• Nenhum resultado encontrado

[PDF] Top 20 STUDY AND ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK

Has 10000 "STUDY AND ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK" found on our website. Below are the top 20 most common "STUDY AND ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK".

STUDY AND ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK

STUDY AND ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK

... performance in low density, whre as in high density both oslr and DSR performes well, oslr is good in both low and high node density (Jat and Patel, 2012) that OLSR is best ... See full document

7

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

Secure Routing and Data Transmission in Mobile Ad Hoc Networks

... AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc ...pair of source-destination nodes of a MANET for securing the ... See full document

17

An Investigation about Performance Comparison of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET

An Investigation about Performance Comparison of Multi-Hop Wireless Ad-Hoc Network Routing Protocols in MANET

... India and M.E degrees from Madurai Kamaraj University, Tamilnadu, India in 1994 and 1997, respectively, and PhD degree from the Periyar University, Salem, India, in ...Principal ... See full document

7

Review Strategies and Analysis of Mobile Ad Hoc Network- Internet Integration Solutions

Review Strategies and Analysis of Mobile Ad Hoc Network- Internet Integration Solutions

... Routing in Internet is IP address based. Each IP address consists of network id and host id ...portion. Routing decisions are taken by routers for packets based on the ... See full document

11

Analysing the Behaviour and Performance of Opportunistic Routing Protocols in Highly Mobile Wireless Ad Hoc Networks

Analysing the Behaviour and Performance of Opportunistic Routing Protocols in Highly Mobile Wireless Ad Hoc Networks

... opportunistic routing protocols tries to optimize the various parameters on which the opportunistic routing is build that includes the candidate list, forwarder selection and prioritization ... See full document

9

Intrusion detection in mobile ad hoc network

Intrusion detection in mobile ad hoc network

... detection in MANETs, however, is challenging for a number of reasons ...lack of concentration points where traffic can be analyzed for intrusions; utilize self configuring multi-party infrastructure ... See full document

7

A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks

A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks

... A Mobile Ad Hoc Network (MANET) is considered an autonomous collection of wireless mobile nodes that are capable of communicating with each other without the use of ... See full document

5

BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EMERGENCY AND RESCUE SITUATION IN INDIA

BEHAVIOUR OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS INVESTIGATED FOR EMERGENCY AND RESCUE SITUATION IN INDIA

... to network changes. Some protocols choose a single path from all available routes, that path information alone is stored in the routing ...table. In multipath, all available paths are ... See full document

15

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

... In Mobile Ad-Hoc Networks (MANETs), mobile devices are equipped with power ...(energy). In order to utilize this energy equipped devices efficiently for transmission of ... See full document

6

Guard against cooperative black hole attack in Mobile Ad-Hoc Network

Guard against cooperative black hole attack in Mobile Ad-Hoc Network

... vulnerability of on-demand ad-hoc routing protocols, especially AODV, which an adversary can exploit to perform a black hole attack [4] on mobile ad-hoc ...node ... See full document

6

Implementing Smart Antenna System in Mobile Ad Hoc  Networks

Implementing Smart Antenna System in Mobile Ad Hoc Networks

... data and are at some distance apart. Because they are out of radio range with each other, it is necessary for Node A to use the neighbouring or intermediate nodes in forwarding its data packets to ... See full document

6

Analysis of AOMDV and OLSR Routing Protocols Under Levy-Walk Mobility Model and Gauss-Markov Mobility Model for Ad Hoc Networks

Analysis of AOMDV and OLSR Routing Protocols Under Levy-Walk Mobility Model and Gauss-Markov Mobility Model for Ad Hoc Networks

... Tech Network Simulator (GTNetS) a very large scale network ranging from 10,000 nodes to 50,000 nodes is evaluated with AODV is the routing protocol in ...kind of setup the packet ... See full document

8

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

EFFECTIVE APPROACH FOR REDUCING THE FLOODING IN ROUTING MECHANISM FOR MULTIHOP MOBILE AD HOC NETWORKS

... nodes in the first inner circle are one-hop neighbours and the nodes in the outer circle are two-hop ...copies of the packet to all its two-hop neighbours of S at the same ...contention ... See full document

11

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

... statement: In Mobile Ad hoc Network (MANET), both the routing layer and the Medium Access Control (MAC) layer are vulnerable to several ...detect and isolate the ... See full document

8

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

... A Mobile Ad Hoc Networks (MANET) is a collection of mobile nodes that can communicate with each other using multi-hop wireless links without utilizing any fixed based- station ... See full document

7

A Performance Comparison of Routing Protocols for Ad Hoc  Networks

A Performance Comparison of Routing Protocols for Ad Hoc Networks

... Mobile Ad hoc Network (MANET) is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic ...infrastructure. ... See full document

8

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

LINK STABILITY WITH ENERGY AWARE AD HOC ON DEMAND MULTIPATH ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS

... Mobile Ad Hoc Network is one of the wireless network in which mobile nodes are communicate with each other and have no infrastructure because no access ... See full document

5

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

A Secure Routing Protocol to Eliminate Integrity, Authentication and Sleep Deprivation Based Threats in Mobile Ad hoc Network

... statement: Network security in Mobile Ad hoc Network (MANET) is a major ...Some of the attacks such as modification, impersonation, Time To Live (TTL) and sleep ... See full document

13

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

Efficient Load Balancing Routing Technique for Mobile Ad Hoc Networks

... goal of this paper is thus to present novel algorithm for efficient load balancing ...balancing and energy efficiency ...method of link estimation proposed for energy efficiency improvement ... See full document

6

Impact of Malicious Nodes under Different Route Refresh Intervals in Ad Hoc Network

Impact of Malicious Nodes under Different Route Refresh Intervals in Ad Hoc Network

... A Mobile Ad-Hoc Network (MANET) is formed by a collection of wireless nodes communicating with each other without the necessity of any ...infrastructure. Ad-hoc ... See full document

6

Show all 10000 documents...