SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1472
Survey on Adaptive Routing Algorithms
A. Vinothini
Research Scholar, School of Computer Science, Engineering and Applications, Bharathidasan University
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract – A routing algorithm is used to set of step-by step
operations direct internet traffic source to destination , there
are many different path it can take to target the routing this
algorithm is used to verify mathematically the best path .
Different routing algorithms use different methods to verify
the best path. For example, a distance vector algorithm
calculates a graph of all available routes by having each point
(called a node) determine the "cost" of travelling to each
immediate neighbor. This information is collected for every
node to create a distance table; which is used to determinethe
best path to from any one node to another.
Key Words: wireless network, routing algorithm
1. INTRODUCTION
Routing is the operate of moving information across an
inter-network from a source to a destination. Along theway,
on the least one intermediate node typically is encountered.
It’s also referred to as the process of choose a path over
which to send the packets. Routing is often contrasted with
bridging, which is might seem to accomplish precisely the
same thing to the casual observer
Routing procedure of selecting a path of traffic in a network
is between are across multiple networks. Broadly routing is
performances are many type of networks are circuit –
switching networks andpublic switched telephonenetwork
and computer such as the internet.
Wireless Routing Protocol (WRP) Is used to routing nodes
communicate the distance and second to-last hop for each
destination. WRP reduces the number of cases in which a
temporary routing loop can occur, whichaccountsforits fast
meeting properties. A compare to algorithms Bellman-Ford
Algorithm (DBF), DUAL (a loop-free distance-vector
algorithm) and Ideal Link-state Algorithms (ILS), which
represent is the state of art of internet routing. Themodel of
the results indicates that WRP is the most efficient of
alternatives analyzed.
2. Routing Algorithms
Routing is process of forwarding of a packet in a network so
that it reaches its intended destination.
Classification of routing algorithm:
The routing algorithm may be classified as follows:
2.1Adaptive routing algorithm
These algorithms change their routing decisions to
return changes in the topology and traffic as well.
These get optimization parameter are the distance,
number of hop and estimated transmisted transit
time. This can be further classified as follow:
1. Centerlized
2. Isolated
2.2 Centralized trust based secure routing used
dijkstra algorithm
centralized trust-based routing scheme has been
proposed to enhance reliable data transmission
over networks that experience advanced attacks.
CSR improves the routing performance by avoiding
malicious nodes and effectively isolating false trust
information offered by malicious nodes through a
weight function. In addition, CSR considers nodal
trust as well as directional trusttoformulatea more
reliable routing path.
Dijkstra algorithm has a constraint that the
distance between each link must be positive to find
the shortest path correctly. However, in the CSR’s
modified Dijkstra algorithm, the total cost is
obtained by multiplication of the link costs.
Algorithm 1: Optimal routing path selection
Data: G: input graph, s: source vertex, N: set of
vertices
Function Modified Dijkstra algorithm (G, s)
For all u ∈ N, c(u) = ∞, c(s) = 0, V = {}
while V ≠ N do
Select u ɆV with smallest c(u)
V = V ∪ {u}
For all vertices v adjacent to u
if u = s (initial case) then
c(v) = l(s, v)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1473
else
if c(v) > c(u)l (u, v) then
c(v) = c(u)l(u, v)
end
end
end
3. A-star Adaptive Routing
The ASA-routing uses the informationoftherouting
table to select as non-congested as possible of
output channels to forward packets.Thecongestion
information should be dynamically updated
according to the transmission latency of the
previous routed packets. Experimental results for
different traffic patterns andnetwork loadsindicate
that how our method applied to the repetitive turn
model routing and the odd-even turn routing yields
an improvement in both theaveragelatencyandthe
throughput.
ASA used path finding and graph traversal it
problem solve possible path choose optimal path
first away.
Algorithm 1: findNextNode()
Input: curNode, dstNode;
openList = ∅;
closeList = ∅;
openList.add(curNode)
while openList is not empty do
tempCurNode = findM inF NodeInOpenList();
closeList.add(tempCurNode);
neighborNodes = f indNeighborNodes();
for each nextNode of neighborNodes do
if nextNode is in openList then
new- g = G(tempCurNode) + c(tempCurNode,
nextNode);
if new- g < G(nextNode) then
F(nextNode) = new- g + H(nextNodee);
set tempCurNode as parent to nextNode ;
end if
else
openList.add(nextNode)
set tempCurNode as parent to nextNode;
end if
end for
if dst Node is in openList then
return
end if
end while
4. Fault aware routing algorithm
Fault-aware routing method consists of fault
detection method, fault-aware routing scheme, and
fault- tolerant mapping method. On the basis of
solution path matrix, the fault-tolerant routing
algorithm completes the packet transmission by
passing the faulty nodes or faulty links.
In this fault aware routing algorithm reduces the
packet loss rate and increases the reliability in
comparison to the existing fault tolerant routing
algorithm. This routing algorithm is also evaluated
on larger networks by varying the position and
number of faults, which shows that it can be
efficiently used for large network on chip (NoCs).
Routing (in- mesh[row][col],xco,yco,move)
{
If((yco==desy-yco)&&(xco==dest-xco))
{
Sol[xco][yco]=1;
Return true;
}
Else if (yco==col-1)
{
If(move==south)
{
If(in-mesh[xco+1][yco]==fail)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1474
Routing(in-mesh,xco,yco-1,west);
}
Routing (in-mesh,xco+1,yco,south);
}
Else if(xco==row-1)
{
If(move==east)
{
If(in-mesh[xco][yco+1]==fail)
Routing (in –mesh,xco-1,yco,north);
}
Routing (in-mesh,xco,yco+1,east);
}
Else if (move==west)
{
If(in-mesh[xco+1][yco]!=fail)
Routing (in-mesh,xco+1,yco,south);
else if (in-mesh,[xco][yco-1]!=fail)
Routing (in-mesh,xco,yco-1,west);
Else if(in-mesh[xco-1][yco]!=fail)
Routing(in-mesh,xco-1,yco,north);
}
Else if (move==north)
{
If(in-mesh[xco][yco-1]!=fail)
Routing (in-mesh,xco,yco-1,west);
Else
Routing (in-mesh,xco,yco+1,east);
}
Else
{
Routing(in-mesh,xco,yco+1,east);
Routing(in-mesh,xco+1,yco,south);
If((in-mesh[xco][yco+1]==fail) &&(in-
mesh[xco+1][yco]==fail))
Routing(in-mesh,xco,yco-1,west);
}
}
Sol[xco][yco]=0;
Return false;
}
{
Sol[xco][yco]=1;
Return true;
}
Else if (yco==col-1)
{
If(move==south)
{
If(in-mesh[xco+1][yco]==fail)
Routing(in-mesh,xco,yco-1,west);
}
Routing (in-mesh,xco+1,yco,south);
}
Else if(xco==row-1)
{
If(move==east)
{
If(in-mesh[xco][yco+1]==fail)
Routing (in –mesh,xco-1,yco,north);
}
Routing (in-mesh,xco,yco+1,east);
}
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1475
Else if (move==west)
{
If(in-mesh[xco+1][yco]!=fail)
Routing (in-mesh,xco+1,yco,south);
else if (in-mesh,[xco][yco-1]!=fail)
Routing (in-mesh,xco,yco-1,west);
Else if(in-mesh[xco-1][yco]!=fail)
Routing(in-mesh,xco-1,yco,north);
}
Else if (move==north)
{
If(in-mesh[xco][yco-1]!=fail)
Routing (in-mesh,xco,yco-1,west);
Else
Routing (in-mesh,xco,yco+1,east);
}
Else
{
Routing(in-mesh,xco,yco+1,east);
Routing(in-mesh,xco+1,yco,south);
If((in-mesh[xco][yco+1]==fail) &&(in-
mesh[xco+1][yco]==fail))
Routing(in-mesh,xco,yco-1,west);
}
}
Sol[xco][yco]=0;
Return false;
}
5. Improved dynamic routing algorithm in
elastic optical networks
There are two types of algorithms usedinimproved
dynamic routing algorithms in elastic optical
networks. The first one is based on a set of shortest
paths whose lengths are determined bythe number
of links in the network. The second one is a
modified version of Dijkstra’s algorithm. this
algorithm is based on weights of the network links
depending on the operation of the links and the
introduction of an aggregated spectrum of the path
that is being selected.
Input: Ɠ(N, E). Set of k shortest paths between each
pair of nodes. The request path selection for C b/s
between node s and d.
Output: The shortest path p forrequestofCb/sand
fa , fb.
Improved kSP algorithm;
1. status← false; l←1;
2. while not(status) and (l ≤ k) do
3. ( ) l s d l s d i j p S p Si j , , , , ∈ ← { Aggregation
bandwidth l-th path l s d p , }
4. ( ) l dist ← dist ps,d {calculate the actual length of
the path}
5. m ← m( ) dist { designate the modulation level m}
6. n ← n( ) C,m { determine the required number of
slots n}
7. if FF( S l ,n G) sd p + then { First Fit function finds
the n + G adjacent slots}
8. Status← true
9. end if
10. l←l+1;
11. end while
12. if status then
13. return pts,d , a b f , f { fb − f a = n + G +1 }
14. else Blocking
15. end
Modified shortest path 2 algorithm
Input: Graph Ɠ (N, E). Therequestpathselectionfor
C b/s between node s and d.
Output:
The shortest path p for request of C b/s and fa, fb.
MSP2 algorithm;
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1476
1. status ← false;
2. m← M
3. while not(status) and ( m > 0 ) do
4. n ← n( ) C,m {specify the required number of
slots n}
5. MSP(D,,p, ,fb , fa)
6. MSP(D, ,p, , fa
,s,fb
, )
7. if ( dist(p) ≤TD max(m)) and dist( p,) ≤TDmax
(m) ) then
8. status←true,p←p ' ,fa←fa,fb fb
9. else if dist(p) ≤ TDmax (m)) then
10. status←true
11. else m ← m −1
12. end if
13. end if
14. end while
15. If status then
16. return p , fa , fb { fb − f a = n + G +1 }
17. else Request blocked
18. end if
6. An Efficient Adaptive Routing Algorithm for
Application- Specific Network-on-Chip
One of the main factors which effects the overall
performance of a Network-on-Chip(NoC) is
represented by the routing algorithm.
The methodology can be applied to regular and
irregular network topology for Network –on chip
and can be done in polynomial time. The results
obtained show that the efficiency of the proposed
methodology is verified through a case study of an
Audio-Video application. Our approach consists in
finding all Strongly Connected Component(SCC)
of the Application Specific Channel Dependency
Graph(ASCDG), and to work on it instead of
working.
Algorithm 1 BreakSCC
Input : A set of SCC (SCC[N]), Routing Table(RT)
Output: Routing Table(RT)
1: for i ∈[0,N−1] do
2: GetacycleDc = d1,d2,···,ck ⊆ D ∈ SCC[i];
3: if (It’s not reduced to one node) then
4: for j ∈[0,k−1] do
5: if (ExistsEscapePath(src(d[j]),Label(src[dj]))
then
6: Remove the Dc from the SCC[i]
7: end if
8: end for
9: if (j ≥(k +1) ) then
10: for (j ∈[1,k]) do
11: Compute: λdj (cf. Section 3)
12: end for
13: for (j ∈[1,k]) do
14: if (The λdj is the minimal and |Θ(c,d)|≥1) then
15: Remove the dj
16: Update RT
17: else
18: Return(fail)
19: end if
20: end for
21: end if
22: BreakSCC(FindSCC(SCC[i]−Dc))
23: end if
24: end for
25: Return(RT), success)
7. Advantages and disadvantages of algorithms
S.
no
Algorithms Advantages Disadvantages
1 Dijkstra centralized
trust based
Secure
routing
scheme can
avoid the
In black hole
attack malicious
behavior is
consistent
because they
drop packet
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1477
malicious
nodes
effectively,
thus it
achieves high
reliability
under
advanced
network
attack.
regardless of
target.
2 A-star
Adaptive
Routing
This to make
packets to
reach the
destination
free of
congested
areas, thus
alleviating
congestion in
the network.
The disadvantage
of this model is
that the degree of
adaptiveness in
half case is the
same with fully
adaptive routing,
however in the
other case is one.
3 Falut aware
routing
Falut aware
routing
algorithm
route the
data through
alternate
paths to the
destination
and at the
same time
the traffic
congestion
around the
faults is also
reduced.
One common
property of these
algorithms is that
blocking of the
packets is the
only way to
acknowledge the
faults.
4 Ksp&&msp2 This
algorithms
reject the
lower traffic
volume as
compared to
well-known
algorithms.
Modified shortest
path 2 algorithm
uses utilization of
the network links,
so loaded links
are omitted on
the calculated
paths.
5 Strongly
Connected
component(S
CC)
The
methodology
can be
applied to
regular and
irregular
network
topology for
NoC and can
be done in
polynomial
time.
APSRAs routing
cannot scale to
large designs for
the technique for
provingdeadlock-
freeness, based
on search and
elimination of
cycles in the
extended
dependency
graph, and
requires
exponential time
in the worst case.
8. CONCLUSION
This paper presents different type of routing algorithms in
wireless networks. Routing is the act of moving information
across an inter-network from a source to a destination A
Routing algorithms routing the information varies route
depending on the routing algorithm. Present routing
protocols are classified according to the existing study
direction and the performance issues of each routing
protocol are highlighted.
REFERENCES
[1] YunSunho Seo, and Jong-Moon Chung, jusik yun,
Centralized Trust Based Secure Routing in Wireless
Networks, IEEE WIRELESS COMMUNICATIONS, Vol
num:7 pg no:1066-1069.
[2] Yuan Cai Xiang Ji1 ASA-routing: A-Star Adaptive
Routing Algorithm for Network-on-Chips, International
conference on algorithms and architectures for parallel
processing,Vol:11335 pg no:187-198 year-2018.
[3] Jyoti Khichar 1 and Sudhanshu Choudhary Fault Aware
Adaptive Routing Algorithm for Mesh based NoCs
International conference inventertive computing and
information, Year 2017.
[4] Ireneusz Olszewsk, Improved dynamic routing
algorithms in elastic optical network, VOLUME: 15 |
NUMBER: 3 | 2017 | SEPTEMBER.
[5] Zongliang ZhuanSun, Keqiu Li and Yanming Shen, An
Efficient Adaptive Routing Algorithm for Application-
Specific Network-on-Chip, institute of electrical and
electrical engineers,Year:2011.

More Related Content

What's hot

An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...IRJET Journal
 
FUZZY CLUSTERING FOR IMPROVED POSITIONING
FUZZY CLUSTERING FOR IMPROVED POSITIONINGFUZZY CLUSTERING FOR IMPROVED POSITIONING
FUZZY CLUSTERING FOR IMPROVED POSITIONINGijitjournal
 
Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expecta...
Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expecta...Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expecta...
Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expecta...TELKOMNIKA JOURNAL
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...ijsrd.com
 
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd Iaetsd
 
Implementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select AdderImplementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select AdderIJMTST Journal
 
Improved data efficiency of programmable arbiter based on chip permutation ne...
Improved data efficiency of programmable arbiter based on chip permutation ne...Improved data efficiency of programmable arbiter based on chip permutation ne...
Improved data efficiency of programmable arbiter based on chip permutation ne...EditorIJAERD
 
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferEswar Publications
 
An efficient list decoder architecture for polar codes
An efficient list decoder architecture for polar codesAn efficient list decoder architecture for polar codes
An efficient list decoder architecture for polar codesjpstudcorner
 
Efficient Planning and Offline Routing Approaches for IP Networks
Efficient Planning and Offline Routing Approaches for IP NetworksEfficient Planning and Offline Routing Approaches for IP Networks
Efficient Planning and Offline Routing Approaches for IP NetworksEM Legacy
 
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...CSCJournals
 
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systemsComparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systemseSAT Journals
 
HEVC 2D-DCT architectures comparison for FPGA and ASIC implementations
HEVC 2D-DCT architectures comparison for FPGA and ASIC implementationsHEVC 2D-DCT architectures comparison for FPGA and ASIC implementations
HEVC 2D-DCT architectures comparison for FPGA and ASIC implementationsTELKOMNIKA JOURNAL
 
Performance evaluation of MANET routing protocols based on QoS and energy p...
  Performance evaluation of MANET routing protocols based on QoS and energy p...  Performance evaluation of MANET routing protocols based on QoS and energy p...
Performance evaluation of MANET routing protocols based on QoS and energy p...IJECEIAES
 
Design and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAsDesign and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAsIOSR Journals
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

What's hot (20)

An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...
 
FUZZY CLUSTERING FOR IMPROVED POSITIONING
FUZZY CLUSTERING FOR IMPROVED POSITIONINGFUZZY CLUSTERING FOR IMPROVED POSITIONING
FUZZY CLUSTERING FOR IMPROVED POSITIONING
 
Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expecta...
Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expecta...Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expecta...
Low Complexity Multi-User MIMO Detection for Uplink SCMA System Using Expecta...
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
 
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fftIaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
 
16
1616
16
 
Implementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select AdderImplementation of Low Power and Area-Efficient Carry Select Adder
Implementation of Low Power and Area-Efficient Carry Select Adder
 
Improved data efficiency of programmable arbiter based on chip permutation ne...
Improved data efficiency of programmable arbiter based on chip permutation ne...Improved data efficiency of programmable arbiter based on chip permutation ne...
Improved data efficiency of programmable arbiter based on chip permutation ne...
 
05725150
0572515005725150
05725150
 
paper
paperpaper
paper
 
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
 
An efficient list decoder architecture for polar codes
An efficient list decoder architecture for polar codesAn efficient list decoder architecture for polar codes
An efficient list decoder architecture for polar codes
 
Efficient Planning and Offline Routing Approaches for IP Networks
Efficient Planning and Offline Routing Approaches for IP NetworksEfficient Planning and Offline Routing Approaches for IP Networks
Efficient Planning and Offline Routing Approaches for IP Networks
 
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
 
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systemsComparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
 
HEVC 2D-DCT architectures comparison for FPGA and ASIC implementations
HEVC 2D-DCT architectures comparison for FPGA and ASIC implementationsHEVC 2D-DCT architectures comparison for FPGA and ASIC implementations
HEVC 2D-DCT architectures comparison for FPGA and ASIC implementations
 
Performance evaluation of MANET routing protocols based on QoS and energy p...
  Performance evaluation of MANET routing protocols based on QoS and energy p...  Performance evaluation of MANET routing protocols based on QoS and energy p...
Performance evaluation of MANET routing protocols based on QoS and energy p...
 
Design and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAsDesign and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAs
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Similar to IRJET- Survey on Adaptive Routing Algorithms

PERFORMANCE ANALYSIS OF DISTANCE VECTOR AND LINKED STATE ROUTING PROTOCOL
PERFORMANCE ANALYSIS OF DISTANCE VECTOR AND LINKED STATE ROUTING PROTOCOLPERFORMANCE ANALYSIS OF DISTANCE VECTOR AND LINKED STATE ROUTING PROTOCOL
PERFORMANCE ANALYSIS OF DISTANCE VECTOR AND LINKED STATE ROUTING PROTOCOLIRJET Journal
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET Journal
 
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...IRJET Journal
 
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...IRJET Journal
 
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...csandit
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...cscpconf
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...IJECEIAES
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsEast West University
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET Journal
 
An approach to dsr routing qos by fuzzy genetic algorithms
An approach to dsr routing qos by fuzzy genetic algorithmsAn approach to dsr routing qos by fuzzy genetic algorithms
An approach to dsr routing qos by fuzzy genetic algorithmsijwmn
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...IRJET Journal
 
Improvement in Computational Complexity of the MIMO ML Decoder in High Mobili...
Improvement in Computational Complexity of the MIMO ML Decoder in High Mobili...Improvement in Computational Complexity of the MIMO ML Decoder in High Mobili...
Improvement in Computational Complexity of the MIMO ML Decoder in High Mobili...IRJET Journal
 
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...ijsrd.com
 

Similar to IRJET- Survey on Adaptive Routing Algorithms (20)

PERFORMANCE ANALYSIS OF DISTANCE VECTOR AND LINKED STATE ROUTING PROTOCOL
PERFORMANCE ANALYSIS OF DISTANCE VECTOR AND LINKED STATE ROUTING PROTOCOLPERFORMANCE ANALYSIS OF DISTANCE VECTOR AND LINKED STATE ROUTING PROTOCOL
PERFORMANCE ANALYSIS OF DISTANCE VECTOR AND LINKED STATE ROUTING PROTOCOL
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...
 
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
 
EESRDA
EESRDAEESRDA
EESRDA
 
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...
 
218
218218
218
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
A046020112
A046020112A046020112
A046020112
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
 
An approach to dsr routing qos by fuzzy genetic algorithms
An approach to dsr routing qos by fuzzy genetic algorithmsAn approach to dsr routing qos by fuzzy genetic algorithms
An approach to dsr routing qos by fuzzy genetic algorithms
 
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization (E...
 
Improvement in Computational Complexity of the MIMO ML Decoder in High Mobili...
Improvement in Computational Complexity of the MIMO ML Decoder in High Mobili...Improvement in Computational Complexity of the MIMO ML Decoder in High Mobili...
Improvement in Computational Complexity of the MIMO ML Decoder in High Mobili...
 
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
Route Optimization to make Energy Efficient MANET using Vishal Fuzzy Genetic ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

IRJET- Survey on Adaptive Routing Algorithms

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1472 Survey on Adaptive Routing Algorithms A. Vinothini Research Scholar, School of Computer Science, Engineering and Applications, Bharathidasan University ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract – A routing algorithm is used to set of step-by step operations direct internet traffic source to destination , there are many different path it can take to target the routing this algorithm is used to verify mathematically the best path . Different routing algorithms use different methods to verify the best path. For example, a distance vector algorithm calculates a graph of all available routes by having each point (called a node) determine the "cost" of travelling to each immediate neighbor. This information is collected for every node to create a distance table; which is used to determinethe best path to from any one node to another. Key Words: wireless network, routing algorithm 1. INTRODUCTION Routing is the operate of moving information across an inter-network from a source to a destination. Along theway, on the least one intermediate node typically is encountered. It’s also referred to as the process of choose a path over which to send the packets. Routing is often contrasted with bridging, which is might seem to accomplish precisely the same thing to the casual observer Routing procedure of selecting a path of traffic in a network is between are across multiple networks. Broadly routing is performances are many type of networks are circuit – switching networks andpublic switched telephonenetwork and computer such as the internet. Wireless Routing Protocol (WRP) Is used to routing nodes communicate the distance and second to-last hop for each destination. WRP reduces the number of cases in which a temporary routing loop can occur, whichaccountsforits fast meeting properties. A compare to algorithms Bellman-Ford Algorithm (DBF), DUAL (a loop-free distance-vector algorithm) and Ideal Link-state Algorithms (ILS), which represent is the state of art of internet routing. Themodel of the results indicates that WRP is the most efficient of alternatives analyzed. 2. Routing Algorithms Routing is process of forwarding of a packet in a network so that it reaches its intended destination. Classification of routing algorithm: The routing algorithm may be classified as follows: 2.1Adaptive routing algorithm These algorithms change their routing decisions to return changes in the topology and traffic as well. These get optimization parameter are the distance, number of hop and estimated transmisted transit time. This can be further classified as follow: 1. Centerlized 2. Isolated 2.2 Centralized trust based secure routing used dijkstra algorithm centralized trust-based routing scheme has been proposed to enhance reliable data transmission over networks that experience advanced attacks. CSR improves the routing performance by avoiding malicious nodes and effectively isolating false trust information offered by malicious nodes through a weight function. In addition, CSR considers nodal trust as well as directional trusttoformulatea more reliable routing path. Dijkstra algorithm has a constraint that the distance between each link must be positive to find the shortest path correctly. However, in the CSR’s modified Dijkstra algorithm, the total cost is obtained by multiplication of the link costs. Algorithm 1: Optimal routing path selection Data: G: input graph, s: source vertex, N: set of vertices Function Modified Dijkstra algorithm (G, s) For all u ∈ N, c(u) = ∞, c(s) = 0, V = {} while V ≠ N do Select u ɆV with smallest c(u) V = V ∪ {u} For all vertices v adjacent to u if u = s (initial case) then c(v) = l(s, v)
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1473 else if c(v) > c(u)l (u, v) then c(v) = c(u)l(u, v) end end end 3. A-star Adaptive Routing The ASA-routing uses the informationoftherouting table to select as non-congested as possible of output channels to forward packets.Thecongestion information should be dynamically updated according to the transmission latency of the previous routed packets. Experimental results for different traffic patterns andnetwork loadsindicate that how our method applied to the repetitive turn model routing and the odd-even turn routing yields an improvement in both theaveragelatencyandthe throughput. ASA used path finding and graph traversal it problem solve possible path choose optimal path first away. Algorithm 1: findNextNode() Input: curNode, dstNode; openList = ∅; closeList = ∅; openList.add(curNode) while openList is not empty do tempCurNode = findM inF NodeInOpenList(); closeList.add(tempCurNode); neighborNodes = f indNeighborNodes(); for each nextNode of neighborNodes do if nextNode is in openList then new- g = G(tempCurNode) + c(tempCurNode, nextNode); if new- g < G(nextNode) then F(nextNode) = new- g + H(nextNodee); set tempCurNode as parent to nextNode ; end if else openList.add(nextNode) set tempCurNode as parent to nextNode; end if end for if dst Node is in openList then return end if end while 4. Fault aware routing algorithm Fault-aware routing method consists of fault detection method, fault-aware routing scheme, and fault- tolerant mapping method. On the basis of solution path matrix, the fault-tolerant routing algorithm completes the packet transmission by passing the faulty nodes or faulty links. In this fault aware routing algorithm reduces the packet loss rate and increases the reliability in comparison to the existing fault tolerant routing algorithm. This routing algorithm is also evaluated on larger networks by varying the position and number of faults, which shows that it can be efficiently used for large network on chip (NoCs). Routing (in- mesh[row][col],xco,yco,move) { If((yco==desy-yco)&&(xco==dest-xco)) { Sol[xco][yco]=1; Return true; } Else if (yco==col-1) { If(move==south) { If(in-mesh[xco+1][yco]==fail)
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1474 Routing(in-mesh,xco,yco-1,west); } Routing (in-mesh,xco+1,yco,south); } Else if(xco==row-1) { If(move==east) { If(in-mesh[xco][yco+1]==fail) Routing (in –mesh,xco-1,yco,north); } Routing (in-mesh,xco,yco+1,east); } Else if (move==west) { If(in-mesh[xco+1][yco]!=fail) Routing (in-mesh,xco+1,yco,south); else if (in-mesh,[xco][yco-1]!=fail) Routing (in-mesh,xco,yco-1,west); Else if(in-mesh[xco-1][yco]!=fail) Routing(in-mesh,xco-1,yco,north); } Else if (move==north) { If(in-mesh[xco][yco-1]!=fail) Routing (in-mesh,xco,yco-1,west); Else Routing (in-mesh,xco,yco+1,east); } Else { Routing(in-mesh,xco,yco+1,east); Routing(in-mesh,xco+1,yco,south); If((in-mesh[xco][yco+1]==fail) &&(in- mesh[xco+1][yco]==fail)) Routing(in-mesh,xco,yco-1,west); } } Sol[xco][yco]=0; Return false; } { Sol[xco][yco]=1; Return true; } Else if (yco==col-1) { If(move==south) { If(in-mesh[xco+1][yco]==fail) Routing(in-mesh,xco,yco-1,west); } Routing (in-mesh,xco+1,yco,south); } Else if(xco==row-1) { If(move==east) { If(in-mesh[xco][yco+1]==fail) Routing (in –mesh,xco-1,yco,north); } Routing (in-mesh,xco,yco+1,east); }
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1475 Else if (move==west) { If(in-mesh[xco+1][yco]!=fail) Routing (in-mesh,xco+1,yco,south); else if (in-mesh,[xco][yco-1]!=fail) Routing (in-mesh,xco,yco-1,west); Else if(in-mesh[xco-1][yco]!=fail) Routing(in-mesh,xco-1,yco,north); } Else if (move==north) { If(in-mesh[xco][yco-1]!=fail) Routing (in-mesh,xco,yco-1,west); Else Routing (in-mesh,xco,yco+1,east); } Else { Routing(in-mesh,xco,yco+1,east); Routing(in-mesh,xco+1,yco,south); If((in-mesh[xco][yco+1]==fail) &&(in- mesh[xco+1][yco]==fail)) Routing(in-mesh,xco,yco-1,west); } } Sol[xco][yco]=0; Return false; } 5. Improved dynamic routing algorithm in elastic optical networks There are two types of algorithms usedinimproved dynamic routing algorithms in elastic optical networks. The first one is based on a set of shortest paths whose lengths are determined bythe number of links in the network. The second one is a modified version of Dijkstra’s algorithm. this algorithm is based on weights of the network links depending on the operation of the links and the introduction of an aggregated spectrum of the path that is being selected. Input: Ɠ(N, E). Set of k shortest paths between each pair of nodes. The request path selection for C b/s between node s and d. Output: The shortest path p forrequestofCb/sand fa , fb. Improved kSP algorithm; 1. status← false; l←1; 2. while not(status) and (l ≤ k) do 3. ( ) l s d l s d i j p S p Si j , , , , ∈ ← { Aggregation bandwidth l-th path l s d p , } 4. ( ) l dist ← dist ps,d {calculate the actual length of the path} 5. m ← m( ) dist { designate the modulation level m} 6. n ← n( ) C,m { determine the required number of slots n} 7. if FF( S l ,n G) sd p + then { First Fit function finds the n + G adjacent slots} 8. Status← true 9. end if 10. l←l+1; 11. end while 12. if status then 13. return pts,d , a b f , f { fb − f a = n + G +1 } 14. else Blocking 15. end Modified shortest path 2 algorithm Input: Graph Ɠ (N, E). Therequestpathselectionfor C b/s between node s and d. Output: The shortest path p for request of C b/s and fa, fb. MSP2 algorithm;
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1476 1. status ← false; 2. m← M 3. while not(status) and ( m > 0 ) do 4. n ← n( ) C,m {specify the required number of slots n} 5. MSP(D,,p, ,fb , fa) 6. MSP(D, ,p, , fa ,s,fb , ) 7. if ( dist(p) ≤TD max(m)) and dist( p,) ≤TDmax (m) ) then 8. status←true,p←p ' ,fa←fa,fb fb 9. else if dist(p) ≤ TDmax (m)) then 10. status←true 11. else m ← m −1 12. end if 13. end if 14. end while 15. If status then 16. return p , fa , fb { fb − f a = n + G +1 } 17. else Request blocked 18. end if 6. An Efficient Adaptive Routing Algorithm for Application- Specific Network-on-Chip One of the main factors which effects the overall performance of a Network-on-Chip(NoC) is represented by the routing algorithm. The methodology can be applied to regular and irregular network topology for Network –on chip and can be done in polynomial time. The results obtained show that the efficiency of the proposed methodology is verified through a case study of an Audio-Video application. Our approach consists in finding all Strongly Connected Component(SCC) of the Application Specific Channel Dependency Graph(ASCDG), and to work on it instead of working. Algorithm 1 BreakSCC Input : A set of SCC (SCC[N]), Routing Table(RT) Output: Routing Table(RT) 1: for i ∈[0,N−1] do 2: GetacycleDc = d1,d2,···,ck ⊆ D ∈ SCC[i]; 3: if (It’s not reduced to one node) then 4: for j ∈[0,k−1] do 5: if (ExistsEscapePath(src(d[j]),Label(src[dj])) then 6: Remove the Dc from the SCC[i] 7: end if 8: end for 9: if (j ≥(k +1) ) then 10: for (j ∈[1,k]) do 11: Compute: λdj (cf. Section 3) 12: end for 13: for (j ∈[1,k]) do 14: if (The λdj is the minimal and |Θ(c,d)|≥1) then 15: Remove the dj 16: Update RT 17: else 18: Return(fail) 19: end if 20: end for 21: end if 22: BreakSCC(FindSCC(SCC[i]−Dc)) 23: end if 24: end for 25: Return(RT), success) 7. Advantages and disadvantages of algorithms S. no Algorithms Advantages Disadvantages 1 Dijkstra centralized trust based Secure routing scheme can avoid the In black hole attack malicious behavior is consistent because they drop packet
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1477 malicious nodes effectively, thus it achieves high reliability under advanced network attack. regardless of target. 2 A-star Adaptive Routing This to make packets to reach the destination free of congested areas, thus alleviating congestion in the network. The disadvantage of this model is that the degree of adaptiveness in half case is the same with fully adaptive routing, however in the other case is one. 3 Falut aware routing Falut aware routing algorithm route the data through alternate paths to the destination and at the same time the traffic congestion around the faults is also reduced. One common property of these algorithms is that blocking of the packets is the only way to acknowledge the faults. 4 Ksp&&msp2 This algorithms reject the lower traffic volume as compared to well-known algorithms. Modified shortest path 2 algorithm uses utilization of the network links, so loaded links are omitted on the calculated paths. 5 Strongly Connected component(S CC) The methodology can be applied to regular and irregular network topology for NoC and can be done in polynomial time. APSRAs routing cannot scale to large designs for the technique for provingdeadlock- freeness, based on search and elimination of cycles in the extended dependency graph, and requires exponential time in the worst case. 8. CONCLUSION This paper presents different type of routing algorithms in wireless networks. Routing is the act of moving information across an inter-network from a source to a destination A Routing algorithms routing the information varies route depending on the routing algorithm. Present routing protocols are classified according to the existing study direction and the performance issues of each routing protocol are highlighted. REFERENCES [1] YunSunho Seo, and Jong-Moon Chung, jusik yun, Centralized Trust Based Secure Routing in Wireless Networks, IEEE WIRELESS COMMUNICATIONS, Vol num:7 pg no:1066-1069. [2] Yuan Cai Xiang Ji1 ASA-routing: A-Star Adaptive Routing Algorithm for Network-on-Chips, International conference on algorithms and architectures for parallel processing,Vol:11335 pg no:187-198 year-2018. [3] Jyoti Khichar 1 and Sudhanshu Choudhary Fault Aware Adaptive Routing Algorithm for Mesh based NoCs International conference inventertive computing and information, Year 2017. [4] Ireneusz Olszewsk, Improved dynamic routing algorithms in elastic optical network, VOLUME: 15 | NUMBER: 3 | 2017 | SEPTEMBER. [5] Zongliang ZhuanSun, Keqiu Li and Yanming Shen, An Efficient Adaptive Routing Algorithm for Application- Specific Network-on-Chip, institute of electrical and electrical engineers,Year:2011.