Analysis of AODV Routing Protocol for Minimized Routing Delay in Ad Hoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
Ad hoc wireless networks consists of mobile terminals communicating directly with other mobile terminals without any pre existing infrastructure. In Ad hoc network each mobile terminal acts as a router to enable multi hop communication. Reactive routing protocols are used to discover routes when a mobile terminal wants to establish communication link with another terminal in the network. AODV and DSR are popular reactive protocol extensively studied. In this paper we investigate the efficiency of AODV routing protocol in a bandwidth constrained network by toggling the destination only flag in the AODV header. The throughput is studied and evaluated.
Authors and Affiliations
K. TAMIZARASU , M. RAJARAM
A New Multi Fractal Dimension Method for Face Recognition with Fewer Features under Expression Variations
In this work, a new method is presented as a mingle of Principal Component Analysis (PCA) and Multi-Fractal Dimension analysis (MFD) for feature extraction. Proposed method makes use of best decision taken from both the...
Optimized design of BCD adder and Carry skip BCD adder using reversible logic gates
Reversible logic is very essential for the construction of low power, low loss computational structures which are very essential for the construction of arithmetic circuits used in quantum computation, nano technology an...
Parent Siblings Oriented Tree Quorum Protocol
In this paper, we are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical...
A Prototype System using Lexical Chains for Web Images Retrieval Based on Text Description and Visual Features
Content Based Image Retrieval, in the current scenario has not been analyzed adequate in the existing system. Here, we implement a prototype system for web based image retrieval. The system is based on description of ima...
Wirelss Security on Security Standard Policy: A Case Studty
Administrators of a network have a variety of different uthentication and encryption technologies to choose from. Administrators must also take into account a variety of organizational factors, not just of technical fac...