A Novel Approach for Appraising the Performance of Multimedia Traffic for OLSR Routing Protocol in Manet
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 8
Abstract
Mobile Ad-hoc Network is a set of portable electronic receivers which detects and demodulates and amplifies transmitted signals. MANETs do not have any polarized armature. Immense excerpt of influx on the cyberspace transfer Transmission Control Protocol influx because of real time and non-real time multimedia influx. Constant Bit Rate influx has peculiar properties compare to cyberspace influx. In this, using Network Simulator 2, we analyze and appraise, conduct of various MANET routing protocols beneath CBR and TCP influx ways. By doing this, we constitute that here is a compelling work variation among diversified steering protocols because of diversities in its interior working. In this, the performance is figured out based on the measurements like Transmission rate, Latency, and work done. Lastly we conclude that Ad-Hoc On Demand Distance Vector Routing protocol which is a reactive protocol performs well for Constant Bit Rate influx. While OLSR which is a proactive protocol performs well for TCP influx. The TCP influx /multimedia in MANETs which is the dominant part of the total influx on internet, OLSR is appraised as the best steering protocol in all cases, in addition to, it is best for transferring the TCP influx.
Authors and Affiliations
Syeda Tasmiya Tarannum
Reliability Assassment of Selected Fossil Fuel Operated Power Stations in Nigeria
As the gap between supply and demand on electric energy widens in Nigeria, it becomes necessary to assess the performance of fossil fueled generator turbine that dominates the electric power industry. Consequently, this...
Identifying Feasible Central Meeting Location from Multiple Geo-Points
Location privacy in Location Based Services (LBS) is the ability to protect the association between user’s identity, query sources, servers and database, thereby preventing an impending attacker from easily linking users...
Secure Mining of Generalized Association Rules from Horizontally Distributed Databases
We consider the problem of secure mining of generalized association rules from horizontally distributed databases. Given a large horizontally distributed database of transactions, where each transaction consists of a set...
Retrieving the Data from Cloud Using Differential Query Services
Cloud computing refers to the delivery of computing resources over the Internet. In a cost efficient cloud environment, a user will experience a degree of delay while retrieving information from the cloud. In such an env...
A New Technology for Ac-Side Cascaded H-Bridge Cells for Multi-Level VSC-HVDC Transmission System
The VSC based HVDC transmission system offers the operational flexibility in terms of active and reactive power control, in addition to improved AC fault ride-through capability. The proposed converter offers a unique fe...