Performance Analysis of Routing Protocols in Mobile AD-HOC Networks (MANETs)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
A mobile ad-hoc network (MANET) is a self starting dynamic network comprising of mobile nodes, where each and every participation node voluntarily transmit the packets destined to some remote node using wireless (radio signal) transmission. The main aim behind the developing of ad hoc networking is multi-hop relaying. Wireless Ad hoc networks or infrastructure less networks are very easy to establish by using radio waves as transmitting medium without the requirements of any other equipment or infrastructure. An ad hoc network doesn’t have any centralized arbitrator or server. In MANET, all networking functions such as routing and packet forwarding, are performed by nodes themselves in a self-organizing manner. For these reasons, securing a mobile ad-hoc network is very challenging in many areas such as routing, bandwidth, security, power consumption, collisions, simulations, and topology control due to moving nodes. This paper provides an overview of AODV, DSR, and TORA. The comparisons among three routing protocols are based on the various protocol property parameters such as Route Discovery, Network Overhead, Periodic Broadcast, Node overhead etc. different routing protocols proposed in literature and also provide a comparison between them.
Authors and Affiliations
Konduri. Sucharitha,
Educational Process Mining-Different Perspectives
Process mining methods have in recent years enabled the development of more sophisticated Process models which represent and detect a broader range of student behaviors than was previously possible. This pa...
Maximizing Wireless Sensor Networks Life Time through Sink Mobility
Abstract: The main objective of this paper is to optimise wireless sensor network life time by moving the sink to a finite number of locations. If any node is having energy less than minimum, that node is not considered...
Intrusion Detection Techniques In Mobile Networks
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no o...
Image Steganography Based On Hill Cipher with Key Hiding Technique
In today’s digital world invisible ink and paper have been replaced by much more versatile and practical covers for hiding messages – digital documents, images, video, and audio files. As long as an electronic...
An Efficient Strategy to Reduce and To Restrict Malicious Attacks on the Web with Web Sense
Abstract: As the growth of Information Technology and Communication has led to vivid change, people can connect with each other globally at anywhere and in anytime through search engines. These search engines has also tr...