International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Review Papers | Computer Science & Engineering | India | Volume 3 Issue 5, May 2014

A Review Paper on Performance of Routing Protocols in NS-2

Rozy Rana, Kanwal Preet Singh

The main goal of this paper is to see the simulation and performance factors of routing protocols. Routing Protocols specifies how communication between two routers takes place. By this we can specify the choice of the route. A routing protocol first shares its information to its routing protocols and then throughput the network. Three routing protocols will helps us in evaluating the performance in NS-2. Analyze literature sources related to wireless networks simulators. Analyze the Network simulator ns-2 and give its detailed Description.Therefore we can see the variation of performance factors packet delay; packet loss and throughput in nodes.

Keywords: NS-2, AODV, DSDV, DSR, Throughput, Delay

Edition: Volume 3 Issue 5, May 2014

Pages: 1590 - 1592


How to Cite this Article?

Rozy Rana, Kanwal Preet Singh, "A Review Paper on Performance of Routing Protocols in NS-2", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=20131518, Volume 3 Issue 5, May 2014, 1590 - 1592

24 PDF Views | 25 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'NS-2'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1295 - 1298

Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique

Sumiti, Dr. Sumit Mittal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1187 - 1192

Effect of Load and Threshold Variation on Performance of RED: Random Early Detection

Kiran Chhabra, Manali Kshirsagar, Arun Zadgaonkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1717 - 1722

Vampire Attack Detection and Prevention to Defending WSN Based Application

Rajani Jagle, Dr. Abhay Kothari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 350 - 352

Implementation, Detection and Prevention of Black hole Attack for Mobile Ad-hoc Network Scenario using NS-2

Raghvendra Prasad, Kuntal Barua

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1896 - 1902

HSR: A New Lightweight Hybrid Source Routing Protocol for Mobile Ad Hoc Networks

Varun Pandey, Somesh Dewangan

Share this article



Similar Articles with Keyword 'AODV'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1262 - 1265

Evaluation of MANET Routing Protocols using OMNeT++

Chand Jain, Jaswinder Singh

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this article



Similar Articles with Keyword 'DSDV'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 675 - 681

Research on Implementation and Comparison of Routing Protocols in MANET using NS2

PriyaDharshini. R, Prabu. V, Rajesh Singh. S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 376 - 379

Performance Analysis of Routing Protocols Over Multimedia Streaming In MANET

Pooja Saini, Meenakshi Sharma

Share this article



Similar Articles with Keyword 'DSR'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2832 - 2834

Hiding Sensitive Association Rules Using EMDSRRC

Marate Shashank S., Manjusha Yeola

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1262 - 1265

Evaluation of MANET Routing Protocols using OMNeT++

Chand Jain, Jaswinder Singh

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this article



Similar Articles with Keyword 'Throughput'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2171 - 2174

A Revised Approach on Attack Identification and Handling in WSN

Seema Khokher

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2010 - 2013

Analysis of Road Vehicle Density based VANET Routing Protocol in City Environments using QualNet

Amita Jaiswal, Arun Kumar Shukla

Share this article



Similar Articles with Keyword 'Delay'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 6, June 2020

Pages: 901 - 905

Low Latency Placement for Effective Fog based Infrastructure

Dr. Varsha Jotwani

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 803 - 806

Congestion Avoidance and Control Mechanism Using Border Gateway Protocol

Akram H. Shaikh, Bharat K. Chaudhary

Share this article
Top