Open Access   Article Go Back

An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach

M.J. Bollarapu1 , G.R. Rao2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-9 , Page no. 103-110, Sep-2016

Online published on Sep 30, 2016

Copyright © M.J. Bollarapu , G.R. Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M.J. Bollarapu , G.R. Rao , “An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.103-110, 2016.

MLA Style Citation: M.J. Bollarapu , G.R. Rao "An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach." International Journal of Computer Sciences and Engineering 4.9 (2016): 103-110.

APA Style Citation: M.J. Bollarapu , G.R. Rao , (2016). An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach. International Journal of Computer Sciences and Engineering, 4(9), 103-110.

BibTex Style Citation:
@article{Bollarapu_2016,
author = {M.J. Bollarapu , G.R. Rao },
title = {An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2016},
volume = {4},
Issue = {9},
month = {9},
year = {2016},
issn = {2347-2693},
pages = {103-110},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1062},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1062
TI - An Effective Re Deployment of Cooperative Network(S) to Transmit in Incremental Clusters Approach
T2 - International Journal of Computer Sciences and Engineering
AU - M.J. Bollarapu , G.R. Rao
PY - 2016
DA - 2016/09/30
PB - IJCSE, Indore, INDIA
SP - 103-110
IS - 9
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1429 1443 downloads 1344 downloads
  
  
           

Abstract

: Scheduling and broadcasting of data through network tunnels is always a big challenge in closed network topologies. Each and individual tunnel or part of network will be having its own capacity to transmit and receive the packets. Adoptive and open networks are easy to transmit the data but the challenges will occur in synchronization of data transmission among them. So clustering, tracking, log maintenance of the data transmission among the channels or tunnels and retransmission with respect energy levels and synchronization can be achieved by incremental tracking retransmission (ITR[1]) approach. Energy levels will be monitored by network monitor and assigns scheduling depends on the network capacity of the available methodologies. Here the three methodologies are 1.Memory less channels[2] , 2. Modulated channel[3], 3.Joint and uniform scheduling[4] for data transmission with respect to scheduling. Considerable throughput criteria is framed with incremental flow with our work to end up fair and best accuracy levels. This ITR method is totally unique in open networks. Here open networks means which can adopt with legacy and other adoptive open networks in tunnelling or bridge level transmission. The packet buffering and delivery is always depends on previous cluster or next cluster and chance of losing the packets. So to overcome our work is practically implemented in chunks mechanism. Totally 3 or more chunks will be framed as clusters which acts as incremental growth in transmission with respect to losing of the packets. The central frame work which works as auto deployment methodology to track the tunnels. The loss of frequency is traceable using this frame work and adopts the lost and non lost packets addresses and flushes to next level to fulfil ITR method. The practical implementation depends on asynchronous services to roll back to any level/cluster. The feasible transmission is achieved in incremental level of clusters which will get the log or track information about the data from central frame work.

Key-Words / Index Term

open networks ,topology, clusters, channel , tunnel. ITR

References

[1] L. Georgiadis, M. Neely, and L. Tassiulas, Resource Allocation and Cross-Layer Control in Wireless Networks. Delft, The Netherlands:Now, 2006.
[2] Y. Hawar, at al, �3G UMTS wireless system physical layer:Baseband processing hardware implementation perspective,� IEEECommun. Mag., vol. 44, no. 9, pp. 52�58, Sep. 2006.
[2] J. Padhye, V. N. Padmanabhan, andL.Qiu,�Impactofinterferenceonmulti-hop wireless network performance,�Wireless Netw.,vol.11,pp.471�487, Sep. 2005.
[3] K. Jagannathan, S. Mannor, I. Menache, and E. Modiano, �A state action frequency approach to throughput maximization over uncertain wireless channels,� inProc. IEEE INFOCOM Mini-Conf.,Apr.2011, pp. 491�495
[4] E. Modiano, D. Shah, and G. Zussman, �Maximizing throughput in wireless networks via gossip,� inProc. ACM SIGMETRICS/Perform.,Jun. 2006, pp. 27�38.
[5] M. J. Neely, Stochastic Network Optimization With Application to Communication and Queueing Systems. San Rafael, CA, USA: Morgan & Claypool, 2010.
[6] M. J. Neely, E. Modiano, and C. E. Rohrs, �Dynamic power allocation and routing for time-varying wireless networks,�IEEE J. Sel. Areas Commun., vol. 23, no. 1, pp. 89�103, Jan. 2005.
[7] M. J. Neely, E. Modiano, and C. E. Rohrs, �Power allocation and routing in multi-beam satellites with time-varying channels,� IEEE Trans. Netw., vol. 11, no. 1, pp. 138�152, Feb. 2003.
[8] M. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. Hoboken, NJ, USA: Wiley, 2005.
[9] V. Raman and N. Vaidya, �Short: A static-hybrid approach for routing real time applications over multichannel, multihop wireless networks,� in Proc. WWIC, Jun. 2006, pp. 77�94.
[10] Rama Koteswara Rao.G , Satya Prasad.R , Patanjali Sastri.A , Prasad.PESN �Enhancing the impregnability of linux Servers, International Journal of network security & its applications(IJNSA) Vol6 ,No2, March2014
[11]S. Tamilarasan1* and P. Kumar2 Dynamic Resource Allocation in Cognitive Radio Networks � Priority Scheduling approach: Literature Survey " JCSE International Journal of computer Sciences and Engineering, Volume-4, ISSUE-9, E-ISSN:2347-2693 (2016)
[12] Manel Guerrero Zapata and N. Asokan: "Securing Ad hoc Routing Protocols". In Proceedings of the 2002 ACM Workshop on Wireless Security (WiSe 2002), pages 1-10. September 2002.
[13] Adamson, B., "Tactical Radio Frequency Communication Requirements for IPng", RFC 1677, August 1994.
[14] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, �An Overview & Study of Security Issues in Mobile Ado Networks�, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011.
[15] Zhou L. and Haas Z.J, �Securing Ad Hoc Networks,� IEEE Network Magazine, vol. 13, no. 6, 1999
[16] Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, �Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", International Journal of Computer Science, Information Technology and Security, Vol. 2, No. 4, Aug 2012.
[17] M.Bhuvaneswari and L.VijayaKalyani, "Authentication Procedures For Ad-hoc Networks: Taxonomy and Investigation Subjects", International Journal of Computer Sciences and Engineering, Volume-02, Issue-09, Page No (90-99), Sep -2014
[18] Mayank Kumar and Tanya Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (71-75), Mar -2014,
[19] Srihari Babu.Kolla and B.B.K. Prasad, "A Survey of Source Routing Protocols, Vulnerabilities and Security In Wireless Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (20-25), Apr -2014
[20] Rama Koteswara Rao.G , Satya Prasad.R , Patanjali Sastri.A , Prasad.PESN �Enhancing the impregnability of linux Servers, International Journal of network security & its applications(IJNSA) Vol6 ,No2, March2014