A Study on Reactive Protocols or On-demand Routing Protocols
Journal Title: International Research Journal of Computer Science - Year 2016, Vol 0, Issue 0
Abstract
Data transmission between two nodes requires multiple hops as nodes transmission range is limited in Mobile Ad hoc networks (MANET’s). Mobility of the networks nodes to makes the situation even more complicated in wireless networks. Multiple routing protocols find optimized routes from a source to some destination. Reactive or On-demand routing protocols take a lazy approach to routing. In contrast to Proactive Routing protocols all up-to-date routes are not maintained at every node, instead the routes are created as and when needed. When a source wants to send to a destination, it invokes the route discovery mechanism to find the path to the destination. The route remains valid till the destination is reachable or until the route is no longer needed. This paper is going to discuss on merits and demerits of Reactive Protocols or on-demand routing Protocols. and an attempt has been made to study the four Reactive (on-demand) routing protocols for MANETs: - Ad hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR) protocols, Temporally Ordered Routing Algorithm (TORA) and Associations Based Routing (ABR) protocol. The primary objective of this paper is to evaluate the effects of reactive protocols that may influence network performance.
Authors and Affiliations
Jahir Hussain S, Dr. Sukumar
Design and Implementation of Lecturer Evaluation System Using ELECTRE Method in Web-based Application
In order to improve the performance of human resources (in this case is a lecturer) at the Faculty of Computer Science University of Mercu has conducted a lecturer's performance evaluation at the end of each semesterBuan...
E-Learning with Cloud Computing: A Next Generation Technological Learning
Today’s world is filled with technology and every development in the technology and computing are influencing all the areas, sectors and departments of life. One such area is ‘learning’. With the growing technology of In...
Web Mining — Concepts and its Applications
Recover information from World Wide Web is a boring assignment since the expansion in the ease of use of knowledge backup supply on it. So this raises the need to utilize a clever system to recover the information from W...
A MECHANISM FOR PREVENTING DUPLICATE FILES IN CLOUD
cloud computing provides a way of storing a voluminous data and can be easily accessed anywhere. This work deals about the prevention of a duplicate file storage in cloud. Here there are three important components in our...
Effective Routing of Data Packets in Networks and implementing security
Data routing in networks is the process of effectively routing a packets of data from a source node to a destination node. There are various problems which occur in the process of routing a data from a source node to a d...