International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 82 - Issue 15 |
Published: November 2013 |
Authors: Satveer Kaur, Shivani Khurana |
![]() |
Satveer Kaur, Shivani Khurana . Performance Evaluation of FSR, DYMO and LANMAR Routing Protocols. International Journal of Computer Applications. 82, 15 (November 2013), 16-19. DOI=10.5120/14239-2386
@article{ 10.5120/14239-2386, author = { Satveer Kaur,Shivani Khurana }, title = { Performance Evaluation of FSR, DYMO and LANMAR Routing Protocols }, journal = { International Journal of Computer Applications }, year = { 2013 }, volume = { 82 }, number = { 15 }, pages = { 16-19 }, doi = { 10.5120/14239-2386 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2013 %A Satveer Kaur %A Shivani Khurana %T Performance Evaluation of FSR, DYMO and LANMAR Routing Protocols%T %J International Journal of Computer Applications %V 82 %N 15 %P 16-19 %R 10.5120/14239-2386 %I Foundation of Computer Science (FCS), NY, USA
Mobile Ad hoc Network (MANET) is a collection of mobile nodes that are arbitrarily located so that the interconnections between nodes are energetically altering [1]. In MANET mobile nodes forms a temporary network without the use of any existing network infrastructure or centralized administration. A routing procedure is used to find routes between mobile nodes to facilitate communication inside the set of connections. The main goal of such an ad hoc network routing protocol is to establish correct and efficient route between a pair of mobile nodes so that messages delivered within the active route break intermission. Route should be discovered and maintained with a minimum of overhead and bandwidth expenditure. This article presents performance evaluation of three different routing protocols i.e. Fisheye Source Routing (FSR), Landmark Adhoc routing protocol (LANMAR), and Dynamic MANET on Demand Routing Protocol (DYMO) with respect to different nodes. Performance of FSR, LANMAR and DYMO is evaluated based on Throughput and Average end to end delay with and without Black hole Attack.