نتایج جستجو برای: پروتکل aodv

تعداد نتایج: 6670  

2003
David West

There are a number of implementations of the Ad-hoc On-demand Distance Vector (AODV) routing protocol available for the Linux platform, but not for any other platform. Development of ad-hoc routing protocols has been slow because current operating systems do not provide adequate direct system-services for their implementation. This dissertation presents a design, implementation, and evaluation ...

2006
Elmurod Talipov Donxue Jin JaeYoun Jung Ilkhyu Ha YoungJun Choi Chonggun Kim

In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node and enhance data security is an important issue on Ad hoc networks. In this study, we provide a path hopping method based on reverse AODV (R-AODV). By reverse AODV, source node builds multipath to destination and adapt...

2010
Nitiket N Mhala N K Choudhari

Most of the adhoc routing protocol research work has been done using simulation only because of the difficulty of creating real implementation. In simulation the developer controls the whole system, which is in effect only a single component. An Implementation, on the other hand, needs to interoperate with a large complex system and the system components. In this paper we focus on working imple...

2015
Virendra Singh Dhanroop Mal Nagar

Ad Hoc network is a network without physical structure and is established with mobile nodes using wireless connections. Ad Hoc network is highly flexible and supports dynamic network topology. Thus, the efficiency of the routing protocol will affect the overall network performance. Mobile ad hoc networks carriage several kinds of security problems, initiated by their open systems and nature of ...

Journal: :CoRR 2012
Youssef Saadi Said El Kafhali Abdelkrim Haqiq Bouchaib Nassereddine

A Mobile Ad-hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless links. In this network technology, simulative analysis is a significant method to understand the performance of routing protocols. In this paper three protocols AODV, DSDV and DSR were simulated using Manhattan Grid Mobility Model. The reactive (AODV, DSR) and proactive (DSD...

2012
Lovekesh Kumar

An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any pre-existing network infrastructure. A number of ad hoc routing protocols have been developed during the time, but none of these is able to produce efficient routing of packets in large number of nodes due to their own limitations. Therefore, scalability is an open issue in ...

2004
Wen-Tsuen Chen Wei-Ting Lee

The frequent change of network topology in mobile ad-hoc network leads to the stability and reliability problems of routing. Many routing schemes such as multi-path routing and backup path routing are proposed to increase the link reliability. Multi-path routing protocols usually concentrate on load balancing or disjoint routing. However, the problem of packet loss caused by re-routing from the...

2012
GURMEET KAUR

Wireless Communication is one of the popular areas of research these days. The Mobile Adhoc Networks (MANETs) is an infrastructureless network consisting of wireless mobile nodes. MANET is a self configuring network and the topology of the network keeps on changing as the nodes move randomly and organize themselves in an arbitrarily manner. Many protocols have been proposed for such networks. O...

2012
M. Karthik K. Venkateswara Rao

As the routing is the basic cause of networking, so the concept of networking is interdependent with methodology of routing. In reactive routing protocols one the AODV plays the active role in obtaining the routes when needed. In related to the Ad-hoc networks like MANET’s, it is considered as the very most prioritized protocol. In this paper a slight advantageous attachment to the AODV routing...

2013
Swarnali Hazra S. K. Setua

In On-demand routing protocols for wireless ad-hoc networks, whenever communication is needed, source discovers route for data delivery to destination. Blackhole attackers exploit the on demand route discovery process and data delivery by dropping the packets which are supposed to be forwarded by them. In this paper, we have proposed an enhanced AODV routing protocol, CAT-AODV-B (Context Aware ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید