2019
DOI: 10.1109/access.2019.2943145
|View full text |Cite
|
Sign up to set email alerts
|

Link-Disjoint Multipath Routing for Network Traffic Overload Handling in Mobile Ad-hoc Networks

Abstract: Mobile Ad-hoc Networks (MANETs) is the network of wireless mobile nodes with selforganizing, dynamic network connectivity without any pre-defined infrastructure for wireless communication. Error-less data broadcasting is the major role in MANET transmission. With the salient feature of dynamic topology and the distributed infrastructure, multipath routing is of great interests in MANETs. Multipath routing methods are dependable on adjacent nodes for finding the shortest path that several data packets are falle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(14 citation statements)
references
References 43 publications
0
14
0
Order By: Relevance
“…Data which are required to transfer or data needed by new system need to give as input to intermediate system; intermediate system will convert the data to the format which is needed by new system and transfer to the new system. Intermediate system will play a vital role in the data transfer [30][31][32][33][34][35]. Data-type conversion, data format conversion and data record manipulation are done in intermediate system.…”
Section: B Data Transfer Via Intermediate System (Methodology 2)mentioning
confidence: 99%
“…Data which are required to transfer or data needed by new system need to give as input to intermediate system; intermediate system will convert the data to the format which is needed by new system and transfer to the new system. Intermediate system will play a vital role in the data transfer [30][31][32][33][34][35]. Data-type conversion, data format conversion and data record manipulation are done in intermediate system.…”
Section: B Data Transfer Via Intermediate System (Methodology 2)mentioning
confidence: 99%
“…For the data from the packet transaction of a node-id with increment, a value checks the sender route. It also checks the neighboring node path with their environment [39]. From this consideration, each node shares two nearby nodes that are overlapping through this process with each of its MANET surroundings.…”
Section: Figure 2 Activities Of Attacker Detection Automation Of Beesmentioning
confidence: 99%
“…This rushing attacker destroys the process in which it affords closer to the target node in the routing path by using the "Use Best Approximation" process. Use best approximation that utilizes the Static route with continuous routing on the MANET [39].…”
Section: A Timing Composition Of Round Trip Time Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, while designing the cross layer approach, apart from the above three concern is time sensitive application. In, wireless network most of the network are time sensitive application such as ad-hoc network, D2D network, M2M network, vehicular network, thus providing high throughput possesses challenge along with optimized delay requirements since it has fast varying channels and complicated interference [19] [20]. Thus, providing the QoS guarantees for video based application is the key issue and can be identified as the problem in wireless network domain; further the video packet data demands optimized utilization of energy and secure video packet data transmission.…”
Section: Introductionmentioning
confidence: 99%