SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Engineering Research and Development
e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 7 (August 2012), PP. 45-51


  Energy Efficient Routing Protocols in Mobile Ad hoc Networks
                            Ajay Shah1, Hitesh Gupta2, Mukesh Baghel3
                                                     1,2,3
                                                             PCST, Bhopal



Abstract—In wireless network can classified in two way one is infrastructure network and another is infrastructure less.
Infrastructure less wireless network is known as Ad-hoc network. Instead of relying on a base station to coordinate the
flow of messages to each node in the network, the individual network nodes forward packets to and from each other.
"Adhoc" is a Latin word its means "for this purpose." It is used to explain solutions that are developed for a specific
purpose. In computer networking, an ad-hoc networks all nodes are mobile and can be connected dynamically in an
arbitrary manner. All nodes of these networks behave as routers and take part in discovery and maintenance of routes to
other nodes in the network.In this paper, the three routing protocols are studied i.e. DSR, ZRP, DSDV

Keywords—Mobile ad hoc network, ad hoc network, DSR, ZRP, DSDV

                                           I.          INTRODUCTION
           A mobile ad-hoc network (MANET) group has been formed within IETF. The primary focus of this working group
is to develop and evolve MANET specifications and introduce them to the Internet standard track. The goal is to support
mobile ad-hoc networks with hundreds of routers and solve challenges in this kind of network. Some challenges that ad-hoc
networking faces are limited wireless transmission range, hidden terminal problems, packet losses due to transmission errors,
mobility induced route changes, and battery constraints. Mobile ad-hoc networks could enhance the service area of access
networks and provide wireless connectivity into areas with poor or previously no coverage Connectivity to wired
infrastructure will be provided through multiple gateways with possibly different capabilities and utilization. To improve
performance, the mobile host should have the ability to adapt to variation in performance and coverage and to switch
gateways when beneficial. To enhance the prediction of the best overall performance, a network layer metric has a better
overview of the network. Ad-hoc networking brings features like easy connection to access networks, dynamic multihop
network structures, and direct peer-to-peer communication. The multihop property of an ad-hoc network needs to be bridged
by a gateway to the wired backbone. The gateway must have a network interface on both types of networks and be a part of
both the global routing and the local ad-hoc routing. Users could benefit from ubiquitous networks in several ways. User
mobility enables users to switch between devices, migrate sessions, and still get the same personalized services. Host
mobility enables the users’ devices to move around the networks and maintain connectivity and reachability. Wireless
networks can be classified in two types: First, infrastructure network which consists of a network with fixed and wired
gateways. A mobile host communicates with a bridge in the network (called base station) within its communication radius.
When it goes out of the range of one base station, it connects with a new fixed base station and starts communicating through
it.




                                        Fig 1. Infrastructure less Wireless Network

         Second, infrastructure less (ad-hoc) networks fig. 1: In ad-hoc networks all nodes are mobile and can be connected
dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in discovery and
maintenance of routes to other nodes in the network.


                                                                45
Energy Efficient Routing Protocols in Mobile Ad hoc Networks




                                              Fig 2. Simple ad hoc Network

         In this simple ad hoc network in fig 2. We take three nodes A,B,C. In this they create adhoc network for some time
for connecting to each other through this mobile adhoc network. They do not use any base station and router in this network.
There are number of routing protocols for ad hoc networks, they are categorized into two: Proactive Routing and Reactive
routing.

A.    Classification Of Routing Protocols:
          The routing protocols can be classified into two parts: 1. Proactive (Table driven), 2. Reactive (Source or Demand
driven) and 3. Hybrid Routing Protocols while depending on the network structure these are classified as flat routing,
hierarchical routing and geographic position assisted routing. Flat routing covers both routing protocols based on routing
strategy. The three ad hoc routing protocols are used, DSR, ZRP and DSDV. ZRP is Hybrid Routing Protocols DSR is
Reactive Protocol (Source driven) and DSDV is Proactive (Table driven) Routing protocol.




                                            Fig 3. Adhoc Networking Protocols

A.1 Pro-active vs. reactive
           The IETF MANET Working Group has researched and developed a number of protocols for mobile ad-hoc
networks, which have been described. These protocols can generally be categorized into two groups: pro-active and reactive
protocols. Pro-active protocols follow an approach similar to the one used in wired routing protocols. By continuously
evaluating the known and attempting to discover new routes, they try to maintain the most up-to-date map of the network.
This allows them to efficiently forward packets, as the route is known at the time when the packet arrives at the node. Pro-
active or table-driven protocols, in order to maintain the constantly changing network graph due to new, moving or failing
nodes, require continuous updates, which may consume large amounts of bandwidth – clearly a disadvantage in the wireless
world, where bandwidth is often sparse. Even worse so, much of the accumulated routing information is never used, since
routes may exist only for very limited periods of time. The family of Distance-Vector protocols, including Destination-
Sequenced Distance-Vector Routing, fall into the category of pro-active protocols. In contrast, reactive protocols determine
the proper route only when required, that is, when a packet needs to be forwarded. In this instance, the node floods the
network with a routerequest and builds the route on demand from the responses it receives. This technique does not require
constant broadcasts and discovery, but on the other hand causes delays since the routes are not already available.
Additionally, the flooding of the network may lead to additional control traffic, again putting strain on the limited
bandwidth. These reactive (or on-demand) protocols include Dynamic Source Routing (DSR) and Ad-hoc On demand
Distance Vector Routing (AODV), as well as the classical flooding algorithms.

A.2. HYBRID ROUTING PROTOCOL
          Hybrid protocols are the combinations of reactive and proactive protocols and takes advantages of these two
protocols and as a result, routes are found quickly in the routing zone.

                                                            46
Energy Efficient Routing Protocols in Mobile Ad hoc Networks

Example Protocol: ZRP (Zone Routing Protocol), TORA (Temporally-Ordered Routing Algorithm)

                                          II.           RELATED WORK
          The problem of routing in MANETs has received attention among researchers, and many routing protocols
devoted to MANETs have been proposed. According to their approaches for creating and maintaining routes, these protocols
can be divided into two main categories; proactive protocols and reactive ones. The proactive protocols, also called table
driven, establish routes in advance, and permanently maintain them, basing on the periodic routing table exchange.

                              Table 1: Comparison of Reactive and Proactive routing protocols
                               Reactive protocols               Proactive Protocols
                               A route is built only when Attempt          to      maintain
                               required.                      consistent,         up-to-date
                                                              Routing information from
                                                              each node to every other
                                                              node in the network.
                               No periodic updates. Control Constant propagation of
                               information       is     not routing             information
                               propagated unless there is a periodically even          when
                               change inthe topology          topology change does not
                                                              occur.
                               First-packet latency is more First packet latency is less
                               when compared with table- when comparedwith on-
                               driven protocols because a demand protocols
                               route need to be built
                               Not available                  A route to every other node
                                                              in ad-hocnetwork is always
                                                              available


                                      Table 2: Comparison of different routing protocols




              III.           DESCRIPTION OF SELECTED ROUTING PROTOCOLS
A. Dynamic Source Routing (DSR)
          Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks and is based on a method known
as source routing. It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one.
Except that each intermediate node that broadcasts a route request packet adds its own address identifier to a list carried in
the packet. The destination node generates a route reply message that includes the list of addresses received in the route
request and transmits it back along this path to the source. Route maintenance in DSR is accomplished through the
confirmations that nodes generate when they can verify that the next node successfully received a packet. These
confirmations can be link-layer acknowledgements, passive acknowledgements or network-layer acknowledgements
specified by the DSR protocol. However, it uses sourcerouting instead of relying on the routing table at each intermediate
device. When a node is not able to verify the successful reception of a packet it tries to retransmit it. When a finite number of
retransmissions fail, the node generates a route error message that specifies the problematic link, transmitting it to the source
node. When a node requires a route to a destination, which it doesn’t have in its route cache, it broadcasts a Route Request
(RREQ) message, which is flooded throughout the network. The first RREQ message is a broadcast query on neighbors
without flooding. Each RREQ packet is uniquely identified by the initiator’s address and the request id. A node processes a
route request packet only if it has not already seen the packet and its address is not present in the route record of the packet.
This minimizes the number of route requests propagated in the network. RREQ is replied by the destination node or an
intermediate node, which knows the route, using the Route Reply (RREP) message. The return route for the RREP message
may be one of the routes that exist in the route cache (if it exists) or a list reversal of the nodes in the RREQ packet if

                                                              47
Energy Efficient Routing Protocols in Mobile Ad hoc Networks

symmetrical routing is supported. In other cases the node may initiate it owns route discovery mechanism and piggyback the
RREP packet onto it. Thus the route may be considered unidirectional or bidirectional. DSR doesn’t enforce any use of
periodic messages from the mobile hosts for maintenance of routes. Instead it uses two types of packets for route
maintenance: Route Error (RERR) packets and ACKs. Whenever a node encounters fatal transmission errors so that the
route becomes invalid, the source receives a RERR message.
          ACK packets are used to verify the correct operation of the route links. This also serves as a passive
acknowledgement for the mobile node. DSR enables multiple routes to be learnt for a particular destination. DSR does not
require any periodic update messages, thus avoiding wastage of bandwidth.

A.    Advantages and Disadvantages
           DSR uses a reactive approach which eliminates the need to periodically flood the network with table update
messages which are required in a table-driven approach. The intermediate nodes also utilize the route cache information
efficiently to reduce the control overhead. The disadvantage of DSR is that the route maintenance mechanism does not
locallyrepair a broken down link. The connection setup delay is higher than in table-driven protocols. Even though the
protocol performs well in static and low-mobility environments, the performance degrades rapidly with increasing mobility.
Also,considerable routing overhead is involved due to the source-routing mechanism employed in DSR. This routing
overhead is directly proportional to the path length.


B. Zone Routing Protocol (ZRP)
           The Zone Routing Protocol, or ZRP, as described in this document combines the advantages of both into a hybrid
scheme, taking advantage of pro-active discovery within a node’s local neighborhood, and using a reactive protocol for
communication between these neighborhoods. As mentioned earlier, the ZRP is not so much a distinct protocol as it provides
a framework for other protocols. The separation of a nodes local neighborhood from the global topology of the entire
network allows for applying different approaches – and thus taking advantage of each technique’s features for a given
situation. These local neighborhoods are called zones (hence the name); each node may be within multiple overlapping
zones, and each zone may be of a different size. The “size” of a zone is not determined by geographical measurement, as one
might expect, but is given by a radius of length, where is the number of hops to the perimeter of the zone.




           By dividing the network into overlapping, variable-size zones, ZRP avoids a hierarchical map of the network and
the overhead involved in maintaining this map. Instead, the network may be regarded as flat, and route optimization is
possible if overlapping zones are detected. While the idea of zones often seems to imply similarities with cellular phone
services, it is important to point out that each node has it’s own zone, and does not rely on fixed nodes (which would be
impossible in MANETs).




C. Destination-Sequenced Distance-Vector Routing (DSDV)
         Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc mobile
networks based on the Bellman-Ford algorithm. It eliminates route looping, increases convergence speed, and reduces
control message overhead.
                                                           48
Energy Efficient Routing Protocols in Mobile Ad hoc Networks




                                                Fig 8: Illustration of DSDV.

           In DSDV, each node maintains a next-hop table, which it exchanges with its neighbors. There are two types of
next-hop table exchanges: periodic full-table broadcast and event-driven incremental updating. The relative frequency of the
full-table broadcast and the incremental updating is determined by the node mobility. In each data packet sent during a next-
hop table broadcast or incremental updating, the source node appends a sequence number. This sequence number is
propagated by all nodes receiving the corresponding distance-vector updates, and is stored in the next-hop table entry of
these nodes. A node, after receiving a new next-hop table from its neighbor, updates its route to a destination only if the new
sequence number is larger than the recorded one, or if the new sequence number is the same as the recorded one, but the new
route is shorter. In order to further reduce the control message overhead, a settling time is estimated for each route. A node
updates to its neighbors with a new route only if the settling time of the route has expired and the route remains optimal.

                                    Table 3: Parameter comparison for DSR,DSDV, ZRP




                                    Table 4: Property comparison for DSR,DSDV, ZRP




IV.           SIMULATION BASED ANALYSIS USING NETWORK SIMULATOR (NS-2.34)
A. Simulation Tool
          The simulation tool used for analysis is NS-2.34 which is highly preferred by research communities. NS is a
discrete event simulator targeted at networking research. NS provides substantial support for simulation of TCP, routing, and
multicast protocols over wired and wireless (local and satellite) networks. NS2 is an object oriented simulator, written in

                                                             49
Energy Efficient Routing Protocols in Mobile Ad hoc Networks

C++, with an OTcl interpreter as a frontend. This means that most of the simulation scripts are created in Tcl (Tool
Command Language). If the components have to be developed for ns2, then both Tcl and C++ have to be used.




                     Fig 9. Packet delivery fraction vs. Pause time for 50-node model with 15 sources.




                 Fig 10. Average End-to-End Delay vs. Pause time forthe 50-node model with 15 sources.

                                             V.            CONCLUSION
          It is difficult for the quantitative comparison of the most of the ad hoc routing protocols due to the fact that
simulations have been done independent of one another using different metrics and using different simulators. This paper
does the realistic comparison of three routing protocols AODV, TORA and DSDV. The significant observation is,
simulation results agree with expected results based on theoretical analysis. As expected, reactive routing protocol DSR
performance is the best considering its ability to maintain connection by periodic exchange of information, which is required
for ZRP and DSDV based traffic. DSDV performs predictably. Meanwhile DSDV was very good at all mobility rates and
movement speeds. Compared the On-Demand (DSR) , Table-Driven (DSDV) routing protocols and hybrid routing protocol
(ZRP) by varying the number of nodes and measured the metrics like end-end delay, dropped packets, As far as packet
delay and dropped packets ratio are concerned, DSR performs better than DSDV and ZRP with large number of nodes.
Hence for real time traffic DSR is preferred over ZRP and DSDV. For less number of nodes and less mobility, DSDV and
ZRP’s performance is superior.

                                           VI.            FUTURE SCOPE
         The application developed can be further enhanced to include some new features that changes with time and new
technologies some of them includes the following features:
     1. It can be used to transfer the larger packets, length by fragmenting at the sender side and de-fragmenting at the
         receiver side.
     2. The protocols which are having poor behaviors and correcting it is not simple. It is more than complex that of
         writing a new protocol so in future the performance, quality gets enhanced.

                                                      REFERENCES
  [1].   Prof. SaquibRazak, Providing explanation on how ad hoc network works and problem that we currently face, 2010.
  [2].   Vivekkumar, Simulation and comparison of AODV and DSR Routing Protocols in MANETs, July 2009.


                                                               50
Energy Efficient Routing Protocols in Mobile Ad hoc Networks

[3].    Djamel Djenouri, Abdelouahid Derhab, and Nadjib Badache Ad Hoc Volume 2, issue 1, January 2012 www.ijarcsse.com ©
        2012, IJARCSSE All Rights Reserved Networks Routing Protocols and Mobility 126 The International Arab Journal of
        Information Technology, Vol. 3, No. 2, April 2006.
[4].    David B. Johnson David A. Maltz Josh Broch ,DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc
        Networks http://www.monarch.cs.cmu.edu/ ,2007.
[5].    Petteri Kuosmanen, Finnish Defence Forces, Naval Academy Classification of Ad Hoc Routing Protocols., IMECS, Vol. 1, pp.
        321-323 , March 2009.
[6].    S. A. Ade1& P.A.Tijare2 Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc
        Networks, International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 545-548, July-
        December 2010.
[7].    V. Kanakaris, D. Ndzi and D. Azzi Ad-hoc Networks Energy Consumption: A review of the Ad-Hoc Routing Protocols Journal
        of Engineering Science and Technology Review 3 162-167, 2010.
[8].    V.Ramesh , Dr.P.Subbaiah , N. KoteswarRao , M.JanardhanaRaju , Performance Comparison and Analysis of DSDV and AODV
        for MANET International Journal on Computer Science and Engineer-ing Vol. 02, No. 02, 183-188 , 2010.
[9].    Md. Shohidul Islam, Md. Naim Hider , Md.TouhidulHaque, LetonmiahAn Extensive Comparison among DSDV, DSR and
        AODV Protocols in MANET International Journal of Computer Applications (0975 – 8887) Volume 15– No.2, February 2011.
[10].   Anuj K. Gupta, Member, IACSIT, Dr. Harsh Sadawarti, Dr. Anil K. Verma Performance analysis of AODV, DSR Routing
        Protocols International Journal of Engineering and Technology, Vol.2, No.2, ISSN: 1793-8236226, April 2010
[11].   Sunil Taneja and Ashwani Kush, A Survey of Routing Protocols in Mobile Ad Hoc Networks International Journal of
        Innovation, Management and Technology, Vol. 1, No. 3, ISSN: 2010-0248, August 2010.
[12].   Rajeshwar Singh, Dharmendra K Singh Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad Hoc
        Networks Int. J. Advanced Networking and Applications 732 Volume: 02, Issue: 04, Pages: 732-737 , 2011.




                                                             51

More Related Content

What's hot

Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network drboon
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 

What's hot (15)

Md3421762181
Md3421762181Md3421762181
Md3421762181
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Bt25420424
Bt25420424Bt25420424
Bt25420424
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
eaodv
eaodveaodv
eaodv
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 
Mane ts
Mane tsMane ts
Mane ts
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 

Viewers also liked

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

Viewers also liked (9)

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
 
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKSPERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKSJYoTHiSH o.s
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
A0110104
A0110104A0110104
A0110104
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1073644
E1073644E1073644
E1073644
 
J018216275
J018216275J018216275
J018216275
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
 
011001010 a
011001010 a011001010 a
011001010 a
 
Ijcta2011020605
Ijcta2011020605Ijcta2011020605
Ijcta2011020605
 
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKSPERFORMANCE STUDIES ON THE  VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
PERFORMANCE STUDIES ON THE VARIOUS ROUTING PROTOCOLS IN AD-HOC NETWORKS
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN : 2278-067X, p-ISSN : 2278-800X, www.ijerd.com Volume 2, Issue 7 (August 2012), PP. 45-51 Energy Efficient Routing Protocols in Mobile Ad hoc Networks Ajay Shah1, Hitesh Gupta2, Mukesh Baghel3 1,2,3 PCST, Bhopal Abstract—In wireless network can classified in two way one is infrastructure network and another is infrastructure less. Infrastructure less wireless network is known as Ad-hoc network. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. "Adhoc" is a Latin word its means "for this purpose." It is used to explain solutions that are developed for a specific purpose. In computer networking, an ad-hoc networks all nodes are mobile and can be connected dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in discovery and maintenance of routes to other nodes in the network.In this paper, the three routing protocols are studied i.e. DSR, ZRP, DSDV Keywords—Mobile ad hoc network, ad hoc network, DSR, ZRP, DSDV I. INTRODUCTION A mobile ad-hoc network (MANET) group has been formed within IETF. The primary focus of this working group is to develop and evolve MANET specifications and introduce them to the Internet standard track. The goal is to support mobile ad-hoc networks with hundreds of routers and solve challenges in this kind of network. Some challenges that ad-hoc networking faces are limited wireless transmission range, hidden terminal problems, packet losses due to transmission errors, mobility induced route changes, and battery constraints. Mobile ad-hoc networks could enhance the service area of access networks and provide wireless connectivity into areas with poor or previously no coverage Connectivity to wired infrastructure will be provided through multiple gateways with possibly different capabilities and utilization. To improve performance, the mobile host should have the ability to adapt to variation in performance and coverage and to switch gateways when beneficial. To enhance the prediction of the best overall performance, a network layer metric has a better overview of the network. Ad-hoc networking brings features like easy connection to access networks, dynamic multihop network structures, and direct peer-to-peer communication. The multihop property of an ad-hoc network needs to be bridged by a gateway to the wired backbone. The gateway must have a network interface on both types of networks and be a part of both the global routing and the local ad-hoc routing. Users could benefit from ubiquitous networks in several ways. User mobility enables users to switch between devices, migrate sessions, and still get the same personalized services. Host mobility enables the users’ devices to move around the networks and maintain connectivity and reachability. Wireless networks can be classified in two types: First, infrastructure network which consists of a network with fixed and wired gateways. A mobile host communicates with a bridge in the network (called base station) within its communication radius. When it goes out of the range of one base station, it connects with a new fixed base station and starts communicating through it. Fig 1. Infrastructure less Wireless Network Second, infrastructure less (ad-hoc) networks fig. 1: In ad-hoc networks all nodes are mobile and can be connected dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in discovery and maintenance of routes to other nodes in the network. 45
  • 2. Energy Efficient Routing Protocols in Mobile Ad hoc Networks Fig 2. Simple ad hoc Network In this simple ad hoc network in fig 2. We take three nodes A,B,C. In this they create adhoc network for some time for connecting to each other through this mobile adhoc network. They do not use any base station and router in this network. There are number of routing protocols for ad hoc networks, they are categorized into two: Proactive Routing and Reactive routing. A. Classification Of Routing Protocols: The routing protocols can be classified into two parts: 1. Proactive (Table driven), 2. Reactive (Source or Demand driven) and 3. Hybrid Routing Protocols while depending on the network structure these are classified as flat routing, hierarchical routing and geographic position assisted routing. Flat routing covers both routing protocols based on routing strategy. The three ad hoc routing protocols are used, DSR, ZRP and DSDV. ZRP is Hybrid Routing Protocols DSR is Reactive Protocol (Source driven) and DSDV is Proactive (Table driven) Routing protocol. Fig 3. Adhoc Networking Protocols A.1 Pro-active vs. reactive The IETF MANET Working Group has researched and developed a number of protocols for mobile ad-hoc networks, which have been described. These protocols can generally be categorized into two groups: pro-active and reactive protocols. Pro-active protocols follow an approach similar to the one used in wired routing protocols. By continuously evaluating the known and attempting to discover new routes, they try to maintain the most up-to-date map of the network. This allows them to efficiently forward packets, as the route is known at the time when the packet arrives at the node. Pro- active or table-driven protocols, in order to maintain the constantly changing network graph due to new, moving or failing nodes, require continuous updates, which may consume large amounts of bandwidth – clearly a disadvantage in the wireless world, where bandwidth is often sparse. Even worse so, much of the accumulated routing information is never used, since routes may exist only for very limited periods of time. The family of Distance-Vector protocols, including Destination- Sequenced Distance-Vector Routing, fall into the category of pro-active protocols. In contrast, reactive protocols determine the proper route only when required, that is, when a packet needs to be forwarded. In this instance, the node floods the network with a routerequest and builds the route on demand from the responses it receives. This technique does not require constant broadcasts and discovery, but on the other hand causes delays since the routes are not already available. Additionally, the flooding of the network may lead to additional control traffic, again putting strain on the limited bandwidth. These reactive (or on-demand) protocols include Dynamic Source Routing (DSR) and Ad-hoc On demand Distance Vector Routing (AODV), as well as the classical flooding algorithms. A.2. HYBRID ROUTING PROTOCOL Hybrid protocols are the combinations of reactive and proactive protocols and takes advantages of these two protocols and as a result, routes are found quickly in the routing zone. 46
  • 3. Energy Efficient Routing Protocols in Mobile Ad hoc Networks Example Protocol: ZRP (Zone Routing Protocol), TORA (Temporally-Ordered Routing Algorithm) II. RELATED WORK The problem of routing in MANETs has received attention among researchers, and many routing protocols devoted to MANETs have been proposed. According to their approaches for creating and maintaining routes, these protocols can be divided into two main categories; proactive protocols and reactive ones. The proactive protocols, also called table driven, establish routes in advance, and permanently maintain them, basing on the periodic routing table exchange. Table 1: Comparison of Reactive and Proactive routing protocols Reactive protocols Proactive Protocols A route is built only when Attempt to maintain required. consistent, up-to-date Routing information from each node to every other node in the network. No periodic updates. Control Constant propagation of information is not routing information propagated unless there is a periodically even when change inthe topology topology change does not occur. First-packet latency is more First packet latency is less when compared with table- when comparedwith on- driven protocols because a demand protocols route need to be built Not available A route to every other node in ad-hocnetwork is always available Table 2: Comparison of different routing protocols III. DESCRIPTION OF SELECTED ROUTING PROTOCOLS A. Dynamic Source Routing (DSR) Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks and is based on a method known as source routing. It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one. Except that each intermediate node that broadcasts a route request packet adds its own address identifier to a list carried in the packet. The destination node generates a route reply message that includes the list of addresses received in the route request and transmits it back along this path to the source. Route maintenance in DSR is accomplished through the confirmations that nodes generate when they can verify that the next node successfully received a packet. These confirmations can be link-layer acknowledgements, passive acknowledgements or network-layer acknowledgements specified by the DSR protocol. However, it uses sourcerouting instead of relying on the routing table at each intermediate device. When a node is not able to verify the successful reception of a packet it tries to retransmit it. When a finite number of retransmissions fail, the node generates a route error message that specifies the problematic link, transmitting it to the source node. When a node requires a route to a destination, which it doesn’t have in its route cache, it broadcasts a Route Request (RREQ) message, which is flooded throughout the network. The first RREQ message is a broadcast query on neighbors without flooding. Each RREQ packet is uniquely identified by the initiator’s address and the request id. A node processes a route request packet only if it has not already seen the packet and its address is not present in the route record of the packet. This minimizes the number of route requests propagated in the network. RREQ is replied by the destination node or an intermediate node, which knows the route, using the Route Reply (RREP) message. The return route for the RREP message may be one of the routes that exist in the route cache (if it exists) or a list reversal of the nodes in the RREQ packet if 47
  • 4. Energy Efficient Routing Protocols in Mobile Ad hoc Networks symmetrical routing is supported. In other cases the node may initiate it owns route discovery mechanism and piggyback the RREP packet onto it. Thus the route may be considered unidirectional or bidirectional. DSR doesn’t enforce any use of periodic messages from the mobile hosts for maintenance of routes. Instead it uses two types of packets for route maintenance: Route Error (RERR) packets and ACKs. Whenever a node encounters fatal transmission errors so that the route becomes invalid, the source receives a RERR message. ACK packets are used to verify the correct operation of the route links. This also serves as a passive acknowledgement for the mobile node. DSR enables multiple routes to be learnt for a particular destination. DSR does not require any periodic update messages, thus avoiding wastage of bandwidth. A. Advantages and Disadvantages DSR uses a reactive approach which eliminates the need to periodically flood the network with table update messages which are required in a table-driven approach. The intermediate nodes also utilize the route cache information efficiently to reduce the control overhead. The disadvantage of DSR is that the route maintenance mechanism does not locallyrepair a broken down link. The connection setup delay is higher than in table-driven protocols. Even though the protocol performs well in static and low-mobility environments, the performance degrades rapidly with increasing mobility. Also,considerable routing overhead is involved due to the source-routing mechanism employed in DSR. This routing overhead is directly proportional to the path length. B. Zone Routing Protocol (ZRP) The Zone Routing Protocol, or ZRP, as described in this document combines the advantages of both into a hybrid scheme, taking advantage of pro-active discovery within a node’s local neighborhood, and using a reactive protocol for communication between these neighborhoods. As mentioned earlier, the ZRP is not so much a distinct protocol as it provides a framework for other protocols. The separation of a nodes local neighborhood from the global topology of the entire network allows for applying different approaches – and thus taking advantage of each technique’s features for a given situation. These local neighborhoods are called zones (hence the name); each node may be within multiple overlapping zones, and each zone may be of a different size. The “size” of a zone is not determined by geographical measurement, as one might expect, but is given by a radius of length, where is the number of hops to the perimeter of the zone. By dividing the network into overlapping, variable-size zones, ZRP avoids a hierarchical map of the network and the overhead involved in maintaining this map. Instead, the network may be regarded as flat, and route optimization is possible if overlapping zones are detected. While the idea of zones often seems to imply similarities with cellular phone services, it is important to point out that each node has it’s own zone, and does not rely on fixed nodes (which would be impossible in MANETs). C. Destination-Sequenced Distance-Vector Routing (DSDV) Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing scheme for ad hoc mobile networks based on the Bellman-Ford algorithm. It eliminates route looping, increases convergence speed, and reduces control message overhead. 48
  • 5. Energy Efficient Routing Protocols in Mobile Ad hoc Networks Fig 8: Illustration of DSDV. In DSDV, each node maintains a next-hop table, which it exchanges with its neighbors. There are two types of next-hop table exchanges: periodic full-table broadcast and event-driven incremental updating. The relative frequency of the full-table broadcast and the incremental updating is determined by the node mobility. In each data packet sent during a next- hop table broadcast or incremental updating, the source node appends a sequence number. This sequence number is propagated by all nodes receiving the corresponding distance-vector updates, and is stored in the next-hop table entry of these nodes. A node, after receiving a new next-hop table from its neighbor, updates its route to a destination only if the new sequence number is larger than the recorded one, or if the new sequence number is the same as the recorded one, but the new route is shorter. In order to further reduce the control message overhead, a settling time is estimated for each route. A node updates to its neighbors with a new route only if the settling time of the route has expired and the route remains optimal. Table 3: Parameter comparison for DSR,DSDV, ZRP Table 4: Property comparison for DSR,DSDV, ZRP IV. SIMULATION BASED ANALYSIS USING NETWORK SIMULATOR (NS-2.34) A. Simulation Tool The simulation tool used for analysis is NS-2.34 which is highly preferred by research communities. NS is a discrete event simulator targeted at networking research. NS provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks. NS2 is an object oriented simulator, written in 49
  • 6. Energy Efficient Routing Protocols in Mobile Ad hoc Networks C++, with an OTcl interpreter as a frontend. This means that most of the simulation scripts are created in Tcl (Tool Command Language). If the components have to be developed for ns2, then both Tcl and C++ have to be used. Fig 9. Packet delivery fraction vs. Pause time for 50-node model with 15 sources. Fig 10. Average End-to-End Delay vs. Pause time forthe 50-node model with 15 sources. V. CONCLUSION It is difficult for the quantitative comparison of the most of the ad hoc routing protocols due to the fact that simulations have been done independent of one another using different metrics and using different simulators. This paper does the realistic comparison of three routing protocols AODV, TORA and DSDV. The significant observation is, simulation results agree with expected results based on theoretical analysis. As expected, reactive routing protocol DSR performance is the best considering its ability to maintain connection by periodic exchange of information, which is required for ZRP and DSDV based traffic. DSDV performs predictably. Meanwhile DSDV was very good at all mobility rates and movement speeds. Compared the On-Demand (DSR) , Table-Driven (DSDV) routing protocols and hybrid routing protocol (ZRP) by varying the number of nodes and measured the metrics like end-end delay, dropped packets, As far as packet delay and dropped packets ratio are concerned, DSR performs better than DSDV and ZRP with large number of nodes. Hence for real time traffic DSR is preferred over ZRP and DSDV. For less number of nodes and less mobility, DSDV and ZRP’s performance is superior. VI. FUTURE SCOPE The application developed can be further enhanced to include some new features that changes with time and new technologies some of them includes the following features: 1. It can be used to transfer the larger packets, length by fragmenting at the sender side and de-fragmenting at the receiver side. 2. The protocols which are having poor behaviors and correcting it is not simple. It is more than complex that of writing a new protocol so in future the performance, quality gets enhanced. REFERENCES [1]. Prof. SaquibRazak, Providing explanation on how ad hoc network works and problem that we currently face, 2010. [2]. Vivekkumar, Simulation and comparison of AODV and DSR Routing Protocols in MANETs, July 2009. 50
  • 7. Energy Efficient Routing Protocols in Mobile Ad hoc Networks [3]. Djamel Djenouri, Abdelouahid Derhab, and Nadjib Badache Ad Hoc Volume 2, issue 1, January 2012 www.ijarcsse.com © 2012, IJARCSSE All Rights Reserved Networks Routing Protocols and Mobility 126 The International Arab Journal of Information Technology, Vol. 3, No. 2, April 2006. [4]. David B. Johnson David A. Maltz Josh Broch ,DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks http://www.monarch.cs.cmu.edu/ ,2007. [5]. Petteri Kuosmanen, Finnish Defence Forces, Naval Academy Classification of Ad Hoc Routing Protocols., IMECS, Vol. 1, pp. 321-323 , March 2009. [6]. S. A. Ade1& P.A.Tijare2 Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc Networks, International Journal of Information Technology and Knowledge Management, Volume 2, No. 2, pp. 545-548, July- December 2010. [7]. V. Kanakaris, D. Ndzi and D. Azzi Ad-hoc Networks Energy Consumption: A review of the Ad-Hoc Routing Protocols Journal of Engineering Science and Technology Review 3 162-167, 2010. [8]. V.Ramesh , Dr.P.Subbaiah , N. KoteswarRao , M.JanardhanaRaju , Performance Comparison and Analysis of DSDV and AODV for MANET International Journal on Computer Science and Engineer-ing Vol. 02, No. 02, 183-188 , 2010. [9]. Md. Shohidul Islam, Md. Naim Hider , Md.TouhidulHaque, LetonmiahAn Extensive Comparison among DSDV, DSR and AODV Protocols in MANET International Journal of Computer Applications (0975 – 8887) Volume 15– No.2, February 2011. [10]. Anuj K. Gupta, Member, IACSIT, Dr. Harsh Sadawarti, Dr. Anil K. Verma Performance analysis of AODV, DSR Routing Protocols International Journal of Engineering and Technology, Vol.2, No.2, ISSN: 1793-8236226, April 2010 [11]. Sunil Taneja and Ashwani Kush, A Survey of Routing Protocols in Mobile Ad Hoc Networks International Journal of Innovation, Management and Technology, Vol. 1, No. 3, ISSN: 2010-0248, August 2010. [12]. Rajeshwar Singh, Dharmendra K Singh Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad Hoc Networks Int. J. Advanced Networking and Applications 732 Volume: 02, Issue: 04, Pages: 732-737 , 2011. 51