International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 137 - Number 9 |
Year of Publication: 2016 |
Authors: P.P. Joby, M. Lavanya, C. Lincy Magdaline |
10.5120/ijca2016908905 |
P.P. Joby, M. Lavanya, C. Lincy Magdaline . Counterfeit Avoidance using Mark-Time Protocol in Mobile Networks. International Journal of Computer Applications. 137, 9 ( March 2016), 15-18. DOI=10.5120/ijca2016908905
Keeping a track of the nodes through which the packets are sent, the retransmission of packets within the network can be avoided. A new protocol called the MARK-TIME protocol is introduced to track the information and store it in common at the base station of the network. The distance of the node in the network is calculated along with the path, is used to transmit the message packets within the network. The detail of the packets and the path along which the data is transmitted is stored in the proxy server at the base station. In the case of delay or loss in communication, due to mobility of nodes in the network, it leads to loss of the receiving packets in the receiver (sink node). It sends a message to the proxy server, which tracks the node and provides efficient transmission without duplication of packets within the mobile network.