CFP last date
20 January 2025
Reseach Article

Performance Analysis of DSR and AODV in Manets: Using WLAN Parameters

by Devendra Singh, Vandana Dubey, Shipra Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 3
Year of Publication: 2012
Authors: Devendra Singh, Vandana Dubey, Shipra Sharma
10.5120/7165-9462

Devendra Singh, Vandana Dubey, Shipra Sharma . Performance Analysis of DSR and AODV in Manets: Using WLAN Parameters. International Journal of Computer Applications. 47, 3 ( June 2012), 1-6. DOI=10.5120/7165-9462

@article{ 10.5120/7165-9462,
author = { Devendra Singh, Vandana Dubey, Shipra Sharma },
title = { Performance Analysis of DSR and AODV in Manets: Using WLAN Parameters },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 3 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number3/7165-9462/ },
doi = { 10.5120/7165-9462 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:42:50.556930+05:30
%A Devendra Singh
%A Vandana Dubey
%A Shipra Sharma
%T Performance Analysis of DSR and AODV in Manets: Using WLAN Parameters
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 3
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In these days it is no longer optional to have security solutions predictable for every type of organizations and individuals. Security is one of the main issues in the MANET in particular with respect to size and complexity of the network. The aim of the paper is to discuss special security aspects of MANET and relative study of the routing protocols such as AODV and DSR. The main task of this paper is to perform the experimental study which is based on simulation . This paper also discusses MANET network scenario which we implement in our simulation. In our simulation we use to implement AODV and DSR routing protocols and also did comparative study that which one is better with respect to different aspects.

References
  1. H. Pucha, S. M. Das, Y. C. Hu, "The Performance Impact of Traffic Patterns on Routing Protocols in Mobile Ad Hoc Networks", Journal (COMNET), vol. 51(12), pp. 3595-3616, August 2007.
  2. C. Siva Ram Murthy and B. S. Manoj, "Ad Hoc Wireless Networks, Architectures and Protocols", Second Edition, Low price Edition, Pearson Education, 2007.
  3. X. Hong, K. Xu, M. Gerla, "Scalable Routing Protocols for Mobile Ad-Hoc Networks" IEEE Network Magazine, Volume-16, Issue-4, pages: 11–21.
  4. B. Schneier, Secret and Lies, Digital Security in a Networked World, Wiley, 2000.
  5. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91.
  6. V. Karpijoki, "Security in Ad Hoc Networks," http://www. hut. fi/~vkarpijo/netsec00/netsec00_manet_sec. ps
  7. J. Lundberg, "Routing Security in Ad Hoc Networks,"Helsinki University of Technology, http://citeseer. nj. nec. com/400961. html
  8. P. V. Jani, "Security within Ad-Hoc Networks," Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
  9. S. Lu, L. Li, K. Y. Lam, L. Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. ," International Conference on Computational Intelligence and Security, 2009.
  10. B. Wu, J. Chen, J. Wu, M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Department of Computer Science and Engineering, Florida Atlantic University, http: / / students. fau. edu/ jchen8/web/paper s/SurveyBookchapter. pdf.
  11. D. P. Agrawal and Q. -A. Zeng, Introduction to Wireless and Mobile Systems, Brooks/Cole Publishing, Aug. 2002.
  12. C. E. Perkins and E. M. Royer, "Ad-Hoc On Demand Distance Vector Routinsg," Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applictions, pp. 90-100, Feb, 1999.
  13. C. M barushimana, A. Shahrabi, "Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad-Hoc Networks," Workshop on Advance Information Networking and Application, Vol. 2, pp. 679-684, May, 2003.
  14. Perkins Charles E. , Bhagwat Pravin: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, London England UK, SIGCOMM 94-8/94. http://www. cise. ufl. edu/~helal/6930F01/papers/DSDV. pdf
  15. C. Perkins, E. Belding-Royer, and S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (Experimental), July 2003. .
  16. D. Johnson, Y. Hu, and D. Maltz. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4. RFC 4728 (Experimental), February 2007.
  17. M. K. J. Kumar, R. S. Rajesh, "Performance Analysis of MANET Routing Protocols in different Mobility Models" IJCSNS International Journal of Computer Science and Network 22 Security, VOL. 9 No. 2, February2009.
  18. Opnet Technologies, Inc. "Opnet Simulator," Internet: www. opnet. com
Index Terms

Computer Science
Information Sciences

Keywords

Throughput Load Delay Retransmission Attempts