International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 80

Review Papers | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita [120] | Sunil Makkar


Abstract: In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have reviewed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols


Keywords: Mobile Ad hoc, AODV, DSDV, TCP, CBR, routing overhead, packet delivery fraction, End-to-End delay, normalized routing load


Edition: Volume 3 Issue 9, September 2014,


Pages: 2450 - 2452


How to Cite this Article?

Sunita, Sunil Makkar, "A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 2450-2452, https://www.ijsr.net/get_abstract.php?paper_id=SEP14618

How to Share this Article?






Similar Articles with Keyword 'Mobile Ad hoc'

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar | Purnima Selokar [2]

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon | Dinesh Kumar [25]

Share this Article


Top