Comparative Analysis of CBRP, DSR, AODV Routing Protocol in MANET
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9
Abstract
An ad-hoc network is self-organizing and adaptive. Networks are formed on-the-fly, devices can leave and join the network during its lifetime, devices can be mobile within the network, the network as a whole may be mobile and the network can be deformed on-the-fly. Devices in mobile ad-hoc networks should be able to detect the presence of other devices and perform the necessary set-up to facilitate communications and the sharing of data and services. This paper focuses on the three popular routing algorithms Ad-Hoc on Demand Distance Vector (AODV), Dynamic Source Routing (DSR) both being reactive routing protocols and Cluster Based Routing Protocol (CBRP), a proactive routing protocol. The performance analysis is done with the help of packet delivery ratio(PDR), average end-to-end delay and routing overhead through simulation using GLOMOSIM simulator.
Authors and Affiliations
Mukesh Kumar , Rahul Rishi , D. K. Madan
Image Compression Using Fast 2-D DCT Technique
Image Compression is a method, which reduces the size of the data to reduce the amount of space required to store the data. The Discrete cosine transform (DCT) is a method for transforms a signal or image from spatial do...
A Survey on Hadoop Assisted K-Means Clustering of Hefty Volume Images
The objects or the overview of the objects in a remote sensing image can be detected or generated directly through the use of basic K-means clustering method. ENVI, ERDAS IMAGINE are some of the software that can be used...
An Ellipsoidal 3D Shape Representation and Wavelet Transform Feature Descriptor for 3D Shape Retrieval
For the year of past most three-dimensional objects are represented and mapped with spherical function. Since the mapping preserves important criteria such as geometrical information of a 3D object, the representation of...
FINGERPRINTING SCHEME FOR FILE SHARING IN TRANSFORM DOMAIN
Fingerprinting scheme plays an important role for file sharing. In this paper, a novel method is introduced for fingerprinting an image. The proposed method uses wavelet and Principal Component Analysis (PCA) techniques...
UNICODE and Colors Integration tool for Encryption and Decryption
Cryptography, to most people, is concerned with keeping communications private. Indeed, the protection of sensitive communications has been the emphasis of cryptography throughout much of its history. Encryption is the t...