Simulation and Analysis the Performance of AODV and DSR for VOIP and Video Conferencing Using OPNET
Abstract
Keywords
Full Text:
PDFReferences
Kuldeep Vats et al, “Simulation and performance analysis of OLSR, GRP, DSR Routing Protocol using OPNET” IJETED volume 2, Issue 2, March 2012.
T. Kunz and E. Cheng, “On-demand multicasting in ad-hoc networks: Comparing AODV and ODMRP, ”pp. 453-454, 2002
C. Perkins, E. Belding-Royer, S. Das, quet, ”Ad hoc on- Demand distance Vector (AODV) Routing”, RFC 3561, July 2003.
J. Haerri, F. Filali, and C. Bonnet, Performance Comparison of AODV and OLSR in VANETs urban Environments under realistic mobility patterns," pp. 14{17, 2006.
Aamar Nath Muraw et al “performance evaluation of MANET routing protocols GRP, DSR and AODV based on packet size” IJEST vol. 4 no.06 June 2012.
Fahim Maan and Nauman Mazhar, “MANET Routing Protocols vs. Mobility Models: A Performance Evaluation”, Proc. of IEEE-ICUFN 2011.
Gagangeet Singh Aujla, Sandeep Singh Kang,” Comprehensive Evaluation of AODV, DSR, GRP, OLSR And TORA Routing Protocols with varying number of Nodes and traffic applications over MANETs” (IOSR- JCE).
OPNET official website, http://www.opnet.com.
I.S. Hammodi et al, “A comprehensive performance study of OPNET Modeler for ZigBee WSN” 3rd International Conference on Next Generation Mobile Applications, 2009.
Abbas, S., Merabti, M., and Llewellyn-Jones, D. (2011). The effect of direct interactions on reputation based schemes in mobile ad hoc networks. In Consumer Communications and Networking Conference (CCNC), 2011 IEEE, pages 297{302. IEEE.
Ahmed, G., Barskar, R., and Barskar, N. (2012). An Improved dsdv routing protocol for wireless ad hoc networks. Procedia Technology, 6:822{831.
John, P. and Vivekanandan, P. (2012). A framework for secure routing in mobile ad hoc networks. In Advances in Engineering, Science and Management (ICAESM), 2012 International Conference on, pages 453{458. IEEE.
Ajina, A., Sakthidharan, G., and Miskin, K. (2010). Study of energy efficient, power aware routing algorithm and their applications. In Machine Learning and Computing (ICMLC), 2010 Second International Conference on pages 288{291. IEEE.
Kang, N., Shakshuki, E., and Sheltami, T. (2011). Detecting forged acknowledgements in Manets. In Advanced Information Networking and Applications (AINA), 2011 IEEE International Conference on, pages 488{494. IEEE.
Sumer et al, Article: “MAODV: To Identify a Secure Route Selection in MANET under Blackhole,” International Journal of Computer Applications, vol. 58, no. 22, 1{2, November 2012, published by Foundation of Computer Science, New York, USA.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.