Open Access   Article Go Back

Survey: Proactive and Reactive Routing Protocols

Prapulla G1 , Prasanna Kumar M2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 334-338, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.334338

Online published on May 16, 2019

Copyright © Prapulla G, Prasanna Kumar M . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Prapulla G, Prasanna Kumar M, “Survey: Proactive and Reactive Routing Protocols,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.334-338, 2019.

MLA Style Citation: Prapulla G, Prasanna Kumar M "Survey: Proactive and Reactive Routing Protocols." International Journal of Computer Sciences and Engineering 07.15 (2019): 334-338.

APA Style Citation: Prapulla G, Prasanna Kumar M, (2019). Survey: Proactive and Reactive Routing Protocols. International Journal of Computer Sciences and Engineering, 07(15), 334-338.

BibTex Style Citation:
@article{G_2019,
author = {Prapulla G, Prasanna Kumar M},
title = {Survey: Proactive and Reactive Routing Protocols},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {334-338},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1255},
doi = {https://doi.org/10.26438/ijcse/v7i15.334338}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.334338}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1255
TI - Survey: Proactive and Reactive Routing Protocols
T2 - International Journal of Computer Sciences and Engineering
AU - Prapulla G, Prasanna Kumar M
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 334-338
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

Routing is a mechanism to build links or connections between two or more nodes with or without the infrastructure. A Routing algorithm is a method for determining the routing of packets in a node. For each node of network, the algorithm determines a routing table, which in each destination, matches an output line. The algorithm should lead to a consistent routing, that is to say without loop. This means that you should not route a packet a node to another node that could send back the package.There are three main types of routing algorithms- Vector (distance-vector routing),To link state (link state routing), Path to vector (path-vector routing).This paper focus on the survey of reactive and proactive routing protocols like OLSR, AODV, RIP, OSPF, DSR.

Key-Words / Index Term

DV,LSR,RIP,DSR, AODV

References

[1]. The AODV protocol is basically flat routing protocol so it does not require any inner organizational methodto handle the routing process.
[2]. In AODV routes established on demand and that destination sequence numbers are applied for find the latest route to thedestination.
[3]. The connection setup delay islower.
[4]. The AODV protocols are a loop free and avoid the counting to infinityproblem.
[5]. At most one route per destination maintain at each node.
[6]. It can lead to heavy controloverhead.
[7]. MorigereSubramanya Bhat, Shwetha .D, Manjunath .D and DevarajuJ.T.”Scenario Based Study of on denmand Reactive Routing Protocol for IEEE-802.11 and 802.15.4 Standards”ISSN: 2249-57 Vol 1(2), 128-135 published in October-november2011.
[8]. Ashish Bagwari,RamanJee,PankajJoshi,SourabhBisht “Performance of AODV Routing Protocol with increasing the MANET Nodes and it’s effects on QoS of Mobile Ad hoc Networks” 2012 International ConferenceonCommunicationSystemsandNetworkTechnologies.
[9]. XuHuang,MuhammadAhmedandDharmendraSharma”Protectingfrom Inside Attacks in Wireless Sensor Networks” 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[10]. Naveen Bilandi and Harsh K Verma “Comparative Analysis of Reactive, Proactive and Hybrid Routing Protocols in MANET” International Journal of Electronics and Computer Science Engineering 1660 ISSN- 2277-1956.
[11]. Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao “A survey of black hole attacks in wireless mobile ad hoc networks” Tseng et al. Human- centric Computing and Information Sciences 2011, a Springer open journal.
[12]. Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala “DoS Attacksin Mobile Ad-hoc Networks: A Survey” 2012 Second International ConferenceonAdvancedComputing&CommunicationTechnologies.
[13]. Ashok M.Kanthe, Dina Simunic and Ramjee Prasad Comparison of AODV and DSR on-Demand Routing Protocols in Mobile Ad hoc Networks.
[14]. PremChandandM.K.Soni“PerformancecomparisonofAODVandDSR ON-DemandRoutingprotocolsforMobilead-hocnetworks”Published in July2012.
[15]. Michel Healy, Thomas News and Elfed Lewis “Security for Wireless Sensors Networks: A Review”.in Feb2009.
[16]. Harmandeep Singh, Gurpreetsingh and Manpreet Singh “Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack”International Journal of Computer Applications (0975 – 8887) Volume 42– No.18, March2012.
[17]. IrshadUllahShoia Ur Rehman “Analysis of Black Hole Attack on MANETs Using Different MANET RoutingProtocols”.
[18]. ShailyMittel and Prabhjot Kaur “Performance comparison of AODV, DSRandZRPRoutingprotocolinMANET’s”Publishedin2009.
[19]. NicklesBeijar “Zone Routing Protocol” Networking Laboratory, Helsinki University ofTechnology.
[20]. HimaniYadavandRakeshKumar“IdentificationandRemovalofBlack Hole Attack for Secure Communication in MANETs” Volume 3, Issue 9, September 2012, ISSN2047-3338.