slugSimulation of AODV Routing protocol
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 1
Abstract
A Mobile Ad hoc NETwork is a kind of Wireless ad-hoc network, and is a self configuring network of Mobile routers connected by wireless links. Mobile Ad-Hoc Network (MANET) is a wireless network without infrastructure. Self configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. Efficient routing protocols will make MANETs reliable. In this paper, an attempt has been made to know protocols AODV.The simulation of AODV has been done by using simulation tool NS2 which is the main simulator, NAM (Network Animator) and excel graph which is used for preparing the graphs from the trace files.
Authors and Affiliations
Isha Gautam
Application of Pinch Technology in Refrigerator Condenser Optimization –A Review
In the refrigerator condenser the study of condenser is main objective for the improvement of system output. Pinch technology and computational fluid dynamics is key for study the condenser and enhance the better option...
Multimodal Biometric System using Fingerprint and Iris
A single biometric identifier in making a personal identification is often not able to meet the desired performance requirements. Biometric identification based on multiple biometrics represents an emerging trend. Autom...
Design of Multioutput High Speed Adder Using Domino Circuit
Dynamic gates have been excellent choice in the design of high-performance modules such as full adders, subtractors, multipliers, registers, multiplexers and comparators in modern microprocessors. However, the main draw...
Rainfall-Runoff Modeling using Multiple Linear Regression Technique
In this paper MLR model was developed to model the rainfall-runoff process. The main objective of this study is to prove that MLR can be successfully used as R-R models. It is for this reason that various MLR models wer...
Visual Cryptography for Light Encryption Scheme Using LED Based On Halftoning Algorithm
Visible Light is regarded as a reliable mode of communication in comparison with Radio Frequency communication. It has a great scope in 5G networks. But this visible light communication is prone to security issues like...