2011
DOI: 10.1016/j.compeleceng.2010.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation for on-demand routing protocols based on OPNET modules in wireless mesh networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
1

Year Published

2012
2012
2020
2020

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(10 citation statements)
references
References 13 publications
0
9
0
1
Order By: Relevance
“…The simulation tool used for analysis is OPNET 14.5 which is highly preferred by researchers [9].It is a synthetic simulation tool to simulate and analyze for network communication and it can provide three tier model, where the top layer is the network layer that reflects the topology of the network, the middle layer is the node layer that is composed of the corresponding protocol models and the bottom layer is the process model that is described by finite state machines.…”
Section: Experimemtal Methodologymentioning
confidence: 99%
“…The simulation tool used for analysis is OPNET 14.5 which is highly preferred by researchers [9].It is a synthetic simulation tool to simulate and analyze for network communication and it can provide three tier model, where the top layer is the network layer that reflects the topology of the network, the middle layer is the node layer that is composed of the corresponding protocol models and the bottom layer is the process model that is described by finite state machines.…”
Section: Experimemtal Methodologymentioning
confidence: 99%
“…The simulation tool used for analysis is OPNET 14.5 which is highly preferred by researchers [11]. It is a synthetic simulation tool to simulate and analyze for network communication and it can provide three tier model, where the top layer is the network layer that reflects the topology of the network, the middle layer is the node layer that is composed of the corresponding protocol models and the bottom layer is the process model that is described by finite state machines.…”
Section: Experimemtal Methodologymentioning
confidence: 99%
“…Paper concluded that the black-hole attack effect on packet loss is much lower as compare to effect on delay. Also, the packet delivery ratio (PDR) decreases when black hole node increases in network L. Geo [7] creating WMN by taking ftp traffic for two reactive protocols in which AODV performs better than DSR. In this paper we have evaluated the performance of three routing protocols (AODV, DSR and TORA) in MANET based on different scenarios of black hole attack for E-mail application.…”
Section: Related Workmentioning
confidence: 99%