Open Access   Article Go Back

Gregarious Characteristics Based Social Aware Routing in Mobile Ad-Hoc Network

K. Vijayalakshmi1 , R. Manicka Chezian2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-10 , Page no. 32-37, Oct-2015

Online published on Oct 31, 2015

Copyright © K. Vijayalakshmi , R. Manicka Chezian . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Vijayalakshmi , R. Manicka Chezian, “Gregarious Characteristics Based Social Aware Routing in Mobile Ad-Hoc Network,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.32-37, 2015.

MLA Style Citation: K. Vijayalakshmi , R. Manicka Chezian "Gregarious Characteristics Based Social Aware Routing in Mobile Ad-Hoc Network." International Journal of Computer Sciences and Engineering 3.10 (2015): 32-37.

APA Style Citation: K. Vijayalakshmi , R. Manicka Chezian, (2015). Gregarious Characteristics Based Social Aware Routing in Mobile Ad-Hoc Network. International Journal of Computer Sciences and Engineering, 3(10), 32-37.

BibTex Style Citation:
@article{Vijayalakshmi_2015,
author = {K. Vijayalakshmi , R. Manicka Chezian},
title = {Gregarious Characteristics Based Social Aware Routing in Mobile Ad-Hoc Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2015},
volume = {3},
Issue = {10},
month = {10},
year = {2015},
issn = {2347-2693},
pages = {32-37},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=699},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=699
TI - Gregarious Characteristics Based Social Aware Routing in Mobile Ad-Hoc Network
T2 - International Journal of Computer Sciences and Engineering
AU - K. Vijayalakshmi , R. Manicka Chezian
PY - 2015
DA - 2015/10/31
PB - IJCSE, Indore, INDIA
SP - 32-37
IS - 10
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2711 2504 downloads 2384 downloads
  
  
           

Abstract

Mobile ad hoc Network (MANET) is a type of wireless mobile network that does not guarantee continuous network connectivity. Intermittently connected network (ICMAN) refers to the network where no end-to-end paths exist from time to time. However in normal MANET, usually end-to-end paths exist, which is not the case in ICMAN. This concept is also similar to Delay Tolerant Network, since both require a ‘store-carry-forward’ style of message propagation. In such a network, people move around and contact each other based on their common interests. The routing hence becomes a process to resolve the social feature differences between a source and a destination. Present social friendship avoid selfness node based Routing in which temporally differentiated friendships are used to make the forwarding decisions of messages. In a typical sensor network, where small packets generated by sensors need to be periodically reported to the base station, end-to-end delay plays a more important role. This paper presents how to achieve the minimum end-to-end delay for regular traffic through routing.

Key-Words / Index Term

MANET, Routing protocol, Throughput and Delay, Social aware routing, social features

References

[1] Mayank Kumar and Tanya Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (71-75), Mar -2014, E-ISSN: 2347-2693
[2] Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014, E-ISSN: 2347-2693
[3] K.Vijayalakshmi, Dr. R. Manicka Chezian “A Study On Security Consideration In MANET”. National Conference on Emerging Trends In Big Data Analytics, FEB, 2015, ISBN 97893 80800417.
[4] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “MaxProp: Routing for vehicle-based disruption-tolerant networking,” in Proc. IEEE Conf. Compute. Commun., Barcelona, Spain, Apr. 2006, pp. 1–11.
[5] P. Hui, A. Chaintreau, J. Scott, R. Gas’s, J. Crowcroft, and C. Diot, “Pocket switched networks and the consequences of human mobility in conference environments,” in Proc. ACM SIGCOMM Workshop Delay Tolerant Newt., Philadelphia, PA, USA, Aug. 2005, pp. 244–251.
[6] D. Zhao, H. Ma, S. Tang, et al., “COUPON: A cooperative framework for building sensing maps in mobile opportunistic networks,” to appear in IEEE Trans. Parallel Diatribe. Syst., Feb. 2014.
[7] P. Li, Y. Fang, J. Li, and X. Huang, “Smooth trade-offs between throughput and delay in mobile ad hoc networks,” IEEE Trans. Mobile Compute., vol. 11, no. 3, pp. 427–438, Mar. 2012.
[8] D. Ciullo, V. Martina, M. Garrett, and E. Leonardo, “Impact of correlated mobility on delay-throughput performance in mobile ad hoc networks,” IEEE/ACM Trans. Newt., vol. 19, no. 6, pp. 1745–1758, Dec. 2011.
[9] J. Zhang, X. Wang, X. Tian, Y. Wang, X. Chu, and Y. Cheng, “Optimal multicast capacity and delay tradeoffs in MANETs,” IEEE Trans. Mobile Compute., vol. 13, no. 5, pp. 1104–1117, May. 2014.
[7] P. Li, Y. Fang, and J. Li, “Throughput, delay, and mobility in wireless ad hoc networks,” in Proc. IEEE Conf. Compute. Commun. San Diego, CA, USA, Mar. 2010, pp. 1–9.
[10] N. Lu, T. H. Luan, M. Wang, X. Shen, and F. Bai, “Capacity and delay analysis for social-proximity urban vehicular networks,” in Proc. IEEE Conf. Compute. Commun. Orland, FL, USA, Mar. 2012, pp. 1476–1484.
[11] X. Wang, W. Huang, S. Wang, J. Zhang, and C. Hu, “Delay and capacity tradeoffs analysis for motion cast,” IEEE/ACM Trans. Newt., vol. 19, no. 5, pp. 1354–1367, Oct. 2011.
[12] M. J. Neely and E. Modiano, “Capacity and delay tradeoffs for ad hoc mobile networks,” IEEE Trans. Inf. Theory, vol. 51, no. 6, pp. 1917–1937, Jun. 2005.
[13] S. Toumpis and A. J. Goldsmith, “Large wireless networks under fading, mobility, and delay constraints,” in Proc. IEEE Conf. Compute. Commun. Hong Kong, Mar. 2004, pp. 609–619.
[14]Gangotri A Khiratkar and Swati S Mahajan, "Performance Analysis of Cluster Based Routing Protocol for Ad hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (141-143), Apr -2014, E-ISSN: 2347-2693
[15] A. E. Gamal, J. Mammon, B. Prabhakar, and D. Shah, “Throughput-delay trade-off in wireless networks,” in Proc. IEEE Conf. Compute. Commun. Hong Kong, Mar. 2004, pp. 464–475.
[16] N. Banal and Z. Liu, “Capacity, delay and mobility in wireless ad-hoc networks,” in Proc. IEEE Conf. Compute. Commun. San Francisco, CA, USA, Apr. 2003, vol. 2, pp. 1553–1563.
[17] G. Sharma, R. R. Mazumdar, and N. B. Shroff, “Delay and capacity trade-offs in mobile ad hoc networks: A global perspective,” IEEE/ACM Trans. Newt., vol. 15, no. 5, pp. 981–992, Oct. 2007.