Study of Routing Protocols in Mobile Ad Hoc Networks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
Mobile ad hoc networks (MANETs) are rapidly evolving as an important area of mobility. MANETs are infrastructure less autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Due to mobile nature of nodes, the network topology may change rapidly and unpredictably time to time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes. Many routing algorithms have been proposed and developed for accomplishing this task. Therefore, it is difficult to determine which protocol performs best under different situations. Hence, this paper presents review of routing protocols.
Authors and Affiliations
Nitin Goyat , Mr. Anshul Anand
Automatic Generation of Standard Deviation Attribute Profiles for Spectral–Spatial Classification of Remote Sensing Data
In recent years, the development of high-resolution remote sensing image extends the visual field of the terrain features. Back Propagation neural network is widely used in remote sensing image classification in recent y...
Implementation of Lifting-Based Two Dimensional Discrete Wavelet Transform on FPGA Using Pipeline Architecture
This paper presents the implementation of the high speed lifting-based two dimensional discrete wavelet transform (2D-DWT) algorithm on Field Programmable Gate Array (FPGA). Pipelining structure in DWT reduces hardware c...
Information Extraction using Incremental Approach
Data mining is playing vital role in text extraction as now a day’s large amount of data available in scientific research, biomedical literature and web data. Data retrieval using existing approaches use sequential appro...
Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...
Securing Web Accounts Using Graphical Password Authentication through Watermarking
Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security research...