• Nenhum resultado encontrado

[PDF] Top 20 Eccentricity in Zone Routing Protocol for MANET

Has 10000 "Eccentricity in Zone Routing Protocol for MANET" found on our website. Below are the top 20 most common "Eccentricity in Zone Routing Protocol for MANET".

Eccentricity in Zone Routing Protocol for MANET

Eccentricity in Zone Routing Protocol for MANET

... table-driven routing algorithms for ...vector protocol. In distance vector protocols, every node n maintains for each destination x a set of distances {dnj(x)} for each node j that is a neighbour of ... See full document

7

Framework for Location Based Power Aware Routing in MANET

Framework for Location Based Power Aware Routing in MANET

... efficient routing the data packets in terms of QoS and energy consumption becomes very ...Many routing protocols have been proposed for efficient routing ...on-demand routing ... See full document

6

Trust Based Power Aware Secure Source Routing Protocol using Fuzzy Logic for Mobile Adhoc Networks

Trust Based Power Aware Secure Source Routing Protocol using Fuzzy Logic for Mobile Adhoc Networks

... conditions in MANET environments. In this paper, a novel trust management scheme is proposed which uses not only the trust value of a node but also the residual energy level of a ...node. In ... See full document

10

AN ENERGY EFFICIENT CLUSTER HEAD SELECTION FOR FAULTTOLERANT ROUTING IN MANET

AN ENERGY EFFICIENT CLUSTER HEAD SELECTION FOR FAULTTOLERANT ROUTING IN MANET

... Based) routing protocol [11] combine both GDMAC and FDCB protocols and uses CFSR for QoS ...Service routing in the ...Service in the ...connections in the ... See full document

9

Implementation of Fuzzy Priority Scheduler for MANET and Performance Analysis with Reactive Protocols

Implementation of Fuzzy Priority Scheduler for MANET and Performance Analysis with Reactive Protocols

... included in the data packets as the route header. The DSR protocol consists of two phases – Route Discovery and Route ...stored in its ...A in the route ...node. In that case, it ... See full document

6

SCTP-MANET New Extension of SCTP Protocol for the Optimization of MANET Performances

SCTP-MANET New Extension of SCTP Protocol for the Optimization of MANET Performances

... of MANET is the perpetual instability of its topology as well as the number of the nodes participating in the data ...sparse MANET undergoes more link interruptions between source and ...This ... See full document

14

A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

A Cluster based Technique for Securing Routing Protocol AODV against Black-hole Attack in MANET

... Attack in MANETs” European Journal of Scientific Research, ISSN 1450-216X ...Cryptography in Mobile Ad Hoc Networks”International Journal of Computer Science and Security ISSN 1985-1553 volume ... See full document

6

A Review Paper on Route Maintenance in Stability Based Energy  Aware Routing Protocol In MANET

A Review Paper on Route Maintenance in Stability Based Energy Aware Routing Protocol In MANET

... algorithm. In their idea, each node maintains a table that contains the previous hop node address, the value of the received packet signal power, and the time which this data packet has been ... See full document

5

New Multicast Routing Protocol in Ad-Hoc Network

New Multicast Routing Protocol in Ad-Hoc Network

... sender in a multicast group, so it is group-oriented computing. In wired networks, some well established routing protocols can provide efficient multicast, but when it comes to MANETs, these ... See full document

12

Improved Quality of Service Protocol for Real Time Traffic in MANET

Improved Quality of Service Protocol for Real Time Traffic in MANET

... less routing overhead. On the other hand, the on demand routing protocols are reactive protocols that exchange routing information only when ...preferred in bandwidth constrained ... See full document

12

A simulation based QoS review of multipath routing protocols for MANET

A simulation based QoS review of multipath routing protocols for MANET

... out in terms of five scenario patterns such as RWM, RPGM, MGM, GMM, and PMM in two different traffic patterns such as CBR and TCP using NS2 and Bonn ...well in all the five scenarios and in ... See full document

11

A Proactive Load-Aware Gateway Discovery in Ad Hoc Networks for Internet Connectivity

A Proactive Load-Aware Gateway Discovery in Ad Hoc Networks for Internet Connectivity

... load-aware routing protocols for Mobile Ad Hoc ...conditions in Ad Hoc networks for Internet ...proposed protocol performance through simulation for different traffic and mobility ...performance ... See full document

20

Impact of Malicious Nodes under Different Route Refresh Intervals in Ad Hoc Network

Impact of Malicious Nodes under Different Route Refresh Intervals in Ad Hoc Network

... regular routing protocols fail. Wireless routing protocols can be broadly classified into pro active routing protocols and reactive routing ...protocols. In proactive routing ... See full document

6

A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

... through routing has been widely studied for VANETs. MANET protocols such as Ad-hoc on Demand distance Vector routing (AODV) proposed by Perkins and Royer (1999), Optimized Link State Routing ... See full document

8

BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EMERGENCY AND RESCUE SITUATION IN INDIA

BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EMERGENCY AND RESCUE SITUATION IN INDIA

... topology, routing is a considerable factor in ...destination. In this unstable environment routing of information from one place to another is a challenging ...are in a situation that ... See full document

15

Mitigating routing behavior in mobile wireless network with various types of routing attacks

Mitigating routing behavior in mobile wireless network with various types of routing attacks

... [1] MANET routing protocol there are different attacks an attacker modifies source routing list with respect to RREQ or RREP ...nodes in the routing ...[2] MANET ... See full document

5

Rafael Timóteo de Sousa Jr., Robson de Oliveira Albuquerque, Maíra Hanashiro, Yamar Aires da Silva and Paulo Roberto de Lira Gondim

Rafael Timóteo de Sousa Jr., Robson de Oliveira Albuquerque, Maíra Hanashiro, Yamar Aires da Silva and Paulo Roberto de Lira Gondim

... distributed MANET certification authority can be created and implemented [3], but it depends and relies on the value of k, which describes the size of a MN group capable of holding the parts that constitute a SK ... See full document

8

A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface

A Query Driven Routing Protocol for Wireless Sensor Nodes in Subsurface

... Traditionally in WSN network application, communications within nodes have seen a lot of development and ...different routing protocols for conventional applications of WSNs, which have been developed or ... See full document

8

QoS Assertion in MANET Routing based on Trusted AODV (ST-AODV)

QoS Assertion in MANET Routing based on Trusted AODV (ST-AODV)

... ST-AODV protocol is proposed that identifies the nodes that drop packets during data ...nodes in the path during ...resulting in a trustworthy MANET ...trustworthy routing. The same ... See full document

9

A Fault Tolerant Congestion Aware Routing Protocol for Mobile Adhoc Networks

A Fault Tolerant Congestion Aware Routing Protocol for Mobile Adhoc Networks

... link in the sequence fails, the route no longer ...failure. In MANET, users communicate by relaying in ...error in wireless channels or hidden terminal ...increases routing ... See full document

8

Show all 10000 documents...