Downloads: 116
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015
Black Hole Problem in AODV Routing Protocol in MANET
Krunal S Bhavsar | Dr. Kamaljit I Lakhtaria
Abstract: A mobile Ad-hoc network (MANET) is a dynamic multi hop wireless network established by a group of nodes in which there is no central administration. Due to mobility of nodes and dynamic network topology, the routing is one of the most important challenges in ad-hoc networks. Several routing algorithms for MANETs have been proposed by the researchers which have been classified into various categories, however, the most prominent categories are proactive, reactive and hybrid. The performance comparison of routing protocols for MANETs has been presented by other researcher also, however, none of these works considers proactive, reactive and hybrid protocols together. In this paper, the performance of proactive (DSDV), reactive (DSR and AODV) and hybrid (ZRP) routing protocols has been compared. The performance differentials are analyzed on the basis of throughput, average delay, routing overhead and number of packets dropped with a variation of number of nodes, pause time and mobility. In MANET each and every mobile node is assumed to be moving with more or less relative speed in arbitrary direction. Because of that there is no long term guaranteed path from any one node to other node. MANET have very enterprising use in emergency scenarios like military operations & disaster relief operation where there is need of communication network immediately following some major event, or some temporary requirement like conference & seminar at new place where there is no earlier network infrastructure exist and need alternative solution
Keywords: MANET, AODV, DSR, SDV, RREQ
Edition: Volume 4 Issue 11, November 2015,
Pages: 2288 - 2293
Similar Articles with Keyword 'MANET'
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar | Purnima Selokar [2]
Downloads: 3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon | Dinesh Kumar [32]