Congestion Avoidance-Data replication in Mobile Adhoc Network
نویسندگان
چکیده
منابع مشابه
Congestion Control Avoidance in Adhoc Network
Mobile adhoc network is an emerging standard or wireless communication. Due to the impendence in infrastructure dependencies these networks are rapidly emerging. These networks are since evolving has to develop methodologies for the compatibility of current services in such an environment. Various services compatibilities were studied and methodologies were proposed for the same. One basic prob...
متن کاملImprovement of the mechanism of congestion avoidance in mobile networks
Mobile ad hoc network congestion control is a significant problem. Standard mechanism for congestion control (TCP), the ability to run certain features of a wireless network, several mutations are not common. In particular, the enormous changes in the network topology and the joint nature of the wireless network. It also creates significant challenges in mobile ad hoc networks (MANET), density ...
متن کاملMobile Adhoc Network
1 Enhancing security features & performance of AODV protocol under attack for MANET In this paper, a novel security mechanism is presented to enhance security & performance of AODV (Adhoc On-demand Distance Vector) routing protocol under the attack for MANET (Mobile Ad-hoc Networks). The AODV routing protocol was initially developed without considering security in mind. So it is not able to def...
متن کاملPerformance Analysis of Congestion Control in Mobile Adhoc Grid Layer
Mobile Ad Hoc Grid deals with the challenges in resource discovery and job scheduling due to its mobility and power consumption. In this paper a new grid computing technique is implemented to manage the congestion control with job scheduling. The proposed addition of the mobile ad hoc network with in AHGL can offer maximum network utility. The model is implemented in the NS-2 network simulator.
متن کاملNew Enhanced Security For Data Transmission Across Mobile Adhoc Network
The Communication systems are typical data systems, which can be undetermined by unauthorized users who have illegal access to the systems. Main Problem created in attacking to malicious node and group of network, whole traffic by system break, data loss, data affecting and data failure system. Overcome node Proposed scheme uses a role-based access control frame work, MANET concept working algo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
سال: 2019
ISSN: 0973-8975,2454-7190
DOI: 10.26782/jmcms.spl.2019.08.00045