Open Access   Article Go Back

Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks

N. Mannan1 , S. Khurana2

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-4 , Page no. 233-237, Apr-2014

Online published on Apr 30, 2014

Copyright © N. Mannan, S. Khurana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Mannan, S. Khurana, “Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.233-237, 2014.

MLA Style Citation: N. Mannan, S. Khurana "Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks." International Journal of Computer Sciences and Engineering 2.4 (2014): 233-237.

APA Style Citation: N. Mannan, S. Khurana, (2014). Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks. International Journal of Computer Sciences and Engineering, 2(4), 233-237.

BibTex Style Citation:
@article{Mannan_2014,
author = {N. Mannan, S. Khurana},
title = {Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {233-237},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=146},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=146
TI - Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - N. Mannan, S. Khurana
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 233-237
IS - 4
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3552 3422 downloads 3503 downloads
  
  
           

Abstract

MANETs have three types of routing protocols, Reactive protocols, Proactive protocols and Hybrid Protocols. The routing protocols designed majorly for internet are fundamentally different from the mobile Ad-Hoc networks (MANET). In research community very little attention has been given towards performance issues in MANET. This review focuses on MANETs focused mainly on comparing different reactive protocols or proactive protocols.

Key-Words / Index Term

MANETS, Performance Issues, Protocols

References

[1]. Neeraj Kumar Pandey and Amit Kumar Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (60-63), Mar -2014
[2]. Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014
[3]. Deepesh Tamrakar, Sreshtha Bhattacharya and Shitanshu Jain, "A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-02, Issue-02, Page No (1-5), Mar -Apr 2014.
[4]. Leena Pal, Pradeep Sharma and Netram Kaurav, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc �Networks", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-05, Page No (1-4), Nov -Dec 2013.
[5]. Pradeep Sharma, Shivlal Mewada and Aruna Bilavariya, "Group Rekeying Management Scheme for Mobile Ad-hoc Network", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-05, Page No (5-12), Nov -Dec 2013.
[6]. Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-04, Page No (8-11), Sep -Oct 2013
[7]. Tamilarasan, Santhamurthy. "A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET." International Journal of Computer Science Issues(IJCSI) 9, no. 1 (2012).
[8]. Khiavi, Mina Vajed, Shahram Jamali, and Sajjad Jahanbakhsh Gudakahriz. "Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs." International Research Journal of Applied and Basic Sciences 3, no. 7 (2012): 1429-1436.
[9]. Bakht, Humayun. "Survey of routing protocols for mobile ad-hoc network."International Journal of Information and Communication Technology Research1, no. 6 (2011).
[10]. Nyirenda, Bained, and Jason Mwanza. "Performance Evaluation of Routing Protocols in Mobile Ad hoc Networks (MANETs)." Blekinge Institute of Technology� in January (2009).
[11]. Parvez, Md Masud, Shohana Chowdhury, SM Bulbul Ahammed, AKM Fazlul Haque, and Mohammed Nadir Bin Ali. "Improved Comparative Analysis of Mobile Ad-hoc Network." International Journal of Emerging Technology and Advanced Engineering 2, no. 8 (2012): 205-211..
[12]. Thamizhmaran, K., R. Santosh Kumar Mahto, and V. Sanjesh Kumar Tripathi. "Performance Analysis of Secure Routing Protocols in MANET." International Journal of Advanced Research in Computer and Communication Engineering 1, no. 9 (2012).