On Demand Routing Protocols in Mobile Ad-hoc Networks: Literature Review
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 9
Abstract
Routing in MANETs may be a difficult task and has received an amazing quantity of attention from researchers round the world. To beat this downside variety of routing protocols are developed and also the number remains increasing day by day. These protocols principally belong to a few classes particularly proactive, reactive and hybrid. This paper provides an outline and comparison of a number of the protocols by presenting their characteristics, practicality, advantages and limitations.
Authors and Affiliations
Veeralakshmi M
A Prototypical Solution for Cyber Space
Many things have been written and told about cyber security and its importance around the world during these recent years. To establish Secure Cyber Space an effective communication network is needed. The cognitive netwo...
A SURVEY ON INFRASTRUCTURE ABSTRACTION OF WIRELESS SENSOR NETWORK
Wireless Sensor Network (WSN) is an autonomous sensor. Several abstractions are harnessed to ease out the difficult WSN application development. Various parameters have been developed to satisfy the different requirement...
Handling Highly Frequent Network Updates For K Nearest Neighbor Query On Road Networks
Outsourcing spatial databases to the cloud has provided the spatial query integrity which means that the third party service provider is Untrustworthy, therefore query integrity verifies the correctness and completeness...
MULTI LAYER NEURAL NETWORK AND SOUNDEX ALGORITHMS FOR TEXT RECOGNITION MODEL
This paper presents a text recognition model based on two algorithms multi-layer neural networks and Soundex algorithms. The text recognition model receives, recognize the text SMS sent by the user. Based on recognition,...
Firewall Management for to Resolve the Policy Anomalies
Firewall is a security system for network, that controls the network traffic based on firewall rules. Firewall depends on the policy configuration, but managing that firewall policy is complex. Existing policy analysis t...