• Nenhum resultado encontrado

[PDF] Top 20 Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

Top PDF Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks were compiled by 1Library PT

Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

Performance Comparison of Routing Protocols in Mobile Ad Hoc Networks

... Abstract Ad hoc networks are self configuring network and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol can accommodate such an ... See full document

9

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

... QoS in terms of data rate and delay will help to ensure the quality of the transmission of real time ...part of the traffic will be transmitted on ...aware routing protocol to ... See full document

7

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

... Mobile Ad Hoc Network (MANET) is an infrastructure less network provides multi hop based communication services, where the nodes are connected via wireless ...Wireless networks can be broadly ... See full document

11

Data Confidentiality in Mobile Ad hoc Networks

Data Confidentiality in Mobile Ad hoc Networks

... the routing in mobile ad hoc network (MANET) has also been given much attention by the researchers; many approaches, therefore, have been proposed to deal with external ...issue ... See full document

12

Realtime multiprocessor for mobile ad hoc networks

Realtime multiprocessor for mobile ad hoc networks

... PDAs, mobile phones and notebooks are increasingly equipped with wireless commu- nication technologies, providing higher degrees of mobil- ity and ease of ...use. Mobile ad hoc ... See full document

5

An Overview on Intrusion Detection in Manet

An Overview on Intrusion Detection in Manet

... consisting of mobile nodes such as Laptop, PDAs and wireless phones with the characteristics of self-organization and self-configuration ...[6]. Mobile ad hoc networks ... See full document

4

Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

Fuzzy-controlled Rebroadcasting in Mobile Ad Hoc Networks

... effects of saved rebroadcast (SRB) with respect to the total number of nodes in the ...number of nodes increase and Fuzzy-controlled Rebroadcasting saves maximum rebroadcasts throughout the ... See full document

5

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

... hop-count of 1, is sent by the upstream node of the broken link to source ...receipt of a RERR, source node initiates a new route discovery process if it still has packets to send to ... See full document

5

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

DYNAMIC K-MEANS ALGORITHM FOR OPTIMIZED ROUTING IN MOBILE AD HOC NETWORKS

... optimization in MANETs are greatly abundant. The authors are aware of futurist research of [10, 11], where Mobility Based Metric for Clustering has been used to effectively find the optimized paths ... See full document

14

An Investigation about Performance Comparison of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET

An Investigation about Performance Comparison of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET

... India in 1983 and 1990, respectively, and PhD degree from the Bharathiar University, Coimbatore, India, in ...Professor, in the Department of computer Science & Engineering, Government ... See full document

7

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

SAHR: Swarm Adaptive Hybrid Routing Protocol for Mobile Ad hoc Networks

... nodes in the Ad hoc networks are independent and well ...couple of nodes can interact with one another, if they have entered into the opponent transition ...creature in the world ... See full document

6

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

... both routing and MAC layer attacks in MANET. In our technique, we simultaneously use the three techniques of cumulative frequency detection, Data forwarding behavior detection and MAC ... See full document

8

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... status of a node. As an outcome of fuzzy decision rules, the node status can be considered as Little Strong, Strong, Very Strong, Lower Medium, Medium, Higher Medium, Little Weak, Weak, and Very ...status ... See full document

6

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

... reactive protocols AODV and DSR than proactive protocol DSDV but comparatively DSR showing best ...complicated in mobile ad hoc networks, because wireless links are subject to ... See full document

6

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

An Efficient Routing Protocol under Noisy Environment for Mobile Ad Hoc Networks using Fuzzy Logic

... status of a node. As an outcome of fuzzy decision rules, the node status can be considered as Little Strong, Strong, Very Strong, Lower Medium, Medium, Higher Medium, Little Weak, Weak, and Very ...status ... See full document

6

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

Cache Based Distributed Query Processing in Mobile Ad hoc Networks

... statement: In the last few years, the evolution of the mobile networks leads to the query processing in mobile computing an impressive research ...The mobile computing ... See full document

6

Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks

Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks

... However, in mobile network, the convergence of virtual ants to one best route, could not be a desir- able ...situation. In mobile networks, the bandwidth is scarce and an ... See full document

7

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

... packets in response to every RREQ copy that arrives from the source S via loop-free and node disjoint paths to the ...extension of AODV RREP packet with additional field Max_PPD, which will hold the maximum ... See full document

14

Bio-Inspired Routing Protocol for Vehicular Ad Hoc Networks

Bio-Inspired Routing Protocol for Vehicular Ad Hoc Networks

... Vehicular Ad-Hoc Network is a technology that uses moving vehicles as nodes in a network to create a random node movement ...meters of each other to connect and in turn create a network ... See full document

7

Implementing Smart Antenna System in Mobile Ad Hoc  Networks

Implementing Smart Antenna System in Mobile Ad Hoc Networks

... Location-aware routing schemes in MANETs assume that the individual nodes are aware of the locations of all the nodes within the ...Position-Based Routing. The best and easiest ... See full document

6

Show all 10000 documents...