2018
DOI: 10.1016/j.aej.2017.03.026
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic multi-stage tandem queue modeling-based congestion adaptive routing for MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…The proposed min-max scheduling for energy efficient load balancing has been simulated in the Network simulator -2 simulation tool and its performance under different parameters are examined. A comparative analysis of the proposed method with FF-AOMDV [10] and DTQCAR [14] takes place for the metrics: throughput, packet delivery ratio, delay, remaining energy and packet loss. Table 1 summarizes the simulation parameters and their values.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed min-max scheduling for energy efficient load balancing has been simulated in the Network simulator -2 simulation tool and its performance under different parameters are examined. A comparative analysis of the proposed method with FF-AOMDV [10] and DTQCAR [14] takes place for the metrics: throughput, packet delivery ratio, delay, remaining energy and packet loss. Table 1 summarizes the simulation parameters and their values.…”
Section: Resultsmentioning
confidence: 99%
“…Dynamic multi-stage tandem queue modeling-based congestion adaptive routing (DTQCAR) [14] is introduced to improve the packet delivery ratio of the network besides unplanned network traffic. This adaptive routing identifies congestion, alerts the neighbors for handling network traffic for minimizing packet loss.…”
Section: Related Workmentioning
confidence: 99%
“…In 2017, Satheesh et al [31] have described the enhanced model for the secured transmission through the initiation of ACO-CBRP. [36] have executed the ZRP, which was a fusion based MANET protocol and it was simulated using hashing algorithm for data reliability and substantiation of the data that was being transmitted. The established scheme provides an advanced PDR and throughput; however at the cost of the higher e2e delay.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Various MANET authentication schemes are reviewed in this work as shown in Fig 1, which comprises [7], Timestamp method [8], GASMAN [9], Poissonization scheme [10], SUPERMAN [11], PCA [37], RIPsec [38], peer-to-peer model [44], HEAP [48] schemes. In addition, models like JATC scheme [12], Dempster-Shafer [14], SDRAC [16], IBBE scheme [5] [46], Trilateration Model [18], DSR [20], DTD method [21], Hashing Algorithm [28], Netpro [30], GS scheme [32], QASEC [33], BSG [35], DTQCAR [36], CLPKM [39], Tidal trust algorithm [47], E-voting protocol [54], NACK [58], LIPG [59], IDDIP [60] and Game theoretic Model [65] are also adopted in different contributions.…”
Section: Algorithmic Analysismentioning
confidence: 99%
See 1 more Smart Citation