ISSN 2278-9723
 

- 


Analysis of Congestion using mobile nodes in Wireless Network

Anjali Sharma and Manish Mahajan.

Abstract
This article discusses the work plan of wireless ad hoc network and the problems related to it during congestion. The congestion in wireless network congestion will vary with different topologies, methods of network deployment, mobility, channel utilization and power consumption at node level. This might lead to degradation of TCP performance of packet loss. In this research the proposed work plan the use of different number of nodes and their effect on congestion in wireless network. The reason for loss in wireless network could be overload of packets in node buffer space. This research will also enable us to conduct a deeper study to understand network congestion in ad-hoc networks. We will try to simulate various network environments with different number of users and then study the network on parameters like throughput, good put; packets dropped etc.

Key words: Wireless; OPNET; TCP; congestion; buffer size; CBR; PLI; AD-HOC ; NODES


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Anjali Sharma and Manish Mahajan
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

Anjali Sharma and Manish Mahajan. Analysis of Congestion using mobile nodes in Wireless Network. . 2012; 1(1): 51-55. doi:10.31838/ijccts/01.01.08


Web Style

Anjali Sharma and Manish Mahajan. Analysis of Congestion using mobile nodes in Wireless Network. http://www.ijccts.org/?mno=302643841 [Access: September 19, 2020]. doi:10.31838/ijccts/01.01.08


AMA (American Medical Association) Style

Anjali Sharma and Manish Mahajan. Analysis of Congestion using mobile nodes in Wireless Network. . 2012; 1(1): 51-55. doi:10.31838/ijccts/01.01.08



Vancouver/ICMJE Style

Anjali Sharma and Manish Mahajan. Analysis of Congestion using mobile nodes in Wireless Network. . (2012), [cited September 19, 2020]; 1(1): 51-55. doi:10.31838/ijccts/01.01.08



Harvard Style

Anjali Sharma and Manish Mahajan (2012) Analysis of Congestion using mobile nodes in Wireless Network. , 1 (1), 51-55. doi:10.31838/ijccts/01.01.08



Turabian Style

Anjali Sharma and Manish Mahajan. 2012. Analysis of Congestion using mobile nodes in Wireless Network. International Journal of Communication and Computer Technologies, 1 (1), 51-55. doi:10.31838/ijccts/01.01.08



Chicago Style

Anjali Sharma and Manish Mahajan. "Analysis of Congestion using mobile nodes in Wireless Network." International Journal of Communication and Computer Technologies 1 (2012), 51-55. doi:10.31838/ijccts/01.01.08



MLA (The Modern Language Association) Style

Anjali Sharma and Manish Mahajan. "Analysis of Congestion using mobile nodes in Wireless Network." International Journal of Communication and Computer Technologies 1.1 (2012), 51-55. Print. doi:10.31838/ijccts/01.01.08



APA (American Psychological Association) Style

Anjali Sharma and Manish Mahajan (2012) Analysis of Congestion using mobile nodes in Wireless Network. International Journal of Communication and Computer Technologies, 1 (1), 51-55. doi:10.31838/ijccts/01.01.08





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Most Cited Articles