Main Reference PaperSmart Route Discovery in MANET using Ordered Walk, International Journal of Computer Applications, May 2013.
  • The welfare of using DFS as the building block of the signalling in MANET routing protocols are epitomized by the introduction of theOrdered Walk Search Algorithm (OSA) as a replacement of flooding, which is used as part of the Ordered Walk with Learning (OWL) protocol. Aim to take advantage of the smaller time complexity of BFS and combine it is the low communication complexity of DFS to further improve the efficient of the search through the use of known topology information.

+ Description
  • The welfare of using DFS as the building block of the signalling in MANET routing protocols are epitomized by the introduction of theOrdered Walk Search Algorithm (OSA) as a replacement of flooding, which is used as part of the Ordered Walk with Learning (OWL) protocol. Aim to take advantage of the smaller time complexity of BFS and combine it is the low communication complexity of DFS to further improve the efficient of the search through the use of known topology information.

  • To reduce the signaling overhead

  • To take advantage of smaller time complexity and low communication complexity.

  • To achieve the minimal singnalling overhead and fast convergence

+ Aim & Objectives
  • To reduce the signaling overhead

  • To take advantage of smaller time complexity and low communication complexity.

  • To achieve the minimal singnalling overhead and fast convergence

  • The proposed work contributes the authentication and forwarding techniques under the flooding attack. A node receiving the RREQverifies that the sender is authenticated user or not and it forwards the request to its neighbors only if it is received from authenticated user otherwise it will not forward the RREQ. It is needed to fully utilize the advantages of ordered walks in routing protocols.

+ Contribution
  • The proposed work contributes the authentication and forwarding techniques under the flooding attack. A node receiving the RREQverifies that the sender is authenticated user or not and it forwards the request to its neighbors only if it is received from authenticated user otherwise it will not forward the RREQ. It is needed to fully utilize the advantages of ordered walks in routing protocols.

  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • OS : Window 7 (Cygwin) / Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • B.E / B.Tech / M.E / M.Tech

+ Project Recommended For
  • B.E / B.Tech / M.E / M.Tech

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.