slugPreventing Black Hole Attack in Mobile Ad-Hoc Networks Using On-Demand Distance Vector
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 5
Abstract
The main objective of this research work is to improve the main advantage of this protocol is that routes are established on demand and destination sequence numbers are used to search out the newest route to the destination. The affiliation setup delay is lower. one in all the disadvantages of this protocol is that intermediate nodes will result in inconsistent routes if the supply sequence range is extremely previous and therefore the intermediate nodes have a better however not the newest destination sequence range, thereby having stale entries. Additionally multiple Route Reply packets in response to one Route Request packet will result in serious management overhead. Another disadvantage of AODV is that the periodic beaconing results in unnecessary bandwidth consumption. The variable used to set the black hole node being activated or deactivated. This will be used to inform the aodv routing protocol that if the node black hole property is set true then it will behave as a black hole node the performance o f the AODV is very good as it provides more than 92 % throughput under dense traffic circumstances.
Authors and Affiliations
Manisha Sao, Sushil Ku. Kashyap, Dr. Vishnu Kumar Mishra
Power Management of Solar Photovoltaic Based Microgrid with Demand Side Management
The use of modern solar photovoltaic system combined with efficient electrical appliances as load, storage battery, and demand side management strategies in the domestic sector, can significantly increase the PV value f...
Resource Allocation in Cloud Environment-A Review
Cloud Computing helps us to utilize the facilities of multiple applications such as web conferencing, games, E-mail on the Internet. With cloud computing we can create and configure the applications online. It also help...
Differentiate Different Methodology for Design of Vedic Multiplier
Multiplier is one of the most important part in any processor speed which improves the speed of the operation for example in special application processors like Digital Signal Processor (DSPs). Basically, the operationa...
Through Virtualization implementation of IPTV service delivery using Optimizing Cloud Resources
Virtualized cloud-based services can get advantage of statistical multiplexing across applications to give significant cost savings to the manipulator. Carrying out of IPTV service delivery through Virtualization is of...
VR Based Monitoring System
we describe the design and development of hardware and software of a portable Virtual Reality in this research paper. The easy access of the device is achieved using a small credit-card sized, yet a powerful computer, R...