Routing Performance Analysis of Infrastructure-less Wireless Networks with Intermediate Bottleneck Nodes
Keywords:
include MANETs, routing, simulation, performanceAbstract
Mobile random The evolution of network technology is working toward the goal of ubiquitous, anytime, everywhere internet connectivity. Since there is no underlying network infrastructure, nodes are free to move about and set up shop in any way they see fit. The nodes in a network are independent units that operate together and exchange information.An efficient dynamic routing protocol is essential for MANET's communication efficiency. In this post, we looked into the effectiveness of numerous reactive routing methods for MANETs.The purpose is to lay the groundwork for future study of MANETs by learning as much as possible about reactive routing protocols made specifically for them. Several performance metrics are used in the article's assessment of performance and their results are analyzed. Our research presents a comprehensive evaluation of reactive routing algorithms across many data rates, hop counts, and topologies, both dynamic and static.
Downloads
References
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Mohammed Abdul Razzak. "Reactive energy aware routing selection based on knapsack algorithm (RER-SK)." In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, pp. 289-298. Springer, Cham, 2015.
SR Das, EM Belding-Royer, CE Perkins (2003) ‘Ad hoc on-demand distance vector (AODV) routing’ Network Working Group, pages 1-35
Issariyakul, Teerawat, and Ekram Hossain. "Introduction to network simulator 2 (NS2)." In Introduction to network simulator NS2, pp. 1-18. Springer, Boston, MA, 2009.
Harris III, Albert F., and Michele Zorzi. "Modeling the underwater acoustic channel in ns2." In ValueTools, p. 18. 2007.
Tuteja, R Gujral, S Thalia (2010) ‘Comparative Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANET Using NS2, Advances in Computer Engineering (ACE), 2010 International Conference on pages 330 – 333
Bari, Mohammed Abdul, Sanjay Kalkal, and Shahanawaj Ahmad. "A Comparative Study and Performance Analysis of Routing Algorithms for MANET." In Computational Intelligence in Data Mining, pp. 333-345. Springer, Singapore, 2017.
Siddiqua, Ayesha, KotariSridevi, and Arshad Ahmad Khan Mohammed. "Preventing black hole attacks in MANETs using secure knowledge algorithm." In 2015 International Conference on Signal Processing and Communication Engineering Systems, pp. 421-425. IEEE, 2015.
Tuteja, R Gujral, S Thalia (2010) ‘Comparative Performance Analysis of DSDV, AODV and DSR Routing Protocols in MANET Using NS2, Advances in Computer Engineering (ACE), 2010 International Conference on pages 330 – 333
Bari, Mohammed Abdul, Sanjay Kalkal, and Shahanawaj Ahmad. "A Comparative Study and Performance Analysis of Routing Algorithms for MANET." In Computational Intelligence in Data Mining, pp. 333-345. Springer, Singapore, 2017.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and SrikanthVemuru. "Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks." Indian Journal of Science and Technology 9 (2016): 26.
Mohammad, Arshad Ahmad Khan, Ali MirzaMahmood, and SrikanthVemuru. "Intentional and unintentional misbehaving node detection and prevention in mobile ad hoc network." International Journal of Hybrid Intelligence 1, no. 2-3 (2019): 239-267
Mohammed Abdul Bari , Sanjay Kalkal,Shahanawaj Ahamad, " Sheltered Energy Aware Routing Against Black Hole Attack. "IJRSM,(2017)
Kalaavathi, B. ., Sridhevasenaathypathy, B. ., Chinthamu, N. ., & Valluru, D. . . (2023). Retail Shop Sales Forecast by Enhanced Feature Extraction with Association Rule Learning. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 50–56. https://doi.org/10.17762/ijritcc.v11i4s.6306
Mr. Ashish Uplenchwar. (2017). Modern Speech Identification Model using Acoustic Neural approach . International Journal of New Practices in Management and Engineering, 6(03), 01 - 06. https://doi.org/10.17762/ijnpme.v6i03.58
Dhabliya, D., Parvez, A. Protocol and its benefits for secure shell (2019) International Journal of Control and Automation, 12 (6 Special Issue), pp. 19-23.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Ijteba Sultana, Mohd Abdul Bari , Sanjay

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.