Study and Analysis of Routing Protocol in Manet
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: AMobile Ad-hoc Network (MANET) is a network that has the ability to communicate each other without any fixed network. It has the capacity to take decisions on its own. MANET has no infrastructure. The bridges in the network are known as a base station. Nodes can move freely anywhere, independent of each other and it makes routing more difficult if the nodes will keep on moving. The routing protocol in MANET should be more dynamic so that they quickly respond to topological changes.So in MANET topology changes frequently.Because of the dynamic property of mobile nodes MANET require an efficient routing protocol for best results[1]. This paper analyze the performance based on mobility model of Reactive routing protocol AODV (on demand distance vector), DSR (dynamic source routing) and proactive routing protocol DSDV (destination sequence distance vector). Performances are analyzed with respect to throughput, end to end delay and packet delivery ratio. Simulations were carried out using Network Simulator-2 (NS-2)version 2.35.
Authors and Affiliations
Nitika Lochab , Priti Narwal
Segmentation of White Blood Cells Using Fuzzy C Means Segmentation Algorithm
ABSTRACT: The objective of this paper is to develop a tool to identify the white blood cells from blood smear images through segmentation. In our research work, we have identified white blood cells from color image...
Analysis of Time Complexities and Accuracy of Depression FillingAlgorithms in DEM
Abstract: The recent development of digital representation has stimulated the development of automaticextraction of topographic and hydrologic information from Digital Elevation Model (DEM). A DEM is used tocreate hydrol...
Scalable Image Classification Using Compression
The increasing rate of data growth has led to finding techniques for faster processing of data. Big Data analytics has recently emerged as a promising field for examining huge volume of datasets containing differen...
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
In organizations sensitive data transaction is having less security because there may be a misusability of data from one to other from past years. In previous methods they calculated how much data is leaked...
Selection of Legendre Moments for Content Based Image Retrieval Using ACO Based Algorithm
Abstract : Feature selection is an important step in Content Based Image Retrieval (CBIR) which has a great impact on reducing complexity and increasing efficiency of CBIR frameworks. Swarm Intelligence (SI) methods, as...