section-5. 2. BACKGROUND Dynamic Cluster Protocol [1] having five states such as un-clustered state, orphan state, election state, cluster node state, and cluster head state are identified for a MANET. Detection and control mechanism for DDOS attacks over reputation and score based MANET [2] gives clustering technique using reputation and score value of nodes but the important parameters like distance from centroid, processing capability and mobility of a node in cluster head selection procedure have not been considered. A distributed directory based service discovery mechanism [6] operates in a proactive mode and selects a provider based on distance and service capability of the provider. A probability based node selection method [7] identifies the inter-mediate node with optimum stored energy that could withstand through duration of connection. A handover scheme considering the current active application in use rather than a single fixed threshold value and dynamically changing the threshold value depending upon the currently active applications [8] have been used to avoid unnecessary handovers. Policy Based Fast Handover Mechanism for MANET [4] provides proactive and reactive handover approaches based on policy for nodes of MANET but parameterized design for different policies in changing situations have not been explored. In addition to the more dynamic and adaptive mechanisms for cluster formation and cluster head selection, most of the policy mechanism to provide best handover decisions and reducing the overhead caused by unnecessary handovers. 3. PROPOSED WORK This section presents the proposed Architecture and mechanism in the sub sections 3.1 and 3.2. 3.1 Architecture of Optimized Policy Based Handover The proposed architecture in Fig. 1 includes the following modules.
  • 3. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 11 3.1.1. Cluster formation module It co-ordinates cluster formation in MANET. All mobile nodes in MANET are organized into clusters on the basis of Device type, Bandwidth, RSSI value, Services required, Distance between nodes. 3.1.2. Cluster Head Selection module It facilitates the score based weighted selection of a node as Cluster head. Figure 1. Adaptive and Optimized Policy Based Handover 3.1.3. Policy Module It comprises different policy mechanisms that guarantee efficient resource utilization along with better QoS inside MANET[4]. Load Manager manages the load balancing task inside a cluster. On the basis of current load and remaining battery power of the cluster nodes the load among them is distributed for the smooth and efficient working of cluster. Service Manager manages intra cluster and intra cluster service discovery to the MN while moving from one place to another. Next-Hop Specification Manager selects optimal cluster for a MN when it receives equal RSSI value from two or more clusters. Policy Manager Coordinates working of overall policy module .It collects the updated policy management in-formation from all the managers, compiles the gathered information and gives suggestions to MN regarding handover need and Quality of services management.
  • 4. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 12 3.1.4. Mobile Agent These freely moving ad hoc network nodes collect the location and description of services available in different clusters and make this global service information available to the CHs of all clusters. 3.1.5. Local Observer module It observes the local functioning of a cluster and assists the CH in various cluster maintenance activities. Application Specific RSSI Observer calculates the RSSI requirement of all the active mobile nodes within a cluster according to the currently running applications in each mobile node[8]. If more than one application is running simultaneously in a mobile node and all applications require different RSSI values then this module selects the maximum of them as RSSIAST. Quality of services Observer keeps track of all the network parameters like bandwidth, RSSI, load distribution on all the mobile nodes within the cluster. 3.1.6. Handover Management module It provides optimal handover when MN detects the need to move seamlessly within MANET. Handover Triggering Observer receives handover request from MN and invokes handover system discovery manager to find potential CHs. Handover System Discovery Manager prepares list of target CHs on the basis of RSSI required, capability of target CHs and the context for which handover need is initiated and sends this list to Handover Decision Manager for target selection. Handover Decision Manager selects the optimal target cluster. Handover Execution Manager coordinates the actual handover including authentication and association to the target cluster. 3.2 Mechanism of Optimized Policy Based Handover 3.2.1. Optimized Cluster Creation and cluster Head Selection In this primary phase details of cluster formation and cluster head selection mechanisms are specified. Node Admission Control manages the entry of a new node in MANET. While a node enters MANET it is in UN Clustered state. It sends a hello message to all neighbors. After a predefined number of tries If it does not get reply before expiry of timer (tuc),it enters into Orphan state.
  • 5. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 13 NodeAdmissionControl( ) { If (t<=tuc) ApplyForCluster(); Else { Ni turns Orphan. If(gets GetState from CH) ApplyForCluster (); Else CreateNewCluster();} } ApplyForCluster() {For (i=1; i<=n; i++) If((clusterSize<MaxSize)&& (Ni=DType)&& (BWNi>=BWT) JoinCluster (); Elseif(clusterSize>MaxSize) CreateNewCluster (); Else MergeCluster();//if no.ofnode<MinSize } JoinCluster( ) {//Ni is in eligibility test and Nj is the existing node If((DNiNj<=DTHRESHOLD)&&(ClusterRangeNi<=RangeTH)&&(RSSINi>=RSSITH)&& (ServiceRequired€ServiceOffered)) Ni is accepted in the cluster; } CreateNewCluster( ) { Appoint the initiating node as CH; If(CH does not get any message for a time period) CH changes its state from CH to
  • 6. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 14 Orphan State; Else ClusterHeadSelection();} MergeCluster( ) {//NC is total no of user clusters. For (j=1; j<=NC-1; i++) If(SizeCi<MinSize||SizeCj<MinSize)&&(Ci and Cj are in range) If(SizeCi<=SizeCj) {//CP is the processing power of node. If((CPCH>=CPTHRESHOLD)&&(CHnotoverloaded)&&(ServicesOfferedCi € ServiceOfferedCj)) For all nodes in Ci ApplyForCluste r; ClusterHeadSel ection(); ElseIf((CPCH>=CPTHRESHOLD)&&(LoadCH<=CapacityCH)&&(ServicesOfferedCj € ServiceOffe- redCi)) For all nodes in Cj ApplyForCluste r; ClusterHeadSel ection();} } Cluster Head Selection process considers the following scores. Reputation Score[2] returns trust value of the node depending upon its previous record of packet forwarding capability. Each node in cluster contains an entry {NID,STRUST,UTRUST}.Let STRUST and UTRUST are scores for correct and In-correct packet forwarding capability STRUST (i,j)=1, if i gets service from j and UTRUST (i,j)=-1 otherwise. Trust value can be calculated as tValue=Σ STRUST (i,j)+Σ UTRUST(i,j) (1) Mobility Score provides means to deduce stability factor of mobile node Di,j is the distance between two nodes i and j and MDi is Mean distance between Ni and all its neighbors STi is the stability of node i. Di, j = (Xi − Xj) + (Yi − Yj) (2) MDi = ∑ Di, j (3)
  • 7. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 15 STi= MDt - MDt-1 (4) Energy Distance Score finds node that consume less energy to communicate with rest of cluster nodes resulting in less battery power consumption [7]. Every node calculates Energy-Distance factor(ED) with other node. Node having highest ED can be preferred as CH. Let Ei and Di is residual Energy and distance of a node respectively. ED= ∗ ∑ ∗ //0<=ED<=1 (5) Degree_Score() gives the number of neighbor nodes. Node calculates no of neighbors on the basis of received Get State messages. DFC( ) gives the distance from cluster centroid. Let (xc,yc) are co-ordinates of cluster centroid and Di, c is the distance of a node from centroid. Residual Power() gives the approximation of total energy consumption to transmit a packet from sender to receiver node and calculates the residual energy[11]. AvailableBandwidth() estimates the available bandwidth on a link[10]. ResidualPower() { If(Ni is Transmitter) { ET(n,d)=Eelec * n + Eamp * n * n2 Eresidual = Eprev - ET(n, d)} ReputationScore( ) EnergyDistanceScore( ) { For(i=1;i<=n;i++) {For(i=1;i<=n;i++) If(tValueNi>=0) Calculate EDNi Node is trustworthy; Return(EDNi); Else } Node not trustworthy; Return(tValue); } Degree_Score () Mobility_Score() { DegreeNi =0 {For (i=1; i<=n; i++) For (i=1; i<=n; i++) Return (STi);} //where j=1to n. DegreeNi++; Return (DegreeNi); }
  • 8. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 16 Else { ER(n,d) =Eelec * n E residual = E prev – ER(n ,d) } Return (Eresidual) } DFC( ) { For (i=1; i<=n; i++) Di, c = (Xi − Xc) + (Yi − Yc) Return (Di, c); } AvailableBandwidth() {//Let LC be the link capacity related with one hop neighbor. Ragg is the aggregate of the rates assigned all incoming and outgoing flows. AB = MAX{0,LC - Ragg} Return(AB); } For each node all of these scores are assigned a weight so that summation of all weights is unity as. W = 1 Let WT[Ni],WS[Ni],WE[Ni]WD[Ni],WDFC[Ni],WBP[Ni] and WB[Ni] are partial weights assigned for all scores. Global weight for each node is calculated as WG[Ni WG[Ni])=(WT[Ni]*tValueNi)+(WS[Ni]*STNi)+(WE[Ni]*EffNi)+(WD[Ni]*DegreeNi) + (WDFC[Ni]* Di, c)+(WBP[Ni]* Eresidual) +( WB[Ni]* AB Ni); ClusterHeadSelection() { For (i=1;i<=n;i++)//for all nodes in the cluster { TVNi = ReputationScore(Ni); STNi = Mobility_Score(Ni); EffNi = Energy_Distance_Score(Ni); DegNi = Degree_Score(Ni); dfcNi = DFC(); Battery_PowerNi= ResidualPower (); BandwidthNi = AvailableBandwidth();
  • 9. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 17 } For (i=1; i<=n;i++) { calculate WG[Ni];} Min_Global_Weight WGmin =MIN(WG[Ni]………WG[Nn]); Assign node having WGmin as CH;//Node having second lowest WG is assigned as CHBackup. If(CH fails || LoadCH>=CapacityCH) { CHBackup is selected as CH. } If(BatteryCH< BatteryTHRESHOLD) { CH sends power low signal to neighbors and turns orphan. Cluster Head Selection (); } } } Figure 2. Cluster Creation and Cluster Head Selection 3.2.2 Caching based on mobility prediction After the weight based dynamic cluster head selection, the cluster head of every cluster maintains a local cache table (LCT) to store the details of the cached items in the same cluster and a global cache table (GCT) to store the cached items of adjacent clusters.CH predicts the mobility of cluster members using Hidden Markov Model (HMM)[12] to model various hidden parameters. If
  • 10. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 18 the node is about to move, the information of that node is updated on both LCT and GCT. Caching activity at CH is depicted in Figure 3. Figure 3. Caching 3.2.3 Optimal Policy Based Parameters To discover accurate decision techniques for handover process, following policies are considered. Load Balancing forces CH to periodically collect energy and load values from all cluster nodes [5]. Considering CapacityCH is the max no of nodes CH can serve and LoadCH is the no of nodes it is serving at present, an overloaded node generates a Relaxation Request to CH. For load balancing among clusters we have used load balancing factor (LBF) [11] to quantitatively measure the load distribution among clusters. n is the number of CHs. xi is the cardinality of cluster i.µ is the average number of neighbors of a CH and N is total no of nodes. µ = (N-n)/n (7) LBF is inverse of the cardinality of the clusters. LBF= n÷∑( − μ)2 (8) Higher value of LBF implies better load distribution. Load balancing ensures balanced clusters inside the MANET and raises the need for handover when load inside cluster is non manageable providing optimal handover triggering. Application Requirement results into hybrid mode service discovery given in Figure.4 all SP nodes advertise their services to their CH proactively while SR nodes query their CH for service information whenever it is in need of any service reactively.CH is responsible for intra cluster service discovery and inter cluster service discovery is done with the help of mobile agents. Optimized service discovery mechanism reduces the risk of unnecessary handovers triggered due to requirement of services.
  • 11. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 19 Figure 4. Hybrid Service Discovery Next-hop Specification helps the cluster nodes who may reach to more than one CH. Let CHcur current CH and CHalter is alternative CH .Such nodes may obtain equal RSSI value from two different CHs. Taking the current load and battery power intermediate hop count of each CH into consideration the better cluster is decided. Figure 5. Next Hop Selection IntraClusterLoadBalance( ) { For(i=1; i<=n; i++)//for all nodes in cluster If(((LoadNi>=MaxLoad)&&(ENi<=MinE)) ||((LoadNi>=MaxLoad)||(ENi<=MinE)) Ni sends RelaxReq to CH and CH sends address of capable nodes in RelaxRep. If(Ni receives more than one address in RelaxRep) { For(j=1; j<=k; j++)//k possible nodes Compute Dij.
  • 12. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 20 MinDistance= MIN (Di1,Di2..DiK); Nj at Minimum distance is selected } } InterClusterLoadBalance( ) { Every CH periodically calculates LBF If(LBFt<LBFmin) Initiate load balancing among clusters. Else Continue; } Service_discovery( ) { If (SP exists in same cluster) Sreq is forwarded to SP that replies to SR . Elseif(same Sreq has been cached in CHSR) CHSR replies to SR. Else if(SP doesn’t exist in cluster) If(CHSR knows the SP) CHSR forwards Sreq to CHSP which replies. Else CHSR sends Sreq to nearest MA who forwards Sreq to CHSP } NextHopSelection() { If(MN directly connects CHcur||MN directly connects CHalter) CH at zero hop distance is selected as CHtarget Else //Let k intermediate nodes to CHcur and l nodes to CHalter ED( CHalter) = ∑ EDi ED( CHcur) = ∑ EDi If(ED(CHalter)==Max(ED(CHalter),ED(CHcur))&&(LoadCHalter< LoadCHcur). CHalter is selected as CHtarget }
  • 13. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 21 3.4.4. Optimized Handover Handover can be performed proactively or reactively according to the following stages: Handover Triggering predicts the need for handover depending upon LoadCH, available services and RSSIAST Handover System discovery searches for better RSSI value proactively or reactively whenever mobile node experience (RSSI< RSSIAST). Handover Decision State selects the optimal cluster. In Proactive mode to reduce the handover latency period, as soon as the mobile node gathers a number of probe advertisements it starts comparing the QoS offered in each cluster and based on various policies and user contexts selects the best cluster to get better QoS. A Prepare Handover request is sent to the target cluster so that target cluster may reserve the required resources in advance. Same policy is applied in reactive mode. Handover Execution Phase starts with AuthenticationReq sent to target CH by MN,After receiving AuthenticationAck MN sends the AssociationReq and waits for AssociationAck.At the end binding update informing about its new location is sent to the old CH which replies with Binding Ack. Trigger_Handover() { For (i=1; i<=n; i++) If((LoadCH>=CapacityCH)||(!ServicesPresent)||(RSSINi<=RSSIAST)) Initiate System Discovery(); } Handover Decision( ) { Find CH with (RSSI>=RSSIAST)&&(LoadCHi<=LoadCHcur) For(i=1; i<=P; i++)// P is total potential CHs If((EDCHi==Max(EDCh1..EDChP)&&(ServicesReq€ServiceOffCHi)&&(Battery=Ba tteryTH)&&(StabilityCHi=Max(StabilityCH1…..CHp)&& (Latency<LatencyTH) Select CHi as target CH for handover procedure Else Repeat the process for the next CH. } Figure 6. Handover Decision Procedure
  • 14. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 22 Figure 7. Reactive and Proactive Handover Procedure 4. CONCLUSION MANET allows mobile nodes to spontaneously form a network and share their services but due to the network’s dynamics and resource constraints of wireless nodes, It requires adequate support for service discovery. An effective cluster formation and power efficient cluster head selection mechanism based on reputation mobility, residual energy and link bandwidth have been proposed in this work. Certain policy framework has been explored to achieve balanced clusters, adaptive service discovery and best cluster selection for a freely roaming mobile node. These policies have been enforced on all handover phases resulting in optimized handover with reduced handover, optimal resource consumption, reduced latency and interruption time. 5. FUTURE SCOPE This mechanism is proposed to achieve required level of flexibility and adaptability to combat the network dynamics. Further exploration is required for a formal validation, based upon prototype implementation and performance evaluation. There is a scope for additional policies which can be explored and implemented as per requirements to increase the effectiveness of proposed scheme. An effective mechanism for location prediction can be incorporated in this framework to assure an optimized handover.
  • 15. International Journal on AdHoc Networking Systems (IJANS) Vol. 3, No. 2, April 2013 23 REFERENCES [1] Shubha Mishra,Dr. Manish Shrivastava, (2011) “Efficient Secure Clustering Protocol For Mobile Ad- Hoc Network”, Journal of Global Research in Computer Science, Vol. 2,No. 9,pp 39-45. [2] Rizwan Khan, A. K. Vatsa, (2011) “Detection and Control of DDOS Attacks over Reputation and Score Based MANET”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No.11. [3] Pradeep Kumar, A. K. Vatsa, (2011) “Novel Security Architecture and Mechanism for Identity based Information Retrieval System in MANET”, International Journal of Mobile Adhoc Network|,Vol 1,No.3. [4] Ankur Gupta, A. K. Vatsa,(2011) “Policy Based Fast Handover Mechanism for MANET”,World of Computer Science and Information Technology Journal,Vol.1,No. 8,pp 339-345. [5] Shruti Sangwan, Nitin Goel, Ajay Jangra, (2011) “AELB: Adaptive and Efficient Load Balancing Schemes to Achieve Fair Routing in Mobile Ad hoc Networks”, IJCST Vol. 2, No.3, pp. 11-15. [6] Cynthia Jaypal, Sumathi Vembu, (2011). “Adaptive Service Discovery Protocol for Mobile Ad Hoc Networks”, European Journal of Scientific Research, Vol.49, No.1, pp. 6-17. [7] Jailani Kadir, Osman Ghazali, Mohamed Firdhous, Suhaidi Hassan, (2011) “Node Selection Based on Energy Consumption in MANET”. [8] V. Berlin Hency, S. Aravind Prasad, Y.RA. Kannan and D. Sridhar an, (2011) “A Novel Approach For Handover Avoidance And Qos Improvement In Wlan”. International Journal of Distributed and Parallel Systems, Vol.2, No.5, pp. 77-86. [9] Mohammad Faisal,Muhammad Nawaz Khan, (2012) “An enhanced Scheme for Reducing Vertical handover latecy”, (International Journal of Advanced Computer Science and Applications, Vol. 3, No.1,pp. 100-105. [10] R. Venilla,V.Duraisamy,(2012)”Qos based clustering technique for multicast security in MANET”, European Journal of Scientific Research,Vol. 81, No. 1,pp. 33-46. [11] R. Deepa, S. Swamynatahan,(2012) “Load Balancer for Energy Efficient Clustering Protocol in MANETs”, International Conference on Advances in Computing, Communication and Informatics,pp. 269-275. [12] P. Kuppusamy, K. Thirunavukkarasu, B. Kalaavathi, (2012)”Cluster Based Cooperative Caching Technique in Mobile Ad Hoc Networks”, European Journal of Scientific Research, Vol. 69, No. 3,pp. 337-349. AUTHOR Nidhi Parashar has done Master in Technology in Computer Engineering. She is presently working as Senior Lecturer in Department of Information Technology at M.I.T., Meerut,U.P. During academic session she has coordinated and attended variousNational Conferences and Workshops at university level.Her research area includes MANET (Mobile Ad-hoc Network),Wireless Sensor Network(WSN) and Congestion control.