Performance evaluation of four hybrid routing protocols for low- and high-density MANETs
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 4
Abstract
Wireless ad-hoc networks are growing in popularity every day. MANETs, VANETs, and SENSOR are the examples of such networks. People are often unaware of the use of those different networks and sometimes it is not clearly understood which network type to deploy according to the requirements of users. Another problem is about which protocols best suits each type of wireless network’s issues. To fill this gap, we compare these three types of networks and finally show that MANET is the best suitable for almost all user’s requirements as it is easy to deploy anywhere at any time. Then using Energy, Accuracy, and Lifetime network parameters, we compare three types of routing protocols available in MANET PROACTIVE, REACTIVE, and HYBRID and choose the hybrid as the best routing protocol because it combines the features of both proactive and reactive protocols and is the only one which is provided with all these three parameters. These two performance evaluations finally lead us to the last evaluation with which, using three performance metrics, such as packet delivery ratio, throughput, and average end-to-end delay, we conduct a performance evaluation of four popular hybrid routing protocols ZRP, TORA, OORP, and ARPAM. The simulations are carried out using NS-2 simulator. The simulation results obtained for low- and high-density networks confirm that TORA performs better for networks with low node density in term of packet delivery ratio, end-to-end delay, and throughput whereas ZRP outperforms other protocols in term of the same metrics but in highly dense networks.
Authors and Affiliations
GATETE MARCEL
A Novel Approach for Web Document Classification
The web is a huge repository of information and there is a need for categorizing web documents to facilitate the search and retrieval of documents. Web document classification plays an important role in information organ...
MAT-V: A strong cryptography algorithm for stream cipher techniques
To improve and increase greater security, efficiency, confidentiality for end user in stream cipher algorithms and also increases complexity for all types of attackers such as correlation attack and linear syndrome attac...
Detection of Packet Dropping and Modification in Wireless Sensor Network
Security is crucial for wireless sensor networks deployed in hostile environments. The packet droppers and packet modifiers may be random. Identifying such attacks is very difficult and sometimes impossible. In this pape...
Analyzing Outlier Detection Techniques with Hybrid Method
Now day’s Outlier Detection is used in various fields such as Credit Card Fraud Detection, Cyber-Intrusion Detection, Medical Anomaly Detection, and Data Mining etc. So to detect anomaly objects from various types of dat...
A Generalized Webservice Selection Framework with Global Quality Constraints
With the advant of SOA based webservices and its attractive features IT industrey started moving towards the novel service dellivery SaaS. Due to its widley utilization different service providers are offering their serv...