Performance Analysis of Various Application Protocols for MANET
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 7
Abstract
A mobile ad hoc network (MANET) consists of mobile wireless nodes. The communication between these mobile nodes is carried without any centralized control. The ease of deployment and the infrastructure less nature of Mobile Ad Hoc Networks (MANET) make them highly desirable for present day multi media communications. In this paper we analyze the performance of TCP/IP based application protocol (HTTP, FTP) via increasing number of nodes and observing its effect on parameters like throughput, network load, media access delay and traffic received. Network simulation tool is OPNET Modeler (Ver. 14.5).
Authors and Affiliations
Dr. Ravi Sindal , Nidhi Jaiswal
E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept
An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are many security challenges associated with the use of Inter...
Design of High Speed Binary to Gray Code Converter Using A Novel Two Transistor XOR Gate
t—In modern era, Ultra low power design has an Active research topic due to its various Applications. In this paper we introduce a novel low power and Area efficient Binary to Gray code converter is implemented...
Improving Memory Access time by Building an AMBA AHB compliant Memory Controller
Memory access time has been a bottleneck in many microprocessor applications which limits the system performance. Memory controller (MC) is designed and built to attacking this problem. The memory controller is the...
Dynamic Load Balancing in Cloud Using Live Migration of Virtual Machine
REVIEW OF PASSWORD PROTECTING MECHANISM
In the online communication, the password has an important role to secure user personal details. These passwords are taken to be secure and it must be retain personally. The third person may take a password witho...