Stable QoS routing by AODV protocol

Author(s):  
Abolfazl Toroghi Haghighat ◽  
Omid Jafarzadeh Khoshrodi
Keyword(s):  
2014 ◽  
Vol 36 (9) ◽  
pp. 1807-1815 ◽  
Author(s):  
Xiao-Min XIE ◽  
Xing-Wei WANG ◽  
Zhan-Kao WEN ◽  
Min HUANG

Author(s):  
Priyanka Bharadwaj ◽  
Surjeet Balhara

Background & Objective: There are some challenging issues such as providing Quality of Service (QoS), restricted usage of channels and shared bandwidth pertaining to ad-hoc networks in a dynamic topology. Hence, there is a requirement to support QoS for the application environment and multimedia services in ad-hoc networks with the fast growing and emerging development of information technology. Eventually, bandwidth is one of the key elements to be considered. Methods: Energy aware QoS routing protocol in an ad-hoc network is presented in this article. Results and Conclusion: The simulation results indicate that the improved protocol outperforms Adhoc On-Demand Distance Vector (AODV) routing protocol in terms of QoS metric such as throughput, packet delivery ratio, loss rate and average delay.


Author(s):  
Divya Singh ◽  
Sumit Jalan

In Wireless ad-hoc network, the infrastructure of MANET's differ to each other due to the topology of MANETs changes time to time because the mobile nodes of MANET's are movable. In MANETs protocols, if any node wants to communicate with another node then they establish a path with the help of adjacent node due to this the security in MANETs protocol is vulnerable. Thus, there are various types of attacks are try to break the security of MANETs protocol. AODV is a popular and most usable protocol of MANET and Black Hole Attack is a severe attack that affects the functionality of AODV protocol. The malicious node treat to the source node which have freshest and nearest path for the destination. In this work, my prime focus specifically is on follow the security against Black Hole Attack. I proposed AODV protocol capture some extra effort for source node and destination node which based on best possible effort (heuristic) with appropriate simulation using ns-2.35.


2021 ◽  
Vol 1827 (1) ◽  
pp. 012163
Author(s):  
Yalong Li ◽  
Wang Wei ◽  
Sun Jing ◽  
Wan Jie

Sign in / Sign up

Export Citation Format

Share Document