Downloads: 121 | Views: 316
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013 | Popularity: 6.4 / 10
Bio-Inspired Methods for Efficient MANET
Pankaj Chaudhary, Sachin Chaudhary
Abstract: Mobile Ad-Hoc Networks (MANETs), that do not rely on pre-existing infrastructure and that can adapt rapidly to changes in their environment, are coming into increasingly wide use in military applications. At the same time, the large computing power and memory available today even for small, mobile devices, allows us to build extremely large, sophisticated and complex networks. Such networks, however, and the software controlling them are potentially vulnerable to catastrophic failures because of their size and complexity. Biological approaches have many of these same characteristics and are potentially subject to the same problems. But in successful organisms, these biological networks do in fact function well so that the organism can survive. In this paper, we present a MANET architecture developed based on several features of bio-inspired approaches, widely observed in biological networks but not ordinarily seen in computer networks. These features allow the network to switch to an alternate mode of operation under stress or attack and then return to the original mode of operation after the problem has been resolved. We explore the potential benefits such architecture has, principally in terms of the ability to survive radical changes in its environment using an illustrative example
Keywords: Biologically-Inspired Networking, Homeostasis, Survivability, Mobile Ad Hoc Networks
Edition: Volume 2 Issue 5, May 2013
Pages: 37 - 40
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera