Power Heterogeneous MANET Using LVC Algorithm

International Journal of Computer Trends and Technology (IJCTT)          
© 2016 by IJCTT Journal
Volume-39 Number-1
Year of Publication : 2016
Authors : K.Santhya, Dr.N. Sasirekha


K.Santhya, Dr.N. Sasirekha "Power Heterogeneous MANET Using LVC Algorithm". International Journal of Computer Trends and Technology (IJCTT) V39(1):6-11, September 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
A mobile ad hoc network (MANET) is a self-configuring, infrastructure-less network of mobile devices which is connected without any wires. In MANET the node can move in any direction independently. The main challenge in building a MANET is equipping each device to continuously maintain the information needed and to properly route traffic. So, these networks may operate by themselves or may be connected to the larger Internet. They may contain one or multiple and different transceivers between the nodes. Finally in a highly dynamic, autonomous topology. Vehicular Ad-hoc Networks (VANETs) are used cars and cars and roadside equipment. MANETS can be used for facilitating the collection of sensor data for data mining for a variety of applications such as air pollution monitoring and different types of architectures can be used for such applications.

[1] Gagandeep, Aashima and Pawan Kumar “Analysis of Different Security Attacks in MANETs on Protocol Stack”.International Journal of Engineering and Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012
[2] Mohammad Wazid , Rajesh Kumar Singh and R. H. Goudar, “A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques “ International Journal of Computer Applications® (IJCA) International Conference on Computer Communication and Networks CSI- COMNET-2011.
[3] Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao “ A survey of black hole attacks in wireless mobile ad hocnetworks” Human-centric Computing and Information Sciences 2011
[4] Sunil Taneja and Ashwani Kush, “A Survey of Routing Protocols in Mobile Ad-Hoc Networks”, InternationalJournal of Innovation, Management and Technology, Vol. 1, No. 3, 279-285, August 2010.
[5] Gary Breed Editorial Director, “Wireless Ad-Hoc Networks: Basic Concepts”, High Frequency Electronics,March 2007.
[6]Hongmei Deng, Wei Li, and Dharma P. Agrawal, “Routing Security in Wireless Ad Hoc Networks” IEEE Communications Magazine • October 2002
[7]Mohseni, S.; Hassan, R.; Patel, A.; Razali, R, “Comparative review study of reactive and proactive routingprotocols in MANETs”, 4th IEEE International Conference on Digital Ecosystems and Technologies, 304-309,2010.
[8]HumayunBakht, “Survey of Routing Protocols for Mobile Adhoc Network”, International Journal ofInformation and Communication Technology Research, 258-270, October 2011.
[9]Mohit Kumar and Rashmi Mishra “An Overview of MANET: History, Challenges and Applications”, Indian Journal of Computer Science and Engineering (IJCSE), Vol. 3 No. 1 Feb-Mar 2012.
[10]Vishal Sharma, Harsukhpreet Singh, “Performance evaluation of reactive routing protocol in MANET networks using GSM based voice traffic applications”, Optik - Int. J. Light Electron Opt. Elsevier, pp. 201-204, June 2012.
[11]Pravin Ghosekar et. al, “Mobile Ad Hoc Networking: Imperative and Challenges” IJCA Special issues on MANETs pp. 153-158, 2010. [12] Md. Golam Kaosar, Tarek R.
Sheltami, “Voice transmission over ad hoc network adapting optimum approaches to maximize the performance”, Elsevier Computer Communications vol 32, pp. 634–639, 2009.
[13] Abdullah Jamali et. al, “Comparative Analysis of Ad Hoc Networks Routing Protocols for Multimedia Streaming”, International Journal of Advanced Computer Sciences and Applications, pp. 978-981, Mar 2009.
[14] Zhan Huawai, Zhou Yun, “Comparison Analysis AODV and OLSR Routing Protocol in Ad Hoc Network”, IEEE 6th International Conference on Wireless and Mobile Computing, Networkingtransactions, pp. 978-982, 2008
[15] Ying Ge, “Quality of Service Routing in Ad-Hoc Networks Using OLSR”, Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS03) IEEE, 2002.