Performance Analysis of Table Driven and Event Driven Protocols for Voice and Video Services in MANET
Journal Title: Journal of Independent Studies and Research - Computing - Year 2015, Vol 13, Issue 1
Abstract
This research paper encompasses the performance analysis of table driven and event driven routing protocols by using voice and video traffic in mobile Adhoc network (MANET). Particularly, OLSR (table driven) and DSR (Event driven) protocol are considered. The nodes of MANET establish the connections with each other energetically and can move freely in any direction. In mobile Adhoc network, environment event driven and table driven protocols have significant subject matter of study. There is a mobility issue which matters the service performance due to breakage and renewal of links of mobile nodes. Protocols performance has significance on overall performance of MANET. The aim of this study is to present the performance analysis of selected routing protocols by varying the node densities and WLAN physical characteristics. The voice and video traffic applications are configured discretely by using OLSR and DSR in scenarios. Moreover, for the performance observation the parameters are jitter, traffic received, traffic sent, end-to-end delay, traffic load, and throughput. The simulations have been carried out through OPNET 14.5 modeller tool and results has been analysed.
The Impending 5G Era and Its Likely Impact on Society
This paper looks at the emergence of the fifth generation of wireless networks, commonly referred to by the acronym 5G, from a perspective informed by the literature on digital divides and digital inequality. 5G has been...
Comparative Analysis of Collaborative Filtering on GraphLab, MLlib and Mahout
Recommendation systems are used to recommend items or products to the user based on their previous purchases, visits, interests, ratings, wish-lists or reviews to develop interest and to display the accurate and suitable...
Extracting patterns from Global Terrorist Dataset (GTD) Using Co-Clustering approach
Global Terrorist Dataset (GTD) is a vast collection of terrorist activities reported around the globe. The terrorism database incorporates more than 27,000 terrorism incidents from 1968 to 2014. Every record has spatial...
Extracting Key Sentences from Text
Automatic key sentence extraction from a text is a challenging task. It has numerous applications in text processing systems. The actual task of key sentence extraction consists of three main functionalities: (i) Identif...
Analysing Input Effort during Online Conference in a Client Server Application
Searching the recorded chat, newsgroup, mailing list etc is easy, which are the text archive generated by the persistent conversation, but it is not very expressive or accurate for the social patterns to tell the user ab...