Development of mobile adhoc network using leader Selection algorithm

  • Authors

    • S. Deepa Assistant Professor
    • Kamal Raj s Assistant Professor
    • Sridhar K.P Associate Professor
  • Bully Algorithm, Distributed Systems, Election, Leader, QOS, Ring Algorithm, Throughput.
  • Mobile ad-hoc network (MANET) is an interconnection of mobile devices without preexisting topology which form a communication network. QOS parameters like congestion control, confidentiality, output, delay, energy consumption, jitter, have to be improved based on the development of transmission technology, and real-time applications. MANETs are totally different from distributed COMPUTING systems. They are dynamic and self-organizing networks. A leader is needed to coordinate and organize tasks in MANET. The challenge is to own the proper election algorithm that chooses the correct leader based on numerous factors in MANET. The task of the leader is to keep up the quality of service (QOS) in the MANET. This paper explores QoS in MANET by using the leader of the network by correct election algorithm by improving the network lifetime, path stability, and reduce end to end delay.

  • References

    1. [1] Brahma, M., Kim, K.W., Abouaissa, A. and Lorenz, P., 2005. A load-balancing and push-out scheme for supporting qos in manets. Telecommunication Systems, 30(1), pp.161-175.

      [2] Bricard-Vieu, V. and Nasser, N., 2006, November. WSN16-1: A Weighted Clustering Algorithm Using Local Cluster-heads Election for QoS in MANETs. In Global Telecommunications Conference, 2006. GLOBECOM'06. IEEE (pp. 1-5). IEEE.

      [3] Dagdeviren, O. and Erciyes, K., 2008. A hierarchical leader election protocol for mobile ad hoc networks. Computational Science–ICCS 2008, pp.509-518.

      [4] Ding, S., 2008. A survey on integrating MANETs with the Internet: Challenges and designs. Computer Communications, 31(14), pp.3537-3551.

      [5] Hoang, V.D., Shao, Z. and Fujise, M., 2006, June. Efficient load balancing in MANETs to improve network performance. In ITS Telecommunications Proceedings, 2006 6th International Conference on (pp. 753-756). IEEE.

      [6] Jhaveri, R.H., Patel, S.J. and Jinwala, D.C., 2012, January. DoS attacks in mobile ad hoc networks: A survey. In Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on (pp. 535-541). IEEE.

      [7] Lochert, C., Scheuermann, B. and Mauve, M., 2007. A survey on congestion control for mobile ad hoc networks. Wireless communications and mobile computing, 7(5), pp.655-676.

      [8] Mamatha, G.S. and Sharma, D.S., 2010. Network Layer Attacks and Defense Mechanisms in MANETS-A Survey. International Journal of Computer Applications, 9(9).

      [9] Mehta, S., Sharma, P. and Kotecha, K., 2011, December. A survey on various cluster head election algorithms for MANET. In Engineering (NUiCONE), 2011 Nirma University International Conference on (pp. 1-6). IEEE.

      [10] Mohapatra, P., Li, J. and Gui, C., 2003. QoS in mobile ad hoc networks. IEEE Wireless Communications, 10(3), pp.44-53.

      [11] Baskar, S., Pavithra, S., &Vanitha, T. (2015, February). Optimized placement and routing algorithm for ISCAS-85 circuit. In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on (pp. 958-964). IEEE.



      [14] Maheswari, M. U., Baskar, S., &Keerthi, G. M. High Speed Finite Field Multiplier GF (2 M) for Cryptographic Applications.

      [15] Raghupathi, S., &Baskar, S. (2012).Design and Implementation of an Efficient and Modernised Technique of a Car Automation using Spartan-3 FPGA. Artificial Intelligent Systems and Machine Learning, 4(10).

      [16] Souihli, O., Frikha, M. and Hamouda, M.B., 2009. Load-balancing in MANET shortest-path routing protocols. Ad Hoc Networks, 7(2), pp.431-442.

      [17] Sudhan, S.K.H.H. and Kumar, S.S., 2016. Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9(44).

      [18] Tang, K., Obraczka, K., Lee, S.J. and Geria, M., 2002, October. A reliable, congestion-controlled multicast transport protocol in multimedia multi-hop networks. In Wireless Personal Multimedia Communications, 2002. The 5th International Symposium on (Vol. 1, pp. 252-256). IEEE.

      [19] Wu, K. and Harms, J., 2001. QoS support in mobile ad hoc networks. Crossing Boundaries-the GSA Journal of University of Alberta, 1(1), pp.92-106.

      [20] Mohapatra, S., & Siddappa, M. (2016, October). Improvised routing using Border Cluster Node for Bee-AdHoc-C: An energy-efficient and systematic routing protocol for MANETs. In Advances in Computer Applications (ICACA), IEEE International Conference on (pp. 175-180). IEEE.

      [21] Cai, X., Duan, Y., He, Y., Yang, J., & Li, C. (2015). Bee-sensor-C: an energy-efficient and scalable multipath routing protocol for wireless sensor networks. International Journal of Distributed Sensor Networks, 11(3), 976127.

      [22] Tikhe, K., & Sohni, N. (2016, September). PF-RBF based energy efficient target tracking routing algorithm for WSN. In Automatic Control and Dynamic Optimization Techniques (ICACDOT), International C onference on (pp. 532-537). IEEE.

  • Downloads

    Additional Files

  • How to Cite

    Deepa, S., s, K. R., & K.P, S. (2018). Development of mobile adhoc network using leader Selection algorithm. International Journal of Engineering & Technology, 7(2.9), 6-11.