SlideShare a Scribd company logo
1 of 5
Download to read offline
Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91
www.ijera.com 87 | P a g e
Performance Evalution Of Reactive & Proactive Routing
Protocols For Vehicular Adhoc–Networks With Varying Speed
Of Nodes
Piyush Chouhan1
, Shivani Shukla2
, Manish Sharma3
Student, SIMS, Asst. Professor, SIMS, Asst. Professor, SIMS
ABSTRACT-
Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today,
Vehicular ad-hoc networks (VANETs) are considered to be the special application of infrastructure-less wireless
Mobile ad-hoc network (MANET). In VANET networks, vehicles are used as nodes. The main concern for
establishment of communication between vehicles is that very high speed as compared to other MANET
Technologies as well as the Density in URBAN areas. In this paper Creation of VANET Scenario for NS-2 and
then to analyze Different routing protocols with the use of various performance matrices Like Packet Delivery
Ratio, End to End delay and Overall Throughput. This work firstly created scenario file for IEEE 802.11p
standard which has to be used along with TCL Script than created a TCL script consist of various routing
protocols which are AODV and DSR than a particular VANET scenario or topology it consist of 44 movable
and static nodes with two ray ground model and various speed of i.e. 20m/sec, 40m/sec & 60m/sec, the total
environment size taken is of 2 KM.
Keywords: VANET, AODV, DSR, Network Simulator-2.35 (NS-2.35)
I. INTRODUCTION
An ad hoc network is a group of wireless
mobile host forming a temporary network without the
aid of any demonstrated infrastructure or consolidates
direction. In such a scenario, it may be required for
one mobile host to enlist the aid of other hosts in
forwarding a packet to its destination, due to the
limited area of each mobile host’s wireless
transmissions [1]. Mobile ad hoc network (MANET)
is the branch of the ad hoc network where as
Vehicular ad hoc network is the sub branch of
MANET.
A vehicular ad hoc network (VANET) is a
technology which utilizes moving cars as nodes in a
network to generate a mobile network. VANET
revolve every participating car into a wireless router
or node rather than moving in arbitrary fashion,
vehicles tend to move in a coordinated fashion.
VANET offers several benefits to management of
any size.
The communication area which is related
with the scope of this approach is a proceeding and
stimulating application of an ad-hoc network where
vehicles are separate as nodes. This area has certain
guaranteed aspects and activities to be granted, which
are largely related with the security, convenience and
entertainment topics. Vehicular ad hoc networks
(VANETs) represent a rapidly emerging and
challenging class of mobile ad hoc networks
(MANETs). In such networks, each node operates not
only as a host but also as a router; promote packets
for other mobile nodes [3]. Communication between
vehicles by means of wireless technology has a large
potential to improve traffic safety and travel comfort
of drivers and passengers [4]. IEEE 802.11p standard
is integrated in vehicular communication.
II. WIRELESS AD-HOC NETWORK
A wireless ad-hoc network is a distributed
type of wireless network. The network is ad
hoc because it does not rely on a preceding
infrastructure, such as routers in wired networks
or access points in managed (infrastructure) wireless
networks. Instead, each node engaged in routing by
forwarding data for other nodes, and so the
persistence of which nodes forward data is made
dynamically based on the network relatedness. In
addition to the classic routing, ad hoc networks can
use flooding for forwarding the data.
An ad hoc network frequently refers to any
set of networks where all devices have equal
consequence on a network and are free to accomplice
with any other ad hoc network devices in link
enclave. Very often, ad hoc network refers to a mode
of operation of IEEE 802.11 wireless networks.
RESEARCH ARTICLE OPEN ACCESS
Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91
www.ijera.com 88 | P a g e
A. TYPES OF WIRELESS AD HOC NETWORKS
Wireless ad hoc networks can be classified by their
application:
 Mobile ad-hoc networks (MANET).
 Wireless mesh networks (WMN).
 Wireless sensor networks (WSN)
III. VEHICULAR AD-HOC NETWORK
(VANET)
Vehicular ad hoc networks (VANETs)
represent a rapidly emerging and challenging class of
mobile ad hoc networks (MANETs). In such
networks, each node operates not only as a host but
also as a router; promote packets for other mobile
nodes [3]. Communication between vehicles by
means of wireless technology has a large potential to
improve traffic safety and travel comfort for drivers
and passengers [4].
VANET, being an infrastructure-less
networks, nodes will be expected to cooperate to
perform essential networking tasks such as routing
[5]. Vehicular ad-hoc network (VANET) is a
technology that uses moving cars as nodes in a
network to create a mobile network. VANET turns
every perform car into a wireless router or node.
VANET offers several prosperities to grouping of
any size. While such a network does pose certain
security concerns (for example, one cannot secure
type an email while driving), this does not limit
VANET’s possible as a productivity
tool. GPS and navigation systems can prosperity, as
they can be unified with traffic reports to provide the
fastest route to work [6]. In order to provide network-
wide connectivity, nodes in a VANET are expected
to route data packets on behalf of other nodes in the
network that want to reach nodes out of their
transmission range [5].
A. VANET AND SAFETY
A major intended uses for VANET regards
safety. If a car spots an unsafe road situation, such as
black ice, it transmits the report to cars behind it that
might be heading in the direction of the danger. A
major research area is how to govern such dispense
of data. It should not be transmitted to cars that are
driving away from the danger or to cars on the other
side of town. This is the kind of problem that needs
to be addressed when choosing the protocol that will
be used. The protocol will need to invisibly protect
the necessary data is transmitted but should also help
prevent information overload [6].
IV. VANET ROUTING PROTOCOLS
Wireless protocol companies are analyzing
with VANET. This includes all the IEEE protocols,
Bluetooth, Integrated Resource Analyses (IRA) and
Wi-Fi. There are also VANET analyzes using cellular
and satellite technologies. Dedicated Short Range
Communications (DSRC) is a protocol that has been
specifically for use with VANET [13].
A. AD HOC ON DEMAND DISTANCE VECTOR
(AODV)
A node running Ad-hoc on demand distance
vector (AODV) initiates a route discovery process
only when it has data packets to send and it does not
know any route to the destination node that is route
discovery AODV is on-demand [14].
During a route detection process, the source
node broadcasts a route query packet to its neighbors.
If any of the neighbors has a route to the destination
it replies to the query with a route reply packet;
otherwise, the neighbors rebroadcast the route inquiry
packet. Finally some query packets reach the
destination or nodes that know route to the
destination. At that time, a reply packet is composed
and transmitted tracing back the route traversed by
the inquiry packet. To handle the case in which a
route does not exist or the inquiry or reply packets
are lost, the source node rebroadcasts the query
packet if no reply is received by the source after a
time-out [14].
A path maintenance process is used by
AODV to monitor the operation of a route being
used. If a source node receives the notification of
broken link, it can re-initiate the route discovery
processes to find a new route to the destination. If a
destination or an intermediate node detects a broken
link, it sends special messages to the affected source
node [14].
AODV uses a routing table to specify
distances to destinations. It uses string numbers
maintained at each destination to determine the
freshness of routing information and to prevent
routing loops [15].
B. DYNAMIC SOURCE ROUTING (DSR)
The Dynamic Source Routing Protocol
(DSR) is one of the most reliable and effective
protocols in the VANET. DSR adopts a similar on-
demand approach as AODV regarding the route
discovery and maintenance processes. A fundamental
difference of DSR from AODV and other on demand
protocols is the use of source routing, where the
source node indicates the complete sequence of
intermediate nodes for each data packet to reach its
destination. The source-route information is
contained by the header of the data packet. The
protection of source routing is that no additional
mechanism is needed to detect routing curve. The
obvious disadvantage is that data packets must carry
source routes. The data structure DSR uses to store
routing information is route cache, with each cache
entry storing one exact route from the source to a
Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91
www.ijera.com 89 | P a g e
destination. DSR makes very aggressive use of the
source routing information [14].
V. IMPLEMENTATION AND RESULTS
In this paper implemented work i.e.
Creation of VANET Scenario for NS-2 and then to
analyze Different routing protocols with the use of
various performance matrices Like Packet Delivery
Ratio, End to End delay and Overall Throughput.
Simulation Parameters:-
Simulation TOOL Network Simulator-2.35
IEEE Scenario VANET(802.11p)
Mobility Model Two Ray Ground
No. Of Nodes 44
Node Movement speed 20,40,60 m/sec.
Traffic Type TCP
Antenna Omni Directional
Antenna
MAC Layer IEEE 802.11p
Routing Protocols AODV, DSR
Queue Limit 50 packets
Simulation Area(in
meter)
2000*2000
Queue type Droptail, CMUPriqueue
Channel Wireless Channel
Simulation Time 10,20,30,40,50 sec.
Table-1 Simulation Scenario
Performance Matrices:-
For our work to be done successfully we have used
VANET scenario with varying speed and time of 20,
40, 60 meter/sec and 10, 20, 30, 40, 50 seconds
respectively under dynamic scenario using two
routing protocols. We have reached to the results
with the help of various performance matrices for
now we have used following performance matrices.
 Packet Delivery Ratio
 End to End Delay
 Throughput
Packet Delivery Ratio:-
This is the fraction of the data packets generated by
the CBR sources to those delivered to the destination.
This evaluates the ability of the protocol to discover
routes.
Packet Delivery Ratio in percent (%) for the speed
of 20m/sec: Table-1 shows the PDR under routing
protocols i.e. AODV and DSR for the mobility of
20m/sec.
AODV DSR
10sec 68.080 59.300
20sec 81.960 87.810
30sec 82.300 92.490
40sec 84.790 93.860
50sec 84.410 94.450
Table–2 Packet Delivery Ratio in percent (%) for the
speed of 20m/sec
Packet Delivery Ratio in percent (%) for the speed
of 40m/sec: Table-2 shows the PDR under routing
protocols i.e. AODV and DSR for the mobility of
40m/sec.
AODV DSR
10sec 80.880 88.290
20sec 84.380 92.710
30sec 87.130 94.530
40sec 88.260 95.140
50sec 87.440 95.550
Table–3 Packet Delivery Ratio in percent (%) for the
speed of 40m/sec
Packet Delivery Ratio in percent (%) for the speed
of 60m/sec: Table-3 shows the PDR under routing
protocols i.e. AODV and DSR for the mobility of
60m/sec.
AODV DSR
10sec 83.080 89.250
20sec 84.510 92.950
30sec 86.010 94.340
40sec 86.710 95.310
50sec 87.460 95.850
Table-4 Packet Delivery Ratio in percent (%) for the
speed of 60m/sec
Analysis of Packet Delivery Ratio:-
From the above Table 2, 3, 4 it is clear that
the packet delivery ratio which is having the unit in
Percentage (%) the table which has been drawn for
AODV and DSR protocols for the time of
10,20,30,40,50 seconds. We can analyze from above
result that DSR routing protocol is much better for all
the scenarios weather the movement of the nodes are
slow or fast as compare to AODV protocol.
End to End Delay:-
This is the average delay between the sending of the
data packet by the CBR source and its receipt at the
corresponding CBR receiver. This includes all the
Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91
www.ijera.com 90 | P a g e
delays caused during route acquisition, buffering and
processing at intermediate nodes.
End to End Delay in ms for the node mobility of
20m/sec: Table-4 shows the End to End Delay under
various routing protocols i.e. AODV and DSR for the
mobility of 20m/sec.
AODV DSR
10sec 180.848 513.575
20sec 242.749 476.694
30sec 243.851 480.152
40sec 243.686 459.282
50sec 244.279 451.569
Table–5 End to End Delay in ms for the node
mobility of 20m/sec
End to End Delay in ms for the node mobility of
40m/sec: Table-5 shows the End to End Delay under
routing protocols i.e. AODV and DSR for the
mobility of 40m/sec.
AODV DSR
10sec 193.722 338.790
20sec 232.242 441.381
30sec 240.311 439.006
40sec 243.901 435.283
50sec 243.406 436.571
Table–6 End to End Delay in ms for the node
mobility of 40m/sec
End to End Delay in ms for the node mobility of
60m/sec: Table-6 shows the End to End Delay under
routing protocols i.e. AODV and DSR for the
mobility of 60m/sec.
AODV DSR
10sec 284.052 408.612
20sec 246.470 433.004
30sec 287.652 433.619
40sec 292.389 442.214
50sec 306.110 445.160
Table–7 End to End Delay in ms for the node
mobility of 60m/sec
Analysis of End to End Delay:-
End to End delay which is the extra time taken by the
packet to reach towards its destination is analyzed in
above table 5, 6, 7 it is quite clear that DSR protocol
is having maximum end to end delay than protocol
has minimum end to end delay for all the mobility
cases of 20m/sec, 40m/sec & 60m/sec. But if we
consider the timeliness property for the fast
communication than the delay must be less.
Throughput:-
There are two representations of throughput; one is
the amount of data transferred over the period of time
expressed in kilobits per second (Kbps). The other is
the packet delivery percentage obtained from a ratio
of the number of data packets sent and the number of
data packets received.
Overall Throughput for the node mobility of
20m/sec: Table-13 shows the Throughput under
routing protocols i.e. AODV and DSR for the
mobility of 20m/sec.
AODV DSR
10sec 217.890 106.730
20sec 458.550 387.010
30sec 534.390 477.950
40sec 592.160 543.100
50sec 627.490 580.640
Table-8 Overall Throughput for the node mobility
of 20m/sec
Overall Throughput for the node mobility of
40m/sec: Table-14 shows the Throughput under
routing protocols i.e. AODV and DSR for the
mobility of 40m/sec.
AODV DSR
10sec 236.270 223.180
20sec 468.440 464.140
30sec 572.690 550.000
40sec 624.930 598.290
50sec 654.00 824.090
Table-9 Overall Throughput for the node mobility of
40m/sec
Overall Throughput for the node mobility of
60m/sec: Table-15 shows the Throughput under
routing protocols i.e. AODV and DSR for the
mobility of 60m/sec.
AODV DSR
10sec 241.950 226.900
20sec 439.940 491.000
30sec 519.770 571.470
40sec 561.620 608.990
50sec 574.450 628.270
Table-10 Overall Throughput for the node mobility
of 60m/sec
Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91
www.ijera.com 91 | P a g e
Analysis of Throughput:-
Throughput which is the speed of data
transfer from source to destination can be analyzed
from above figures which implies that for high speed
scenario throughput of DSR Routing protocol is
better as compare to AODV but for moderate or slow
speed scenario DSR does not have better throughput
for those cases AODV protocol is having better
throughput refer table 8, 9, 10.
VI. CONCLUSION
From all the above analysis done so far
conclude that for different performance matrices
different cases has been observed DSR routing
protocol is having Very good PDR as compared with
AODV. If conclude relatively as PDR is directly
proportional to Throughput but inversely proportional
to End to End Delay thus from this analysis it has
been proved.
REFERENCES
[1] David B. Johnson and David A. Maltz “Dynamic
Source Routing in Ad Hoc Wireless Networks” A
version of this paper will appear as a chapter in the
book Mobile Computing, edited by Tomasz Imielinski
and Hank Korth, Kluwer Academic Publishers, 1996.
[2] Christian Lochert, Hannes Hartenstein, Jing Tian,
Holger Füßler, Dagmar Hermann and Martin Mauve
“A Routing Strategy for Vehicular Ad Hoc Networks
in City Environments” IEEE Transactions On
Vehicular Technology, vol. 59, no.2 february 2010
[3] Schoch, and Ulm Kargl, F.Weber,M. Leinmuller, T.
“Communication patterns in VANETs” IEEE Volume:
46 , Issue: 11 Page(s): 119- 125,Dated on Nover 2008.
[4] Yan-Bo Wang Dept. of Electr. Eng., Tamkang Univ.,
Tamsui, Taiwan Tin-Yu Wu, Wei-Tsong Lee, Chih-
Heng Ke “A Novel Geographic Routing Strategy over
VANET” Advanced Information Networking and
Applications Workshops (WAINA), 2010 IEEE 24th
International Conference on Page(s): 873- 879.
[5] Suriyapaibonwattana, K. Fac. King Mongkut's, C.
Pomavalai, “An Effective Safety Alert Broadcast
Algorithm for VANET” Communications and
Information Technologies, 2008, ISCIT 2008 pages
247-250.
[6] Sommer, and C. Dressler “Progressing toward realistic
mobility models in VANET simulations” IEEE
Volume:46, Issue: 11 pages 132-137. [7] Hanan
Saleet, Otman Basir, Rami Langar, and Raouf Boutaba
“Region-Based Location-Service-Management
Protocol for VANETs” IEEE Transactions On
Vehicular Technology, vol. 59, no.2 february 2010 pp.
917-931
[8] Monika, Sanjay Batish and Amardeep Singh, “Border-
node based Movement Aware Routing Protocol”
International Journal of Computer Science and
Informatics ISSN Vol-1, Iss-4, 2012, pp. 2231 –5292
[9] Udit Agarwal and Monika Saxena “Comparative and
Behavioral Study of Various Routing Protocols in
VANET” International Journal of Advanced Research
in Computer Science and Software Engineering 3(10),
October - 2013, pp. 769-773
[10] Sanjay N. Kandekar and Ashwini kumar Dhande,
“Issues and future developments in Ad hoc Routing
Protocols in VENET” International Multidisciplinary e
–Journal / pages (92-102).
[11] P.Senthilkumar, M.Baskar and K.Saravanan, “A Study
on Mobile AD-HOCK Network (MANETS)” Journal
of Management and Science, Vol. 1, No.1, Sep 2011,
pp. 16-22
[12] Meenakshi ,Vinod Kumar Mishra and Kuber Singh,
“Simulation & Performance Analysis of Proactive,
Reactive & Hybrid Routing Protocols in MANET”
IJARCSSE Volume 2, Issue 7,July2012.
[13] Kapil Kumar Shah,Dr.Pankaj Dashore, Oriental
University “Performance Analysis of Reactive &
Proactive Routing Protocols for Mobile AD HOC
Network” IJARCSSE Volume 3, Issue 10, October
2013 pp. 1087-1093.
[14] Neelam Chauhan and Paramjeet Singh “Simulation of
DSDV Protocol” Special Issue of IJCCT, Volume- 3,
Issue-1
[15] M.Shahaya Sheela, A.Sivanantha Raja and V.R.Sarma
Dhulipala “Parametric Analysis of Mobile Ad-Hoc
Network Environment” International Journal of
Computer Applications Volume 9– No.9, November
2010 pages 33-36
[16] Charles E. Perkins and Pravin Bhagwat “Highly
Dynamic Destination-Sequenced Distance-Vector
Routing (DSDV) for Mobile Computers” SIGCOMM
94 -8/94 London England UK @ 1994 ACM 0-89791 -
682-4/94/0008.
[17] Teressa Longjam and Neha Bagoria “Comparative
Study of Destination Sequenced Distance Vector and
Ad-hoc On-demand Distance Vector Routing Protocol
of Mobile Ad-hoc Network” International Journal of
Scientific and Research Publications, Volume 3, Issue
2, February 2013
[18] Hemanth Narra, Yufei Cheng, Egemen K. Cetinkaya,
Justin P. Rohrer and James P.G. Sterbenz “Detination-
Sequenced Distance Vector (DSDV) Routing Protocol
Implementation in NS-3” WNS-3 2011, March 21,
Barcelona, Spain 2011,March 21.
[19] Naigende Duncan and Btulega Tonny Eddie “An
Energy-Efficient Dynamic Source Routing Protocol for
Mobile Ad Hoc Networks” International Journal of
Computing and ICT Research, Vol.6, Issue 2,
December 2012. pp. 23-32.
[20] Jerry Toung, Raymond Gilstrap and Kenneth Freeman
“A Split Implementation of the Dynamic Source
Routing Protocol for Lunar/Planetary Surface
Communications” IEEEAC, Version 4, Updated Dec.
12 2005.
[21] Khalid Haseeb, Dr.Muhammad Arshad, Dr.Shazia
Yasin and Naveed Abbas “A Survey of VANET’s
Authentication” IEEE Wireless Communications
Magazine, Special Issue on Inter-Vehicular
Communications, October 2006.
[22] Mingliu Zhang and Richard S. Wolff “Routing
Protocols for Vehicular Ad Hoc Networks in Rural
Areas” International Journal of Scientific and
Research Publications, Volume 3, Issue 2, February
2013.

More Related Content

What's hot

Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprjpublications
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...INFOGAIN PUBLICATION
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsabhijit parmar
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanetBroadcasting routing protocols in vanet
Broadcasting routing protocols in vanetAlexander Decker
 
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanetAlexander Decker
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
ASR-FANET: An adaptive SDN-based routing framework for FANET
ASR-FANET: An adaptive SDN-based routing framework for FANET ASR-FANET: An adaptive SDN-based routing framework for FANET
ASR-FANET: An adaptive SDN-based routing framework for FANET IJECEIAES
 

What's hot (16)

Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Mane ts
Mane tsMane ts
Mane ts
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETs
 
Sub1565
Sub1565Sub1565
Sub1565
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanetBroadcasting routing protocols in vanet
Broadcasting routing protocols in vanet
 
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
ASR-FANET: An adaptive SDN-based routing framework for FANET
ASR-FANET: An adaptive SDN-based routing framework for FANET ASR-FANET: An adaptive SDN-based routing framework for FANET
ASR-FANET: An adaptive SDN-based routing framework for FANET
 

Viewers also liked

Smau Roma 2012 Mob App Camp put social in your app
Smau Roma 2012 Mob App Camp put social in your appSmau Roma 2012 Mob App Camp put social in your app
Smau Roma 2012 Mob App Camp put social in your appSMAU
 
Exponer el conocimiento metodología pacie l rosales delgado
Exponer el conocimiento metodología pacie l rosales delgadoExponer el conocimiento metodología pacie l rosales delgado
Exponer el conocimiento metodología pacie l rosales delgadoluisrosales
 
Fantasy art by regan kabecek (catherine) (fil eminimizer)
Fantasy art by regan kabecek (catherine) (fil eminimizer)Fantasy art by regan kabecek (catherine) (fil eminimizer)
Fantasy art by regan kabecek (catherine) (fil eminimizer)Catherine Dewilde
 
俄羅斯攝影
俄羅斯攝影俄羅斯攝影
俄羅斯攝影Jaing Lai
 
美如天堂
美如天堂美如天堂
美如天堂Jaing Lai
 
Osinimigosdesencarnadosesuaacaocontraosgruposespiritas 121216064833-phpapp02
Osinimigosdesencarnadosesuaacaocontraosgruposespiritas 121216064833-phpapp02Osinimigosdesencarnadosesuaacaocontraosgruposespiritas 121216064833-phpapp02
Osinimigosdesencarnadosesuaacaocontraosgruposespiritas 121216064833-phpapp02Alcides lambiasi
 
俄國人怎麼過冬天Winter in russia
俄國人怎麼過冬天Winter in russia俄國人怎麼過冬天Winter in russia
俄國人怎麼過冬天Winter in russiaJaing Lai
 
CANNULATION AND VENEPUNCTURE
CANNULATION AND VENEPUNCTURECANNULATION AND VENEPUNCTURE
CANNULATION AND VENEPUNCTUREEmily Bishop
 
Joanna sierko filipowska
Joanna sierko filipowskaJoanna sierko filipowska
Joanna sierko filipowskaLorian
 
邏輯代數學
邏輯代數學邏輯代數學
邏輯代數學Jaing Lai
 
05 floor expansion joints (metal+flexible insert)
05   floor expansion joints (metal+flexible insert)05   floor expansion joints (metal+flexible insert)
05 floor expansion joints (metal+flexible insert)REDA SRL
 
Lo mejor del 2010 programas descargas gratis
Lo mejor del 2010 programas descargas gratisLo mejor del 2010 programas descargas gratis
Lo mejor del 2010 programas descargas gratisJFKSOFT CORP.
 
Por qué llego a necesitar insulina. lina ometepec guerrero
Por qué llego a necesitar insulina. lina ometepec guerreroPor qué llego a necesitar insulina. lina ometepec guerrero
Por qué llego a necesitar insulina. lina ometepec guerreroClinicas de Diabetes en Guerrero
 
Semente – o que é isso.pptx
Semente – o que é isso.pptxSemente – o que é isso.pptx
Semente – o que é isso.pptxSandra Regina
 
Projectile Motion Problems
Projectile Motion ProblemsProjectile Motion Problems
Projectile Motion ProblemsJan Parker
 
Outra vez, é natal
Outra vez, é natalOutra vez, é natal
Outra vez, é natalHelio Cruz
 

Viewers also liked (20)

Smau Roma 2012 Mob App Camp put social in your app
Smau Roma 2012 Mob App Camp put social in your appSmau Roma 2012 Mob App Camp put social in your app
Smau Roma 2012 Mob App Camp put social in your app
 
Exponer el conocimiento metodología pacie l rosales delgado
Exponer el conocimiento metodología pacie l rosales delgadoExponer el conocimiento metodología pacie l rosales delgado
Exponer el conocimiento metodología pacie l rosales delgado
 
Fantasy art by regan kabecek (catherine) (fil eminimizer)
Fantasy art by regan kabecek (catherine) (fil eminimizer)Fantasy art by regan kabecek (catherine) (fil eminimizer)
Fantasy art by regan kabecek (catherine) (fil eminimizer)
 
慧悟
慧悟慧悟
慧悟
 
俄羅斯攝影
俄羅斯攝影俄羅斯攝影
俄羅斯攝影
 
鞋趣
鞋趣鞋趣
鞋趣
 
美如天堂
美如天堂美如天堂
美如天堂
 
Osinimigosdesencarnadosesuaacaocontraosgruposespiritas 121216064833-phpapp02
Osinimigosdesencarnadosesuaacaocontraosgruposespiritas 121216064833-phpapp02Osinimigosdesencarnadosesuaacaocontraosgruposespiritas 121216064833-phpapp02
Osinimigosdesencarnadosesuaacaocontraosgruposespiritas 121216064833-phpapp02
 
俄國人怎麼過冬天Winter in russia
俄國人怎麼過冬天Winter in russia俄國人怎麼過冬天Winter in russia
俄國人怎麼過冬天Winter in russia
 
Mecanico de lujo
Mecanico de lujoMecanico de lujo
Mecanico de lujo
 
CANNULATION AND VENEPUNCTURE
CANNULATION AND VENEPUNCTURECANNULATION AND VENEPUNCTURE
CANNULATION AND VENEPUNCTURE
 
Joanna sierko filipowska
Joanna sierko filipowskaJoanna sierko filipowska
Joanna sierko filipowska
 
邏輯代數學
邏輯代數學邏輯代數學
邏輯代數學
 
05 floor expansion joints (metal+flexible insert)
05   floor expansion joints (metal+flexible insert)05   floor expansion joints (metal+flexible insert)
05 floor expansion joints (metal+flexible insert)
 
DHS TOTAL ENSAMBLES
DHS TOTAL ENSAMBLESDHS TOTAL ENSAMBLES
DHS TOTAL ENSAMBLES
 
Lo mejor del 2010 programas descargas gratis
Lo mejor del 2010 programas descargas gratisLo mejor del 2010 programas descargas gratis
Lo mejor del 2010 programas descargas gratis
 
Por qué llego a necesitar insulina. lina ometepec guerrero
Por qué llego a necesitar insulina. lina ometepec guerreroPor qué llego a necesitar insulina. lina ometepec guerrero
Por qué llego a necesitar insulina. lina ometepec guerrero
 
Semente – o que é isso.pptx
Semente – o que é isso.pptxSemente – o que é isso.pptx
Semente – o que é isso.pptx
 
Projectile Motion Problems
Projectile Motion ProblemsProjectile Motion Problems
Projectile Motion Problems
 
Outra vez, é natal
Outra vez, é natalOutra vez, é natal
Outra vez, é natal
 

Similar to Q045058791

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsIJCSIS Research Publications
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANETEditor IJCATR
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksIOSR Journals
 
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...IJEEE
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...IJERA Editor
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...IJECEIAES
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Networkpaperpublications3
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 

Similar to Q045058791 (20)

Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Differential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETsDifferential Evolution Based Secured Routing Protocols for VANETs
Differential Evolution Based Secured Routing Protocols for VANETs
 
Improved greedy routing protocol for VANET
Improved greedy routing protocol for VANETImproved greedy routing protocol for VANET
Improved greedy routing protocol for VANET
 
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc NetworksMulticast Dual Arti-Q System in Vehicular Adhoc Networks
Multicast Dual Arti-Q System in Vehicular Adhoc Networks
 
Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...
 
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsEvaluation The Performance of MAODV and AODV Protocols In VANETs Models
Evaluation The Performance of MAODV and AODV Protocols In VANETs Models
 
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...Optimization of Quality of Service (QoS) framework for highway based Vehicula...
Optimization of Quality of Service (QoS) framework for highway based Vehicula...
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...Comparative study of proactive and reactive routing protocols in vehicular ad...
Comparative study of proactive and reactive routing protocols in vehicular ad...
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc NetworkDeterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
Deterministic AODV Routing Protocol for Vehicular Ad-Hoc Network
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Aodv
AodvAodv
Aodv
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Q045058791

  • 1. Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91 www.ijera.com 87 | P a g e Performance Evalution Of Reactive & Proactive Routing Protocols For Vehicular Adhoc–Networks With Varying Speed Of Nodes Piyush Chouhan1 , Shivani Shukla2 , Manish Sharma3 Student, SIMS, Asst. Professor, SIMS, Asst. Professor, SIMS ABSTRACT- Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, Vehicular ad-hoc networks (VANETs) are considered to be the special application of infrastructure-less wireless Mobile ad-hoc network (MANET). In VANET networks, vehicles are used as nodes. The main concern for establishment of communication between vehicles is that very high speed as compared to other MANET Technologies as well as the Density in URBAN areas. In this paper Creation of VANET Scenario for NS-2 and then to analyze Different routing protocols with the use of various performance matrices Like Packet Delivery Ratio, End to End delay and Overall Throughput. This work firstly created scenario file for IEEE 802.11p standard which has to be used along with TCL Script than created a TCL script consist of various routing protocols which are AODV and DSR than a particular VANET scenario or topology it consist of 44 movable and static nodes with two ray ground model and various speed of i.e. 20m/sec, 40m/sec & 60m/sec, the total environment size taken is of 2 KM. Keywords: VANET, AODV, DSR, Network Simulator-2.35 (NS-2.35) I. INTRODUCTION An ad hoc network is a group of wireless mobile host forming a temporary network without the aid of any demonstrated infrastructure or consolidates direction. In such a scenario, it may be required for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited area of each mobile host’s wireless transmissions [1]. Mobile ad hoc network (MANET) is the branch of the ad hoc network where as Vehicular ad hoc network is the sub branch of MANET. A vehicular ad hoc network (VANET) is a technology which utilizes moving cars as nodes in a network to generate a mobile network. VANET revolve every participating car into a wireless router or node rather than moving in arbitrary fashion, vehicles tend to move in a coordinated fashion. VANET offers several benefits to management of any size. The communication area which is related with the scope of this approach is a proceeding and stimulating application of an ad-hoc network where vehicles are separate as nodes. This area has certain guaranteed aspects and activities to be granted, which are largely related with the security, convenience and entertainment topics. Vehicular ad hoc networks (VANETs) represent a rapidly emerging and challenging class of mobile ad hoc networks (MANETs). In such networks, each node operates not only as a host but also as a router; promote packets for other mobile nodes [3]. Communication between vehicles by means of wireless technology has a large potential to improve traffic safety and travel comfort of drivers and passengers [4]. IEEE 802.11p standard is integrated in vehicular communication. II. WIRELESS AD-HOC NETWORK A wireless ad-hoc network is a distributed type of wireless network. The network is ad hoc because it does not rely on a preceding infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node engaged in routing by forwarding data for other nodes, and so the persistence of which nodes forward data is made dynamically based on the network relatedness. In addition to the classic routing, ad hoc networks can use flooding for forwarding the data. An ad hoc network frequently refers to any set of networks where all devices have equal consequence on a network and are free to accomplice with any other ad hoc network devices in link enclave. Very often, ad hoc network refers to a mode of operation of IEEE 802.11 wireless networks. RESEARCH ARTICLE OPEN ACCESS
  • 2. Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91 www.ijera.com 88 | P a g e A. TYPES OF WIRELESS AD HOC NETWORKS Wireless ad hoc networks can be classified by their application:  Mobile ad-hoc networks (MANET).  Wireless mesh networks (WMN).  Wireless sensor networks (WSN) III. VEHICULAR AD-HOC NETWORK (VANET) Vehicular ad hoc networks (VANETs) represent a rapidly emerging and challenging class of mobile ad hoc networks (MANETs). In such networks, each node operates not only as a host but also as a router; promote packets for other mobile nodes [3]. Communication between vehicles by means of wireless technology has a large potential to improve traffic safety and travel comfort for drivers and passengers [4]. VANET, being an infrastructure-less networks, nodes will be expected to cooperate to perform essential networking tasks such as routing [5]. Vehicular ad-hoc network (VANET) is a technology that uses moving cars as nodes in a network to create a mobile network. VANET turns every perform car into a wireless router or node. VANET offers several prosperities to grouping of any size. While such a network does pose certain security concerns (for example, one cannot secure type an email while driving), this does not limit VANET’s possible as a productivity tool. GPS and navigation systems can prosperity, as they can be unified with traffic reports to provide the fastest route to work [6]. In order to provide network- wide connectivity, nodes in a VANET are expected to route data packets on behalf of other nodes in the network that want to reach nodes out of their transmission range [5]. A. VANET AND SAFETY A major intended uses for VANET regards safety. If a car spots an unsafe road situation, such as black ice, it transmits the report to cars behind it that might be heading in the direction of the danger. A major research area is how to govern such dispense of data. It should not be transmitted to cars that are driving away from the danger or to cars on the other side of town. This is the kind of problem that needs to be addressed when choosing the protocol that will be used. The protocol will need to invisibly protect the necessary data is transmitted but should also help prevent information overload [6]. IV. VANET ROUTING PROTOCOLS Wireless protocol companies are analyzing with VANET. This includes all the IEEE protocols, Bluetooth, Integrated Resource Analyses (IRA) and Wi-Fi. There are also VANET analyzes using cellular and satellite technologies. Dedicated Short Range Communications (DSRC) is a protocol that has been specifically for use with VANET [13]. A. AD HOC ON DEMAND DISTANCE VECTOR (AODV) A node running Ad-hoc on demand distance vector (AODV) initiates a route discovery process only when it has data packets to send and it does not know any route to the destination node that is route discovery AODV is on-demand [14]. During a route detection process, the source node broadcasts a route query packet to its neighbors. If any of the neighbors has a route to the destination it replies to the query with a route reply packet; otherwise, the neighbors rebroadcast the route inquiry packet. Finally some query packets reach the destination or nodes that know route to the destination. At that time, a reply packet is composed and transmitted tracing back the route traversed by the inquiry packet. To handle the case in which a route does not exist or the inquiry or reply packets are lost, the source node rebroadcasts the query packet if no reply is received by the source after a time-out [14]. A path maintenance process is used by AODV to monitor the operation of a route being used. If a source node receives the notification of broken link, it can re-initiate the route discovery processes to find a new route to the destination. If a destination or an intermediate node detects a broken link, it sends special messages to the affected source node [14]. AODV uses a routing table to specify distances to destinations. It uses string numbers maintained at each destination to determine the freshness of routing information and to prevent routing loops [15]. B. DYNAMIC SOURCE ROUTING (DSR) The Dynamic Source Routing Protocol (DSR) is one of the most reliable and effective protocols in the VANET. DSR adopts a similar on- demand approach as AODV regarding the route discovery and maintenance processes. A fundamental difference of DSR from AODV and other on demand protocols is the use of source routing, where the source node indicates the complete sequence of intermediate nodes for each data packet to reach its destination. The source-route information is contained by the header of the data packet. The protection of source routing is that no additional mechanism is needed to detect routing curve. The obvious disadvantage is that data packets must carry source routes. The data structure DSR uses to store routing information is route cache, with each cache entry storing one exact route from the source to a
  • 3. Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91 www.ijera.com 89 | P a g e destination. DSR makes very aggressive use of the source routing information [14]. V. IMPLEMENTATION AND RESULTS In this paper implemented work i.e. Creation of VANET Scenario for NS-2 and then to analyze Different routing protocols with the use of various performance matrices Like Packet Delivery Ratio, End to End delay and Overall Throughput. Simulation Parameters:- Simulation TOOL Network Simulator-2.35 IEEE Scenario VANET(802.11p) Mobility Model Two Ray Ground No. Of Nodes 44 Node Movement speed 20,40,60 m/sec. Traffic Type TCP Antenna Omni Directional Antenna MAC Layer IEEE 802.11p Routing Protocols AODV, DSR Queue Limit 50 packets Simulation Area(in meter) 2000*2000 Queue type Droptail, CMUPriqueue Channel Wireless Channel Simulation Time 10,20,30,40,50 sec. Table-1 Simulation Scenario Performance Matrices:- For our work to be done successfully we have used VANET scenario with varying speed and time of 20, 40, 60 meter/sec and 10, 20, 30, 40, 50 seconds respectively under dynamic scenario using two routing protocols. We have reached to the results with the help of various performance matrices for now we have used following performance matrices.  Packet Delivery Ratio  End to End Delay  Throughput Packet Delivery Ratio:- This is the fraction of the data packets generated by the CBR sources to those delivered to the destination. This evaluates the ability of the protocol to discover routes. Packet Delivery Ratio in percent (%) for the speed of 20m/sec: Table-1 shows the PDR under routing protocols i.e. AODV and DSR for the mobility of 20m/sec. AODV DSR 10sec 68.080 59.300 20sec 81.960 87.810 30sec 82.300 92.490 40sec 84.790 93.860 50sec 84.410 94.450 Table–2 Packet Delivery Ratio in percent (%) for the speed of 20m/sec Packet Delivery Ratio in percent (%) for the speed of 40m/sec: Table-2 shows the PDR under routing protocols i.e. AODV and DSR for the mobility of 40m/sec. AODV DSR 10sec 80.880 88.290 20sec 84.380 92.710 30sec 87.130 94.530 40sec 88.260 95.140 50sec 87.440 95.550 Table–3 Packet Delivery Ratio in percent (%) for the speed of 40m/sec Packet Delivery Ratio in percent (%) for the speed of 60m/sec: Table-3 shows the PDR under routing protocols i.e. AODV and DSR for the mobility of 60m/sec. AODV DSR 10sec 83.080 89.250 20sec 84.510 92.950 30sec 86.010 94.340 40sec 86.710 95.310 50sec 87.460 95.850 Table-4 Packet Delivery Ratio in percent (%) for the speed of 60m/sec Analysis of Packet Delivery Ratio:- From the above Table 2, 3, 4 it is clear that the packet delivery ratio which is having the unit in Percentage (%) the table which has been drawn for AODV and DSR protocols for the time of 10,20,30,40,50 seconds. We can analyze from above result that DSR routing protocol is much better for all the scenarios weather the movement of the nodes are slow or fast as compare to AODV protocol. End to End Delay:- This is the average delay between the sending of the data packet by the CBR source and its receipt at the corresponding CBR receiver. This includes all the
  • 4. Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91 www.ijera.com 90 | P a g e delays caused during route acquisition, buffering and processing at intermediate nodes. End to End Delay in ms for the node mobility of 20m/sec: Table-4 shows the End to End Delay under various routing protocols i.e. AODV and DSR for the mobility of 20m/sec. AODV DSR 10sec 180.848 513.575 20sec 242.749 476.694 30sec 243.851 480.152 40sec 243.686 459.282 50sec 244.279 451.569 Table–5 End to End Delay in ms for the node mobility of 20m/sec End to End Delay in ms for the node mobility of 40m/sec: Table-5 shows the End to End Delay under routing protocols i.e. AODV and DSR for the mobility of 40m/sec. AODV DSR 10sec 193.722 338.790 20sec 232.242 441.381 30sec 240.311 439.006 40sec 243.901 435.283 50sec 243.406 436.571 Table–6 End to End Delay in ms for the node mobility of 40m/sec End to End Delay in ms for the node mobility of 60m/sec: Table-6 shows the End to End Delay under routing protocols i.e. AODV and DSR for the mobility of 60m/sec. AODV DSR 10sec 284.052 408.612 20sec 246.470 433.004 30sec 287.652 433.619 40sec 292.389 442.214 50sec 306.110 445.160 Table–7 End to End Delay in ms for the node mobility of 60m/sec Analysis of End to End Delay:- End to End delay which is the extra time taken by the packet to reach towards its destination is analyzed in above table 5, 6, 7 it is quite clear that DSR protocol is having maximum end to end delay than protocol has minimum end to end delay for all the mobility cases of 20m/sec, 40m/sec & 60m/sec. But if we consider the timeliness property for the fast communication than the delay must be less. Throughput:- There are two representations of throughput; one is the amount of data transferred over the period of time expressed in kilobits per second (Kbps). The other is the packet delivery percentage obtained from a ratio of the number of data packets sent and the number of data packets received. Overall Throughput for the node mobility of 20m/sec: Table-13 shows the Throughput under routing protocols i.e. AODV and DSR for the mobility of 20m/sec. AODV DSR 10sec 217.890 106.730 20sec 458.550 387.010 30sec 534.390 477.950 40sec 592.160 543.100 50sec 627.490 580.640 Table-8 Overall Throughput for the node mobility of 20m/sec Overall Throughput for the node mobility of 40m/sec: Table-14 shows the Throughput under routing protocols i.e. AODV and DSR for the mobility of 40m/sec. AODV DSR 10sec 236.270 223.180 20sec 468.440 464.140 30sec 572.690 550.000 40sec 624.930 598.290 50sec 654.00 824.090 Table-9 Overall Throughput for the node mobility of 40m/sec Overall Throughput for the node mobility of 60m/sec: Table-15 shows the Throughput under routing protocols i.e. AODV and DSR for the mobility of 60m/sec. AODV DSR 10sec 241.950 226.900 20sec 439.940 491.000 30sec 519.770 571.470 40sec 561.620 608.990 50sec 574.450 628.270 Table-10 Overall Throughput for the node mobility of 60m/sec
  • 5. Piyush Chouhan et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 5), May 2014, pp.87-91 www.ijera.com 91 | P a g e Analysis of Throughput:- Throughput which is the speed of data transfer from source to destination can be analyzed from above figures which implies that for high speed scenario throughput of DSR Routing protocol is better as compare to AODV but for moderate or slow speed scenario DSR does not have better throughput for those cases AODV protocol is having better throughput refer table 8, 9, 10. VI. CONCLUSION From all the above analysis done so far conclude that for different performance matrices different cases has been observed DSR routing protocol is having Very good PDR as compared with AODV. If conclude relatively as PDR is directly proportional to Throughput but inversely proportional to End to End Delay thus from this analysis it has been proved. REFERENCES [1] David B. Johnson and David A. Maltz “Dynamic Source Routing in Ad Hoc Wireless Networks” A version of this paper will appear as a chapter in the book Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, 1996. [2] Christian Lochert, Hannes Hartenstein, Jing Tian, Holger Füßler, Dagmar Hermann and Martin Mauve “A Routing Strategy for Vehicular Ad Hoc Networks in City Environments” IEEE Transactions On Vehicular Technology, vol. 59, no.2 february 2010 [3] Schoch, and Ulm Kargl, F.Weber,M. Leinmuller, T. “Communication patterns in VANETs” IEEE Volume: 46 , Issue: 11 Page(s): 119- 125,Dated on Nover 2008. [4] Yan-Bo Wang Dept. of Electr. Eng., Tamkang Univ., Tamsui, Taiwan Tin-Yu Wu, Wei-Tsong Lee, Chih- Heng Ke “A Novel Geographic Routing Strategy over VANET” Advanced Information Networking and Applications Workshops (WAINA), 2010 IEEE 24th International Conference on Page(s): 873- 879. [5] Suriyapaibonwattana, K. Fac. King Mongkut's, C. Pomavalai, “An Effective Safety Alert Broadcast Algorithm for VANET” Communications and Information Technologies, 2008, ISCIT 2008 pages 247-250. [6] Sommer, and C. Dressler “Progressing toward realistic mobility models in VANET simulations” IEEE Volume:46, Issue: 11 pages 132-137. [7] Hanan Saleet, Otman Basir, Rami Langar, and Raouf Boutaba “Region-Based Location-Service-Management Protocol for VANETs” IEEE Transactions On Vehicular Technology, vol. 59, no.2 february 2010 pp. 917-931 [8] Monika, Sanjay Batish and Amardeep Singh, “Border- node based Movement Aware Routing Protocol” International Journal of Computer Science and Informatics ISSN Vol-1, Iss-4, 2012, pp. 2231 –5292 [9] Udit Agarwal and Monika Saxena “Comparative and Behavioral Study of Various Routing Protocols in VANET” International Journal of Advanced Research in Computer Science and Software Engineering 3(10), October - 2013, pp. 769-773 [10] Sanjay N. Kandekar and Ashwini kumar Dhande, “Issues and future developments in Ad hoc Routing Protocols in VENET” International Multidisciplinary e –Journal / pages (92-102). [11] P.Senthilkumar, M.Baskar and K.Saravanan, “A Study on Mobile AD-HOCK Network (MANETS)” Journal of Management and Science, Vol. 1, No.1, Sep 2011, pp. 16-22 [12] Meenakshi ,Vinod Kumar Mishra and Kuber Singh, “Simulation & Performance Analysis of Proactive, Reactive & Hybrid Routing Protocols in MANET” IJARCSSE Volume 2, Issue 7,July2012. [13] Kapil Kumar Shah,Dr.Pankaj Dashore, Oriental University “Performance Analysis of Reactive & Proactive Routing Protocols for Mobile AD HOC Network” IJARCSSE Volume 3, Issue 10, October 2013 pp. 1087-1093. [14] Neelam Chauhan and Paramjeet Singh “Simulation of DSDV Protocol” Special Issue of IJCCT, Volume- 3, Issue-1 [15] M.Shahaya Sheela, A.Sivanantha Raja and V.R.Sarma Dhulipala “Parametric Analysis of Mobile Ad-Hoc Network Environment” International Journal of Computer Applications Volume 9– No.9, November 2010 pages 33-36 [16] Charles E. Perkins and Pravin Bhagwat “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers” SIGCOMM 94 -8/94 London England UK @ 1994 ACM 0-89791 - 682-4/94/0008. [17] Teressa Longjam and Neha Bagoria “Comparative Study of Destination Sequenced Distance Vector and Ad-hoc On-demand Distance Vector Routing Protocol of Mobile Ad-hoc Network” International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013 [18] Hemanth Narra, Yufei Cheng, Egemen K. Cetinkaya, Justin P. Rohrer and James P.G. Sterbenz “Detination- Sequenced Distance Vector (DSDV) Routing Protocol Implementation in NS-3” WNS-3 2011, March 21, Barcelona, Spain 2011,March 21. [19] Naigende Duncan and Btulega Tonny Eddie “An Energy-Efficient Dynamic Source Routing Protocol for Mobile Ad Hoc Networks” International Journal of Computing and ICT Research, Vol.6, Issue 2, December 2012. pp. 23-32. [20] Jerry Toung, Raymond Gilstrap and Kenneth Freeman “A Split Implementation of the Dynamic Source Routing Protocol for Lunar/Planetary Surface Communications” IEEEAC, Version 4, Updated Dec. 12 2005. [21] Khalid Haseeb, Dr.Muhammad Arshad, Dr.Shazia Yasin and Naveed Abbas “A Survey of VANET’s Authentication” IEEE Wireless Communications Magazine, Special Issue on Inter-Vehicular Communications, October 2006. [22] Mingliu Zhang and Richard S. Wolff “Routing Protocols for Vehicular Ad Hoc Networks in Rural Areas” International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013.