Performance Evaluation of different Routing Algorithm in Wireless Ad hoc Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 5
Abstract
A mobile ad hoc network consists of wireless hosts and the movement of hosts results in a change in routes. There are many routing protocols proposed by different researchers but to determine which one work efficiently is a little difficult task. In this paper we have performed some simulation and try to compare the algorithm like flooding, LAR scheme1 and LAR scheme 2. We suggests an approach to utilize location information (for instance, obtained using the global positioning system) to improve performance of routing protocols for ad hoc networks. This paper gives an idea of optimizing the route searching methods in Wireless ad hoc networks.
Authors and Affiliations
Bighnaraj Mishra
A Real Time Implementation of High Speed Data Transmission using Aurora Protocol on Multi-Gigabit Transceivers in Virtex-5 FPGA
This paper proposes a design and implementation of high speed data transmission of 128 bit data serially at the rate of 3.125Gbps using architectural features of virtex-5 FPGA. The data transmission and reception is c...
A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then r...
Identifying the Top Demanding Technology Trends in the Field of Software Engineering
The rapid advancement of technology makes it difficult to choose the right domain for a software developer that will continue to exist in future. New inventions are replacing old technologies every day. Software compa...
A Glance At Malicious Attacks In Web
Web usage is one of the great important to all users in this era. For each and every need internet or web is made use of. Users make use of the area as a medium for searching information, performing business transacti...
Impact of DDOS Attacks on Cloud Environment
Cloud Computing is an emerging area nowadays. Researchers are working on all aspects of cloud viz. cloud network architecture, scheduling policies, virtualization, hypervisor performance scalability, I/O efficiency, d...