slugAn Examination of HTTP Traffics against Proactive, Reactive and Hybrid Routing Protocols in MANET
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
A MANET consists of mobile nodes, a router with multiple hosts and wireless communication devices. The wireless communication devices are transmitters, receivers and smart antennas. This paper aims to compare performance of three routing protocols for Mo bile Ad - Hoc networks (MANET’s ). In present study, a comparison of reactive routing protocols i.e. Ad Hoc On - Demand Distance Vector Routing (AODV), proactive routing protocols i.e. Optimized Link State Routing (OLSR) and hybrid routing protocol i.e. Gathering - based Routing Protocol has been made on the basis of throughput, delay, network load, traffic sent and traffic received by increasing number of nodes in the network. MANET routing protocols are evaluated under different scenarios using file transfer protocol (ftp) . We compared three routing protocols i.e. AODV, OLSR and GRP. Our simulation tool will be OPNET modeler. All the three routing protocols are explained in a deep way with metrics. The comparison analysis will be carrying out about these protocols and in the last the conclusion will be presented, that which routing protocol is the best one for mobile ad hoc networks. The final evaluation is presented at the end of this paper.
Authors and Affiliations
Er. Rahul Paul, Er. Naveen Bilandi
slugPerformance of Multiplicative Data Perturbation for Privacy Preserving Data Mining
Data mining is a well-known technique for automatically and intelligently extracting information or knowledge from a large amount of data, however, it can also disclosure sensitive information about individuals compromi...
Friendbook: Semantic Based Friendship
Now a day’s friend recommendation has a greater impact on social networking. Friend recommendation based on social graph may not be most relevant to reflect user’s expectation on friend selection. Propose approach Based...
A Secure Based Approach in M-voting for Human Identification based on Iris Recognition using Biometrics
The iris recognition is one of the preeminent biometrics characteristics which are used for security purpose. This biometrics technology is related to human physiological and behavioral characteristics. This paper illus...
Privacy Preserving in Association Rule Mining
Data mining is the computer oriented process to evaluate vast database and extract the meaning of the data. Privacy is interrelated with secrecy and anonymity. Thus privacy preserving in data mining means maintaining sec...
Laboratory Automation Using Wireless Sensor Networks
The inclusion of internet communication within the loop of control is innovative comparing with the design methodologies of classical control system. In the proposed system, hazardous environment monitoring and control...