SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1949
NETWORK SURVEILLANCE BASED DATA TRANSFERENCE IN COGNITIVE
RADIO NETWORK WITH THE COMPARISON OF DIFFERENT ROUTING
PROTOCOLS
G.ELANAGAI1 C.JAYASRI2
1PG Scholar, Dept. of ECE
2Assistant Professor, Dept. of ECE
AVC College of Engineering , Mannampandal, Mayiladuthurai.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Creation of Energy-Efficient Cognitive Radio
model is a challenging task. There are many traditional
methods which are highly energy efficient, but it does not
bother about network security. Hence in this paper we are
comparing different wireless routing protocols and find best
protocol to create energy efficient Cognitive Radio network
(CRN) model having attacker nodes in it. Finally energy
consumption comparison graph was generatedbetweenthose
routing protocols and finds the efficient model i.e. thecreation
of energy efficient CRN model.
Key Words: Network Security,Energy Efficiency,Cognitive radio
(CR), X Graph
1. INTRODUCTION
Cognitive radio is a Software-defined radio that can
able to access unused radio spectrum holes efficiently. The
definition adopted by Federal CommunicationsCommission
(FCC):“Cognitive radio: A radio or system that senses its
operational electromagnetic environment and can
dynamically and autonomously adjust its radio operating
parameters to modify system operation, such as maximize
throughput, mitigate interference, facilitateinteroperability,
access secondary markets.” Cognitive radio (CR) techniques
provide the capability of detecting spectrum holes and
sharing the spectrum in an opportunistic manner. DSA
techniques can select the best available channel from the
spectrum pool for CR devices to operate [4]. More
specifically, CR enables secondary users (SUs) to perform a
series of operations as follows: 1) spectrum sensing to
predict what spectrum is available and recognize the
presence of the primary user (PU) when a PU reoccupiesthe
licensed channel; 2) spectrummanagementtoselectthe best
available channel from the spectrum pool for special
services; 3) spectrum sharing to coordinate access to all
available channels with other SUs; and 4) spectrummobility
to vacate the channel as soon as possible when a PU is
detected [4]. Spectrum sensing is one of the most important
components in the cognition cycle .Routing protocols plays
an important role to choose an efficientCRN model.Hence in
this paper we are going to compare the reactive, Proactive
and Hybrid routing Protocols. The below figure 1.1
shows the basic cognition cycle [13].
2. WIRELESS ROUTING PROTOCOLS
Figure 2.1 Routing Protocols Classification
Wireless Routing
protocols
Eg: AODV,
DSR
Reactive Proactive
Hybrid Eg: DSDV,
OLSR
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1950
 Reactive (AODV,DSR,TORA) on demand
 Proactive (DSDV,OLSR,WRP) table driven
 Hybrid (ZRP) combination of reactive and
proactive.
In this paper we are going to compare three routing
protocols to choose the best one.
2.1 Reactive Protocol
Reactive Protocol has lower overhead since routes
are determined on demand. It employs flooding (global
search) concept. Constantly updatingofroutetables with the
latest route topology is not required in on demand concept.
Reactive protocol searches for the route in an on-demand
manner and set the link in order to send out and accept the
packet from a source node to destination node. Route
discovery process is used in on demand routing by flooding
the route request (RREQ) packets throughout the network.
Examples of reactive routing protocols are the dynamic
source Routing (DSR), ad hoc on-demand distance vector
routing (AODV).
2.1.1 AODV
Adhoc-Ondemand–Distance-Vectoristhealgorithm
used here it enables dynamic, multihop routing betweenthe
nodes.It allows the nodes to obtain the routes quickly and
the operation is loop-free one and it has setup of
reverse/forward pointers. The major advantage of this
algorithm is it avoids link breakage, AODV causes affected
set of nodes to be notified, so we can invalidate the route
using lost link. Route Request (RREQ’s), Route Replies
(RREP’s) and Route Errors (REER’s) are the message types
defined by AODV algorithm.
Advantages of AODV
Highly suitable for more number of nodes.Use of
periodic indication messages to track neighbours the
messages supporting the routes maintenance are range-
limited, so they do not cause unnecessary overhead in the
network. The connection setup delay is less. RERR (Route
error) is defined so we can avoid link breakage.
2.1.2 DSR
DSR uses source routing concept. When packets
are flooded by a source node, the sender node caches
complete hop-by-hop routetothereceivernode.These
route lists are caches in a route cache. The datapackets
carry the source route in the packet header. DSR uses
Route Discovery process to send the data packetsfrom
sender to receiver node for which it does not already
know the route; it uses a route discovery process to
dynamically determine such a route. In Route
discovery DSR works by flooding the data packets in
network with route request (RREQ) packets. RREQ
packets are received by every neighbor nodes and
continue this flooding process by retransmissions of
RREQ packets, unless it gets destination or its route
cache consists a route for destination .Such a node
replies to the RREQ with a route reply (RREP) packet
that is routed back to real source node .source routing
uses RREQ and RREP packets. The RREQ builds up the
path traversed across the network. The RREP routes
itself back to the source by traversing this path toward
the back. The source caches backward route by RREP
packets for upcoming use. If any connection on a
source route is wrecked, a route error (RERR)packetis
notified to the source node.
2.2 Proactive Protocol
Each node in the network has routing table for
the broadcast of the data packets and want toestablish
connection to other nodes in the network.Thesenodes
record for all the presented destinations, number of
hops required to arrive at each destination in the
routing table. The routing entry is tagged with a
sequence number which is created by the destination
node. To retain the stability, each station broadcasts
and modifies its routing table from time to time. How
many hops are required to arrive that particular node
and which stations are accessible is result of
broadcasting ofpacketsbetweennodes.Eachnodethat
broadcasts data will contain its new sequencenumber.
The proactive protocols are appropriate for less
number of nodes in networks, as they need to update
node entries for each and every node in the routing
table of every node. It results more Routing overhead
problem. There is consumption of more bandwidth in
routing table. Example of Proactive RoutingProtocol is
Destination Sequenced Distance Vector (DSDV).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1951
2.2.1 DSDV
The DSDV routing protocol is an enhanced
version of the distributed Bellman-Ford algorithm
where each node maintain a table that contain the
shortest distance and the first node on the shortest
path to every other node in the network. Each node,
upon receiving an update, quickly disseminatesittoits
neighbors in order to propagate the broken-link
information to the whole network. Thus a single link
break leads to the propagation of table update
information to the whole network.
Advantage
It can be applied to MANETs with few
modifications. The updatesarepropagatedthroughout
the network in order to maintain an up-to-date viewof
the network topology at all the nodes.
Disadvantages
(1) The DSDV suffers from excessive control
overhead that is proportional to the number of nodes
in the network and therefore is not scalable in
MANETs, which have limited bandwidth and whose
topologies are highly dynamic.
(2) In order to obtain information about a
particular destination node, a node has to wait for a
table update message initiatedbythesamedestination
node. This delay could result in stale routing
information at nodes.
2.2.2 OLSR
Optimized Link State Protocol (OLSR) is a
proactive routing protocol, so the routes are always
immediately available when needed. OLSR is an
optimization version of a pure link state protocol. So
the topological changes cause the flooding of the
topological information to all available hosts in the
network. To reduce the possible overhead in the
network protocol uses Multipoint Relays (MPR). The
idea of MPR is to reduce flooding of broadcasts by
reducing the same broadcast in some regions in the
network, more details about MPR can be found later in
this chapter. Another reduce is to provide the shortest
path. The reducing the time interval for the control
messages transmissioncanbringmorereactivitytothe
topological changes.
Advantages
OLSR is also a flat routing protocol; it does not
need central administrative system to handle its
routing process. The proactive characteristic of the
protocol provides that the protocol has all the routing
information to all participated hosts in the network.
However, as adrawbackOLSRprotocolneedsthateach
host periodic sends the updated topology information
throughout the entire network, this increase the
protocols bandwidth usage. But the flooding is
minimized by the MPRs, which are only allowed to
forward the topological messages.
2.2.3 Hybrid Routing Protocol (HRP)
HRP is a hybrid protocol that separates the
network into several zones, which makes a
hierarchical protocol as the protocol ZHLS (zone-
based hierarchical link state). HRP is based on GPS
(Global positioning system), which allows each node
to identify its physical position before mapping an
area with table to identify it to which it belongs. The
number of messages exchanged in high ZHLS is what
influences the occupation of the bandwidth. Our
protocol attempts to reduce the number of messages.
Hence the network is zoned in HRP thereisnoneedof
periodic updates about the network’s source and the
bandwidth consumption and the number of reports
exchanged is highly reduced.
Operation of the Protocol HRP
HRP is a protocol that is based on the concept of
zones; each zone can contain multiple nodes
So we can define tree levels:
- Level node.
- Level Getaway.
- Level Cluster Head
Each node deploys a relocation method to find its
physical location and determines its zone ID by
mapping its physical location to the zone map.
Equipped with this zone ID, the node can start the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1952
intrazone (level of node) clustering and then the
interzone (level of getaway) clustering procedures to
build itsroutingtables.Eachasynchronouslybroadcast
a link request. Nodes within its communication range
in turn reply with link responses node ID, zone ID.
After all link responses are received, the node
generates its node LSP that contains the node ID of its
neighbors of the same zone and the zone ID of its
neighbors of different zones. Nodes may receive link
responses from the nodes of their neighboring zones.
After LSP receipt, cluster head communicates with the
getaway that is sending a scope on the tablecontaining
the nodes belongingtothearea.Theirgetawayschange
the tables receivedbytheclusterheadandupdatetheir
routing table.
3. ANALYSIS SNAPSHOT
Figure 3.1 Working Snap of NS2
Figure 3.2 Energy Consumption Comparison of
DSDV and HRP
In the Fig 3.2 Red strike shows DSDV output and green shows
HRP
In the Below Figure 3.3 Red strike shows AODV and green
shows DSR
Figure 3.3 AODV and DSR Comparison
Figure 3.4 AODV and Hybrid Comparison
In the above figure 3.4 Red strike shows AODV and
Green Strike Shows the Hybrid Protocol.This graph proves
that our Hybrid routing protocol is more energy efficient
than AODV.
4.CONCLUSION
Different Routing Protocols are applied in our
proposedCRNmodelandEnergyConsumptionXgraph
was generated for all the protocols.Based on X graph
result we Proves that AODV protocols Suits to the
network having highest number of nodes and DSR is
best for the network having less number of nodes and
for Hybrid protocol there is no need of periodic HELLO
messages. Hence for creating Energy Efficient model
Hybrid routing protocol plays an important role i.e,
Highly enrgy efficient which means it consumes very
less energy When compared with other protocols.
REFERENCES
[1] A Survey of spectrum sensing algorithms for
cognitive radio networks, T.Yucek and H. Arslan,
IEEE Commun Surveys, vol 11, 2009.
[2] Optimization Of CollaborativeSpectrumSensing,
A. Ghasemi and E.Sousa, J Commun, June 2007.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1953
[3] Catch me if you can: An abnormality detection
approach for CSS in Cognitive radio networks, H.Li
and Z.Han, IEEE Transaction, Wireless Commun,
Nov 2010.
[4] Cooperative Sensing among Cognitive Radios,
A.Sahai and S.Mishra, IEEE ICC, 2006.
[5] Optimal linear cooperation for spectrumsensing
in cognitive radio networks, Z.Quan and A.Sayed,
IEEE J.Sel.Topics, Vol no2, Feb 2008.
[6] On collaborative detection of TV transmission in
supportofdynamicspectrumsharing,E.Visotsky,S.
Kuffner and R.Peterson, IEEE DySPAN, 2005.
[7] Collaborative spectrum sensing with stranger:
Trust, or not to trust? , H.Li and Z. Han,IEEEWCNC,
2010.
[8] Attack-proof Collaborative spectrum sensing in
Cognitive Radio Network , H.Li ,Y.Sun and Z.Han,
IEEE CISS,2009
[9] Cooperative spectrum sensing with double
threshold detection basedonreputation,L.Duan,L.
Zhang, Y. Chu and S. Liu, IEEE WiCOM, 2009.
[10] Optimum number of secondary users in
collaborative spectrum sensing considering
resource efficiency, Y.Chen, IEEE Commun Letter,
Dec 2008.
[11] Yi Zheng, XianzhongXie, Lili Yang, “Cooperative
Spectrum Sensing Based on Blind Source
Separation for Cognitive Radio”,International
Conference on Future Information
Network(ICFIN),pp. 398-402, Oct 2009.
[12] Multitask Spectrum Sensing in Cognitive Radio
Networks via Spatiotemporal Data Mining Xin-
Huang, Gang Wang, and Fei Hu, IEEE
Transactions On Vehicular technology, Vol. 62,
No . 2, February 2013
[13] I. F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty,
“NeXt Generation / dynamic spectrum
access/cognitive radio wireless Networks : a
survey”, Computer Networks, vol. 50, no. 13, pp.
2127–2159, 2006.

More Related Content

What's hot

The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluationijwmn
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisonsITM Universe - Vadodara
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Sushant Kushwaha
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...eSAT Publishing House
 
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksA New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksLeila_maleke
 

What's hot (17)

The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
Routing ad hoc network
Routing ad hoc networkRouting ad hoc network
Routing ad hoc network
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
 
Az26337342
Az26337342Az26337342
Az26337342
 
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksA New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
 

Similar to Network Surveillance Based Data Transfer Comparison of Routing Protocols

IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET Journal
 
Performance evaluation of two models in the reactive routing protocol in manets
Performance evaluation of two models in the reactive routing protocol in manetsPerformance evaluation of two models in the reactive routing protocol in manets
Performance evaluation of two models in the reactive routing protocol in manetsnooriasukmaningtyas
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 

Similar to Network Surveillance Based Data Transfer Comparison of Routing Protocols (20)

IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
Performance evaluation of two models in the reactive routing protocol in manets
Performance evaluation of two models in the reactive routing protocol in manetsPerformance evaluation of two models in the reactive routing protocol in manets
Performance evaluation of two models in the reactive routing protocol in manets
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 

Network Surveillance Based Data Transfer Comparison of Routing Protocols

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1949 NETWORK SURVEILLANCE BASED DATA TRANSFERENCE IN COGNITIVE RADIO NETWORK WITH THE COMPARISON OF DIFFERENT ROUTING PROTOCOLS G.ELANAGAI1 C.JAYASRI2 1PG Scholar, Dept. of ECE 2Assistant Professor, Dept. of ECE AVC College of Engineering , Mannampandal, Mayiladuthurai. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Creation of Energy-Efficient Cognitive Radio model is a challenging task. There are many traditional methods which are highly energy efficient, but it does not bother about network security. Hence in this paper we are comparing different wireless routing protocols and find best protocol to create energy efficient Cognitive Radio network (CRN) model having attacker nodes in it. Finally energy consumption comparison graph was generatedbetweenthose routing protocols and finds the efficient model i.e. thecreation of energy efficient CRN model. Key Words: Network Security,Energy Efficiency,Cognitive radio (CR), X Graph 1. INTRODUCTION Cognitive radio is a Software-defined radio that can able to access unused radio spectrum holes efficiently. The definition adopted by Federal CommunicationsCommission (FCC):“Cognitive radio: A radio or system that senses its operational electromagnetic environment and can dynamically and autonomously adjust its radio operating parameters to modify system operation, such as maximize throughput, mitigate interference, facilitateinteroperability, access secondary markets.” Cognitive radio (CR) techniques provide the capability of detecting spectrum holes and sharing the spectrum in an opportunistic manner. DSA techniques can select the best available channel from the spectrum pool for CR devices to operate [4]. More specifically, CR enables secondary users (SUs) to perform a series of operations as follows: 1) spectrum sensing to predict what spectrum is available and recognize the presence of the primary user (PU) when a PU reoccupiesthe licensed channel; 2) spectrummanagementtoselectthe best available channel from the spectrum pool for special services; 3) spectrum sharing to coordinate access to all available channels with other SUs; and 4) spectrummobility to vacate the channel as soon as possible when a PU is detected [4]. Spectrum sensing is one of the most important components in the cognition cycle .Routing protocols plays an important role to choose an efficientCRN model.Hence in this paper we are going to compare the reactive, Proactive and Hybrid routing Protocols. The below figure 1.1 shows the basic cognition cycle [13]. 2. WIRELESS ROUTING PROTOCOLS Figure 2.1 Routing Protocols Classification Wireless Routing protocols Eg: AODV, DSR Reactive Proactive Hybrid Eg: DSDV, OLSR
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1950  Reactive (AODV,DSR,TORA) on demand  Proactive (DSDV,OLSR,WRP) table driven  Hybrid (ZRP) combination of reactive and proactive. In this paper we are going to compare three routing protocols to choose the best one. 2.1 Reactive Protocol Reactive Protocol has lower overhead since routes are determined on demand. It employs flooding (global search) concept. Constantly updatingofroutetables with the latest route topology is not required in on demand concept. Reactive protocol searches for the route in an on-demand manner and set the link in order to send out and accept the packet from a source node to destination node. Route discovery process is used in on demand routing by flooding the route request (RREQ) packets throughout the network. Examples of reactive routing protocols are the dynamic source Routing (DSR), ad hoc on-demand distance vector routing (AODV). 2.1.1 AODV Adhoc-Ondemand–Distance-Vectoristhealgorithm used here it enables dynamic, multihop routing betweenthe nodes.It allows the nodes to obtain the routes quickly and the operation is loop-free one and it has setup of reverse/forward pointers. The major advantage of this algorithm is it avoids link breakage, AODV causes affected set of nodes to be notified, so we can invalidate the route using lost link. Route Request (RREQ’s), Route Replies (RREP’s) and Route Errors (REER’s) are the message types defined by AODV algorithm. Advantages of AODV Highly suitable for more number of nodes.Use of periodic indication messages to track neighbours the messages supporting the routes maintenance are range- limited, so they do not cause unnecessary overhead in the network. The connection setup delay is less. RERR (Route error) is defined so we can avoid link breakage. 2.1.2 DSR DSR uses source routing concept. When packets are flooded by a source node, the sender node caches complete hop-by-hop routetothereceivernode.These route lists are caches in a route cache. The datapackets carry the source route in the packet header. DSR uses Route Discovery process to send the data packetsfrom sender to receiver node for which it does not already know the route; it uses a route discovery process to dynamically determine such a route. In Route discovery DSR works by flooding the data packets in network with route request (RREQ) packets. RREQ packets are received by every neighbor nodes and continue this flooding process by retransmissions of RREQ packets, unless it gets destination or its route cache consists a route for destination .Such a node replies to the RREQ with a route reply (RREP) packet that is routed back to real source node .source routing uses RREQ and RREP packets. The RREQ builds up the path traversed across the network. The RREP routes itself back to the source by traversing this path toward the back. The source caches backward route by RREP packets for upcoming use. If any connection on a source route is wrecked, a route error (RERR)packetis notified to the source node. 2.2 Proactive Protocol Each node in the network has routing table for the broadcast of the data packets and want toestablish connection to other nodes in the network.Thesenodes record for all the presented destinations, number of hops required to arrive at each destination in the routing table. The routing entry is tagged with a sequence number which is created by the destination node. To retain the stability, each station broadcasts and modifies its routing table from time to time. How many hops are required to arrive that particular node and which stations are accessible is result of broadcasting ofpacketsbetweennodes.Eachnodethat broadcasts data will contain its new sequencenumber. The proactive protocols are appropriate for less number of nodes in networks, as they need to update node entries for each and every node in the routing table of every node. It results more Routing overhead problem. There is consumption of more bandwidth in routing table. Example of Proactive RoutingProtocol is Destination Sequenced Distance Vector (DSDV).
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1951 2.2.1 DSDV The DSDV routing protocol is an enhanced version of the distributed Bellman-Ford algorithm where each node maintain a table that contain the shortest distance and the first node on the shortest path to every other node in the network. Each node, upon receiving an update, quickly disseminatesittoits neighbors in order to propagate the broken-link information to the whole network. Thus a single link break leads to the propagation of table update information to the whole network. Advantage It can be applied to MANETs with few modifications. The updatesarepropagatedthroughout the network in order to maintain an up-to-date viewof the network topology at all the nodes. Disadvantages (1) The DSDV suffers from excessive control overhead that is proportional to the number of nodes in the network and therefore is not scalable in MANETs, which have limited bandwidth and whose topologies are highly dynamic. (2) In order to obtain information about a particular destination node, a node has to wait for a table update message initiatedbythesamedestination node. This delay could result in stale routing information at nodes. 2.2.2 OLSR Optimized Link State Protocol (OLSR) is a proactive routing protocol, so the routes are always immediately available when needed. OLSR is an optimization version of a pure link state protocol. So the topological changes cause the flooding of the topological information to all available hosts in the network. To reduce the possible overhead in the network protocol uses Multipoint Relays (MPR). The idea of MPR is to reduce flooding of broadcasts by reducing the same broadcast in some regions in the network, more details about MPR can be found later in this chapter. Another reduce is to provide the shortest path. The reducing the time interval for the control messages transmissioncanbringmorereactivitytothe topological changes. Advantages OLSR is also a flat routing protocol; it does not need central administrative system to handle its routing process. The proactive characteristic of the protocol provides that the protocol has all the routing information to all participated hosts in the network. However, as adrawbackOLSRprotocolneedsthateach host periodic sends the updated topology information throughout the entire network, this increase the protocols bandwidth usage. But the flooding is minimized by the MPRs, which are only allowed to forward the topological messages. 2.2.3 Hybrid Routing Protocol (HRP) HRP is a hybrid protocol that separates the network into several zones, which makes a hierarchical protocol as the protocol ZHLS (zone- based hierarchical link state). HRP is based on GPS (Global positioning system), which allows each node to identify its physical position before mapping an area with table to identify it to which it belongs. The number of messages exchanged in high ZHLS is what influences the occupation of the bandwidth. Our protocol attempts to reduce the number of messages. Hence the network is zoned in HRP thereisnoneedof periodic updates about the network’s source and the bandwidth consumption and the number of reports exchanged is highly reduced. Operation of the Protocol HRP HRP is a protocol that is based on the concept of zones; each zone can contain multiple nodes So we can define tree levels: - Level node. - Level Getaway. - Level Cluster Head Each node deploys a relocation method to find its physical location and determines its zone ID by mapping its physical location to the zone map. Equipped with this zone ID, the node can start the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1952 intrazone (level of node) clustering and then the interzone (level of getaway) clustering procedures to build itsroutingtables.Eachasynchronouslybroadcast a link request. Nodes within its communication range in turn reply with link responses node ID, zone ID. After all link responses are received, the node generates its node LSP that contains the node ID of its neighbors of the same zone and the zone ID of its neighbors of different zones. Nodes may receive link responses from the nodes of their neighboring zones. After LSP receipt, cluster head communicates with the getaway that is sending a scope on the tablecontaining the nodes belongingtothearea.Theirgetawayschange the tables receivedbytheclusterheadandupdatetheir routing table. 3. ANALYSIS SNAPSHOT Figure 3.1 Working Snap of NS2 Figure 3.2 Energy Consumption Comparison of DSDV and HRP In the Fig 3.2 Red strike shows DSDV output and green shows HRP In the Below Figure 3.3 Red strike shows AODV and green shows DSR Figure 3.3 AODV and DSR Comparison Figure 3.4 AODV and Hybrid Comparison In the above figure 3.4 Red strike shows AODV and Green Strike Shows the Hybrid Protocol.This graph proves that our Hybrid routing protocol is more energy efficient than AODV. 4.CONCLUSION Different Routing Protocols are applied in our proposedCRNmodelandEnergyConsumptionXgraph was generated for all the protocols.Based on X graph result we Proves that AODV protocols Suits to the network having highest number of nodes and DSR is best for the network having less number of nodes and for Hybrid protocol there is no need of periodic HELLO messages. Hence for creating Energy Efficient model Hybrid routing protocol plays an important role i.e, Highly enrgy efficient which means it consumes very less energy When compared with other protocols. REFERENCES [1] A Survey of spectrum sensing algorithms for cognitive radio networks, T.Yucek and H. Arslan, IEEE Commun Surveys, vol 11, 2009. [2] Optimization Of CollaborativeSpectrumSensing, A. Ghasemi and E.Sousa, J Commun, June 2007.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1953 [3] Catch me if you can: An abnormality detection approach for CSS in Cognitive radio networks, H.Li and Z.Han, IEEE Transaction, Wireless Commun, Nov 2010. [4] Cooperative Sensing among Cognitive Radios, A.Sahai and S.Mishra, IEEE ICC, 2006. [5] Optimal linear cooperation for spectrumsensing in cognitive radio networks, Z.Quan and A.Sayed, IEEE J.Sel.Topics, Vol no2, Feb 2008. [6] On collaborative detection of TV transmission in supportofdynamicspectrumsharing,E.Visotsky,S. Kuffner and R.Peterson, IEEE DySPAN, 2005. [7] Collaborative spectrum sensing with stranger: Trust, or not to trust? , H.Li and Z. Han,IEEEWCNC, 2010. [8] Attack-proof Collaborative spectrum sensing in Cognitive Radio Network , H.Li ,Y.Sun and Z.Han, IEEE CISS,2009 [9] Cooperative spectrum sensing with double threshold detection basedonreputation,L.Duan,L. Zhang, Y. Chu and S. Liu, IEEE WiCOM, 2009. [10] Optimum number of secondary users in collaborative spectrum sensing considering resource efficiency, Y.Chen, IEEE Commun Letter, Dec 2008. [11] Yi Zheng, XianzhongXie, Lili Yang, “Cooperative Spectrum Sensing Based on Blind Source Separation for Cognitive Radio”,International Conference on Future Information Network(ICFIN),pp. 398-402, Oct 2009. [12] Multitask Spectrum Sensing in Cognitive Radio Networks via Spatiotemporal Data Mining Xin- Huang, Gang Wang, and Fei Hu, IEEE Transactions On Vehicular technology, Vol. 62, No . 2, February 2013 [13] I. F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty, “NeXt Generation / dynamic spectrum access/cognitive radio wireless Networks : a survey”, Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006.