Study of Routing Protocols in Mobile Ad Hoc Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
Mobile ad hoc networks (MANETs) are rapidly evolving as an important area of mobility. MANETs are infrastructure less autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Due to mobile nature of nodes, the network topology may change rapidly and unpredictably time to time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes. Many routing algorithms have been proposed and developed for accomplishing this task. Therefore, it is difficult to determine which protocol performs best under different situations. Hence, this paper presents review of routing protocols.
Authors and Affiliations
Nitin Goyat , Mr. Anshul Anand
A Puzzle Based Authentication Scheme for Cloud Computing
This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...
Early Proliferation Stage of Detecting Diabetic Retinopathy Using Bayesian Classifier Based Level Set Segmentation
This article presents Bayesian Classifier which controls the levels set segmentation and it detect the retinal clots at an early stage from the image captured from fundus camera. The classifier is a probabilistic and use...
A New Web Based Student Annual Review Information System (SARIS) With Student Success Prediction
In this paper, we are proposing new web based Student Annual Review Information System (SARIS) and prediction method for the success of scholar students to China Scholarship Council(CSC). The main objective of developing...
Secured Packet Hiding Technique for Packet Jamming Attacks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechani...
Facial Image Noise Removal Via a Trained Dictionary
In this project we address that, sparsity has shown to be useful in source separation. In most cases, the sources are not sparse currently and needs to sparsify them using a known dictionary. The problem here is that, if...