Abstract
Wireless networks have certainly been are volution int oday’s technology as one of the most vital and active field sin the communication industries.These wireless ad-hoc networks consists of independent nodes with decentralized administration and physical infrastructures, also with a dynamic topology in which no descan easily leave or join the network at all time and also move freely. In other not to compromise the confidentiality ,availability and integrity of network services, the safety of packets data can only be achieved by guaranteeing that the problem of security has met the requisitest and ard.The performance analyses of routing protocols for Ad-Hoc wireless networks, DSDV, DSR and AODV were investigated using network parameters such as averages through put ,packet delivery ratio and End-to-end delay using various scenarios of mobile node and size of the network. A wk script was used to analyze the trace file and produce the average through put, packet delivery ratio and end-to-end delay as there sult of the simulation. The simulation was run by implementing code sin DSDV ,DSR and AODVCC class files to accommodate the behavioral pattern of attacks. In the results analysis of routing protocols under the security attacks, it was observed that the DSDV significantly has lower performance as are sult of frequent link changes and connection failure swhich led to heavy overload and congestion problems .Further more, when comparing the two reactive routing protocols, AODV performs better than DSR.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Contemporary Research and Review
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.