Clustering Schemes Use for To Mobile Ad Hoc Network

Authors

  • P. A. Gaikwad  PG Department of Computer Science and Engineering, Sant Gadge Baba Amravati University, Amravati, Maharashtra, India
  • Dr. S. S. Sherekar  PG Department of Computer Science and Engineering, Sant Gadge Baba Amravati University, Amravati, Maharashtra, India
  • Dr. V. M. Thakare  PG Department of Computer Science and Engineering, Sant Gadge Baba Amravati University, Amravati, Maharashtra, India

DOI:

https://doi.org/10.32628/CSEIT217236

Keywords:

Ad Hoc Network MANETS.

Abstract

The MANETs are effectively deployed in the different environments such as: Armed Forces, Disaster Management, Medical and other similar Integrated Applications . Observed that new challenges and applications come up in the MANETs in every short period of a time. In the large deployments MANETs can have huge number of mobile nodes creating new problems. In the order to overcome such challenges, clustering algorithms are a invariably used to allow the structuring of the network Clustering methods allow fast connection and also for better routing and to the topology management of mobile ad hoc networks (MANET). The assortment of approaches for the MANET grouping has been created by scientists which center around various kinds of execution measurements. In this paper presents a analysis of various clustering schemes for the MANET into group of entities or the cluster and proposes efficient approach.

References

  1. H. Yan, J. Li, G. Sun, and H. Chen, “An optimistic power control MAC protocol for mobile ad hoc networks,” in Proc. IEEE ICC, 2006, pp. 3615–3620.
  2. Z. Haas and J. Deng, “Dual busy tone multiple access (DBTMA)— a multiple access control scheme for ad hoc networks,” IEEE Trans.Comput., vol. 50, no. 6, pp. 975–985, Jun. 2002.
  3. T. Korakis, Z. Tao, Yevgeniy Slutskiy, S.Panwar, “A Cooperative MAC protocol for Ad Hoc Wireless Networks”, in Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops(PerComW'07), 2007
  4. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks,” Comput. Commun., vol. 28, pp. 1193– 1203, Jun. 2005.
  5. I. D. Chakeres and E. M. Belding-Royer, “AODV routing protocol implementation design,” in Proc. 24th Int. Conf. Distributed Computing Systems Workshops (ICDCSW’04), 2004, pp. 698– 703.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
P. A. Gaikwad, Dr. S. S. Sherekar, Dr. V. M. Thakare, " Clustering Schemes Use for To Mobile Ad Hoc Network" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 2, pp.137-142, March-April-2021. Available at doi : https://doi.org/10.32628/CSEIT217236