MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Net
#1

This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. The algorithm, which is called Minimum Distance Packet Forwarding (MDPF), uses routing information to select the node with the minimum distance. The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. Numerical analysis and experimental evaluations using the network simulation software ns2 were performed to derive the lower and upper bounds of the confidence interval for the mean hop count between the source node of the data request, on one hand, and the node that holds the desired data and the last node in the set of search nodes, on the other hand. In the experimental evaluation, the performance of MDPF was compared to that of Random Packet Forwarding (RPF) and Minimal Spanning Tree Forwarding (MSTF). The results agreed with the numerical analysis results and demonstrated that MDPF offers significant hop count savings and smaller delays when compared to RPF and MSTF.

Presented By:
Hassan Artail, Senior Member

Reply
#2
plz send the ppt for this topic
Reply
#3


to get information about the topic minium distance packet forwarding for serch applications in manet full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-mdpf-minimu...ad-hoc-net
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: distance education in texas, indiana university distance learning, packet forwarding priority, distance from vemagiri to simhadri, packet forwarding c linux, mit distance, minimum mode of 8086 wiki,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Cloud Computing with Service Oriented Architecture in Business Applications 1 907 15-02-2017, 11:55 AM
Last Post: jaseela123d
  Migrating Component-based Web Applications to Web Services: towards considering a ”We 1 841 15-02-2017, 10:56 AM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 907 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 679 14-02-2017, 11:35 AM
Last Post: ijasti
  DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS--PARALLEL AND DISTRIBU electronics seminars 9 7,362 14-07-2015, 02:25 PM
Last Post: seminar report asees
  MOBILE PHONE BASED ATTENDANCE TRACKING SYSTEM seminarsonly 25 21,054 06-03-2015, 07:18 PM
Last Post: unas
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,926 25-02-2015, 07:17 AM
Last Post: Guest
  Mobile shop management System computer science technology 7 14,780 01-07-2014, 06:21 PM
Last Post: seminar report asees
  Adaptive Forwarding Delay Control for VANET Data Aggregation Projects9 2 1,730 18-03-2014, 11:25 PM
Last Post: seminar report asees
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,367 30-07-2013, 05:30 PM
Last Post: mounikabujji

Forum Jump: