2016
DOI: 10.1016/j.procs.2016.03.090
|View full text |Cite
|
Sign up to set email alerts
|

Improving QoS of Mobile Ad-hoc Network Using Cache Update Scheme in Dynamic Source Routing Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“…The main idea in reactive routing (on-demand routing) is to find and maintain routes only `when there is a need and thus minimizes routing overhead. The DSR protocol is composed of two mechanisms: route discovery and route maintenance [8,18,19]. Route discovery operation is initiated when a source node wants to send a packet to a destination node and does not have a route.…”
Section: 1dsr Routing Protocolmentioning
confidence: 99%
“…The main idea in reactive routing (on-demand routing) is to find and maintain routes only `when there is a need and thus minimizes routing overhead. The DSR protocol is composed of two mechanisms: route discovery and route maintenance [8,18,19]. Route discovery operation is initiated when a source node wants to send a packet to a destination node and does not have a route.…”
Section: 1dsr Routing Protocolmentioning
confidence: 99%
“…They have drawn attention towards protocol enhancement requirement in the network and showed that up to now most of the work is done in a small area. Paper [13] presented the route cache update technique. Various quality of service parameters was taken for evaluation.…”
Section: Literature Surveymentioning
confidence: 99%
“…In the paper [5] the author described that routing protocol can also be categorized according to route computation: Precomputed (proactive/ table-driven) and On-Demand Routing. In precomputed as the name indicates, the nodes are computed in advance.…”
Section: Literature Surveymentioning
confidence: 99%
“…It is important to protect the network functionality to transmit message between mobile nodes through multi-hop ad-hoc forwarding. The data packets transmitting between the mobile nodes should be consistent with the protocol specification [13]. For exchanging routing information in wireless environment, sometimes trust relationship is used by routing protocols among participating nodes and hence the currently used protocol trust on neighboring nodes but it is possible that the trust model unintentionally permit malicious attacker to enter in-network, for example, replaying old routing data or by including erroneous routing data or inefficient routing can cause malicious attacker to enter in system.…”
Section: Literature Surveymentioning
confidence: 99%