Volume: 01 Issue: 01 November 2016
Total Page:16
File Type:pdf, Size:1020Kb
ISBN: 978-0-9957075-0-4 Volume: 01 Issue: 01 November 2016 EMPIRICAL RESEARCH PRESS LTD. KempEdnvklsdvndkln House, 160 City Road, London United Kingdom IJEACS International Journal of Engineering and Applied Computer Science Empirical Research Press Ltd. London, United Kingdom © 2016 by the author(s) of each contribution; publisher and licensee Empirical Research Press Ltd. United Kingdom. This is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license. (http://creativecommons.org/licenses/by/4.0/). Volume: 01, Issue: 01 ISBN: 978-0-9957075-0-4 www.ijeacs.com ii Indexing, Hosting and Advertising iii Message International Journal of Engineering and Applied Computer Science (IJEACS) is an open access, double-blind peer reviewed international journal monthly publishing online by Empirical Research Press Ltd. Empirical Research Press is a research publishing company with name, trademark registered and incorporated in England and Wales, United Kingdom. The scope of International Journal of Engineering and Applied Computer Science is to publish high quality research contributions, latest innovations, advance development carried out in the field of Engineering, Computer Science and Technology. The original research, review, case study, survey, new interpretation and implementation of concepts and theories, recent technological development, technical reports, empirical discussions are invited to submit for publication. The major objective of International Journal of Engineering and Applied Computer Science is to maintain high quality of publications and indexing with world’s highly accessed and cited research and academic databases. The scope of IJEACS publications also includes special and interdisciplinary research contributions. We offer best wishes to all readers, reviewers and contributors of IJEACS. iv Board Members of IJEACS Chief Editor Consultant Editor Prof. Bao Yang Prof. Hassan Kazemian Professor Professor Department of Mechanical Engineering Director of Intelligent Systems Research Centre, University of Maryland, USA. London Metropolitan University, UK. Associate Editors Prof. Prasad Yarlagadda Prof. Ghassan Beydoun Professor Professor Faculty of Science and Engineering School of Management, Information Systems & Queensland University of Technology Leadership, University of Technology Sydney, Australia. Australia. Prof. Zahid Ali Dr. Fadi Ghaith Professor & Director Associate Professor SSI College of Management & Information School of Engineering & Physical Sciences Technology, Punjab Technical University Heriot Watt University, Dubai Campus, UAE. India. Dr. Shahanawaj Ahamad Dr. Amit Kumar Kohli Chair, Software Engineering Research Associate Professor Deputy Director of Quality Assurance & Thapar University, Patiala, India. Development, University of Ha'il Saudi Arabia. Dr. Shamimul Qamar Dr. Mieczyslaw Drabowski Associate Professor Assistant Professor & Deputy Dean Dept. of Computer Network Engineering Faculty of Electrical & Computer Engineering King Khalid University, Saudi Arabia. Cracow University of Technology, Poland. Dr. Magdy S. A. Mahmoud Dr. K. S. Senthilkumar Assistant Professor Assistant Professor Faculty of Computers and Informatics Department of Computer & IT Suez Canal University, Egypt. St. George University, Grenada, West Indies. Dr. Hany Elslamony Taimoor Khan, Assistant Professor Assistant Professor Helwan University, EGYPT. National Institute of Technology, Silchar, India. v Dr. G. Suseendran Dr. Sugam Sharma Assistant Professor Senior Scientist Department of Information Technology Iowa State University, USA. School of Computing Sciences Vels University, India. Dr. Xinggang Yan Dr. M. Reza Shadnam Senior Lecturer Scientific Manager University of Kent, UK. Canadian Scientific Research & Experimental Development Vancouver, Canada. Dr. Xuefei Guan Dr. Gururaj Revanasiddappa Scientist Lecturer Siemens Corporate Research, New Jersey, Department of Computer Science, Gulbarga USA. University, India. vi Content Sr. Title Page No. 1. The Proposed Cluster and Position Based Fault Tolerant 1-6 Multicast Protocol in Ad Hoc Networks. Mahboobeh Abdoos 2. Study of Ethical Hacking and Management of Associated 7-11 Risks Mohammed Abdul Bari, Shahanawaj Ahamad 3. Software Complexity Measurement: A Critical Review 12-16 Harmeet Kaur, Gurvinder N. Verma 4. Program Comprehension and Analysis 17-21 Asfa Praveen 5. Fuzzy Model for Parameterized Sign Language 22-30 Sumaira Kausar, Samabia Tehsin, M. Younus Javed vii International Journal of Engineering and Applied Computer Science (IJEACS) The Proposed Cluster and Position Based Fault Tolerant Multicast Protocol in Ad Hoc Networks Mahboobeh Abdoos Department of Electrical and Computer Engineering Qom Islamic Azad University, Qom, Iran. eliminate some topology based limitations, by additional Abstract—A location service gives the requested location information. They need to the location information of nodes in information to the nodes in the ad hoc networks. It is supposed the network. Every node finds its location by GPS. that there are different clusters in the different levels. Every A source node uses the location service to find the location cluster has a cluster head. The clusters can be logical or physical. The higher level cluster heads have the information of of a destination node and puts it into the header of the data the tables of lower level cluster heads. The information of tables packets. every node routing decision is based on the location of a cluster head is updated periodically by its lower level cluster of destination node and the neighbor nodes. The location heads. The combination of the cluster and position based based routing protocols do not need to create or support the routing can be used. In this paper the cluster and position based routes. The nodes do not need to the routing tables and the location service is represented, that every node can find the updating packets. There are different location services like the location of its destination node via the location service. Some square location service or simple location service. The section nodes are selected as the mirror nodes of a cluster head which 2 surveys the MAODV multicast protocol and the section 3 can act as the cluster head after the failing of cluster head. These reviews the cluster based position service and the section 4 nodes have the replicated information of a cluster head. Here a represents the proposed location and cluster based fault multicast protocol is proposed that a source node can get the tolerant location service then the proposed cluster and position location information of the destination nodes via the proposed based multicast protocol (CPMB) is represented. In continue location service and puts this information into the header of the simulation results are shown, which show that the packets and sends them toward the destination nodes. The proposed multicast protocol has more packet delivery than the simulation results show that the proposed Cluster and Position AODV. [1], [2], [3], [4], [5], [6] based Multicast protocol (CPMB) has more packets delivery ratio and packets transfer ratio than the Multicast Ad hoc II. MAODV PROTOCOL On-Demand Distance Vector multicast protocol (MAODV). The MAODV is a demand based routing protocol that the Keywords —Ad hoc network; position service; fault tolerant; necessary routes are discovered. The MAODV has the least cluster; protocol. control and processing overhead and the multi hop capability and saves the topology dynamically and avoids the loops. I. INTRODUCTION Because of the limited resources of an ad hoc network, the An ad hoc network consists of some wireless mobile nodes MAODV tries to minimize the control overhead by limiting which route the packets without any infrastructure. The ad hoc the updating packets. To minimize the processing overhead, network is divided to static and dynamic ad hoc networks. In a the MAODV packets are simple so they need a little static ad hoc network, the location of a node does not change. computation. MAODV uses the sequential numbers to prevent In the dynamic ad hoc networks the nodes are moving like the the loops. In MAODV, every node has a routing table which mobile and vehicle ad hoc networks. The topology of the consists of information of the routes. Every entry of the mobile ad hoc network is changing. There are two kinds of routing table consists of destination IP address and the routing, the first one is the topology based routing and the sequential number and the number of hops toward the second one is the location based routing. The topology based destination node and the next hop toward the destination node routing use the information of links of the network to transfer and the time to live (TTL) field. When the information of a the packets. They are divided to the table-driven and the route is entered in the routing table, the TTL field for demand based routing protocols. The table-driven routing destination node, will be set based on the RREQ (route protocols consist of the distance-vector protocols and the request), RREP (route reply) or the hello packets. link-state protocols. The location based routing protocols Volume: 01, Issue: 01, November 2016 www.ijeacs.com 1 ISBN: 978-0-9957075-0-4 Mahboobeh Abdoos International Journal of Engineering and Applied Computer Science (IJEACS) When a node uses a route toward the destination node, the Every cluster head has the location of its higher cluster TTL field