PERFORMANCE EVALUATION FOR DETECTION OF MALICIOUS NODES USING SVM IN MANET
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.5, No. 8)Publication Date: 2016-08-30
Authors : Inderpreet Kaur; Er.Manasvi Mannan;
Page : 82-87
Keywords : Routing;
Abstract
Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table defined by the user. Reactive protocols are on-demand routing protocols that defines the routing table on time for data transmission. This protocol selects the shortest path for data transmission. Two prevalent on-demand routing protocols which are ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR) protocol are used previously. AODV is constructed based on DSDV routing. In AODV, each node only records the next hop information in its routing table but maintains it for sustaining a routing path from source to destination node. The source node is informed by a route error (RRER) packet first.
Other Latest Articles
- Inertial/Satellite Research and Design of Integrated Navigation Simulation System
- NUMERICAL SOLUTIONS FOR STOCHASTIC PARTIAL DIFFERENTIAL EQUATIONS VIA ACCELERATED GENETIC ALGORITHM
- Manual Elevator for Material Handling
- RESOLVEMENT OF POWER QUALITY PROBLEMS BY UNIFIED POWER QUALITY CONDITIONER (UPQC)
- Study of Effect of Eccentricity on the Linear andNonlinear Behaviour of RCC Irregular Buildings
Last modified: 2016-08-08 19:24:36