International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

MANET is abbreviation of mobile ad-hoc network. Mobile ad-hoc network is a set of mobile nodes that communicate with radio links. MANET network infrastructure is not defined and there is no centralized administration for controlling the other activities. MANET consist several routing protocols. AODV is reactive MANET routing protocol. OLSR is a proactive routing protocol and TORA is adaptive MANET routing protocol. In this paper analysis of AODV; OLSR and TORA MANET routing protocols are done on the basis of different application level traffic like HTTP; E-mail; FTP and Voice. Analysis of memory used in simulation with different application traffic is also done. The whole analysis is done on the basis of Delay; Network Load and Throughput using OPNET simulator 14.5.

Keywords: MANET, AODV, OLSR, TORA, HTTP, E-mail, FTP, Voice, OPNET 145

Edition: Volume 3 Issue 6, June 2014

Pages: 1887 - 1991


How to Cite this Article?

Rawendra Pratap Singh, Savita Shiwani, "Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014567, Volume 3 Issue 6, June 2014, 1887 - 1991

21 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANET'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2234 - 2241

Distributed Direct Neighbour Comparison Based Approach

Pankaj Singh Chouhan, Brajesh Kumar Shrivash, Nidhi Bajpai

Share this article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this article



Similar Articles with Keyword 'AODV'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1295 - 1298

Detecting Selfish Node over the Active Path using Neighbor Analysis based Technique

Sumiti, Dr. Sumit Mittal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1295 - 1299

A Review on Security Attacks in Mobile Ad-hoc Networks

Amandeep Kaur, Dr. Amardeep Singh

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this article



Similar Articles with Keyword 'OLSR'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this article



Similar Articles with Keyword 'TORA'

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1879 - 1883

Enhancement of Hazy Image Using Visibility Restoration Technique

Salini N, Anju J Prakash

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2451 - 2458

Regenerating Code Based on Public Auditing Scheme with Security Preserving for Cloud Storage

Dr. K. Sundeep Kumar, Anupama P. V

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2457 - 2460

Privacy Preserved Encrypted Cloud Data Access

Anes P. A., Neethu Francis

Share this article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1664 - 1667

Over View of Past Literature and Making Comparative Analysis Along with Our Strategy of Materialized View Selection

Sapna Choudhary, Roshna Mahajan

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this article



Similar Articles with Keyword 'HTTP'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1297 - 1299

Web Services in DDoS Attack by Classify the Attacks

Suji.S, Chandraprabha.K

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 239 - 244

The Survey Paper on ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P

Saloni Shah, Vina M. Lomte

Share this article



Similar Articles with Keyword 'E-mail'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2352 - 2355

Spam Detection Techniques: A Review

Reena Sharma, Gurjot Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1532 - 1535

User Based Content Management System to Analyze the E-Mail Reviews

Satinder Singh, Dr. Amit Goel

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1861 - 1866

E-mail Clustering with oPass Security Prevent to Password Stealing and Password Reuse Attack

Gore Kranti K, Jarali Vilas M

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this article



Similar Articles with Keyword 'FTP'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1501 - 1506

Implementing Different Set of Network Security Policies for a Well Infrastructure Campus Network

Faqarunnisa Begum, Dr. Suvarna Nandyal

Share this article



Similar Articles with Keyword 'Voice'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2345 - 2351

Hidden Markovian Model Combined with Dynamic Mode Decomposition for Detecting Deception in Videos

Shyama V S, Mary Linda P A

Share this article

Research Paper, Computer Science & Engineering, Bangladesh, Volume 3 Issue 6, June 2014

Pages: 2403 - 2405

Instant Bangla Speech to Text Conversion

Nazia Hossain, Dilruba Shareen, Tarin Kazi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2039 - 2041

Age Detection of Singer using KNN Algorithm

Sumeet S. Andhalkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1380 - 1385

Voice over Internet Protocol (VoIP) Based IP PBX System Design

Sonali Golhar, V. S. Dhamdhere

Share this article
Top