Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Per User Spectrum Performance Analysis in Wireless Ad-Hoc Network

Published on August 2017 by Deepak Kumar Mahapatro, Ramesh Kumar Sahoo, Srinivas Sethi
National Conference on Next Generation Computing and its Applications in Computer Science and Technology
Foundation of Computer Science USA
NGCAST2016 - Number 1
August 2017
Authors: Deepak Kumar Mahapatro, Ramesh Kumar Sahoo, Srinivas Sethi
18cdf8f0-03ff-4e13-b435-f609755488b9

Deepak Kumar Mahapatro, Ramesh Kumar Sahoo, Srinivas Sethi . Per User Spectrum Performance Analysis in Wireless Ad-Hoc Network. National Conference on Next Generation Computing and its Applications in Computer Science and Technology. NGCAST2016, 1 (August 2017), 21-25.

@article{
author = { Deepak Kumar Mahapatro, Ramesh Kumar Sahoo, Srinivas Sethi },
title = { Per User Spectrum Performance Analysis in Wireless Ad-Hoc Network },
journal = { National Conference on Next Generation Computing and its Applications in Computer Science and Technology },
issue_date = { August 2017 },
volume = { NGCAST2016 },
number = { 1 },
month = { August },
year = { 2017 },
issn = 0975-8887,
pages = { 21-25 },
numpages = 5,
url = { /proceedings/ngcast2016/number1/28124-1609/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Next Generation Computing and its Applications in Computer Science and Technology
%A Deepak Kumar Mahapatro
%A Ramesh Kumar Sahoo
%A Srinivas Sethi
%T Per User Spectrum Performance Analysis in Wireless Ad-Hoc Network
%J National Conference on Next Generation Computing and its Applications in Computer Science and Technology
%@ 0975-8887
%V NGCAST2016
%N 1
%P 21-25
%D 2017
%I International Journal of Computer Applications
Abstract

Ad-Hoc network is a self-organizing wireless network in which collection of wireless mobile nodes (devices) dynamically forming a temporary network without the use of any existing network infrastructure or centralized administrationi. e. chaotically decentralised. It is a ubiquitous type of computing often referred to as pervasive/invisible computing. It can randomly deploy with no advance planning. In this paper it has been analyzed the performance of Spectrum at each node in terms of Packet Delivery Ratio (PDR) and Throughput subject to Number of Interruptions occurred during transmission.

References
  1. "A secure Routing Protocol for Ad Hoc Networks", Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer, Oct 2001
  2. Seung Yi, Prasad Naldurg, Robert Kravets,"Security-Aware Ad Hoc Routing for Wireless Networks", Aug 2001
  3. Yih-Chun Hu, Adrian Perrig, David. B. Johnson,"Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks", IEEE INFOCOM 2003
  4. Adam Burg, "Ad hoc network specific attacks", Seminar on Ad hoc networking: concepts, applications, and security, Technische University at Munchen, 2003
  5. Matias Korman, "Minimizing interference in ad-hoc networks with bounded communication radius", doi:arXiv:1102. 2785v5 [cs. CG] 29 Jun 2012
  6. Ashima Rout, Srinivas Sethi, "Throughput Analysis of Spectrum in Cognitive Radio Ad Hoc Network", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 6, June 2013
  7. Kim, W. , & Gerla, M. "Cognitive multicast with partially overlapped channels in vehicular ad hoc networks" in Proc. Of Ad-Hoc Networks, 2013.
  8. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions", IEEE Wireless Communications, February 2004
  9. D. Bil`o and G. Proietti. "On the complexity of minimizing interference in ad-hoc and sensor networks. Theoritcal Computer. Sci. , 402(1):43–55, 2008.
  10. K. Buchin. "Minimizing the maximum interference is hard. CoRR, doi:abs/0802. 2134, 2008.
  11. Su, H. , & Zhang, X. (2008); IEEE Journal on Selected Areas in Communications, 26(1), 118–129.
  12. Timmers,M. , Pollin, S. , Dejonghe, A. ,Van der Perre, L. ,&Catthoor, F. (2010); IEEE Transactions on Vehicular Technology, 59(1), 446–459.
  13. Akyildiz IF, Lee WY, Vuran MC, Mohanty S. (2006) "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey", computer networks, Vol. 50, no. 13, pp. 2127–2159
  14. Ms. Monika G. Ghorale, Prof. A. O. Bang,"Wireless Ad-Hoc Networks: Types, Applications, Security Goals", International Journal of Advent Research in Computer and Electronics (IJARCE) (E-ISSN: 2348-5523) Special Issue, National Conference "CONVERGENCE 2015", 28 March 2015
  15. Vanita Rani, Dr. Renu Dhir,"A Study of Ad-Hoc Network: A Review" International Journal of Advanced Research in Computer Science and Software Engineering 3(3), March - 2013, pp. 135-138.
  16. https://en. wikipedia. org/wiki/Wireless_ad_hoc_network
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc Network Spectrum Analysis Throughput Packet Delivery Ratio