• Nenhum resultado encontrado

[PDF] Top 20 COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

Has 10000 "COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS" found on our website. Below are the top 20 most common "COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS".

COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

COMPARATIVE REVIEW FOR ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORKS

... Hass in 1997[5]; the key value of this protocol is the ability to divide all networks members into a set of groups called ...of protocols. First, IntrA-zone Routing Protocol (IARP), it allows ... See full document

19

Realtime multiprocessor for mobile ad hoc networks

Realtime multiprocessor for mobile ad hoc networks

... PDAs, mobile phones and notebooks are increasingly equipped with wireless commu- nication technologies, providing higher degrees of mobil- ity and ease of ...use. Mobile ad hoc networks ... See full document

5

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

... Vehicular Ad hoc Networks ...BSP in MANETs based on realistic mobility model and Performance evaluation of an efficient counter-based scheme for mobile ad hoc ... See full document

11

Rebroadcasting for Routing Reduction based upon Neighbor coverage in Ad Hoc Networks

Rebroadcasting for Routing Reduction based upon Neighbor coverage in Ad Hoc Networks

... (MOBILE ad hoc networks) contains a set of mobile nodes which can shift without ...topology networks which are arbitrary without a predetermined ...dynamic routing ... See full document

5

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... the routing in mobile ad hoc network (MANET) has also been given much attention by the researchers; many approaches, therefore, have been proposed to deal with external ...issue ... See full document

12

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETWORKS (MANETS)

... done in the MATLAB programming and the output produces time of data ...Mahriyar in [12] analyzed video streaming characteristics in Ad hoc networks using several cryptography ... See full document

13

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

... A Mobile Ad hoc Network (MANET) is an autonomous system of mobile nodes connected by wireless ...connecting mobile devices quickly and spontaneously. Most existent protocols, ... See full document

6

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

... Li and Cuthbert (2004) declare the AODV is a single-path, on-demand routing protocol. When a source node generates a packet for a particular destination node, it broadcasts a Route Request (RREQ) packet Williams ... See full document

5

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

... Several routing protocol analyzing strategies are used to verify the protocol and the test is conducted by changing the various parameters according to a particular ...move in the area 3000 X 1000m 2 ... See full document

6

A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks

A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks

... Slow Start: Before TCP can send data at a fast rate, it needs to estimate the bandwidth available. If this is not done, the throughput of the TCP connection will drastically decrease, as the intermediate routers would ... See full document

5

Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

... AODV in a Wi-Fi ...both routing protocols are well tailored for scenarios with maximum 40 ...the routing overhead in scenarios with larger number of nodes can have very high values ... See full document

4

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

... neighbors. Routing packets including Hello messages which have higher priority always transmitted firstly and data packets are queued ...AODV routing protocol, when the traffic is low in the network, ... See full document

7

Implementing Smart Antenna System in Mobile Ad Hoc  Networks

Implementing Smart Antenna System in Mobile Ad Hoc Networks

... nodes in forwarding its data packets to Node B. In other words, the data packets from Node A are passed onto the neighbouring nodes in a series of single hops until the data packets reach Node ... See full document

6

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

... Future mobile Ad hoc networks (MANETs) are expected to be based on all-IP architecture and be capable of carrying multitudinous real-time multimedia applications such as voice, video and ... See full document

14

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic ...(ERPN). In this paper, the proposed protocol enhances Dynamic Source ... See full document

6

Byzantine fault-tolerant agreement protocols for wireless Ad hoc networks

Byzantine fault-tolerant agreement protocols for wireless Ad hoc networks

... wireless ad-hoc environments, it deserves a systematic study in order to circumvent its impossibility ...system. In this regard, randomization seems to be the best approach because it just ... See full document

209

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... Mobile ad hoc network is a collection of mobile devices which can communicate through wireless ...of routing protocol is to direct packets from source to ...hard in mobile ... See full document

6

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

... both in resource utilization and preventing DoS attacks. In this study, a DoS attack caused by a selfish node that drops packet and a wormhole attack caused by a malicious node, both are ...management ... See full document

8

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

... election in the each time slot T is complemented, cluster state is going to stable ...optimized routing in this state, each cluster head appoint a proportionate TDMA (Time Division Multiple Access) ... See full document

14

Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

... rebroadcast messages, high contention and collision in the network. This leads to a huge loss of battery power [3-10]. To mitigate this problem, several rebroadcast schemes have been proposed. Cartigny and Simplot ... See full document

5

Show all 10000 documents...