This document compares two reactive routing protocols for mobile ad hoc networks (MANETs) - Ad Hoc On-Demand Distance Vector (AODV) routing and Dynamic Source Routing (DSR). It provides an overview of MANETs and characteristics of reactive protocols. AODV establishes routes on demand and uses destination sequence numbers to ensure freshness. DSR is similar but uses source routing where the source node specifies the route in packets. The document analyzes the operation of each protocol and compares their advantages and disadvantages, finding that AODV generally outperforms DSR under higher stress conditions while DSR is better under less stressful situations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
MANETs are composed of autonomous nodes that are self-managed without any existing of infrastructure and centralized administration. Therefore, each node operates not only as an end system but also as a router to forward packets for other nodes. For these reasons, the network has a dynamic topology, so nodes can easily join or leave the network at any time. Routing information differentiates these networks from other ad-hoc networks. The study of QoS issues in Mobile Ad-hoc Network is done by simulation in MATLAB that can help in better understanding of the behavior of various routing protocols. This paper is intended to compare QoS parameters of various routing protocols.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...IJECEIAES
Mobile Ad-hoc Networks (MANETs) are a cluster of self-organizing and self-governing wireless nodes without any backbone infrastructure and centralized administration. The various nodes in MANET move randomly, and this node mobility may pose challenges on the performance of routing protocols. In this paper, an Intra and intergroup performance review of various MANET routing protocols are performed under varying speed of nodes. The routing protocols included in this study are reactive, proactive, and hybrid protocols. This performance review is done using the NS2 simulator and random waypoint model. The routing protocols performance is assessed through standard performance measure metrics including packet delivery ratio, throughput, routing overhead and end to end delivery with varying speed of nodes. The simulations result shows that there is no significant impact of varying speed of nodes on standard performance evaluation metrics.
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
Mobile ad-hoc networks (MANETs) are autonomous,infrastructure less, self-organized networks. In
MANETs, nodes are not stationary and thus move arbitrarily, resulting in rapid and unpredictable
topology changes in the network. Due to the limited transmission range of the nodes in the MANETs, these
nodes are not capable of directly communicating with each other. Hence, routing paths in MANETs
potentially contain multiple hops, and every node in it has the responsibility to act as a router.So, the
presence of any intermediate node in the route, which is either highly congested or behaving as a malicious
node, is likely to drop the packets. In computer networking, this type of attack is known as a packet drop
attack or black hole attack which is a type of denial-of-service attack in which a router that is supposed to
relay packets instead discards them. The proposed algorithm will detect black hole nodes in the network by
implementing changes into the existing AODV routing algorithm. The implementation of the algorithm was
being achieved using theNS-2 simulator.
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
Wireless sensor network is a wireless network consisting of small nodes with sensing, computation, and wireless communication capabilities. One of the most important issues in Wireless sensor networks WSNs is collecting and processing data perceived from the environment and sending that data to be processed and evaluated. Routing data towards the destination node is a fundamental task in WSNs. The data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the networks. In this research work, the performance of the different routing protocols in wireless sensor network based on air pollution area is derived. Sensor nodes are deployed in two types of scenario grid and random. And, simulation result outcomes are evaluated using the different routing protocols like Ad hoc On Demand Distance Vector AODV Destination Sequenced Distance Vector Routing DSDV and Dynamic Source Routing DSR in two scenarios. This system is implemented in Network Simulator NS2 . The main focus of this paper is to evaluate the performance of the different routing protocols in random scenarios. The comparison between three different routing protocols is simulated between 10, 50 and 100 nodes. Khaing Khaing Maw "Performance Comparison of Different Routing Protocols for Wireless Sensor Network in Air Pollution Area" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26760.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26760/performance-comparison-of-different-routing-protocols-for-wireless-sensor-network-in-air-pollution-area/khaing-khaing-maw
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
MANETs are composed of autonomous nodes that are self-managed without any existing of infrastructure and centralized administration. Therefore, each node operates not only as an end system but also as a router to forward packets for other nodes. For these reasons, the network has a dynamic topology, so nodes can easily join or leave the network at any time. Routing information differentiates these networks from other ad-hoc networks. The study of QoS issues in Mobile Ad-hoc Network is done by simulation in MATLAB that can help in better understanding of the behavior of various routing protocols. This paper is intended to compare QoS parameters of various routing protocols.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...IJECEIAES
Mobile Ad-hoc Networks (MANETs) are a cluster of self-organizing and self-governing wireless nodes without any backbone infrastructure and centralized administration. The various nodes in MANET move randomly, and this node mobility may pose challenges on the performance of routing protocols. In this paper, an Intra and intergroup performance review of various MANET routing protocols are performed under varying speed of nodes. The routing protocols included in this study are reactive, proactive, and hybrid protocols. This performance review is done using the NS2 simulator and random waypoint model. The routing protocols performance is assessed through standard performance measure metrics including packet delivery ratio, throughput, routing overhead and end to end delivery with varying speed of nodes. The simulations result shows that there is no significant impact of varying speed of nodes on standard performance evaluation metrics.
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
Mobile ad-hoc networks (MANETs) are autonomous,infrastructure less, self-organized networks. In
MANETs, nodes are not stationary and thus move arbitrarily, resulting in rapid and unpredictable
topology changes in the network. Due to the limited transmission range of the nodes in the MANETs, these
nodes are not capable of directly communicating with each other. Hence, routing paths in MANETs
potentially contain multiple hops, and every node in it has the responsibility to act as a router.So, the
presence of any intermediate node in the route, which is either highly congested or behaving as a malicious
node, is likely to drop the packets. In computer networking, this type of attack is known as a packet drop
attack or black hole attack which is a type of denial-of-service attack in which a router that is supposed to
relay packets instead discards them. The proposed algorithm will detect black hole nodes in the network by
implementing changes into the existing AODV routing algorithm. The implementation of the algorithm was
being achieved using theNS-2 simulator.
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
Wireless sensor network is a wireless network consisting of small nodes with sensing, computation, and wireless communication capabilities. One of the most important issues in Wireless sensor networks WSNs is collecting and processing data perceived from the environment and sending that data to be processed and evaluated. Routing data towards the destination node is a fundamental task in WSNs. The data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the networks. In this research work, the performance of the different routing protocols in wireless sensor network based on air pollution area is derived. Sensor nodes are deployed in two types of scenario grid and random. And, simulation result outcomes are evaluated using the different routing protocols like Ad hoc On Demand Distance Vector AODV Destination Sequenced Distance Vector Routing DSDV and Dynamic Source Routing DSR in two scenarios. This system is implemented in Network Simulator NS2 . The main focus of this paper is to evaluate the performance of the different routing protocols in random scenarios. The comparison between three different routing protocols is simulated between 10, 50 and 100 nodes. Khaing Khaing Maw "Performance Comparison of Different Routing Protocols for Wireless Sensor Network in Air Pollution Area" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26760.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/26760/performance-comparison-of-different-routing-protocols-for-wireless-sensor-network-in-air-pollution-area/khaing-khaing-maw
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
This ppt is helpful in clearing a basic concepts regarding this topic.
Also if you are preparing for competitive exams go through the MCQ given in this ppt.
Compittitve exams like CTET, PTET, SSC, JEE, etc.
Facultad de ciencias de la salud. Fisiología Humana II
El ojo y la visión.
1-estructura del ojo ocular
tunicas
esclerotica
cornea, coroides cuerpo ciliar, iris pupila, retina cristalino. refracción, conos y bastones, agudeza y sensibilidad visual. Movimiento ocular, Información Visual, Campo Receptor. células
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
Mobile Ad-hoc Network (MANET) is a kind of wireless network. A Wireless ad-hoc
network is a temporary network with no network infrastructure. The nodes communicate with each
other, they co-operate by forwarding data packets to other nodes in the network. Thus the nodes
find a path to the destination node using routing protocols. Due to the security vulnerabilities of
the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes.
One of these attacks is the Sinkhole Attack. Sinkhole attack is a kind of routing attack in MANET.
A sinkhole node tries to attract all the network packets to it-self from all neighboring nodes. This
paper focuses on to detect and prevent sinkhole node. By using a hybrid detection technique which
combines the advantages of both reactive and proactive routing Protocol to detect the black hole
node. It also shows performance of ZRP.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
Abstract- MANETs are infrastructure less and can be set up anytime anywhere. Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data broadcasting mechanism, where a mobile node blindly rebroadcasts the first received route request packets unless it has a route to the destination, and thus it causes the broadcast storm problem and without consider the nodes energy level of route selection it leads to reduce the network lifetime. In this paper proposed to focus is on a two mechanism ESDSR and Neighbor coverage based Probabilistic rebroadcast to overcome those problems. A Energy Saving Dynamic Source Routing in MANETs (ESDSR) which will efficiently utilize the battery power consideration in the route selection time of mobile nodes in such a way that the network will get more life time and Neighbor coverage based Probabilistic rebroadcast mechanism, which can significantly decrease the number of retransmissions so as to reduce the routing overhead, and can also improve the routing performance. The simulation was carried out using the NS-2 network simulator.
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
A group of mobile devices called as nodes, without any centralized network, communicates with each other over multi-hop links is called as an Ad-hoc Network (MANET). The military battle-field scenarios, Post-disaster rescue efforts, sensor networks, and entrepreneurs in a conference are some of the examples of mobile ad-hoc networks. Since there is no infrastructure in the network, the routing should be handled at every node. To improve the life time of network different routing protocols are consider. In present routing protocols of ad hoc networks, routing is an act of moving information from a source to destination in an internetwork. Route is selected in the route discovery phase until all the packets are sent out. Due to the continuous flow of packets in a selected route leads to the route failure. In order to reduce this problem we consider PRD-based MMBCR and considering the percentage of the optimum value for periodic route discovery. In our research we are going to analyze the performance of different routing protocols like DSR, MMBCR to get maximum optimum value using Network Simulator Software.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to Comparative analysis of manet reactive protocols (20)
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
2. International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
24
transmission range or it can forward its information to the other node that will act as an
intermediate node. The network is decentralized as all the network activities for example
discovering the topologies and delivering messages must be executed by the nodes
themselves. Therefore routing is necessary for the mobile nodes. Such type of networks can
be used in the environments where there is no infrastructure or setting of an infrastructure is
very expensive or the existing wired infrastructure has been destroyed by the natural calamity
,for example earthquakes, floods.
Characteristics of MANETS are:
• Nodes can act like both hosts and routers (intermediate nodes).
• Communication via radio waves.
• Limited Bandwidth.
• Less Security.
• Dynamic network topology.
Applications of MANET are:
• Emergency situations or disaster areas, where a hurricane or earthquake has destroyed
the communication infrastructure.
• Coverage area expansion of cellular networks.
• Commercial and Industrial areas where associates can share information during a
meeting and participants in a conference can exchange documents or presentations.
• Inter-vehicle communication.
• Sensor Networks represent a special kind of ad hoc networks that consist of nodes
having sensing communication and processing abilities.
Properties of MANET Routing protocols are:
• The routing protocols should be capable of using not only the bi-directional links but
also the unidirectional links that will improve the performance of routing protocols.
• The nodes in the ad-hoc network can be laptops or cell phones that are limited in
battery power so it is very important that the routing protocol has support for sleep
modes.
• The protocol should be reactive in nature that the protocol should react only when
needed and should not periodically broadcast information This minimize the control
overhead in the network and prevent misuse of the network resources.
• The protocol should be distributed that is it should not be dependent on any
centralized controlling system. The nodes in an ad-hoc network are mobile in nature
so they can enter or leave the network any time causing partitions.
• The radio environment is especially vulnerable to attacks so some sort of security
measures should be followed like Authentication and encryption.
• The routes used for communication should be loop free. This avoids any misuse of
bandwidth and improves the overall performance.
• Multiple routes can be used to reduce the number of reactions to topological changes
and congestion. If one route becomes invalid, it is possible that another route can be
used.
• The routing protocols should incorporate Quality of service that helps to find where
these networks can be used for example for real time traffic support.
3. International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
25
II ROUTING PROTOCOLS
Ad-hoc networks have routing protocols that can be classified into two categories:
Proactive/table-driven
Reactive/on-demand.
Fig 2: Type of Routing Protocols
A. Proactive Protocol
Proactive protocols are also known as table-driven protocols. These protocols always
maintain routes between every host that means there is a regular exchange of network
topology packets between the nodes of the network. So there is a minimal delay in
determining which route should to be taken. These protocols consume bandwidth to keep
routes up-to-date and also maintain routes which may never be used. The increased mobility
in the network causes traffic overhead. If the nodes transmit packets infrequently then the
routing information is considered redundant.
Proactive protocols are most suitable in the networks that have low node mobility and where
the nodes transmit data frequently. Examples of Proactive Protocols are: Optimized Link
State Routing (OLSR), Fish-eye State Routing (FSR), Destination-Sequenced Distance
Vector (DSDV), and Cluster-head Gateway Switch Routing Protocol (CGSR).
B. Reactive Protocol
Reactive routing protocols are also known as on-demand routing protocols as they are
used whenever a communication is requested. Firstly, Source node checks its route cache if
there is a route available from source to destination and if the route is not available then it
initiates route discovery process.
The reactive routing protocols perform two functions:
Route discovery: In this the source node initiates a route discovery process on demand basis.
A source node then sees its route cache for the available route and if the route from source to
destination is not present then it initiates a route discovery process. The packet includes the
destination address of the node as well as address of the intermediate nodes to the destination.
Route maintenance: Due to dynamic topology of the ad hoc networks, route failures
between the nodes are more frequent that arises due to link breakage between the nodes.
Route maintenance is done to avoid this problem by using an acknowledgement mechanism.
Examples of Reactive protocols are Dynamic Source Routing (DSR) and Ad-hoc on- demand
distance vector (AODV).
4. International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
26
III.AD HOC ON-DEMAND DISTANCE VECTOR (AODV)
Ad hoc On-Demand Distance Vector (AODV) routing is a reactive routing protocol for
mobile ad hoc networks. It is an on-demand and distance-vector routing protocol that is a
route is established by AODV from a destination only on demand. AODV routing protocol is
capable of both unicast and multicast routing. It keeps the routes in the routing table as long
as they are needed by the source nodes. AODV generates a tree or trees are composed of the
group members and the nodes that are needed to connect their members. AODV uses
destination sequence numbers to ensure the freshness of routes. Its operations are loop-free.
AODV can also scales to large numbers of mobile nodes.
Each mobile node in the network maintains a route table entry for each destination in its route
table.
• Number of hops (Hop count)
• Destination sequence number
• Destination IP address
• Active neighbors for this route
• Lifetime (Expiration time of the route)
• Next hop
When a node suppose S wants to communicate with another node suppose D, then it initiates
route discovery process by broadcasting a Route Request packet (RREQ) to its neighbors. If
the neighbor node has a route to the destination then it replies with a route reply packet,
otherwise it broadcast the route request packet to all its neighbors and some packets reach to
the destination D.
When the Route Reply (RREP) is generated, it reaches back to the source node, based
on the reverse path. Each node along this path sets a forward pointer to the node and records
the latest destination sequence number.
The RREQ has the following fields:
• Source address
• Source sequence number used to maintain freshness info about the route to the source.
• Destination address
• Destination sequence number
• Hop-count
•
Route Request (RREQ) Message Format
Type J R G D U Reserved
Hop
Count
RREQ ID
Destination IP Address
Destination Sequence Number
Source IP Address
Source Sequence Number
5. International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
27
The Route Request message includes the following fields:
Type 1
J Join flag, reserved for multicast
R Repair flag, reserved for multicast
G Gratuitous RREP flag
D Destination only flag, idicates that destination can respond to this RREQ.
U Unknown sequence number indicates that destination sequence number is
unknown.
Reserved Sent as 0.
Hop Count Number of hops from Source to the node handling the request.
A. Advantages and Disadvantages
The main advantage of AODV protocol is that AODV established routes on demand
basis and uses destination sequence numbers to find the latest route to the destination. The
connection setup delay is also less in AODV. The HELLO messages used in AODV that
supports the routes maintenance are range-limited so they do not cause unnecessary overhead
in the network. AODV are well suited for large networks.
A disadvantage of this protocol is that intermediate nodes can lead to inconsistent routes
if the sequence number is very old and the intermediate nodes have a higher but not the latest
destination sequence number. Multiple Route Reply messages in response to a single Route
Request packet can lead to heavy control overhead. The periodic HELLO message leads to
gratuitous bandwidth consumption.
IV Dynamic Source Routing (DSR)
Dynamic Source Routing (DSR) is also a reactive routing protocol for ad hoc networks.
It is similar to AODV as it establishes a route on-demand. It uses source routing instead of
relying on the routing table at each intermediate node. Dynamic source routing protocol is an
on-demand, source routing protocol, where all the routing information is maintained at
mobile nodes. Every node contains a route cache. Each entry in route cache specifies the
intermediate nodes to a destination. The route cache is used to respond to RREQs even if it is
not the destination. The route cache is always updated when it learns a new route. The entries
from the route cache are removed only when a node receives an RERR.
DSR allows the network to be self-organizing and self-configuring without the need for
any existing infrastructure. The protocol is based on two main mechanisms: Route Discovery
and Route Maintenance.
In Route discovery the source node floods the network with RREQ packets. The RREQ
contain the source and destination address and also the unique identity of the request. When a
node receives an RREQ and if it is the destination then it responds back with an RREP
containing the route from the source to the destination required, if not the node appends its
own address to the RREQ header and rebroadcasts the RREQ to all its neighbour nodes. But
a node that is not the destination receives the RREQ and contains a route to the destination
may send an RREP. Upon receiving the RREP packet the source node records the route
indicated in RREP in its route cache.
A shortest path for the communication between a source node and destination node is
determined by Route Discovery process. Route Maintenance mechanism ensures that the
6. International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
28
communication path remains loop-free according the change in network conditions. Route
Reply is generated only in the case if the message has reached the destination node.
A. Advantages and Disadvantages
DSR uses a reactive approach which eliminates the need to periodically flooding the
network with update messages which are required in a table-driven approach. The
intermediate node utilizes the route cache information efficiently to reduce the control
overhead. DSR has information of multiple routes.
The disadvantage of DSR is that it is not suitable for large networks and the route
maintenance mechanism does not repair a broken link. The performance of DSR degrades
rapidly with increasing mobility. Routing overhead is involved due to the source-routing
mechanism used in DSR.
V.COMPARISON BETWEEN AODV AND DSR
TABLE I
Sr.
No.
AODV DSR
1. It uses table-driven routing. It uses source routing.
2. It delivers virtually all
packets at low mobility.
It is very good at all mobility rates.
3. It has low end to end delay.
4. AODV uses one route per
destination.
DSR uses routing cache aggressively,
and maintains multiple routes per
destination.
5. For real time traffic AODV
is preferred.
6. It is more conservative as
the fresher route is always
chosen.
DSR does not have any explicit
mechanism to expire stale routes in the
cache.
7. It outperforms DSR in more
stress situations (more load,
higher mobility.
It outperforms AODV in less stressful
situations (smaller # of nodes and
lower load and/or mobility).
7. International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
29
CONCLUSION
In this paper an effort has been made on the theoretical study of mobile ad hoc network
routing protocols. There are mainly two types of routing protocols: Proactive and Reactive
routing protocols. Various advantages and disadvantages of these protocols are also included
in this. There are various shortcomings in different routing protocols and it is very difficult to
choose a right routing protocol for a particular situation as there are tradeoffs between various
protocols.
ACKNOWLEDGMENT
I WOULD LIKE TO THANK MRS. RITU SALUJA AND MANAV RACHNA COLLEGE OF ENGG. FOR
THEIR SUPPORT AND GUIDANCE
REFERENCES
[1] S .Taneja, A.Kush, A.Makkar, “Experimental analysis of DSR and AODV using
speed and pause time”, International Journal of Innovation, Management and
Technology, Vol. 1, No. 5, December 2010.
[2] C.E, E.M. Royer and S.R. Das, “Performance comparison of two on-demand routing
protocols for Ad hoc networks”, IEEE Personal Communications Magazine, 8: 16-28,
2001.
[3] G.Kaur, “Performance Analysis of AODV routing protocol in Manets”,
International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.08
August 2012.
[4] T.Singh, S.Dua, V.Das, “Energy-Efficient Routing Protocols In Mobile Ad-Hoc
Networks”, International Journal of Advanced Research in Computer Science and
Software Engineering, Volume 2, Issue 1, January 2012.
[5] D.Maltz, J.Broch, J.Jetcheva, D.Johnson. The effects of on-demand behavior in
routing protocols for multihop wireless ad hoc networks IEEE Journal on Selected
Areas in Communication, 1999
[6] Poonam Thakur, M.Vijaya Raju, “survey on routing techniques for Manets and
Wireless sensor networks: a comparison” international journal of computer
engineering & technology (ijcet) Volume 4, Issue 1, January -February2013.
[7] Sunita Kushwaha, Bhavna Narain, Deepti Verma, Sanjay kumar, “effect of scenario
environment on the performance of Manets routing protocol: aodv” international
journal of computer engineering & technology (ijcet) Volume 2, Issue 1, January-
April 2011.
[8] Shah Vrutik, Dr.Nilesh Modi, Patani Ashwin, “aodvgap-an acknowledgment based
approach to mitigate selective forwarding attacks in Manet” international journal of
computer engineering& technology (ijcet) Volume 3, Issue 2, July-September
2010.