An Analysis of Reactive Routing Protocols in Manets with some current issues related with it
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 4
Abstract
This paper describes the concepts and issues related with Manets and reactive routing protocols. In 1970s, wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. There are currently two variations of mobile wireless networks. . This paper is a great asset in knowing the concepts such as routing, Manet’s etc.The first is known as the infrastructured network. The second type of mobile wireless network is the infrastructure less mobile network, commonly known as an ad hoc network.
Authors and Affiliations
Chitra Joshi, Deepak Sharma, Nirankar Sharma and Nimisha Srivastava
CERVICAL CELL FOR THINPREP IMAGE ENHANCEMENT USING MORPHOLOGICAL SEGMENTATION
This paper proposes a contrast enhancement technique, which is applied on the ThinPrep Cervical Cell. The proposed technique is divided into two stages. In the First Stage the cervical cells for the thin Prep Image wil...
Restricted Flow In A Non Linear Capacitated Transportation Problem With Bounds on Rim Conditions
This paper discusses restricted flow in a fixed charge capacitated transportation problem with bounds on total source availabilities and total destination requirements . The objective function is the sum of two linear...
Challenges and the Future Perspectives of labor Related Issues in Internationalization
Multinational corporations manufacture products in many countries and sell to consumers around the world. Money, technology and raw materials move ever more swiftly across national borders. Along with products and fina...
Incorporating security into Web Applications - An Aspect oriented approach
In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web appli...
The design of a Trusted Authentication scheme for Wimax Network
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into...