A Study of Asynchronous Routing Protocols in Peer to Peer Networks
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2014, Vol 5, Issue 1
Abstract
Mobile Ad Hoc Network (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. It is a collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA. This research paper provides an overview of these protocols by presenting their characteristics, functionality, benefits and limitations and then makes their comparative analysis so to analyze their performance. The objective is to make observations about how the performance of these protocols can be improved.
Authors and Affiliations
D Arun Kumar Reddy , T Sunil Kumar Reddy
Offensive Decoy Technology For Cloud Data Attacks
Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of...
An Efficient Vertical Handoff Technique for TwoTier Heterogeneous Networks
Integration of cellular networks and Wireless local area networks (WLANs) will be very useful for development of fourth generation communication technologies. The integration of two or more networks would be done b...
A Survey Paper of Bellman-Ford Algorithm and Dijkstra Algorithm for Finding Shortest Path in GIS Application
GIS application is very useful in transportation management. A Road network analysis is an important function of GIS, and the shortest path analysis is the key issue of network analyses. In Most of GIS application, Dijks...
A Study on Steganography to Hide Secret Message inside an Image
Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. There are many techniques to perform Steganography on electronic media, most notably audio and im...
Generating Test Cases Through Markov Models for Undertaking Comprehensive Testing of Embedded Systems
Cleanroom Software Engineering (CRSE) methodology has incorporated in it, the Markov models based on which the number of test cases that should be used for testing can be determined. Model based statistics are developed...