PERFORMANCE INVESTIGATION OF ROUTING PROTOCOLS FOR DATABASE AND VOICE DATA IN MANETS
|
|
- Vernon Manning
- 5 years ago
- Views:
Transcription
1 PERFORMANCE INVESTIGATION OF ROUTING PROTOCOLS FOR DATABASE AND VOICE DATA IN MANETS VIKAS GOYAL 1, SHAVETA RANI 2, PARAMJIT SINGH 3 1,2,3 Giani Zail Singh Punjab Technical University Campus, BATHINDA (P.B), India Abstract: MANET is Mobile Ad-Hoc Network which has been self-configured and infrastructure less using dynamically nature. MANET consists of mobiles nodes that are routers with host nodes and wireless communication devices. In the MANET, the transmitter and receiver nodes communicate using antennas which may be omnidirectional for broadcast purpose. In this paper, we compare the performance of routing protocols are - Geographical Routing Protocol (GRP) and Temporally-Ordered Routing Algorithm (TORA) Routing Protocol. The performance is evaluated by using OPNET MODELER 14.5 Simulator. The simulation performance parameters are Traffic Received, Traffic Sent, Jitler, Voice MOS Value, Packet Delay Variation, Data Dropped, Network Load and Throughput for comparing protocols. Keywords: GRP, TORA, MANET AND OPNET 1. INTRODUCTION Wireless Ad hoc Networks consists of mobile nodes communicating over shared wireless links. MANET does not have any base station. In the MANET, the automatic configuration helps to Ad hoc networks flexibility through possibility when mobile devices are connected to each other in the coverage (Transmission range). The mobile nodes have movement with respect to location velocity and acceleration [1] in the MANET through mobility model. During mobility and limited resources in the wireless networks, each layer in the TCP/IP model needs redefinition and modification [2]. decided by various routing protocols. In this paper, we have proposed the GRP and TORA routing protocols. 2.1 Geographical Routing Protocols (GRP) Geographic routing is a routing protocol that is based on position-based information. It is a wireless network routing protocol, in which the source node sends a message to geographic location of the destination instead of network address [3]. Each node finds out its own location and information is sent to the source about location of destination and associated neighbors, by broadcasting the HELLO message. Each node knows its location by global positioning system. By using Location Aided Routing (LAR) [4] limit search for a new route Request Zone. From the sender node to the destination node sends the HELLO message for the broadcast purpose. If destination node responds back, then sender transmits the data packets over all networks. The control message [5] is used to minimize overhead for fast transmission. The intermediate node uses the next hop geographic forwarding process. Gathering--based Routing protocol [6] is used to quickly collect network information source node and control overhead. By using intermediate neighbors and control packets, there is no need for creation and maintenance of routing tables for the routing purpose when there is lack of route creation. The data traffic conditions and node s own requirements [7] are adjusted by the protocol parameter values independently. Location Based Routing Protocol (LBRP) [8] is used for optimum topology quickly destination applying for routing. Geographic Routing localizes information for explicit node location to make forward decisions [9]. Figure 1: Mobile Ad hoc Network (MANET) 2. MANET ROUTING ROTOCOLS When we need to transfer data packets from source to destination, we need a dedicated path or a route that is 2.2 Temporally Ordered Routing Algorithm (TORA) Protocol Temporally Ordered Routing Algorithm is based on demand routing when node discovers the route then it follows the Directed Acyclic Graph DAG technique used to loop-free multipath routing. Every node in the network has own copy of TORA which runs for each destination. The height term is answering a query and destination field. In TORA, when any node wants to communicate to broadcast the query request to all other nodes which contains address of destination it requires query packets. When a node detects height, its issues a CLR (clear) packet. The CLEAR packets consist of reference level and destination id. As the query response propagates back, Volume 2, Issue 4 July August 2013 Page 326
2 each intermediate node updates its TORA table with the route and height to the destination node [10]. The main advantage of this protocol is that failure or removal of any of the nodes is quickly resolved without source intervention by switching to an alternate route [11], [12]. Hierarchical-TORA (Hi-TORA) [13] is hierarchical routing scheme based on clustering scheme. The localization and selective node [14] approach has been used to improve TORA. It initializes and maintains a location portion of network by localization approach, by selecting a subset of node for participation as network by selective participation approach. A node can spread its MAC Layer Information [15] to its neighbor by modification Internet MANET Encapsulation Protocol (IMEP). When node has multiple paths to reach destination, then MAC Information and route hop count are used to calculate route selection probability. 3.8 Throughput (bits/sec): The ratio of total data received by receiver from sender over the network is known as Throughput. 4. OPNET SIMULATION ENVIRONMENT In this paper, the network is created by using OPNET Modeler 14.5 simulator, a wireless Ad hoc network with size Meters scale Office type. In the figure 2, the project setup consists of 85 mobile nodes (workstations), Application Configuration, Profile Configuration, Wireless LAN Server (Mobile), Mobility Configuration (Default Random Waypoint Mobility). There are two scenarios for Database and two scenarios for Voice data. 3. PERFORMANCE PARAMETERS 3.1 Traffic Received (pakets/sec): When data packets have been transmitted from source to destination node, then the quantity of traffic received by source node to destination node by using intermediate node is known as Traffic Received. 3.2 Traffic Sent (pakets/sec): When data packets have been transmitted from source to destination node, then the amount of traffic have been sent by source node to destination node by using intermediate node is known as Traffic Sent. 3.3 Jitler (sec): To define the variation to reach packet that is caused by network congestion or route changes is known as Jitler. 3.4 Mean Opinion Score (MOS) value: Mean Opinion Score value gives a numerical indication of perceived quality of media received after being transmitted [16]. 3.5 Packet Delay Variation: Difference in End-to-End Delay between selected packets in a flow is known as Packet Delay Variation 3.6 Data Dropped (bit/sec): When source node transfers data then how many data packets have been successfully sent and received by the receiver and also data dropped in the way `before reaching destination node due to interruption of another devices is known as Data Dropped. 3.7 Network Load (bits/sec): When there is excess traffic in the network which is unable to be controlled is known as Network Load. When all higher layers [17] in WLAN nodes have load of the whole network, it is called Network Load. Figure 2: Simulator setup having 60 Mobile nodes Table 1: Simulation Parameters Simulation Parameters Values Simulator Version Opnet Modeler 14.5 Network Scale Network Size Technology Used Routing Protocols Number of Mobiles nodes 85 Traffic Type Simulation Time Physical characteristics Data Rate (bps) Office Type Meters MANET GRP and TORA Database With High Load and Voice With GSM Quality and Silence Suppressed 500 Sec Direct Sequence 11 bps Volume 2, Issue 4 July August 2013 Page 327
3 5. RESULTS & DISCUSSIONS In this paper, we have analyzed the performance of protocols-grp and TORA w.r.t Database and Voice Data Service. 5.1 Wireless LAN Database When the source node sends the database query to destination node through Database Service, it enables the Database server to responsd the query that is sent by the sender node is known as Database service. The Wireless LAN performance parameters are as following: DB Query Traffic Received (packets/sec) Figure 3, represents the graph of DB query Traffic Received for GRP and TORA routing protocols. In the GRP routing protocol, the peak value of Traffic Received is almost 4.4 packets/sec after 500 seconds. In the TORA routing protocol, the peak value of DB query Traffic Received is almost 0.35 packets/sec and it gradually drops down to almost 0.1 bits/sec and last value of DB Query Traffic Received is 0.01 packets/sec. The peak value of DB Query Traffic Received of TORA is lower than GRP, because when node discovers the route then it follows the Directed Acyclic Graph DAG technique used to loop-free multipath routing. Figure 3: DB Query Traffic Received for Database DB Query Traffic Sent (packets/sec) Figure 4, represents the graph of DB query Traffic Sent for GRP protocol, the peak value of DB query Traffic Sent that is almost 13.1 packets/sec after 500 seconds. In the TORA routing protocol, the peak value of DB query Traffic Sent is almost 1.5 packets/sec and it gradually drops down to almost 1 packet/sec after 500 seconds. The peak value of DB Query Traffic Sent of TORA is lower than GRP, because when node discovers the route then it follows the Directed Acyclic Graph DAG technique used to loop-free multipath routing. Figure 4: DB Query Traffic Sent for Database Data Dropped (bits/sec) Figure 5, represents the graph of Data Dropped for GRP protocol, the peak value of Data Dropped is almost bits/sec and it gradually drops down to almost 4000 bits/sec and last value of Data Dropped is 1800 bits/sec peak value of data dropped is almost 4300 bits/sec after 500 seconds. The peak value of Data Dropped of TORA is lower than GRP, when TORA protocol failure or removal of any of the nodes is quickly resolved without source intervention by switching to an alternate route. Figure 5: Data Dropped for Database Network Load (bits/sec) Figure 6, represents the graph of Network Load for GRP protocol, the peak value of Network Load is almost bits/sec and it gradually drops down to almost bits/sec and last value of Network Load is bits/sec after 500 seconds. In the TORA routing protocol, the peak value of Network Load is almost bits/sec after 500 seconds. The peak value of Network Load of TORA is lower than GRP, when TORA protocol failure or removal of any of the nodes is quickly resolved without source intervention by switching to an alternate route. Figure 6: Network Load for Database Throughput (bits/sec) Figure 7, represents the graph of Throughput for GRP protocol, the peak value of Throughput is almost bits/sec and it gradually drops down to almost bits/sec and last value of Throughput is bits/sec peak value of Throughput is almost bits/sec after 500 seconds. The peak value of Throughput of GRP is Volume 2, Issue 4 July August 2013 Page 328
4 higher than TORA, because each node has known its location by global positioning system. Figure 8: Jitler for Voice Data Figure 7: Throughput for Database In the Table 2, the performance comparison of routing protocols GRP and TORA w.r.t Database is done. The performance parameters are: DB Query Traffic Received, DB Query Traffic Sent, Data Drpped, Network Load and Throughput etc. The peak value of each parameter is approximation value. TABLE 2: Performance Comparison for Database Parameters Protocols MOS Value Figure 9, represents the graph of MOS Value for GRP and TORA routing protocols. In the GRP routing protocol, the peak value of MOS Value is almost 3.58 and it gradually drops down to almost 1.7 after 500 seconds. In the TORA routing protocol, the peak value of MOS Value is almost 3.59 and it gradually drops down to almost 3.05 after 500 seconds. The peak value of MOS Value of TORA is lower than GRP, because when node discovers the route then it follows the Directed Acyclic Graph DAG technique used to loop-free multipath routing. GRP TORA DB Query Traffic Received (packets/sec) DB Query Traffic Sent (packets/sec) Data Dropped Networks Load Throughput Wireless LAN Voice Data When the source node wants to send the multimedia data that is voice to destination node through Voice Service, it enables the Voice server to process the voice data and take necessary action. That data sent by the sender node is known as Voice service. The Wireless LAN performance parameters are as following: 5.2 Wireless LAN Voice When the source node sends the voice data to destination node through Voice Service, it enables the Voice server to process the voice data that is sent by the sender node is known as Voice service. The Wireless LAN performance parameters are as following: Jitler (Sec) Figure 8, represents the graph of Jitler for GRP and TORA routing protocols. In the GRP routing protocol, the peak value of Jitler is almost after 500 seconds. In the TORA routing protocol, the peak value of Jitler is almost 0.01 and it gradually drops down to almost after 500 seconds. The peak value of Jitler of TORA is lower than GRP, when TORA protocol failure or removal of any of the nodes is quickly resolved without source intervention by switching to an alternate route. Figure 9: MOS Value for Voice Data Packet Delay Variation Figure 10, represents the graph of Packet Delay Variation for GRP protocol, the peak value of Packet Delay Variation is almost 88 and it gradually drops down to almost 69 after 500 seconds. In the TORA routing protocol, the peak value of Packet Delay Variation is almost 15 after 500 seconds. The peak value of Packet Delay Variation of TORA is lower than GRP, when TORA protocol failure or removal of any of the nodes is quickly resolved without source intervention by switching to an alternate route. Figure 10: Packet Delay Variation for Voice Data Volume 2, Issue 4 July August 2013 Page 329
5 5.2.4 Voice Traffic Received (packets/sec) Figure 11, represents the graph of Traffic Received for GRP protocol, the peak value of Traffic Received is almost 220 packets/sec and it gradually drops down to almost 158 packets/sec and last value of Traffic Received is 159 packets/sec after 500 seconds. In the TORA routing protocol, the peak value of Traffic Received is almost 100 packets/sec and it gradually drops down to almost 78 packets/sec after 500 seconds. The peak value of Traffic Received of TORA is lower than GRP, because when node discovers the route then it follows the Directed Acyclic Graph DAG technique used to loop-free multipath routing. peak value of Data Dropped is almost 5000 bits/sec after 500 seconds. The peak value of Data Dropped of TORA is lower than GRP, because when node discovers the route then it follows the Directed Acyclic Graph DAG technique used to loop-free multipath routing. Figure 13: Data Dropped for Voice Data Figure 11: Traffic Received for Voice Data Voice Traffic Sent (packets/sec) Figure 12, represents the graph of Traffic Sent for GRP protocol, the peak value of Traffic Sent is almost 2399 packets/sec after 500 seconds. In the TORA routing protocol, the peak value of Traffic Sent is almost 1810 packets/sec after 500 seconds. The peak value of Traffic Sent of TORA is lower than GRP, because when node discovers the route then it follows the Directed Acyclic Graph DAG technique used to loop-free multipath routing Network Load (bits/sec) Figure 14, represents the graph of Network Load for GRP protocol, the peak value of Network Load is almost bits/sec and it gradually drops down to almost bits/sec and last value of Network Load is bits/sec after 500 seconds. In the TORA routing protocol, the peak value of Network Load is almost bits/sec after 500 seconds. The peak value of Network Load of TORA is lower than GRP, when TORA protocol failure or removal of any of the nodes is quickly resolved without source intervention by switching to an alternate route. Figure 14: Network Load for Voice Data Figure 12: Traffic Sent for Voice Data Data Dropped (bits/sec) Figure 13, represents the graph of Data Dropped for GRP protocol, the peak value of Data Dropped is almost bits/sec and it gradually drops down to almost 4520 bits/sec and last value of Data Dropped is bits/sec Throughput (bits/sec) Figure 15, represents the graph of Throughput for GRP protocol, the peak value of Throughput is almost bits/sec and it gradually drops down to almost bits/sec and last value of Throughput is bits/sec peak value of Throughput is almost bits/sec after 500 seconds. The peak value of Throughput of TORA is lower than GRP, because each node knows its locations by global positioning system. Volume 2, Issue 4 July August 2013 Page 330
6 Figure 15: Throughput for Voice Data In the Table 3, the performance comparison of routing protocols GRP and TORA w.r.t Voice Data is done. The performance parameters are: Jitler, MOS Value, Packet Delay Variation, Voice Traffic Received, Voice Traffic Sent, Data Dropped, Network Load and Throughput etc. The peak value of each parameter is approximation value. TABLE 3: Performance Comparison for Voice Data Parameters Protocols GRP TORA Jitler (sec) MOS Value Packet Delay Variation Voice Traffic Received (packets/sec) Voice Traffic Sent (packets/sec) Data Dropped Networks Load Throughput CONCLUSION In this paper, we have analyzed performance evaluation of routing protocols GRP and TORA with Database and Voice Data. In case of Database, TORA routing protocol has performed best in term of performance parameters: DB Query Traffic Received, DB Query Traffic Sent, Data Dropped and Network Load. GRP routing protocol has performed best in term of performance parameter: Throughput. In case of Voice, TORA routing protocol has performed best in term of performance parameters: Jitler, MOS Value, Packet Delay Variation, Voice Traffic Received, Voice Traffic Sent, Data Dropped and Network Load. GRP routing protocol has performed best in term of performance parameter: Throughput. References [1] Vijayavani, G.R. and Prema, G. MEPCO Schlenk Eng. Coll., Sivakasi, India Performance comparison of MANET routing protocols with mobility model derived based on realistic mobility pattern of mobile nodes Advanced Communication Control and Computing Technologies (ICACCCT), International Conference on 2012 [2] Mehran Abolhasan, Tadeusz Wysocki and Eryk Dutkiewicz A review of routing protocols for mobile ad hoc networks Elsevier : Ad Hoc Networks Volume 2, Issue 1, January 2004, Pages 1 22 [3] A. Tamizhselvi and Dr. R.S.D. Wahida Banu Performance Evaluation of Geographical Routing Protocol under Different Traffic Scenario International Journal of Computer Science and Telecommunications Volume 3, Issue 3, March 2012 [4] Young-Bae Ko and Nitin R. Vaidya Location-Aided Routing (LAR) in mobile ad hoc networks Springer: Wireless Networks 6 (2000) [5] Kuldeep Vats, Mandeep Dalal, Deepak Rohila, Vikas Loura, OPNET Based Simulation and Performance Analysis of GRP Routing Protocol in International Journal of Advance Research in Computer Science and Software Engineering Volume 2, Issue 3, March 2012 [6] Chang Wook Ahn Gathering-based routing protocol in mobile ad hoc networks Elsevier: Computer Communications Volume 30, Issue 1, 15 December 2006, Pages [7] Upasna, Jyoti Chauhan, Manisha Minimized Routing Protocol in Ad-Hoc Network with Quality Maintenance Based on Genetic Algorithm: A Survey International Journal of Scientific and Research Publications, Volume 3, Issue 1, January ISSN [8] RAJ, E.G.D.P. ; SELVAKUMAR, S. AND LEKHA, J.R. DEPT. OF COMPUT. SCI. & ENG., BHARATHIDASAN UNIV., TIRUCHIRAPALLI, INDIA LBRP: GEOGRAPHIC ROUTING PROTOCOLS FOR MANETS RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), INTERNATIONAL CONFERENCE ON 2011 [9] FOTOPOULOU-PRIGIPA, S. AND MCDONALD, A.B. INTRACOM S.A., ATHENS, GREECE GCRP: GEOGRAPHIC VIRTUAL CIRCUIT ROUTING PROTOCOL FOR AD HOC NETWORKS MOBILE AD-HOC AND SENSOR SYSTEMS, IEEE INTERNATIONAL CONFERENCE ON 2004 [10] G.Vijaya Kumar, Y.Vasudeva Reddyr and Dr.M.Nagendra Current Research Work on Routing Protocols for MANET: A Literature Survey (IJCSE) International Journal on Computer Science and Engineering (IJCSE) Vol. 02, No. 03, 2010, [11] Sunil Taneja and Ashwani Kush A Survey of Routing Protocols in Mobile Ad Hoc Networks International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010 ISSN: [12] Tamilarasan and Santhamurthy A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012 ISSN (Online): Volume 2, Issue 4 July August 2013 Page 331
7 [13] Ohta, T. ; Fujimoto, M. ; Inoue, S. ; and Kakuda, Y. Dept. of Comput. Eng., Hiroshima City Univ., Japan Hi-TORA: a hierarchical routing protocol in ad hoc networks High Assurance Systems Engineering, Proceedings. 7th IEEE International Symposium on [14] KWAN HUI LIM AND DATTA, A. SCH. OF COMPUT. SCI. & SOFTWARE ENG., UNIV. OF WESTERN AUSTRALIA, CRAWLEY, WA, AUSTRALIA ENHANCING THE TORA PROTOCOL USING NETWORK LOCALIZATION AND SELECTIVE NODE PARTICIPATION PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), IEEE 23RD INTERNATIONAL SYMPOSIUM ON 2012 [15] QIANG LIU HUA WANG ; JINGMING KUANG ; ZHENG WANG AND ZHIMING BI DEPT. OF ELECTRON. ENG., BEIJING INST. OF TECHNOL., BEIJING WSNP1-1: M- TORA: A TORA-BASED MULTI-PATH ROUTING ALGORITHM FOR MOBILE AD HOC NETWORKS GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM '06. IEEE CONFERENCE 2006 [16] Sumit Mahajan, Vinay Chopra Performance Evaluation of MANET Routing Protocols with Scalability using QoS Metrics of VOIP Applications International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 2, February 2013 ISSN: X. [17] Suhaimi Bin Abd Latif, M.A. Rashid, F.Alam, Profiling Delay and Throughput Characteristics of Interactive Multimedia Traffic over WLANs using OPNET, School of Engineering Institute of Technology & Engineering, Massey University, Auckland, New Zealand. Paramjit Singh received PhD from BITS, Pilani in 2009, M.S (Software System) from BITS, Pilani in 2002 & B.Tech (CSE) from Sant Longowal Institute of Engineering & Technology, Longowal in He is currently working as Assistant Professor C.S.E Department Giani Zail Singh Punjab Technical University Campus, Bathinda. His research area is Networking, Software Systems and Computer Graphics. He has to her contribution International Journals: 11, National Journals: 02, International Conferences: 12 and National Conferences: 30. AUTHORS: Vikas Goyal received B.Tech (CSE) from Malout Institute of Management & Information Technology, Malout in 2009 and currently pursuing M.Tech (CSE) from Giani Zail Singh Punjab Technical University Campus, Bathinda. His research area is Adhoc Networks routing Protocols MANET. Shaveta Rani received PhD from BITS, Pilani in 2009, M.S (Software System) from BITS, Pilani in 2002 & B.Tech (CSE) from Sant Longowal Institute of Engineering & Technology, Longowal in She is currently working as Assistant Professor C.S.E Department Giani Zail Singh Punjab Technical University Campus, Bathinda. Her research area is Internetworking, Image Processing and Software Systems. She has to her contribution International Journals: 11, National Journals: 02, International Conferences: 12 and National Conferences: 29 Volume 2, Issue 4 July August 2013 Page 332
Performance Comparison of Routing Protocols for Remote Login in MANETs
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 7, July 2013, pg.413
More informationComprehensive Study and Review Various Routing Protocols in MANET
126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet
More informationOPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS
OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS Kamini Jaswal 1, Jyoti 2, Kuldeep Vats 3 1 M.tech, Department of electronics and communication, South point institute of engineering
More informationOPNET based Performance Evaluation of WIMAX Network with WIMAX Management using Different QoS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.862
More informationCOMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE
COMPARISON OF DSR PROTOCOL IN MOBILE AD-HOC NETWORK SIMULATED WITH OPNET 14.5 BY VARYING INTERNODE DISTANCE Puneet Mittal 1, Paramjeet Singh 2 and Shaveta Rani 3 1 Dept. of Computer Engg. Govt. Poly. College,
More informationPerformance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack
Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University
More informationSIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS
Volume 4, No. 5, May 2013 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationPerformance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks
, pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationCOMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK
COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,
More informationIMPACT OF DIFFERENT NETWORK SIZE ON MANET ROUTING PROTOCOLS WITH DATABASE & METRICS USING OPNET TOOL
IMPACT OF DIFFERENT NETWORK SIZE ON MANET ROUTING PROTOCOLS WITH DATABASE & E-MAIL METRICS USING OPNET TOOL ARCHANA SAINI, RAVI PARKASH SHARMA GLOBAL INSTITUTE OF MANAGEMENT AND EMERGING TECHNOLOGIES,
More informationII. ROUTING CATEGORIES
ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses
More informationPerformance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator
Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The
More informationScalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size
Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department
More informationSimulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application
Simulation and Comparison of AODV, DSR and TORA under Black Hole Attack for Videoconferencing Application Lovepreet Singh, Navdeep Kaur, Gurjeevan Singh, Shaheed Bhagat Singh State Technical Campus, Ferozepur,
More informationPerformance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela
Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,
More informationDifferent QoS Based TORA Reactive Routing Protocol using OPNET 14.5
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.907
More informationPerformance Analysis of Routing Protocols in MANETs Using OPNET 14.0
Performance Analysis of Routing Protocols in MANETs Using OPNET 14.0 Karanveer Singh 1, Naveen Goyal 2 1 Research Scholar,ECE Deptt.,Bhai Gurdas Institute of Engineering and Technology, Sangrur 2 Assistant
More informationPerformance Evaluation of DSDV, DSR AND ZRP Protocol in MANET
Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut
More informationA STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS
A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationCLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing
Volume 5, Issue 5, MAY 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on Unicast
More informationPerformance Evaluation of ASMR with QRS and RZLSR Routing Scheme in Mobile Ad-hoc and Sensor Networks
, pp. 43-50 http://dx.doi.org/10.14257/ijfgcn.2014.7.6.05 Performance Evaluation of ASMR with QRS and RZLSR Routing Scheme in Mobile Ad-hoc and Sensor Networks Anna Saro Vijendran 1 and J. Viji Gripsy
More informationGSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid
More informationEnergy Efficient EE-DSR Protocol for MANET
Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com
More informationImpact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,
More informationQuantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks
Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks E. Suresh Babu P S V Srinivasa Rao M Srinivasa Rao C Nagaraju Assoc. Prof. of CSE K L University, Vijayawada.
More informationSimulative Investigation of Zigbee Network Coordinator Failure with Different QoS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationPardeep Mittal Assistant Professor, Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Comparative Study
More informationCOMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK
COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK 1 Ranjana Kukkar, 2 Kulbhushan Rassewatt, 3 Rahul Malhotra GTB KHALSA INSTITUTE OF ENGINEERING AND TECHNOLOGY,
More informationOptimizing Wireless Network Using Combination of Auto Summarization and EIGRP Protocol
Optimizing Wireless Network Using Combination of Auto Summarization and EIGRP Protocol Ravjot Singh Syal, Kamaljit Kaur M.Tech Student, Dept. of CSE, Sri Guru Granth Sahib World University, Punjab, India
More informationPERFORMANCE ANALYSIS OF AODV, OLSR, GRP AND DSR ROUTING PROTOCOLS WITH DATABASE LOAD IN MANET
PERFORMANCE ANALYSIS OF AODV, OLSR, GRP AND DSR ROUTING PROTOCOLS WITH DATABASE LOAD IN MANET Puneet Mittal 1, Paramjeet Singh 2, Shaveta Rani 3 1 Dept. of Computer Engineering Govt, Poly. College, Bathinda,
More informationPerformance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data
ISSN (e): 2250 3005 Volume, 08 Issue, 4 April 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationSimulation Study to Observe the Effects of Increasing Each of The Network Size and the Network Area Size on MANET s Routing Protocols
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationOPNET based Investigation and Simulation Evaluation of WLAN Standard with Protocols using Different QoS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.852
More informationSimulation and Performance Analysis of OLSR Routing Protocol Using OPNET
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Simulation and Performance Analysis
More informationInfra-Red WLAN Performance Evaluation in 1 Mbps and 2 Mbps Using OPNET for GRP
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationVaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR
More informationMANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014
Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationPerformance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET
Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,
More informationReview of Routing Protocols in Ad Hoc Networks
International Journal of Computer Engineering and applications,volumex,issuevi,june2016 Review of Routing Protocols in Ad Hoc Networks Harmandeep Kaur 1, Jabarweer Singh 2 1,2 Department of Computer Science
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationIJMIE Volume 2, Issue 6 ISSN:
Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network Mr. Amol V. Zade* Prof. Vijaya K. Shandilya** Abstract: A major aspect of ad-hoc networks is that the nodes
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationAN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK
www.arpapress.com/volumes/vol9issue2/ijrras_9_2_09.pdf AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK Ashish Bagwari 1, Danish Quamar 2, Noor Mohd 3 &
More informationNetwork traffic based assessment of reactive, proactive and hybrid MANET protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 2, Ver. VII (Mar - Apr. 2014), PP 82-86 Network traffic based assessment of reactive,
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationEstimation of Network Partition Problem in Mobile Ad hoc Network
Estimation of Network Partition Problem in Mobile Ad hoc Network Varaprasad Golla B.M.S.College of Engineering Bangalore, India varaprasad555555@yahoo.co.in ABSTRACT: A node cannot communicate with others
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationPerformance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35
Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Manpreet Singh Team number 8 Project webpage-http://manpreetensc833.weebly.com/ ENSC 833 : NETWORK
More informationA Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh
A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which
More informationA Proposed Route Selection Method in AODV Routing Protocol for MANET
A Proposed Route Selection Method in AODV Routing Protocol for MANET Aarti Bairagi, Shweta Yadav Abstract A Mobile Ad Hoc Network (MANET) is a network consisting of a set of mobile hosts capable of communicating
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationOverview (Advantages and Routing Protocols) of MANET
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 855-861 Research India Publications http://www.ripublication.com Overview (Advantages and Routing Protocols)
More informationANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW
ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW Kirandeep Kaur 1, Mr.Pawan Luthra 2, Er.Gagandeep 3 1 Department of Computer Science and Engineering, Shaheed Bhagat Singh
More informationSTUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
More informationA New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm
A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationDetection of Vampire Attack in Wireless Adhoc
Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,
More informationA Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet
A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India
More informationINTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT
COMPARISON OF ENERGY EFFICIENT AODV AND AODV PROTOCOL USING NS2 Vaibhav N Palav 1, Vijaykumar Kawde 2,Shraddha Kunkunkar 3,Preeti Motwani 4 EXTC Engineering Department, LTCOE NaviMumbai, India DOI: 10.5281/zenodo.821708
More informationEffects of Caching on the Performance of DSR Protocol
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder
More informationQos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol
Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,
More informationrouting protocols, also these don t consider the packet size and the antenna range of the nodes as a I. INTRODUCTION
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Secure Routing by Elimination
More informationASurveyonTopologybasedReactiveRoutingProtocolsinVanets
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 18 Issue 4 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Online
More information[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationand coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different
ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com PERFORMANCE ANALYSIS FOR WIRELESS MESH NETWORK CONSIDERING DIFFERENT CLIENT DISTRIBUTION PATTERNS S.Dhivya #1,
More informationENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS
ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo
More informationCOMPARATIVE STUDY OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS USING QUALNET6.1
COMPARATIVE STUDY OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS USING QUALNET6.1 B.A.S Roopa Devi 1, J.V.R Murthy 1, G.Narasimha 2, R.Hyndavi 3, R.Avataram 3 1 Department of CSE, JNTUK, Kakinada, A.P,
More informationPerformance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET
Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET Er. Ravneet Singh Sahota 1, Er. Madan lal 2 1 M.Tech Student, Department of Computer engineering, Punjabi University Patiala,India
More informationPooja * Sandeep Jaglan Reema Gupta CSE Dept of NCCE, ISRANA CSE Dept of NCCE, ISRANA CSE Dept of NCCE, ISRANA India India India
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Analysis
More informationAn Approach for Enhanced Performance of Packet Transmission over Packet Switched Network
ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched
More informationComparative Analysis of Throughput and Dropped rate for Location-Aided Routing Protocol
Comparative Analysis of Throughput and Dropped rate for Location-Aided Routing Protocol Neelima Parsendia, Amit Sinhal Dept. of I.T., Technocrats Institute of Technology, Bhopal Abstract A wireless LAN
More informationA Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks
A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks Abdulrahman Issa Kh Shybub 1, Tarek Mosbah Abdala 2 1, Computer Department Higher Institute
More informationA Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks
International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2
More informationPerformance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS
Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS Sowjanya Kumari Nalam¹, P.V.Venkateswara Rao ²,SrinadhSagiraju³ ¹M.Tech Student, CSE Department, Raghu Engineering
More informationEZR: Enhanced Zone Based Routing In Manet
EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationImplementation of Quality of Services (QoS) for Based Wireless Mesh Network
Implementation of Quality of Services (QoS) for 802.16 Based Wireless Mesh Network Er. Gurpreet Kaur Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er. Jasbir Singh
More informationA COMPARISON STUDY OF DSDV AND SEAD WIRELESS AD HOC NETWORK ROUTING PROTOCOLS
A COMPARISON STUDY OF DSDV AND SEAD WIRELESS AD HOC NETWORK ROUTING PROTOCOLS M.S.R.S Prasad 1, S.S. Panda 2, MNM Prasad 3, S.T.V.S.Kumar 4 1 Assistant Professor (SG), Dept. of CSE., Regency Institute
More informationPerformance Comparison of MANETs Routing Protocols for Dense and Sparse Topology
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse
More informationEvaluation of Mobility Models with AODV & OLSR Protocol by Varying Node Speed in MANET
Evaluation of Mobility Models with AODV & OLSR Protocol by Varying Node Speed in MANET Smt. Rekha Shahapurkar 1, Dr. Umesh Kumar Singh 2, Sh. Yogesh Mishra 3 1 Reasearch Scholar, 2 Reader 3 Assistant ptofessor
More informationZigbee- Effect of Zigbee End Devices Failure on Hybrid Topology by using Different Trajectories
e t International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 33-40(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Zigbee- Effect of Zigbee End Devices Failure
More informationThe General Analysis of Proactive Protocols DSDV, FSR and WRP
Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,
More informationA Highly Effective and Efficient Route Discovery & Maintenance in DSR
A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan
More informationA Review Paper on Routing Protocols in Wireless Sensor Networks
A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,
More informationAd Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
More informationMobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2
Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Oxford University Press 2007. All rights reserved. 1 Temporally ordered routing algorithm (TORA) A reactive
More information