International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Clustering Based Energy Coding for Wireless Adhoc Network

Mahaboob Basha , Srinu Nidamanuri , Anusha Pureti , Vamsi krishna

The rapid expansion of wireless networking in the present environment is due to its advantages in terms of portability and ease of use in contrast to the constraints imposed by wired networking on the communications system. Research that is cutting-edge and innovative in the field of wireless technology has made it possible for computers such as personal digital assistants (PDAs) and notebooks to function without an interface for wired networks. This has made it possible for these devices to participate in networked communication even when they are being used while traveling. A specific kind of wireless network known as an ad-hoc network is now seeing rapid expansion. The mobile ad-hoc network will not take into consideration the wired network or centralized control since, by its very nature; it will be capable of uniting, shaping, and rapidly deploying its network nodes. In a scenario with several facets, the nodes of an ad-hoc network have an insufficient amount of battery power, and these batteries are not going to be replaced or rejuvenated. These batteries need utilization in an efficient manner in order to get the most out of the lifespan of the network. The communication inside ad hoc networks will be entirely reliant on batteries. Since these batteries will deplete the energy of the nodes that contributed to the network, the result will be a failure of the nodes due to a lack of available battery power. Because of this, the objective of ad hoc networks is still to care about the virtually expected message. In addition, the strategies for prolonging the life of the battery primarily considered the impact of specific node letdown on the actual message being sent by the network in the communication. The description of the system's life cycle becomes connected with the communication message that is desired to succeed. The phrase "prevailing network system lifetime" refers to the timing of the first node's failure, the presence of non-zero energy for the nodes' functional components, and the amount of time it takes for the cumulative delivery level to fall below the threshold necessary to perform a network partition. Considering all of these justifications and the structure of this, with a special emphasis on the node and the importance it has in the network's node lifespan, the difficulty of presenting the limiting near-to-far distance in Energy Efficient Coding with Channel Information for Wireless Ad-hoc Network (CAEC), an effort for the Multiple Access Interference (MAI), which will reduce the throughput. In order to reduce the impact of the MAI, a power assignment mechanism that ensures users have enough control over their connections inside mobile ad-hoc networks has been developed. This protocol, which is called CAEC and will interpret as the multiple access interruption accordingly resolving near-far complicated difficulties, which will challenge throughput presentation popularly mobile ad hoc network, was proposed as the supreme controlled access protocol for wireless ad hoc networks.

Read More

Doi: https://doi.org/10.54216/IJWAC.010203

Vol. Volume 1 Issue. Issue 2 PP. 34-52, (2020)

Design of Secure and Stable Routing Protocols for the Adhoc Networks

Lamia F. Tulaib , Akbal O. Salman , Mazin A. Mohammed

The desire to remain connected no matter where you are, when you want to be connected, or how you want to be connected has been a driving force behind the development of wireless networks, in particular in the field of persistent and ubiquitous computing. This need can be satisfied in a number of different ways. The Mobile Ad-hoc networks made up of a collection of nodes, each of which is equipped with wireless networking and communication capabilities. There may be any number of these nodes. It is not necessary to involve a central administrator in order for these nodes to communicate with one another since they may do so independently. Ad hoc networks also often referred to as infrastructure-less networks since they do not have a present topology or infrastructure. This is because ad hoc networks do not have a predetermined topology or infrastructure. Because each node in the wireless ad-hoc network functions as either a host or a router or both, In order to prevent unauthorized parties from accessing the data, it is essential to have developed secure and reliable routing protocols. The work that is presented in this proposed work is an attempt to develop an ad-hoc routing protocol that is safe and robust. The protocol in question called Energy Efficient Wireless Path Optimization (EEWPO). The dynamic route selection mechanism, which is based upon genetic programming, and the connection integrity assurance algorithm have been combined within the framework of the proposed model routing scheme for wireless ad-hoc networks to produce a routing-based mechanism that is secure, flexible, and robust. This is accomplished by combining the two mechanisms within the framework of the proposed model routing scheme. These two aspects are going to work together to form the foundation of this plan. The new combination has the ability to give a higher degree of security to the current network, hence reducing the likelihood that vulnerabilities in connection and fake route injections would be exploited. When it comes to speech-based ad-hoc networks, which need dedicated connections for the exchange of voice data over an ad-hoc channel, intelligent route selection throughout the multipath network becomes very important. This is because the transmission of speech data is essential to the functioning of these networks. In order to materialize the robust ad-hoc routing algorithm, the generation of the adaptive ad-hoc network routing solution requires the ideally layered combination of the genetic programming-based routing solution along with the connection integrity assurance model. Only then can the adaptive ad-hoc network routing solution be created. The effectiveness of the recommended routing protocol has been shown via testing in a number of different simulated situations.

Read More

Doi: https://doi.org/10.54216/IJWAC.010202

Vol. Volume 1 Issue. Issue 2 PP. 19-33, (2020)

Quality of Service Enhancement in Wireless LAN and MANET

Senthil Murugesan , Krishna Venkata , Narendra Mupparaju , Rayudu Kommi

In this dissertation, the author introduces a novel MAC technique that uses directional antennas to reduce interference, allowing the channel effectively reuse in various places. A node will wait for the Additional Control Gap (ACG) period after exchanging the RTS/CTS packet using the suggested protocol before starting the transmission of data packets. Other nodes in the area may plan simultaneous transmission at this ACG time by exchanging RTS/CTS packets with one another. This technique of installing directional antennas to avoid interference while simultaneously ensuring simultaneous transmissions among nodes in the vicinity may enhance the overall throughput and latency of wireless ad hoc networks. The suggested MAC protocol, in combination with TCP, serves to lessen the possibility of medium congestion and collisions in multi-hop situations by scheduling simultaneous transmissions. After identifying the bottleneck node on the high-traffic route, the heavy-traffic route moved to a different dedicated path to facilitate longhop flow. This makes it feasible for longhop flow to use the completely available bandwidth of the recently allotted dedicated lane and ensures that traffic on the congested route will reduce. Additionally, the dissertation offers a simple but efficient hybrid model as a solution to the issues that could come up when carrying out disaster relief activities. According to the suggested concept, stationary SANET grid nodes that is installed will allow mobile MANET nodes that are more than 13 kilometres outside of the transmission range of the infrastructure network to connect to the internet and the central command. In the case of a disaster, this method increases the coverage area of MANET nodes, enabling those nodes to connect with and exchange data with the rescue and relief operations centre

Read More

Doi: https://doi.org/10.54216/IJWAC.010201

Vol. Volume 1 Issue. Issue 2 PP. 08-18, (2020)