SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1949
NETWORK SURVEILLANCE BASED DATA TRANSFERENCE IN COGNITIVE
RADIO NETWORK WITH THE COMPARISON OF DIFFERENT ROUTING
PROTOCOLS
G.ELANAGAI1 C.JAYASRI2
1PG Scholar, Dept. of ECE
2Assistant Professor, Dept. of ECE
AVC College of Engineering , Mannampandal, Mayiladuthurai.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Creation of Energy-Efficient Cognitive Radio
model is a challenging task. There are many traditional
methods which are highly energy efficient, but it does not
bother about network security. Hence in this paper we are
comparing different wireless routing protocols and find best
protocol to create energy efficient Cognitive Radio network
(CRN) model having attacker nodes in it. Finally energy
consumption comparison graph was generatedbetweenthose
routing protocols and finds the efficient model i.e. thecreation
of energy efficient CRN model.
Key Words: Network Security,Energy Efficiency,Cognitive radio
(CR), X Graph
1. INTRODUCTION
Cognitive radio is a Software-defined radio that can
able to access unused radio spectrum holes efficiently. The
definition adopted by Federal CommunicationsCommission
(FCC):“Cognitive radio: A radio or system that senses its
operational electromagnetic environment and can
dynamically and autonomously adjust its radio operating
parameters to modify system operation, such as maximize
throughput, mitigate interference, facilitateinteroperability,
access secondary markets.” Cognitive radio (CR) techniques
provide the capability of detecting spectrum holes and
sharing the spectrum in an opportunistic manner. DSA
techniques can select the best available channel from the
spectrum pool for CR devices to operate [4]. More
specifically, CR enables secondary users (SUs) to perform a
series of operations as follows: 1) spectrum sensing to
predict what spectrum is available and recognize the
presence of the primary user (PU) when a PU reoccupiesthe
licensed channel; 2) spectrummanagementtoselectthe best
available channel from the spectrum pool for special
services; 3) spectrum sharing to coordinate access to all
available channels with other SUs; and 4) spectrummobility
to vacate the channel as soon as possible when a PU is
detected [4]. Spectrum sensing is one of the most important
components in the cognition cycle .Routing protocols plays
an important role to choose an efficientCRN model.Hence in
this paper we are going to compare the reactive, Proactive
and Hybrid routing Protocols. The below figure 1.1
shows the basic cognition cycle [13].
2. WIRELESS ROUTING PROTOCOLS
Figure 2.1 Routing Protocols Classification
Wireless Routing
protocols
Eg: AODV,
DSR
Reactive Proactive
Hybrid Eg: DSDV,
OLSR
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1950
 Reactive (AODV,DSR,TORA) on demand
 Proactive (DSDV,OLSR,WRP) table driven
 Hybrid (ZRP) combination of reactive and
proactive.
In this paper we are going to compare three routing
protocols to choose the best one.
2.1 Reactive Protocol
Reactive Protocol has lower overhead since routes
are determined on demand. It employs flooding (global
search) concept. Constantly updatingofroutetables with the
latest route topology is not required in on demand concept.
Reactive protocol searches for the route in an on-demand
manner and set the link in order to send out and accept the
packet from a source node to destination node. Route
discovery process is used in on demand routing by flooding
the route request (RREQ) packets throughout the network.
Examples of reactive routing protocols are the dynamic
source Routing (DSR), ad hoc on-demand distance vector
routing (AODV).
2.1.1 AODV
Adhoc-Ondemand–Distance-Vectoristhealgorithm
used here it enables dynamic, multihop routing betweenthe
nodes.It allows the nodes to obtain the routes quickly and
the operation is loop-free one and it has setup of
reverse/forward pointers. The major advantage of this
algorithm is it avoids link breakage, AODV causes affected
set of nodes to be notified, so we can invalidate the route
using lost link. Route Request (RREQ’s), Route Replies
(RREP’s) and Route Errors (REER’s) are the message types
defined by AODV algorithm.
Advantages of AODV
Highly suitable for more number of nodes.Use of
periodic indication messages to track neighbours the
messages supporting the routes maintenance are range-
limited, so they do not cause unnecessary overhead in the
network. The connection setup delay is less. RERR (Route
error) is defined so we can avoid link breakage.
2.1.2 DSR
DSR uses source routing concept. When packets
are flooded by a source node, the sender node caches
complete hop-by-hop routetothereceivernode.These
route lists are caches in a route cache. The datapackets
carry the source route in the packet header. DSR uses
Route Discovery process to send the data packetsfrom
sender to receiver node for which it does not already
know the route; it uses a route discovery process to
dynamically determine such a route. In Route
discovery DSR works by flooding the data packets in
network with route request (RREQ) packets. RREQ
packets are received by every neighbor nodes and
continue this flooding process by retransmissions of
RREQ packets, unless it gets destination or its route
cache consists a route for destination .Such a node
replies to the RREQ with a route reply (RREP) packet
that is routed back to real source node .source routing
uses RREQ and RREP packets. The RREQ builds up the
path traversed across the network. The RREP routes
itself back to the source by traversing this path toward
the back. The source caches backward route by RREP
packets for upcoming use. If any connection on a
source route is wrecked, a route error (RERR)packetis
notified to the source node.
2.2 Proactive Protocol
Each node in the network has routing table for
the broadcast of the data packets and want toestablish
connection to other nodes in the network.Thesenodes
record for all the presented destinations, number of
hops required to arrive at each destination in the
routing table. The routing entry is tagged with a
sequence number which is created by the destination
node. To retain the stability, each station broadcasts
and modifies its routing table from time to time. How
many hops are required to arrive that particular node
and which stations are accessible is result of
broadcasting ofpacketsbetweennodes.Eachnodethat
broadcasts data will contain its new sequencenumber.
The proactive protocols are appropriate for less
number of nodes in networks, as they need to update
node entries for each and every node in the routing
table of every node. It results more Routing overhead
problem. There is consumption of more bandwidth in
routing table. Example of Proactive RoutingProtocol is
Destination Sequenced Distance Vector (DSDV).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1951
2.2.1 DSDV
The DSDV routing protocol is an enhanced
version of the distributed Bellman-Ford algorithm
where each node maintain a table that contain the
shortest distance and the first node on the shortest
path to every other node in the network. Each node,
upon receiving an update, quickly disseminatesittoits
neighbors in order to propagate the broken-link
information to the whole network. Thus a single link
break leads to the propagation of table update
information to the whole network.
Advantage
It can be applied to MANETs with few
modifications. The updatesarepropagatedthroughout
the network in order to maintain an up-to-date viewof
the network topology at all the nodes.
Disadvantages
(1) The DSDV suffers from excessive control
overhead that is proportional to the number of nodes
in the network and therefore is not scalable in
MANETs, which have limited bandwidth and whose
topologies are highly dynamic.
(2) In order to obtain information about a
particular destination node, a node has to wait for a
table update message initiatedbythesamedestination
node. This delay could result in stale routing
information at nodes.
2.2.2 OLSR
Optimized Link State Protocol (OLSR) is a
proactive routing protocol, so the routes are always
immediately available when needed. OLSR is an
optimization version of a pure link state protocol. So
the topological changes cause the flooding of the
topological information to all available hosts in the
network. To reduce the possible overhead in the
network protocol uses Multipoint Relays (MPR). The
idea of MPR is to reduce flooding of broadcasts by
reducing the same broadcast in some regions in the
network, more details about MPR can be found later in
this chapter. Another reduce is to provide the shortest
path. The reducing the time interval for the control
messages transmissioncanbringmorereactivitytothe
topological changes.
Advantages
OLSR is also a flat routing protocol; it does not
need central administrative system to handle its
routing process. The proactive characteristic of the
protocol provides that the protocol has all the routing
information to all participated hosts in the network.
However, as adrawbackOLSRprotocolneedsthateach
host periodic sends the updated topology information
throughout the entire network, this increase the
protocols bandwidth usage. But the flooding is
minimized by the MPRs, which are only allowed to
forward the topological messages.
2.2.3 Hybrid Routing Protocol (HRP)
HRP is a hybrid protocol that separates the
network into several zones, which makes a
hierarchical protocol as the protocol ZHLS (zone-
based hierarchical link state). HRP is based on GPS
(Global positioning system), which allows each node
to identify its physical position before mapping an
area with table to identify it to which it belongs. The
number of messages exchanged in high ZHLS is what
influences the occupation of the bandwidth. Our
protocol attempts to reduce the number of messages.
Hence the network is zoned in HRP thereisnoneedof
periodic updates about the network’s source and the
bandwidth consumption and the number of reports
exchanged is highly reduced.
Operation of the Protocol HRP
HRP is a protocol that is based on the concept of
zones; each zone can contain multiple nodes
So we can define tree levels:
- Level node.
- Level Getaway.
- Level Cluster Head
Each node deploys a relocation method to find its
physical location and determines its zone ID by
mapping its physical location to the zone map.
Equipped with this zone ID, the node can start the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1952
intrazone (level of node) clustering and then the
interzone (level of getaway) clustering procedures to
build itsroutingtables.Eachasynchronouslybroadcast
a link request. Nodes within its communication range
in turn reply with link responses node ID, zone ID.
After all link responses are received, the node
generates its node LSP that contains the node ID of its
neighbors of the same zone and the zone ID of its
neighbors of different zones. Nodes may receive link
responses from the nodes of their neighboring zones.
After LSP receipt, cluster head communicates with the
getaway that is sending a scope on the tablecontaining
the nodes belongingtothearea.Theirgetawayschange
the tables receivedbytheclusterheadandupdatetheir
routing table.
3. ANALYSIS SNAPSHOT
Figure 3.1 Working Snap of NS2
Figure 3.2 Energy Consumption Comparison of
DSDV and HRP
In the Fig 3.2 Red strike shows DSDV output and green shows
HRP
In the Below Figure 3.3 Red strike shows AODV and green
shows DSR
Figure 3.3 AODV and DSR Comparison
Figure 3.4 AODV and Hybrid Comparison
In the above figure 3.4 Red strike shows AODV and
Green Strike Shows the Hybrid Protocol.This graph proves
that our Hybrid routing protocol is more energy efficient
than AODV.
4.CONCLUSION
Different Routing Protocols are applied in our
proposedCRNmodelandEnergyConsumptionXgraph
was generated for all the protocols.Based on X graph
result we Proves that AODV protocols Suits to the
network having highest number of nodes and DSR is
best for the network having less number of nodes and
for Hybrid protocol there is no need of periodic HELLO
messages. Hence for creating Energy Efficient model
Hybrid routing protocol plays an important role i.e,
Highly enrgy efficient which means it consumes very
less energy When compared with other protocols.
REFERENCES
[1] A Survey of spectrum sensing algorithms for
cognitive radio networks, T.Yucek and H. Arslan,
IEEE Commun Surveys, vol 11, 2009.
[2] Optimization Of CollaborativeSpectrumSensing,
A. Ghasemi and E.Sousa, J Commun, June 2007.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1953
[3] Catch me if you can: An abnormality detection
approach for CSS in Cognitive radio networks, H.Li
and Z.Han, IEEE Transaction, Wireless Commun,
Nov 2010.
[4] Cooperative Sensing among Cognitive Radios,
A.Sahai and S.Mishra, IEEE ICC, 2006.
[5] Optimal linear cooperation for spectrumsensing
in cognitive radio networks, Z.Quan and A.Sayed,
IEEE J.Sel.Topics, Vol no2, Feb 2008.
[6] On collaborative detection of TV transmission in
supportofdynamicspectrumsharing,E.Visotsky,S.
Kuffner and R.Peterson, IEEE DySPAN, 2005.
[7] Collaborative spectrum sensing with stranger:
Trust, or not to trust? , H.Li and Z. Han,IEEEWCNC,
2010.
[8] Attack-proof Collaborative spectrum sensing in
Cognitive Radio Network , H.Li ,Y.Sun and Z.Han,
IEEE CISS,2009
[9] Cooperative spectrum sensing with double
threshold detection basedonreputation,L.Duan,L.
Zhang, Y. Chu and S. Liu, IEEE WiCOM, 2009.
[10] Optimum number of secondary users in
collaborative spectrum sensing considering
resource efficiency, Y.Chen, IEEE Commun Letter,
Dec 2008.
[11] Yi Zheng, XianzhongXie, Lili Yang, “Cooperative
Spectrum Sensing Based on Blind Source
Separation for Cognitive Radio”,International
Conference on Future Information
Network(ICFIN),pp. 398-402, Oct 2009.
[12] Multitask Spectrum Sensing in Cognitive Radio
Networks via Spatiotemporal Data Mining Xin-
Huang, Gang Wang, and Fei Hu, IEEE
Transactions On Vehicular technology, Vol. 62,
No . 2, February 2013
[13] I. F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty,
“NeXt Generation / dynamic spectrum
access/cognitive radio wireless Networks : a
survey”, Computer Networks, vol. 50, no. 13, pp.
2127–2159, 2006.

More Related Content

What's hot (17)

The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Narendra Singh Yadav
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
ijwmn
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
IRJET Journal
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
IJERA Editor
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
Zakaria Zubi
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Sushant Kushwaha
 
Routing ad hoc network
Routing ad hoc networkRouting ad hoc network
Routing ad hoc network
Prof. Dr. Noman Islam
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
eSAT Publishing House
 
Az26337342
Az26337342Az26337342
Az26337342
IJERA Editor
 
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksA New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
Leila_maleke
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Narendra Singh Yadav
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
ijwmn
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
IRJET Journal
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
Zakaria Zubi
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Sushant Kushwaha
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
eSAT Publishing House
 
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksA New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
Leila_maleke
 

Similar to Network Surveillance Based Data Transference in Cognitive Radio Network with the Comparison of Different Routing Protocols (20)

IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET Journal
 
Performance evaluation of two models in the reactive routing protocol in manets
Performance evaluation of two models in the reactive routing protocol in manetsPerformance evaluation of two models in the reactive routing protocol in manets
Performance evaluation of two models in the reactive routing protocol in manets
nooriasukmaningtyas
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
eSAT Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
eSAT Publishing House
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
IJERA Editor
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
ijsrd.com
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
ijceronline
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
CSEIJJournal
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Narendra Singh Yadav
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Narendra Singh Yadav
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Narendra Singh Yadav
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
ijcnes
 
H01115155
H01115155H01115155
H01115155
IOSR Journals
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IOSR Journals
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET Journal
 
Performance evaluation of two models in the reactive routing protocol in manets
Performance evaluation of two models in the reactive routing protocol in manetsPerformance evaluation of two models in the reactive routing protocol in manets
Performance evaluation of two models in the reactive routing protocol in manets
nooriasukmaningtyas
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
eSAT Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
eSAT Publishing House
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
ijsrd.com
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
ijceronline
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
CSEIJJournal
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Narendra Singh Yadav
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Narendra Singh Yadav
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Narendra Singh Yadav
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
ijcnes
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IOSR Journals
 

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 

Recently uploaded (20)

Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
Personal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.pptPersonal Protective Efsgfgsffquipment.ppt
Personal Protective Efsgfgsffquipment.ppt
ganjangbegu579
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025Transport modelling at SBB, presentation at EPFL in 2025
Transport modelling at SBB, presentation at EPFL in 2025
Antonin Danalet
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
Evonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdfEvonik Overview Visiomer Specialty Methacrylates.pdf
Evonik Overview Visiomer Specialty Methacrylates.pdf
szhang13
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 

Network Surveillance Based Data Transference in Cognitive Radio Network with the Comparison of Different Routing Protocols

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1949 NETWORK SURVEILLANCE BASED DATA TRANSFERENCE IN COGNITIVE RADIO NETWORK WITH THE COMPARISON OF DIFFERENT ROUTING PROTOCOLS G.ELANAGAI1 C.JAYASRI2 1PG Scholar, Dept. of ECE 2Assistant Professor, Dept. of ECE AVC College of Engineering , Mannampandal, Mayiladuthurai. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Creation of Energy-Efficient Cognitive Radio model is a challenging task. There are many traditional methods which are highly energy efficient, but it does not bother about network security. Hence in this paper we are comparing different wireless routing protocols and find best protocol to create energy efficient Cognitive Radio network (CRN) model having attacker nodes in it. Finally energy consumption comparison graph was generatedbetweenthose routing protocols and finds the efficient model i.e. thecreation of energy efficient CRN model. Key Words: Network Security,Energy Efficiency,Cognitive radio (CR), X Graph 1. INTRODUCTION Cognitive radio is a Software-defined radio that can able to access unused radio spectrum holes efficiently. The definition adopted by Federal CommunicationsCommission (FCC):“Cognitive radio: A radio or system that senses its operational electromagnetic environment and can dynamically and autonomously adjust its radio operating parameters to modify system operation, such as maximize throughput, mitigate interference, facilitateinteroperability, access secondary markets.” Cognitive radio (CR) techniques provide the capability of detecting spectrum holes and sharing the spectrum in an opportunistic manner. DSA techniques can select the best available channel from the spectrum pool for CR devices to operate [4]. More specifically, CR enables secondary users (SUs) to perform a series of operations as follows: 1) spectrum sensing to predict what spectrum is available and recognize the presence of the primary user (PU) when a PU reoccupiesthe licensed channel; 2) spectrummanagementtoselectthe best available channel from the spectrum pool for special services; 3) spectrum sharing to coordinate access to all available channels with other SUs; and 4) spectrummobility to vacate the channel as soon as possible when a PU is detected [4]. Spectrum sensing is one of the most important components in the cognition cycle .Routing protocols plays an important role to choose an efficientCRN model.Hence in this paper we are going to compare the reactive, Proactive and Hybrid routing Protocols. The below figure 1.1 shows the basic cognition cycle [13]. 2. WIRELESS ROUTING PROTOCOLS Figure 2.1 Routing Protocols Classification Wireless Routing protocols Eg: AODV, DSR Reactive Proactive Hybrid Eg: DSDV, OLSR
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1950  Reactive (AODV,DSR,TORA) on demand  Proactive (DSDV,OLSR,WRP) table driven  Hybrid (ZRP) combination of reactive and proactive. In this paper we are going to compare three routing protocols to choose the best one. 2.1 Reactive Protocol Reactive Protocol has lower overhead since routes are determined on demand. It employs flooding (global search) concept. Constantly updatingofroutetables with the latest route topology is not required in on demand concept. Reactive protocol searches for the route in an on-demand manner and set the link in order to send out and accept the packet from a source node to destination node. Route discovery process is used in on demand routing by flooding the route request (RREQ) packets throughout the network. Examples of reactive routing protocols are the dynamic source Routing (DSR), ad hoc on-demand distance vector routing (AODV). 2.1.1 AODV Adhoc-Ondemand–Distance-Vectoristhealgorithm used here it enables dynamic, multihop routing betweenthe nodes.It allows the nodes to obtain the routes quickly and the operation is loop-free one and it has setup of reverse/forward pointers. The major advantage of this algorithm is it avoids link breakage, AODV causes affected set of nodes to be notified, so we can invalidate the route using lost link. Route Request (RREQ’s), Route Replies (RREP’s) and Route Errors (REER’s) are the message types defined by AODV algorithm. Advantages of AODV Highly suitable for more number of nodes.Use of periodic indication messages to track neighbours the messages supporting the routes maintenance are range- limited, so they do not cause unnecessary overhead in the network. The connection setup delay is less. RERR (Route error) is defined so we can avoid link breakage. 2.1.2 DSR DSR uses source routing concept. When packets are flooded by a source node, the sender node caches complete hop-by-hop routetothereceivernode.These route lists are caches in a route cache. The datapackets carry the source route in the packet header. DSR uses Route Discovery process to send the data packetsfrom sender to receiver node for which it does not already know the route; it uses a route discovery process to dynamically determine such a route. In Route discovery DSR works by flooding the data packets in network with route request (RREQ) packets. RREQ packets are received by every neighbor nodes and continue this flooding process by retransmissions of RREQ packets, unless it gets destination or its route cache consists a route for destination .Such a node replies to the RREQ with a route reply (RREP) packet that is routed back to real source node .source routing uses RREQ and RREP packets. The RREQ builds up the path traversed across the network. The RREP routes itself back to the source by traversing this path toward the back. The source caches backward route by RREP packets for upcoming use. If any connection on a source route is wrecked, a route error (RERR)packetis notified to the source node. 2.2 Proactive Protocol Each node in the network has routing table for the broadcast of the data packets and want toestablish connection to other nodes in the network.Thesenodes record for all the presented destinations, number of hops required to arrive at each destination in the routing table. The routing entry is tagged with a sequence number which is created by the destination node. To retain the stability, each station broadcasts and modifies its routing table from time to time. How many hops are required to arrive that particular node and which stations are accessible is result of broadcasting ofpacketsbetweennodes.Eachnodethat broadcasts data will contain its new sequencenumber. The proactive protocols are appropriate for less number of nodes in networks, as they need to update node entries for each and every node in the routing table of every node. It results more Routing overhead problem. There is consumption of more bandwidth in routing table. Example of Proactive RoutingProtocol is Destination Sequenced Distance Vector (DSDV).
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1951 2.2.1 DSDV The DSDV routing protocol is an enhanced version of the distributed Bellman-Ford algorithm where each node maintain a table that contain the shortest distance and the first node on the shortest path to every other node in the network. Each node, upon receiving an update, quickly disseminatesittoits neighbors in order to propagate the broken-link information to the whole network. Thus a single link break leads to the propagation of table update information to the whole network. Advantage It can be applied to MANETs with few modifications. The updatesarepropagatedthroughout the network in order to maintain an up-to-date viewof the network topology at all the nodes. Disadvantages (1) The DSDV suffers from excessive control overhead that is proportional to the number of nodes in the network and therefore is not scalable in MANETs, which have limited bandwidth and whose topologies are highly dynamic. (2) In order to obtain information about a particular destination node, a node has to wait for a table update message initiatedbythesamedestination node. This delay could result in stale routing information at nodes. 2.2.2 OLSR Optimized Link State Protocol (OLSR) is a proactive routing protocol, so the routes are always immediately available when needed. OLSR is an optimization version of a pure link state protocol. So the topological changes cause the flooding of the topological information to all available hosts in the network. To reduce the possible overhead in the network protocol uses Multipoint Relays (MPR). The idea of MPR is to reduce flooding of broadcasts by reducing the same broadcast in some regions in the network, more details about MPR can be found later in this chapter. Another reduce is to provide the shortest path. The reducing the time interval for the control messages transmissioncanbringmorereactivitytothe topological changes. Advantages OLSR is also a flat routing protocol; it does not need central administrative system to handle its routing process. The proactive characteristic of the protocol provides that the protocol has all the routing information to all participated hosts in the network. However, as adrawbackOLSRprotocolneedsthateach host periodic sends the updated topology information throughout the entire network, this increase the protocols bandwidth usage. But the flooding is minimized by the MPRs, which are only allowed to forward the topological messages. 2.2.3 Hybrid Routing Protocol (HRP) HRP is a hybrid protocol that separates the network into several zones, which makes a hierarchical protocol as the protocol ZHLS (zone- based hierarchical link state). HRP is based on GPS (Global positioning system), which allows each node to identify its physical position before mapping an area with table to identify it to which it belongs. The number of messages exchanged in high ZHLS is what influences the occupation of the bandwidth. Our protocol attempts to reduce the number of messages. Hence the network is zoned in HRP thereisnoneedof periodic updates about the network’s source and the bandwidth consumption and the number of reports exchanged is highly reduced. Operation of the Protocol HRP HRP is a protocol that is based on the concept of zones; each zone can contain multiple nodes So we can define tree levels: - Level node. - Level Getaway. - Level Cluster Head Each node deploys a relocation method to find its physical location and determines its zone ID by mapping its physical location to the zone map. Equipped with this zone ID, the node can start the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1952 intrazone (level of node) clustering and then the interzone (level of getaway) clustering procedures to build itsroutingtables.Eachasynchronouslybroadcast a link request. Nodes within its communication range in turn reply with link responses node ID, zone ID. After all link responses are received, the node generates its node LSP that contains the node ID of its neighbors of the same zone and the zone ID of its neighbors of different zones. Nodes may receive link responses from the nodes of their neighboring zones. After LSP receipt, cluster head communicates with the getaway that is sending a scope on the tablecontaining the nodes belongingtothearea.Theirgetawayschange the tables receivedbytheclusterheadandupdatetheir routing table. 3. ANALYSIS SNAPSHOT Figure 3.1 Working Snap of NS2 Figure 3.2 Energy Consumption Comparison of DSDV and HRP In the Fig 3.2 Red strike shows DSDV output and green shows HRP In the Below Figure 3.3 Red strike shows AODV and green shows DSR Figure 3.3 AODV and DSR Comparison Figure 3.4 AODV and Hybrid Comparison In the above figure 3.4 Red strike shows AODV and Green Strike Shows the Hybrid Protocol.This graph proves that our Hybrid routing protocol is more energy efficient than AODV. 4.CONCLUSION Different Routing Protocols are applied in our proposedCRNmodelandEnergyConsumptionXgraph was generated for all the protocols.Based on X graph result we Proves that AODV protocols Suits to the network having highest number of nodes and DSR is best for the network having less number of nodes and for Hybrid protocol there is no need of periodic HELLO messages. Hence for creating Energy Efficient model Hybrid routing protocol plays an important role i.e, Highly enrgy efficient which means it consumes very less energy When compared with other protocols. REFERENCES [1] A Survey of spectrum sensing algorithms for cognitive radio networks, T.Yucek and H. Arslan, IEEE Commun Surveys, vol 11, 2009. [2] Optimization Of CollaborativeSpectrumSensing, A. Ghasemi and E.Sousa, J Commun, June 2007.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1953 [3] Catch me if you can: An abnormality detection approach for CSS in Cognitive radio networks, H.Li and Z.Han, IEEE Transaction, Wireless Commun, Nov 2010. [4] Cooperative Sensing among Cognitive Radios, A.Sahai and S.Mishra, IEEE ICC, 2006. [5] Optimal linear cooperation for spectrumsensing in cognitive radio networks, Z.Quan and A.Sayed, IEEE J.Sel.Topics, Vol no2, Feb 2008. [6] On collaborative detection of TV transmission in supportofdynamicspectrumsharing,E.Visotsky,S. Kuffner and R.Peterson, IEEE DySPAN, 2005. [7] Collaborative spectrum sensing with stranger: Trust, or not to trust? , H.Li and Z. Han,IEEEWCNC, 2010. [8] Attack-proof Collaborative spectrum sensing in Cognitive Radio Network , H.Li ,Y.Sun and Z.Han, IEEE CISS,2009 [9] Cooperative spectrum sensing with double threshold detection basedonreputation,L.Duan,L. Zhang, Y. Chu and S. Liu, IEEE WiCOM, 2009. [10] Optimum number of secondary users in collaborative spectrum sensing considering resource efficiency, Y.Chen, IEEE Commun Letter, Dec 2008. [11] Yi Zheng, XianzhongXie, Lili Yang, “Cooperative Spectrum Sensing Based on Blind Source Separation for Cognitive Radio”,International Conference on Future Information Network(ICFIN),pp. 398-402, Oct 2009. [12] Multitask Spectrum Sensing in Cognitive Radio Networks via Spatiotemporal Data Mining Xin- Huang, Gang Wang, and Fei Hu, IEEE Transactions On Vehicular technology, Vol. 62, No . 2, February 2013 [13] I. F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty, “NeXt Generation / dynamic spectrum access/cognitive radio wireless Networks : a survey”, Computer Networks, vol. 50, no. 13, pp. 2127–2159, 2006.
  翻译: