Performance Evaluation of Internet Routing Protocols in Wireless Mesh Networks
Journal Title: Indian Journal of Computer Science and Engineering - Year 2016, Vol 7, Issue 3
Abstract
Wireless Mesh Networks are considered as a feasible solution for transformation into next generation wireless network to offer Internet services for large variety of applications. These types of networks are used for providing enhanced services and extended coverage for scalable deployment. To support such services, an attempt is made to incorporate existing Internet Protocols into Wireless Mesh Networks and study their performance under different network scenarios. In this research contribution, a systematic investigation of proactive protocol Optimized Link State Routing (OLSR), two Internet Protocols Open Shortest Path First (OSPF) and Routing Information Protocol (RIP) are simulated in QualNet for Wireless Mesh Networks. The simulation results shows that OLSR provides better throughput and end-to-end delay in terms of number of nodes and OSPF has got clear advantage over link utilization when compared to OLSR and RIP.
Authors and Affiliations
H R Ranganatha , Shobha Rani A , T G Basavaraju
PROPOSED PROFILE TRANSLATION IN CONTEXT AWARE PROACTIVE SYSTEM
The advancement of mobile devices and Internet has given us great platform for our day to day tasks. Various Activities like ticket booking; shopping, paying bills have been done on the fly.The Smartphone adds portabilit...
A STUDY ON DIFFERENT FEATURE EXTRACTION TECHNIQUES FOR LESION IDENTIFICATION IN MRI BREAST IMAGES
This study discusses the different feature extraction techniques for lesion identification in Dynamic Contrast Enhancement - Magnetic Resonance Imaging (DCE - MRI) of Breast. In DCE- MRI, kinetic feature extraction is a...
A NOVEL APPROACH TO GENERATE FRACTAL IMAGES USING CHAOS THEORY
We propose the fractal generation method to generate the different types of fractals using chaos theory. The fractals are generated by Iterated Function System (IFS) technique. The chaos theory is an unpredictable behavi...
IMPROVING VIRTUAL MACHINE SECURITY THROUGH INTELLIGENT INTRUSION DETECTION SYSTEM
Virtualization is the key feature of cloud computing which facilitates sharing of common resources among cloud users. As cloud computing is a shared facility and accessed remotely, it is vulnerable to various attacks. Th...
RELATIVE QUERY RESULTS RANKING FOR ONLINE USERS IN WEB DATABASES
To handle with the problem of so many-answers replied from an online Web database in response to a relative query, this paper proposes a unique approach to rank the similar query results. Depending upon the on the databa...