Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
A mobile ad hoc network is self configuring, resource poor and has dynamically changing topology. Keeping in view these constraints and complexity number of routing protocols are proposed. The most popular protocols are AODV, DSDV and OLSR. In this paper an attempt has been made for comparison of these three protocols on the basis of different performance matrices. The Network Simulator (NS2) is used for simulating the mobile ad hoc network. The results presented in this paper work are indicating the performance comparison of different protocols on the basis of End-to-End delay, Throughput, Packet Delivery Ratio and Normalized Routing Load. Different Awk scripts are used for finding the values of these parameters.
Authors and Affiliations
Alok Upadhyay, Rupali Phatak
Intelligent Encoding of Packets Against Jamming Attacks in Wireless Network
Wireless network never has certain limited boundaries that can’t be extended due to this nature security flaws may get developed. When someone breaks into wireless network system that person takes advantage of lapses...
MINIMIZING END – TO – END DELAY IN MULTIPARTY NETWORK APPLICATIONS
In these days interaction between different network applications are becoming more popular and to improve the speed and datatransfer rate delay difference between the multynetworks should minimize. In this paper we p...
Delegating Auditing Task to TPA for Security in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. Extension is introducing Third Party auditing users can sa...
Provide Secure And Privacy-Preserving Access Control To Users Anonymously Utilize The Cloud Resource Using Mona
Involvement in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue due to the regular change of the membership.In the meantime the storage overhead and...
Big Data Analytics for Net Flow Analysis in Distributed Environment using Hadoop
Network traffic measurement and analysis have been regularly performed on a high performance server that collects and analysis packet flow. When we monitor a large volume of network traffic data for detailed statisti...