Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in MANET
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
This Mobile Ad hoc Networks (MANET) is a set of wireless mobile nodes dynamically form spontaneous network which works without centralized administration. Due to this characteristic, there are some challenges that protocol designers and network developers are faced with. These challenges include routing, service and frequently topology changes. Therefore routing discovery and maintenance are critical issues in these networks. There are also limited battery power and low bandwidth available in each node. In this paper, we evaluate the performance of four MANET routing protocols using simulations: AODV, OLSR, DSR and GRP. Our evaluation metrics are End-to-End delay, network load, throughput and media access delay. Most of the papers consider the first three parameters, but here we also consider MAC delay.
Authors and Affiliations
Manijeh Keshtgary , Vahide Babaiyan
A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods
This paper proposes a data-hiding technique for water marked images and secured transmission of those watermarked images to the destination . today’s lot of companies are stored their data in the images, they store data...
Private and Secure Hyperlink Navigability Assessment in Web Mining Information System
Information explosion in World Wide Web has increased the interest in Web usage mining techniques in both commercial and academic areas. Study of interested web users; provide valuable information for web designers to qu...
Removal of Salt and Pepper Noise from highly Corrupted Images using Mean Deviation statistical parameter
A novel idea of using median deviation parameter in estimating the noise in the images is proposed and successfully applied to both gray level as well as color images. The median filter which is very popular in removing...
A Journey from floppy disk to cloud storage
Data storage and backup needs have evolved over the years necessitating the need for evolution of data storage methods and devices. The needs for a higher storage capacity as well as versatility of storage devices and th...
A Survey on Recent Security Trends using Quantum Cryptography
Cryptography is the science of keeping private information from unauthorized access of ensuring data integrity and uthentication, and it is the strongest tool for controlling against much kind of security threats. Role...