Enviar pesquisa
Carregar
50120130406027
•
0 gostou
•
788 visualizações
IAEME Publication
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 7
Baixar agora
Baixar para ler offline
Recomendados
Aodv
Aodv
Akshita Sharma
Investigating effects of channel fading on routing protocols in wireless
Investigating effects of channel fading on routing protocols in wireless
IAEME Publication
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
eSAT Publishing House
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
eSAT Journals
50120130405022
50120130405022
IAEME Publication
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
IJARIIT
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
eSAT Publishing House
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
IJCSEA Journal
Recomendados
Aodv
Aodv
Akshita Sharma
Investigating effects of channel fading on routing protocols in wireless
Investigating effects of channel fading on routing protocols in wireless
IAEME Publication
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
eSAT Publishing House
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
eSAT Journals
50120130405022
50120130405022
IAEME Publication
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
IJARIIT
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
eSAT Publishing House
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
IJCSEA Journal
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet
Alexander Decker
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanet
Alexander Decker
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
IJECEIAES
Md3421762181
Md3421762181
IJERA Editor
Ds35676681
Ds35676681
IJERA Editor
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
cscpconf
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
eSAT Publishing House
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
Mesh network
Mesh network
Fatima Radi
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Eswar Publications
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
ijwmn
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
ijsrd.com
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
IRJET Journal
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
IAEME Publication
The resistance of routing protocols against DDOS attack in MANET
The resistance of routing protocols against DDOS attack in MANET
IJECEIAES
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
MICROCONTROLLER BASED SOLAR POWER INVERTER
MICROCONTROLLER BASED SOLAR POWER INVERTER
IAEME Publication
FIRING ANGLE SVC MODEL FOR ANALYZING THE PERFORMANCE OF TRANSMISSION NETWORK ...
FIRING ANGLE SVC MODEL FOR ANALYZING THE PERFORMANCE OF TRANSMISSION NETWORK ...
IAEME Publication
REDUCTION OF HARMONIC DISTORTION IN BLDC DRIVE USING BL-BUCK BOOST CONVERTER ...
REDUCTION OF HARMONIC DISTORTION IN BLDC DRIVE USING BL-BUCK BOOST CONVERTER ...
IAEME Publication
NON-ISOLATED SOFT SWITCHING DC-DC CONVERTER AND LOAD AT FULL RANGE OF ZVS
NON-ISOLATED SOFT SWITCHING DC-DC CONVERTER AND LOAD AT FULL RANGE OF ZVS
IAEME Publication
Mais conteúdo relacionado
Mais procurados
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet
Alexander Decker
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanet
Alexander Decker
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
IJECEIAES
Md3421762181
Md3421762181
IJERA Editor
Ds35676681
Ds35676681
IJERA Editor
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
cscpconf
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
eSAT Publishing House
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
Mesh network
Mesh network
Fatima Radi
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Eswar Publications
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
ijwmn
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
ijsrd.com
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
IRJET Journal
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
IAEME Publication
The resistance of routing protocols against DDOS attack in MANET
The resistance of routing protocols against DDOS attack in MANET
IJECEIAES
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
Mais procurados
(18)
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
11.broadcasting routing protocols in vanet
11.broadcasting routing protocols in vanet
Broadcasting routing protocols in vanet
Broadcasting routing protocols in vanet
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
Md3421762181
Md3421762181
Ds35676681
Ds35676681
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
Mesh network
Mesh network
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Attacks and Routing Protocols in MANET: A Review
Attacks and Routing Protocols in MANET: A Review
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
The resistance of routing protocols against DDOS attack in MANET
The resistance of routing protocols against DDOS attack in MANET
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Destaque
MICROCONTROLLER BASED SOLAR POWER INVERTER
MICROCONTROLLER BASED SOLAR POWER INVERTER
IAEME Publication
FIRING ANGLE SVC MODEL FOR ANALYZING THE PERFORMANCE OF TRANSMISSION NETWORK ...
FIRING ANGLE SVC MODEL FOR ANALYZING THE PERFORMANCE OF TRANSMISSION NETWORK ...
IAEME Publication
REDUCTION OF HARMONIC DISTORTION IN BLDC DRIVE USING BL-BUCK BOOST CONVERTER ...
REDUCTION OF HARMONIC DISTORTION IN BLDC DRIVE USING BL-BUCK BOOST CONVERTER ...
IAEME Publication
NON-ISOLATED SOFT SWITCHING DC-DC CONVERTER AND LOAD AT FULL RANGE OF ZVS
NON-ISOLATED SOFT SWITCHING DC-DC CONVERTER AND LOAD AT FULL RANGE OF ZVS
IAEME Publication
DESIGN CONTROL SYSTEM OF AN AIRCRAFT
DESIGN CONTROL SYSTEM OF AN AIRCRAFT
IAEME Publication
พื้นที่ใต้เส้นโค้งปกติม.6
พื้นที่ใต้เส้นโค้งปกติม.6
KruGift Girlz
ODD EVEN BASED BINARY SEARCH
ODD EVEN BASED BINARY SEARCH
IAEME Publication
Ijmet 07 06_005
Ijmet 07 06_005
IAEME Publication
Destaque
(8)
MICROCONTROLLER BASED SOLAR POWER INVERTER
MICROCONTROLLER BASED SOLAR POWER INVERTER
FIRING ANGLE SVC MODEL FOR ANALYZING THE PERFORMANCE OF TRANSMISSION NETWORK ...
FIRING ANGLE SVC MODEL FOR ANALYZING THE PERFORMANCE OF TRANSMISSION NETWORK ...
REDUCTION OF HARMONIC DISTORTION IN BLDC DRIVE USING BL-BUCK BOOST CONVERTER ...
REDUCTION OF HARMONIC DISTORTION IN BLDC DRIVE USING BL-BUCK BOOST CONVERTER ...
NON-ISOLATED SOFT SWITCHING DC-DC CONVERTER AND LOAD AT FULL RANGE OF ZVS
NON-ISOLATED SOFT SWITCHING DC-DC CONVERTER AND LOAD AT FULL RANGE OF ZVS
DESIGN CONTROL SYSTEM OF AN AIRCRAFT
DESIGN CONTROL SYSTEM OF AN AIRCRAFT
พื้นที่ใต้เส้นโค้งปกติม.6
พื้นที่ใต้เส้นโค้งปกติม.6
ODD EVEN BASED BINARY SEARCH
ODD EVEN BASED BINARY SEARCH
Ijmet 07 06_005
Ijmet 07 06_005
Semelhante a 50120130406027
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
eSAT Journals
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
ijsrd.com
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
ijcsit
1. 8481 1-pb
1. 8481 1-pb
IAESIJEECS
20120130405026
20120130405026
IAEME Publication
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
IRJET Journal
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
IOSR Journals
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
IOSR Journals
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
IAEME Publication
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
IAEME Publication
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
ijceronline
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
IDES Editor
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
IAEME Publication
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ijasuc
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networks
IAEME Publication
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
IOSR Journals
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
IOSR Journals
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
IOSR Journals
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
Semelhante a 50120130406027
(20)
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
1. 8481 1-pb
1. 8481 1-pb
20120130405026
20120130405026
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networks
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Mobile Adhoc Network (MANET) Routing Protocols Analytical Study
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Último
(20)
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
50120130406027
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 6, November - December (2013), pp. 240-246 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME A STUDY ON SECURITY LEVEL OF AD HOC ROUTING PROTOCOL TO FIND OTHER APPROACH WITH DSDV Prof. Vikram M. Agrawal1, Prof. Samip A. Patel2 IT Department, BVM Engineering College ABSTRACT Mobile ad hoc networks have a collection of large number of mobile nodes that form temporary network without aid of any existing network like physical infrastructure or central access point. So it means in MANET it can not be identified the particular topology for particular time. The main characteristics of MANETs are dynamic topology, node mobility, provides large number of degree of freedom and self-organizing capability. These all properties make it completely different from other network. Due to such properties of MANETs, to design and development of secure routing is challenging task in open and distributed communication environments with protocols. There is option of cryptography to give advance security to already present protocols. It may be best option of DSDV for key management and message sending. Keywords: MANETs, Security, Cryptography, DSDV, AODV. 1. INTRODUCTION WIRELESS cellular system has been in use since 1980s. At the starting of the development of wireless system, it operates with the help of a centralized supporting structure it means there is one server or main point which manage the all the network. This is also known as an access point. Recent advancement of wireless technologies like Bluetooth [3], IEEE 802.11 [4] introduced a new type of wireless system known as Mobile ad-hoc network (MANETs) [1, 2, 5, 6], which operate in the absence of central access point or server. It provides high mobility and device portability that enable to nodes connect network and communicate to each other anytime and anywhere. It allows the devices to maintain connections to the network as well as easily adding and removing from the network. User has great flexibility to design such a network which is available at cheapest cost and minimum time. DSDV is the only proactive protocol taken for comparison with other secure protocols. It has most common features with the traditional routing protocols in wired networks. The sequence numbers are added to ensure loop-free routes. 240
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 2. FEATURES OF MANETs (Different type of connection) A mobile ad hoc network has following features [7]: Autonomous Terminal: It means each node may function as both a host and a router. So each node can send and receive packet as well work as mediator. Distributed Operation: The nodes act as a relay to implement functions. So packets are sent in form of relay one will send packet to second and second will send to third and so on. Multi-hop Routing: When delivering data packets from a source to its destination out of the direct wireless transmission range, the packets should be forwarded via one or more intermediate node [8] FIG 1: Multi Hop Routing Dynamic Network Topology: The mobile nodes in the network dynamically establish routing among themselves. When they finish the work then loose the network and move out Light-weight Terminal: In this network is established for some particular purpose. In these MANET nodes with less CPU processing capability, small memory size, and low power storage are exist. 3. WEAKNESSES OF MANETs Since nodes in mobile network can move dynamically, the network tends to change its topology very frequently just because of joining and leaving network is not managed by any central entity. This mobile nature of the nodes may create many security and other issues in MANETs [7]: Lack of Centralized Management: It is impossible to detect attacks. Infrastructure less: Detecting faults in network is not easy. There is dynamic and free feature for each node in ad hoc network so fault is not detected. Dynamic Topology: Results in weaker relationship among nodes. Not easily find out about how many nodes in network at present. Packet Loss: Mobility of nodes, bit rate error and interference causes packet loss. Mobile Nodes: It is easy for malicious nodes to enter any network and hinder communication. Security: Mobile nodes itself perform the major networking tasks, so it is easy for any attacker to acquire data or pretending to be authorised node. Resource Availability: Providing security in mobile network requires various resources and architectures. 241
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 4. ROUTING IN MANETs The choice of the route being selected is done by the routing algorithm [11]. As in Fig 2 it is clearly shows the classification of the routing protocols. FIG 2: DIFFERENT ROUTING PROTOCOLS IN Manets 4.1 Reactive protocol Reactive protocols are also called on-demand protocols because they maintain or discover route only on demand or required [11]. A control message is flooded to the routes to discover the appropriate route. It only establishes the route when any node in the network wants to send a message or a packet to another node in the network. The advantage of these protocols are that it reduces the routing table overflow and its major disadvantage is that due to its on demand nature while route discovery a longer delay is been found. The example of this type of protocol are DSR (dynamic source routing), AODV (ad hoc on demand distance vector routing), LAR (location aided routing), TORA (temporally ordered routing algorithm). These types of protocol maintain the details when it is required to send packets. So this is good when there are many dynamic nodes are available in one ad hoc network. 4.2 Proactive protocol Proactive protocols are also named as table driven routing protocol. They maintain the routing table of the entire network constantly like where the packets are sent, how they sent and which route are used to send packets. Each node has to maintain one or more tables to store routing information and also response to changes in network topology by broadcasting acknowledgement and propagating. [12] The routing tables are constantly updated whenever the network topology changes. Each node in the network sends a broadcast message to the entire network if there is any change in the network topology. This feature of maintaining routing entries of the entire network may affect the routing table but it provides the actual information of the entire network. For very large network the proactive routing protocols may not be recommended because they maintain 242
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME entries of each node in the network which causes more bandwidth consumption and overload to routing table. The examples of proactive routing protocol are DV (distance vector), DSDV (destination sequence distance vector), OLSR (optimised link state routing), and WRP (wireless routing protocol) which is an enhanced version of DSDV. 4.3 Hybrid protocols As according to the name hybrid routing protocols are a combination of both reactive and proactive routing protocols. Basically to overcome the shortcomings of reactive and proactive routing protocol the hybrid is used. It uses the route discovery and on demand mechanism of reactive routing protocol and the routing table management mechanism of proactive routing protocol. In hybrid routing protocol a large network is divided into zones. The routing inside the zones is done by using reactive approach and the routing outside the zone is done using reactive approach. [13] It is the most effective and appropriate routing protocol amongst all. The examples of hybrid protocols are ZRP (zone routing protocol), ZHLS (zone based hierarchical state). TABLE 1: Comparison of Proactive, Reactive and Hybrid Advantages • Disadvantages • • • • • Up-to-date routing information Quick establishment of routes Less delay • • • Saving resources Reduces routing load Loop free • Not always up-to-date routes • More delay • Control traffic and Overhead cost • • • Scalability Limited search cost Up-to-date routing information within zones • Inter-zone delay • Requires more resources for large size zones Proactive • Reactive Hybrid 5. Slow convergence Tendency of creating loops Requires more resources Routing information not fully used METHODS TO SECURE ROUTING PROTOCOLS AODV does not take security into account. AODV messages are neither encrypted nor authenticated nor integrity protected. So it is basically always assumed as trusted. Based on the possibility to forge packets and on the distributed and uncontrolled nature of the network many attacks are possible. Because of forge packets, destination can not identify the integrity of the message or packets. Due to these reasons many security techniques should be implemented on AODV. There are some following techniques provide security to ad hoc routing protocols. 243
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME SAODV: - Secure AODV is an extension to AODV routing protocol. It is proposed by M. Zapata and N. Asokan. It is based on public key cryptography and hash algorithm. SAODV routing messages (RREQs, RREPs, and RERRs) are digitally signed, in order to guarantee their integrity and authenticity [14]. So we can easily identify that is there any unauthorised activity is placed or not. There is a key management system which makes it possible for each node to obtain public keys from the other nodes of the network. How this is achieved depends on the key management scheme. There are different approaches for key management. Two mechanisms are used to secure the AODV messages: digital signatures to authenticate, and hash chains to secure the hop count information (the only mutable information in the messages). For the non-changeable information, authentication is performing in an end-to-end manner, but the same kind of techniques cannot be applied to the changeable information. To preserve the collaboration mechanism of AODV, SAODV that allows intermediate nodes to reply to RREQ messages, when any node want to send message. This is called the double signature to get idea of authenticated source when a node A generates a RREQ message, in addition to the regular signature, it can include a second signature, which is computed on a pretended RREP message towards intermediate node itself. A-SAODV – Adaptive secure AODV is another approach to secure AODV routing protocol from attacks and from malicious users. It is based on the AODV-UU implementation by Uppsala University. Unlike AODV-UU, A-SAODV is a multithreaded application [15]. In A-SAODV, there are two execution threads: one carries the cryptographic operations and the other to all other functions (routing message processing, SAODV routing table management, timeout management, SAODV message generation, and data packet forwarding). The two threads communicate via a first input first output (FIFO) queue containing all the messages that must be signed or verified. [15] SEAD – Secure efficient Ad hoc distance vector is a proactive routing protocol. It is another routing protocol which is secure as it is based on one way hash functions to provide authentication. Each node contains its individual hash chains which are separated into segments to prevent an attacker to forge sequence numbers [16]. So with this sequence number we can identify that there is some unauthorised message in between in actual packets. ARIADNE - It is another On-Demand Routing Protocol presented by Hun, Johnson & Perrig based on DSR. It is a secure on-demand routing protocol that can authenticate messages using one of the three ways: shared secrets between each pair of nodes, shared secrets between communicating nodes combined with broadcast authentication, or digital signature[16]. In shared secrets key twos nodes (source and destination) mutually and securely share the key so no one can open the key. In second method there is disadvantage of broadcasting of secret key because if any unauthorised nodes to pretend real actor then he can also get broadcasted secret key. The third method provides more security then other two methods because by digital signature, we can easily identify the person is authorised actor or not. ARAN - It is proposed by Dahill. Authenticated Routing for ad hoc networks detects the attacks from malicious nodes and also protects the network from forged actions. It uses cryptographic certificates for authentication purpose. The certificate includes the IP of the node, the public key of the source node, a timestamp of the time at which the certificate was created and another timestamp of the time at which the certificate expires. So by using the timestamp user or node can use particular certificate for particular time. The disadvantage of timestamp is that suppose some packet takes less time as per valid time certificate then an intruder can use certificate to send the forge packets. This is the first step which is covered. After the successful completion of the first step second step is preceded. It discovers the shortest path to the destination. It is an on- demand routing protocol. It is successful in protecting the network against impersonation attack but is vulnerable to wormhole attack. [16] 244
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME 6. RELATION BETWEEN ATTACKS AND PROTOCOLS Relation between attacks and different security protocols is shown in table 2. TABLE 2: Relation between Attacks and Protocols PROTOCOLS SAODV SEAD ARIADE ARAN BLACK HOLE NO YES NO NO DOS YES YES YES YES SPOOFING NO YES NO NO WORMHOLE YES YES YES YES ATTA CKS 7. CONCLUSION In conclusion we can say that there is some ambiguity to provide security in reactive protocol AODV and proactive protocol SEAD. If we provide some functionality to DSDV then we can best option for key management and sending packets. The table in section 6 indicate that there is possiblility of attack in SAODV, SEAD, Ariadne, and ARAN. There is another approach to provide security with DSDV. DSDV is the only proactive protocol taken for comparison. It has most common features with the traditional routing protocols in wired networks. The sequence numbers are added to ensure loop-free routes. If we short out the problem of mobility and join the protocol in long time then DSDV can be best approach for key management and sending packet then other protocols. 8. REFERENCES [1] [2] [3] [4] [5] [6] B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A secure routing protocol for ad hoc networks,” in Proceedings of the International Conference on Network Protocols (ICNP), pp. 78-87, 2002. Y. Hu, A. Perrig and D. Johnson, Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks, in Proceedings of ACM MOBICOM’02, 2010. Janne Lundberg, Routing Security in Ad Hoc Networks. Tik-110.501 Seminar on Network Security, http://citeseer.nj.nec.com/400961.html.2000.H. Dang,W. Li, and D. P. Agrawal, “Routing security in wireless ad hoc networks”, IEEE Communications Magazine, 0163-6804, pp. 7075, October 2009. Jean-Pierre Hubaux, Levente Buttyan, Srdjan Capkun. The Quest for security in Mobile Ad Hoc Networks. Proceedings of the 2010 ACM International Symposium on Mobile ad Hoc networking & computing, Long Beach, CA. 2001. F. Stajano and R. Anderson, “The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks,” Security Protocols, 7th International Workshop, LNCS, SpringerVerlag, 2009. 245
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 4, Issue 6, November - December (2013), © IAEME [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] Kuldeep Sharma, Neha Khandelwal and Prabhakar.M, “An Overview of security Problems in MANET,” http://psrcentre.org/images/extraimages/155.pdf Sevil Şen, John A. Clark, Juan E. Tapiador , “Security Threats in Mobile Ad Hoc Networks”, Department of Computer Science, University of York, YO10 5DD, UK Saloni Sharma and Anuj Kumar Gupta, “A Comprehensive Review of Security Issues in Manets,” http://anujkgupta.webs.com/pxc3888277.pdf Bing Wu, Jianmin Chen, Jie Wu, Mihaela Carde “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks” in proceedings of WIRELESS/MOBILE NETWORK SECURITY Y. Xiao, X. Shen, and D.-Z. Du (Eds.) 2006 Springer R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi, “Performance Metrics of MANET in Multi-Hop Wireless Ad Hoc Network Routing Protocols” in proceedings of International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005 National Conference on Architecture, Software system and Green computing. Priyanka Goyal, Vinti Parmar, Rahul Rishi “MANET: Vulnerabilities, Challenges, Attacks, Application” in proceedings of IJCEM International Journal of Computational Engineering & Management, Vol. 11, January 2011. Robinpreet Kaur & Mritunjay Kumar Rai “A Novel Review on Routing Protocols in MANETs” in proceedings of Undergraduate Academic Research Anil Suryavanshi and Dr. Poonam Sinha “Efficient techniques for saodv in mobile adhoc network” in proceedings of Journal of Global Research in Computer Science, Volume 2, No. 8, August 2011. Mohd Anuar Jaafar and Zuriati AhmadZukarnain “Performance Comparisons of AODV, Secure AODV and Adaptive Secure AODV Routing Protocols in Free Attack Simulation Environment” in proceedings of European Journal of Scientific Research ISSN 1450-216X Vol.32 No.3 (2009), pp.430-443 Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani “A Survey of Secure Mobile Ad Hoc Routing Protocols” in proceedings of IEEE communications surveys & tutorials, vol. 10, no. 4, fourth quarter 2008. Thaker Minesh, S B Sharma and Yogesh Kosta, “A Survey: Variants of Energy Constrained Reactive Routing Protocols of Mobile Ad Hoc Networks”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 248 - 257, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. Shiva Prakash, J. P. Saini, S.C. Gupta and Sandip Vijay, “Design and Implementation of Variable Range Energy Aware Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 105 - 123, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. V. Bapuji, R. Naveen Kumar, Dr. A. Govardhan and Prof. S.S.V.N. Sarma, “Maximizing Lifespan of Mobile Ad Hoc Networks with Qos Provision Routing Protocol”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 150 - 156, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Sanjukta Tanti, Sukant Kishoro Bisoy, Namita Das and Mohit Ranjan Panda, “Performance of DSDV Protocol Based on Different Propagation Model with Various Topologies”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 4, 2013, pp. 333 - 340, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. M. Ahmed, S. Yousef and Sattar J Aboud, “Bidirectional Search Routing Protocol for Mobile Ad Hoc Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 229 - 243, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 246
Baixar agora