Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani
MANET is abbreviation of mobile ad-hoc network. Mobile ad-hoc network is a set of mobile nodes that communicate with radio links. MANET network infrastructure is not defined and there is no centralized administration for controlling the other activities. MANET consist several routing protocols. AODV is reactive MANET routing protocol. OLSR is a proactive routing protocol and TORA is adaptive MANET routing protocol. In this paper analysis of AODV; OLSR and TORA MANET routing protocols are done on the basis of different application level traffic like HTTP; E-mail; FTP and Voice. Analysis of memory used in simulation with different application traffic is also done. The whole analysis is done on the basis of Delay; Network Load and Throughput using OPNET simulator 14.5.
Keywords: MANET, AODV, OLSR, TORA, HTTP, E-mail, FTP, Voice, OPNET 145
Edition: Volume 3 Issue 6, June 2014
Pages: 1887 - 1991
How to Cite this Article?
Rawendra Pratap Singh, Savita Shiwani, "Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014567, Volume 3 Issue 6, June 2014, 1887 - 1991
98 PDF Views | 81 PDF Downloads
Similar Articles with Keyword 'MANET'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Similar Articles with Keyword 'AODV'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1295 - 1299A Review on Security Attacks in Mobile Ad-hoc Networks
Amandeep Kaur, Dr. Amardeep Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 633 - 636Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay
Kaushal Kishor, Parma Nand
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2302 - 2305Detection and Prevention of Cooperative Wormhole Attack in a MANET
Anuradha T, Padmashree S. Shedbalkar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2550 - 2556Detection and Prevention of Misbehaving Node using PDA and Enhanced 2ACK Scheme
Anil Rathod, Sherly Noel
Similar Articles with Keyword 'OLSR'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 633 - 636Performance Evaluation of AODV; DSR; TORA and OLSR in with Respect to End-to-End Delay
Kaushal Kishor, Parma Nand
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1803 - 1808Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions
Katroth Balakrishna Maruthiram, Kare Suresh Babu
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 597 - 602Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks
Abhishek Kumar, Shweta Kumari
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 1408 - 1412Simulation Study of VANET Routing Protocols on NS-2 and NS-3
Dipti Shastri, Ajay Lala
Similar Articles with Keyword 'TORA'
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013
Pages: 297 - 300Balancing the Trade-Offs between Data Availability and Query Delay in MANETs
Umar I. Masumdar, N. S. Killarikar
Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 431 - 433Real Time Signal Quality ECG Telemetry System for IoT - Based Health Care Monitoring
Arjumand Arshi, Dr. Sameena Banu
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013
Pages: 315 - 318Cloud Computing - A Birds Eye View
S.Kalaiselvi, S.V.Revathi
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1782 - 1787Review Paper on Online Shortest Path Computation
Pratik P.Watane, Prof. Prachi V. Kale
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1939 - 1946An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud
Nagaraj S Kolhar, Dr. Suvarna Nandyal
Similar Articles with Keyword 'HTTP'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 878 - 881Detection of Malicious Client based HTTP/DoS Attack on Web Server
Dhanya Jayan, Pretty Babu
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2982 - 2984Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil, Y. V. Chavan
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 239 - 244The Survey Paper on ASP2P: An Advanced Botnet Based on Social Networks over Hybrid P2P
Saloni Shah, Vina M. Lomte
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1628 - 1631A Survey On XML-Injection Attack Detection Systems
Swati Ramesh Kesharwani, Aarti Deshpande
Similar Articles with Keyword 'E-mail'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2025 - 2029Investigation of Security in Cloud Computing
Annu Devi
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1532 - 1535User Based Content Management System to Analyze the E-Mail Reviews
Satinder Singh, Dr. Amit Goel
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2352 - 2355Spam Detection Techniques: A Review
Reena Sharma, Gurjot Kaur
Research Paper, Computer Science & Engineering, Nepal, Volume 4 Issue 11, November 2015
Pages: 1220 - 1226Government Roadmap for IPv4 to IPv6 Network Migration: Case of Nepal
Babu Ram Dawadi, Ananda Raj Khanal
Similar Articles with Keyword 'FTP'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014
Pages: 1803 - 1808Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions
Katroth Balakrishna Maruthiram, Kare Suresh Babu
Review Papers, Computer Science & Engineering, India, Volume 2 Issue 2, February 2013
Pages: 168 - 170Gateway Antivirus Implementation using Open Source along with Performance Testing and Improvement Analysis
Hiren V Mer, Sheetal Mehta
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1501 - 1506Implementing Different Set of Network Security Policies for a Well Infrastructure Campus Network
Faqarunnisa Begum, Dr. Suvarna Nandyal
Similar Articles with Keyword 'Voice'
Informative Article, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 21 - 25Bluetooth Wireless Technology & Its Applications
Dr D S Kushwaha, Ankur Singh
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1112 - 1116Scalable Uninterrupted Network Service Using LTE
S. Kalaiyarasi, M. Manikandan
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1887 - 1991Analysis of Application Level Traffics and Routing Protocols in Mobile Ad Hoc Network
Rawendra Pratap Singh, Savita Shiwani
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2039 - 2041Age Detection of Singer using KNN Algorithm
Sumeet S. Andhalkar
Research Paper, Computer Science & Engineering, Bangladesh, Volume 3 Issue 6, June 2014
Pages: 2403 - 2405Instant Bangla Speech to Text Conversion
Nazia Hossain, Dilruba Shareen, Tarin Kazi