Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

MANET is abbreviation of mobile ad-hoc network. Mobile ad-hoc network is a set of mobile nodes that communicate with radio links. MANET network infrastructure is not defined and there is no centralized administration for controlling the other activities. MANET consist several routing protocols. AODV is reactive MANET routing protocol. OLSR is a proactive routing protocol and TORA is adaptive MANET routing protocol. In this paper analysis of AODV; OLSR and TORA MANET routing protocols are done on the basis of different application level traffic like HTTP; E-mail; FTP and Voice. Analysis of memory used in simulation with different application traffic is also done. The whole analysis is done on the basis of Delay; Network Load and Throughput using OPNET simulator 14.5.

Keywords: MANET, AODV, OLSR, TORA, HTTP, E-mail, FTP, Voice, OPNET 145

Edition: Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Share this Article

How to Cite this Article?

Rawendra Pratap Singh, Savita Shiwani, "Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014567, Volume 3 Issue 6, June 2014, 1887 - 1991

Enter Your Registered Email Address





Similar Articles with Keyword 'MANET'

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 46 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 79 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 86 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Downloads: 91 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'AODV'

Downloads: 79 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article

Downloads: 102 | Monthly Hits: ⮙6

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 895 - 900

Secured Greedy Geographical Reliable Reactive Routing for WSN

Bhramitha B Shetty, Manimozhi Iyer

Share this Article

Downloads: 105 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1572 - 1577

Analysis of Various Malicious Node Detection Techniques: A Review

Priyanka, Mukesh Dalal

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙15

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1448 - 1453

Implementation and Comparison of Enhance SAODV Protocol against Blackhole Attacks in MANET using Network Simulator

Anil, Dr. Sudesh Kumar

Share this Article

Downloads: 106 | Weekly Hits: ⮙5

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1262 - 1265

Evaluation of MANET Routing Protocols using OMNeT++

Chand Jain, Jaswinder Singh

Share this Article

Similar Articles with Keyword 'OLSR'

Downloads: 107 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 633 - 636

Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay

Kaushal Kishor, Parma Nand

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1408 - 1412

Simulation Study of VANET Routing Protocols on NS-2 and NS-3

Dipti Shastri, Ajay Lala

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this Article

Similar Articles with Keyword 'TORA'

Downloads: 86 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Downloads: 89 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 431 - 433

Real Time Signal Quality ECG Telemetry System for IoT - Based Health Care Monitoring

Arjumand Arshi, Dr. Sameena Banu

Share this Article

Downloads: 98 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Similar Articles with Keyword 'HTTP'

Downloads: 99 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 878 - 881

Detection of Malicious Client based HTTP/DoS Attack on Web Server

Dhanya Jayan, Pretty Babu

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this Article

Downloads: 108 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1742 - 1746

An Analytic Research on HTTP ,Web Servers, Web-Services & Efficient DNS Querying

Shaik Khaja Hafeezuddin, P.V.S.Srinivas

Share this Article

Similar Articles with Keyword 'E-mail'

Downloads: 103 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, Nepal, Volume 4 Issue 11, November 2015

Pages: 1220 - 1226

Government Roadmap for IPv4 to IPv6 Network Migration: Case of Nepal

Babu Ram Dawadi, Ananda Raj Khanal

Share this Article

Downloads: 105 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Downloads: 106 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1532 - 1535

User Based Content Management System to Analyze the E-Mail Reviews

Satinder Singh, Dr. Amit Goel

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this Article

Downloads: 112 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2352 - 2355

Spam Detection Techniques: A Review

Reena Sharma, Gurjot Kaur

Share this Article

Similar Articles with Keyword 'FTP'

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this Article

Downloads: 127 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013

Pages: 168 - 170

Gateway Antivirus Implementation using Open Source along with Performance Testing and Improvement Analysis

Hiren V Mer, Sheetal Mehta

Share this Article

Downloads: 135 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1501 - 1506

Implementing Different Set of Network Security Policies for a Well Infrastructure Campus Network

Faqarunnisa Begum, Dr. Suvarna Nandyal

Share this Article

Similar Articles with Keyword 'Voice'

Downloads: 97 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1112 - 1116

Scalable Uninterrupted Network Service Using LTE

S. Kalaiyarasi, M. Manikandan

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2039 - 2041

Age Detection of Singer using KNN Algorithm

Sumeet S. Andhalkar

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1887 - 1991

Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network

Rawendra Pratap Singh, Savita Shiwani

Share this Article

Downloads: 108 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2694 - 2699

Antispoofing Methods for Authenticating Live Users in Biometric System

Anita Kori, Swathi S. Wali, Sanjeev Kumar M. Hatture, Dr. Suvarna Nandyal

Share this Article

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1445 - 1449

Secure VoIP Network by Fusion of Irises

S. Bhuvaneshwari, Dr. P. Arul

Share this Article



Top