slugQoS and Scalability with Mobility on the Performance of Routing Protocols of MANETs Using OPNET Modeller
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
MANET is combination of mobile nodes which uses multi hop transmission for communication. Due to highly dynamic topology, routing in MANET is challenging task, moreover presence of malicious nodes make the overall network very insecureFinally, we propose an approach to improve the efficiency of Reactive Routing protocols.The main classes of MANET routing protocols are Proactive, Reactive and Hybrid. In this paper we compare performance of Proactive routing protocol by focusing on Optimized Link State Routing (OLSR) and Reactive Routin g Protocol by focusing on Ad Hoc On Demand Distance Vector (AODV) and Gathering - based Routing Protocol (GRP). In this paper our simulation tool is OPNET modeller. The performance of these routing protocols is analysed by three metrics: delay, network load and throughput.This paper presents a performance analysis of three Mobile Ad Hoc Network (MANET) routing protocols – AODV, OLSR and GRP under the two mobility models i.e. Vector Mobility Model and Random Way Point. The final evaluation results to obtain route stability, so as to Improve routing efficiency as well by Vector mobility model.
Authors and Affiliations
Gaurav Kumar Soni, RajBala
Implementation of Optimized 64 Bit MAC using Vedic Multiplier and Reverse Logic Gate
In advanced digital signal processing the MAC (multiply and accumulate unit) unit acquires the predominant role. The optimized MAC unit deals with improvising the speed, area power consumption. The high speed processors...
D Flip Flop with Low Power Clocking System by using MTCMOS and Slumber Keeper Technique
power utilization plays an significant function in any integrated circuit. We are having three main challenges in semiconductor technology. in any integrated circuit clock sharing networks and storage elements such as f...
slugPrediction of Concealed Information from Social Networks
The online applications like social networks that allow the users to connect each other by different links. The users can update their profile with information of their friends and their private information. Some of the...
Tongue Recognition System for Authentication
The paper presents an efficient tongue recognition biometric system for authentication based on Dual Tree Complex Wavelet Transform. A method for identifying a person based on their tongue is provided in which an image...
slugA Novel Approach ForHost-Compiled Processor Model With Cache And PipeliningIntegration
In the increasing model of the embedded system software solutions host compiled as well as the Real Time Operating System made the dramatic added applications for the mobile applications all over the world. However, des...