Study of TORA FOR Mobile Ad-hoc NetworK

نویسندگان

  • Ritu Sharma
  • Ritu Sindhu
چکیده

Mobile Adhoc Networks [MANETs] involve communication between various mobiles hosts which themselves act as routers and help in transmitting packets to the destination through intermediate nodes which lie within the radio transmission range of each other. Due to high level of dynamism, reliable, fast and energy efficient routing of data packets from the source to the destination is an area of great concern for researches. Science it is an infrastructure network, one cannot rely on use of access points or other infrastructure for routing, thus leaving only one option of building multi-hop routes from source to destination, where intermediate nodes act as routers. Routing in MANETs involves designing a protocol which helps using routing data packets from source to destination with minimum possible hops and minimum battery power consumption of nodes. The main purpose of this paper is to design and implement tora for manet.In this paper, results show that TORA’s inability to handle rapid increases in traffic volumes. TORA performs well in networks where the volume of traffic increases gradually. Keywords—: Ad-hoc, IMEP, MANET, OPNET, TORA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

Improved Olsr and Tora Routing Protocols for Manets

A mobile ad-hoc network (MANET) is groundwork less system of movable devices associated by wireless links. Every device in MANET is unrestricted to move arbitrarily on any path and will therefore transform its links to new devices promptly and unpredictably. MANETs can interconnect with each other without the usage of a predefined arrangement or federal administration. In this paper routing pro...

متن کامل

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

Performance Analysis of AODV and TORA under DDoS Attack in MANETs

Wireless networks are gaining popularity day by day, as users want wireless connectivity irrespective of their geographic position. There is an increasing threat of malicious nodes attacks on the Mobile Ad-hoc Networks (MANET). Distributed denial of service attack is one of the security threat in which is used to make the network resources unavailable. The distributed denial of service (DDoS) a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014