2326-9865
Vol. 68 No. 1 (2019) 63 http://philstat.org.ph
Network Steering Conventions: A Logical Review
B. Neelima1, Dr. M. Suresh2, Dr. P. Prabhakaran 3, Dr. K. Anusha 4, Dr. A. Prakash5
1, 2, 3, 4Department of Computer Science and Engineering
5 Electrical and Electronics Engineering
1, 2, 3,4, 5QIS College of Engineering and Technology, Ongole, Andhra Pradesh, India [email protected]1, [email protected]2, [email protected]3,
[email protected]4, [email protected]5 Corresponding Author Mail: [email protected]
Article Info
Page Number: 63 - 75 Publication Issue:
Vol 68 No. 1 (2019)
Article History Article Received:
09 September 2019 Revised: 16 October 2019 Accepted: 21 November 2019 Publication: 28 December 2019
Abstract
As the name implies, this architecture consists of a number of PCs that pool their resources with those of the organization's hubs. Advanced joins are utilized to link the PCs together using similar standards. These connections, which are made up of improvements in media transmission networks including physical proximity, optical, and remote radio-recurrence methods, can be applied in a few organizational geographies. Personal computers, organizational tools, and other specialized or generally Hubs are an example of beneficial hosts. In a PC organization. You could distinguish between them using hostnames and network addresses. Hostnames are hub IDs that are simple to remember and are rarely after being assigned, updated. For contacting Network addresses are required at events like the Web Convention. Businesses that deal with computers can be divided into the signaling media used, transfer speed, network traffic orchestration conventions, organizational size, geographic location, traffic management systems, and organizational purpose, among other factor. PC companies unquestionably support email and texting apps, as well as access to the Internet, high-definition shared use of music and video servers, printers, and fax machines, and high-definition video and music. Switch interactivity is described by directing conventions, which are rules. These conventions allow switches to select the fastest route between two hubs on a PC network. We can assert that guiding computations decide the correspondence's most effective route. The language that a switch uses to communicate can be can be classified as a number several ways, such as the way that signals are transmitted, the speed at which data is transferred, the rules that govern how network traffic is organized, the size of the organization, and the number of switches that show how reachable and healthy a given organization is. The terms steering and connecting are frequently used interchangeably. The number of layers in which each of them operates is the fundamental distinction between the two. In order to arrive at a specific area, directing calculations take into account a number of variables, keeping in mind the current burden for a course, its constancy, idleness, and various metrics. It first shares information with its close neighbors and then with the rest of the organization.
Keywords: Routing protocols, including BGP, OSPF, RIP, RIP2, and RIP2.
INTRODUCTION
Further mechanical advancements in association are typical as the world tries to find a quicker and more effective means of expression, necessitating a more uniform technique for data exchange. The general public's requests for correspondence could be satisfied utilizing
2326-9865
Vol. 68 No. 1 (2019) 64 http://philstat.org.ph
distant ad hoc networks. WANET (Remote Adhoc Organization) establishes a network of remote devices in a community that enables them to connect with one another frequently or infrequently. In a dispersed network, the connected devices might be able to communicate with one another. Due to the highlight point remote approaches utilized to associate the associated devices. In order to address the issue of force utilization in sensor frameworks resulting from their battery power and failing to focus primarily on communicating a reasonable design, inventor Raj, Jennifer S., and companions [1] developed this particular type of information transmission. They neglected to focus on the security of data supplied from the photomultiplier cylinder to the it’s pattern in their efforts to differentiate and foster a steering that takes into account both optimum web use and power utilization. Similar to how Manshahia, et al. [2] used swarm knowledge to navigate their remote link, the scientist did likewise using based calculation and CNN. Making steering limits, which is essential for significant organization activities, is one of the most challenging tasks in vanets.Because of the unique combinations of elements, spontaneous travel is captivating. The ability of hubs to roam is a crucial benefit of an unplanned organization. The organization encountered typical organizational elements and course disappointments as a result of this hub development.
Because of this organization's flexibility, a powerful steering structure is needed. The base handset's band width for a particular something is much smaller and less consistent than it is on wired networks. When the remote transmitter is used as a common medium, it drastically limits the amount of data transmission that is available to each hub. Transfers should therefore be low-cost and staff-escalated to produce courses, enabling the additional transmission capacity to be used effectively for knowledge transfer. Third, power, which has a constrained amount of force available, controls hubs. If steering conventions are to keep hubs continuously connected for an extended period of time, they must be energy efficient.
By all accounts, this serves as even another motivation to keep expenses as low as possible.
Steering frameworks should achieve the desirable goals of dynamic adaptability and minimal dormancy to achieve excellent overall execution. Sadly, there are no steering rules designed for wired networks like the wired Web because to their heavy reliance on lead geography and its high above. There are a few direction suggestions related to this that are unique to impromptu networks. Even if some of these hypotheses are more advanced wired network implementations, the majority of them include innovative concepts like "on-request steering,"
in which courses are only kept "responsively" when they are important. However, common Web-based conventions serve a useful purpose. There have also been other new standards that have arisen, like using directing area data and energy-efficient steering. In all of our discussions, it is possible to think of the fundamental organizational structure as an undirected diagram. In that mindset, it's possible that this isn't the case because of the possibility of unidirectional linkages.
This is a regular occurrence when the organization's hubs' transmission capacities diverge.
Even in a totally uniform organization, connections might benefit from geologically varying remote divert contortion. In any event, continuous organizations may not be useful for steering, according to observational [38] and hypothetical [3] data. On the other hand, using these kinds of associations may require a large amount of additional effort and money.
2326-9865
Vol. 68 No. 1 (2019) 65 http://philstat.org.ph
However, it is a simple issue to ignore unidirectional links when they are present. This might be accomplished with a straightforward two-way message exchange between hubs that are close to one another. In order to locate the nearby hub set, directing frameworks regularly transmit "signals" (also known as "hello" messages) (neighbor discovery). Because the hubs are powered by batteries with a limited capacity, adhoc is a busy and dispersed animal variety. IN this way, promoting energy-efficient steering strategies is a huge endeavor. The impromptu organization's ability to work is severely constrained in terms of its capacity to deliver energy due to the short lifetime of various energy sources. A network hub that has been specially designed is controlled by various energy sources. Sending a package, receiving a package, holding up the hub, and putting the switch into deep sleep all require energy consumption and occur when the remote organization on the hub is switched down. A blackout has an impact on a hub's ability to transfer bundles for other users as well as the organization's overall life expectancy. This means that short distances and typical assessments are optimal overstretched terms and low energy consumption in terms of energy- effective steering. Therefore, hubs should choose the optimum course based on their extra lifetime in order to increase network execution. Since the factors affecting course lifespan vary, it is challenging to calculate the remaining life expectancy of the course methodically.
In this current situation, smart fluffy logic approaches might be used to evaluate the proposed convention's exhibition given its locations in relation to time and distance. These two limits enable the beginning of many branches, which are subsequently sent to the predicting motor, which investigates the numerous rewards associated with each course. It has been demonstrated that the suggested steering convention increases the benefits of execution in light of recreations and a comparison of the proposed directing convention to other existing conventions.
I. RELATEDWORKS
In order to stay up with the organization's affiliation, steering conventions are concerned with locating the most immediate course throughout the organization. Numerous metrics, including the number of subsequent jumps, data transfer speed, and dormancy, are used by steering conventions to evaluate the nature of a trajectory. This paper introduces the use of Cisco parcel Tracer and a few steering conventions. According to our research, EIGRP is the ideal convention to utilize because it has a faster union time than RIPv2 and OSPF. In terms of typical throughput and momentary dormancy across a range of organizational sizes, OSPF outperforms Tear. Although EIGRP was quick to transmit traffic and Tear was the least traffic-heavy since it only really communicates the number of hops, OSPF sent the most traffic and was the latest to send directing traffic. Course above, table size, and combination speed are all reduced when broken steering information is separated from the rest of the OSPF framework and divided into separate independent directing zones. Areas deviate from convention by restricting availability while increasing the complexity of directing, the length of steering routes, and the convergence of traffic. The PC organizing industry makes extensive use of the OSPF guiding convention. An organization's data flow cannot be predicted. A single set of steering conventions cannot predict an organization's behavior in
2326-9865
Vol. 68 No. 1 (2019) 66 http://philstat.org.ph
real-world situations because they do not take the information stream into account, whereas the current framework does.
Gil Zussman and Adrian Segall [11] proposed to use this method to get information from arrested survivors using an unplanned grouping of distant dazzling labels. The authors focus on the energy-productive directing issue in such organizations, demonstrating that "shrewd identifications" have constrained power sources and slow information speeds, both of which are lacking in an emergency. The goal of this endeavor, like previous cast-directing issues, is to lengthen the duration until the primary battery dies. The suggested MANET energy- mindful steering techniques are analyzed and organized into categories by Yu et al. [12].They restrict the amount of continuous input energy required to send and receive packages, as well as the amount of cooperative discussion energy used while a mobile hub is inactive but monitors the remote media for any potential future particular status from various hubs. The creators have divided the results into two categories: Transmission power guidelines and burden distribution are included in the first class, whereas rest/shut down mode is used in the second. It very well could be challenging to decide which computation is the greatest fit for a certain instance when choosing one. As a result, the designers made it simpler so that researchers could combine ebb and flow strategies to cope with nurturing a more energy- efficient system. Su et al. [13] established the fluffy rationale adjusted AODV steering (FMAR) convention for portable impromptu organizations. This framework's main goal is to use fluffy reasoning weighted multi-models to gradually study dynamic courses. It could help with the poor throughput of cell phones. Additionally, the suggested convention only specifies one rating value for each route, making it difficult to determine which pathways are generally more crucial. The problems of energy-productive directing and network longevity depending on factors like energy and distance are not addressed by these designs. Therefore, the suggested method considers two measures in light of these problems.
PROPOSED SYSTEM ARCHITECTURE
Instead of certain Routing Protocols, the Proposed System would test Static Routing, Dynamic Routing, and Default Routing. Cisco Packet Tracer can be used to examine the effects of routing protocols. It was developed by Cisco Corporation as a simulation tool.
Static Directing Module
An executive could choose an immediate course starting with one organization before moving on to the next the difficult way using a method of steering that is static. It enhances the company's security. A static directing table must be established, updated, and maintained by an organization leader. To build a full network, each switch should have a static route to each organize. This favors fine-grained control over steering, but it is soon impractical on huge networks. Switches with similar static courses won't impede network traffic. Static directing is not issue tolerant because any change to the steering framework (such as the expansion of another organization or a broken association) must be made the hard way. In the unlikely case that a connection is lost, Switches cannot, therefore, be changed to another way in a static environment.
2326-9865
Vol. 68 No. 1 (2019) 67 http://philstat.org.ph
Dynamic Directing module
Dynamic steering is another type of directing technique to take into account. As a result, updating steering tables with data from other connected switches is made simpler for switches.These protocols also express geography updates when the organization's topological architecture changes. Currently, four out of five specific Dynamic Directing Conventions are in use. Take the most restricted (OSPF) (EIGRP) Course Data Convention first (Tear). An Agreement on Boundary Passage between Frameworks.
Interoperability (IS) (BGP). Default Steering Module
In the unlikely event that a switch cannot connect to a particular organization, it will stop sending any traffic to it. Traffic may be redirected via a default course or entrance if there is no established path to the ideal network after all other options have been explored. It is important to keep the following in mind when creating the Capability Configuration because we are employing a reenactment tool to carry out the attempt. If a switch cannot connect to a certain organization, it will stop sending traffic there. When no specific route to a specific organization is established, traffic can be moved forward in any situation by employing a default course, or "passage of last resort." Zero’s acknowledge the default course everywhere in the business. Subnetmask (0.0.0.0 0.0.0.0). The entrance is the most confusing course possible in the unlikely event that a clearer course is not available after all other options have been explored. How to set the switch's Hub number for the default route IP course order for the 0.0.0.0/0 network On a Cisco equipment, a default network can be set: Default network IP octet size: Elements Router configuration # (s) Personal computers, switches, servers, pure copper links, crossover copper links, and fiber optic links (s).
In computer networks, switches are used to exchange information packages. Web traffic is coordinated through switches. Web content is delivered in the form of packets of data, much like a website page or an email. In an internetwork, a package is typically routed from one switch to the next until it reaches its final destination hub. Devices within an organization are connected through network modifications so that information can be obtained and sent off using packet exchanging.
As an organization bridge at the data interface layer (layer 2) of the OSI model, a company switch routes traffic using Macintosh locations. The ability to redirect information toward the organizational layer may be introduced to some switches (layer 3). Layer-3 or multi-facet switches are the names for these switches that are most frequently used. It is a PC that acts as a safe deposit box for other PCs at the business and gives them access to various resources like equipment access, plate space, printer access, and so on. A straight-through connection type with RJ-45 connections at the two closures is a type of CAT5 with a similar pinot. The T568A or T568B specifications are adhered to. The LAN uses a similar variation code for homogeneity. This reversed pair link is used in local area networks (LANs) to link PCs and administrative hubs like switches. The network connections in question are relatively common.
Copper Get over Links (CCCs):
2326-9865
Vol. 68 No. 1 (2019) 68 http://philstat.org.ph
A Feline 5 hybrid link features one end with a T568A design and one with a T568BC design.
In this particular link connection, Pin 1 crosses Pin 3, whereas Pin 2 crosses Pin 6. A hybrid link can be used to connect any number of PCs. In hybrid links, the signals for transmission and gathering are switched. This connection technique allows similar pieces of equipment, such switches or PCs, to be connected to one another. It is a structural glass filament link that is packaged for security. They are made for long-distance communication, professional execution, and information system administration. Fiber optic links have a more pronounced transmission capability and can transport data over longer distances. Than standard wired links the majority of people in the globe use satellite TV, the internet, and telephone services, all of which are supported by fiber optic cables. PCs are versatile microcomputers that are user-friendly, portable, and powerful enough for individuals to operate. Instead of relying on a PC trained professional or expert, PCs are made to be restricted toward the end user.
Contrary to huge, expensive minicomputers and centralized servers, individual computers do not offer simultaneous time-sharing by numerous clients. A switch at a base should be capable of carrying out the following tasks: a location where a package is delivered. Layer 3 conventions, such as IP addresses. Packets can be sent to close-by switches, where they can be utilized to find and gather information on far-off organizations. It is possible to determine the optimum path between distant networks. A procedure for compiling, confirming, and keeping track of course data. It is considerably worse to have unstable, imprecise, or fragmented steering data than no steering data at all. Packages are dropped and the source is notified in the unlikely event that a switch lacks directional information. Inaccurate steering data can cause loops to start, which can destabilize networks.
Open Shortest Path First (OSPF)
Only IP bundles are routed using the OSPF connection state steering convention (Open Briefest Way First). The internal convention supports devices for multi-seller networks (IGP). By exchanging connection status declarations, OSPF switches build and maintain a global geography data set (LSA). Using LSAs, switches with OSPF enabled can communicate about geography and steering. Data transport can be minimized, for instance, by sending occasion-triggered refreshes when the geography changes (connect disappointment).
Enhanced Interior Gateway Routing Protocol (EIGRP)
To support several organization layer standards, Cisco developed the restrictive directing convention EIGRP. A robust IP-only organizational structure with open web and cloud association principles has gained popularity more recently. It is common knowledge that OSPF, an open source protocol with greater flexibility, is taking the place of EIGRP. EIGRP is a non-various levelled guiding innovation that is attempting to troubleshoot because to its complexity. The best elements of both connection state and distance vector protocols are combined into one framework in the updated connection state protocol known as EIGRP.Other guiding conventions include extensive organizational charts; EIGRP does not.
Similar to connection state conventions, EIGRP builds neighbor adjacencies and offers event- driven refreshes rather than infrequent entire routing table updates. This ludicrous
2326-9865
Vol. 68 No. 1 (2019) 69 http://philstat.org.ph
convention, whose architecture is identical to OSPF, is being changed with the help of the given subnet information. Variable length subnet veils (VLSM), which take into account ridiculous subletting and course outline on any piece limit, greatly benefit from this. In contrast, distance vector conventions only help with subletting within the class of the IP address. Unpredictable expense way load adjustment is taken into account by EIGRP's new change component.
Routing Information Protocol (RIP)
Many years before the present, there was a guiding framework known as the Directing Data Convention (Tear). The ideal target market for this product was comprised of smaller businesses with simple management and no subletting. Tear is a non-universal distance vector convention with postponed combination as its other components and class full tending to as its single tending to component. The simplicity of this strategy's execution and investigation are advantages. The course metric for a distance vector convention is the quantity of bounces. Estimated distance between source and target in bounces. Therefore, the optimum path is determined to be the one with the fewest switch leaps. RIPv1 is less suitable for web associations because it doesn't offer message confirmation. Only the majority of inward entrance conventions, with the exception of EIGRP Most inward entryway norms simply employ similar expenditure paths for load adjustment.
Routing Information Protocol 2(RIP2)
To solve some of the problems of RIPv1, RIPv2, an upgrade to the convention standard, was developed. RIPv2 is a routing convention that incorporates subnet cover data into direction updates while RIPv1 is a class-based architecture. As a result, OSPF, EIGRP, IS, and BGP provide support for tacit sub netting. Additionally, RIPv2 neighbors can verify communications using a text secret phrase or an MD5 hash. All current organizational regions are provided with a fundamental level of safety thanks to this.RIPv2 sends steering changes to multicast 224.0.0.9 rather than the conventional 255.255.255.255 transmission protocol, where each switch would have to process messages. Due to reverse similarity, RIPv2 switches may broadcast to RIPv1 switches. The issue is that RIPv1 will summarize.
To solve some of the problems of RIPv1, RIPv2, an upgrade to the convention standard, was developed. Subnet cover data is combined with the evil convention known as RIPv2 to direct any evil courses up any noble lines.
Intermediate System to Intermediate System (IS-IS)
Steering changes are sent by RIPv2 to multicast 224.0.0.9 rather than the standard 255.255.255.255 transmission protocol, which requires all switches to process messages.
RIPv2 switches may broadcast to RIPv1 switches because of reverse similarity.
Unfortunately, RIPv1 will summarize. To address some of the problems with RIPv1, an improvement to the convention standard known as RIPv2 was developed. In order to direct up any evil courses on a classy line, the evil RIPv2 convention combines subnet cover data.
The IS addressing standard uses interface costs to determine the optimum course of action (transmission capacity). The sum of all en route expenses is used to determine a course's
2326-9865
Vol. 68 No. 1 (2019) 70 http://philstat.org.ph
overall cost. Using an end framework (ES) or an intermediate framework (IS), IS locates all hubs (routers). Level 1 switches (intra-region), Level 1/Level 2 switches (ABR), and Level 2 switches (between regions) make up a two-level progressive system (spine). Because each switch may easily be spread to a single area, the switch in OSPF functions as a line connecting areas rather than a connection point. There isn't a spine connecting the districts like the OSPF. Due to their directed design, certain Level 2 switches can connect locations via L1/L2 switches.
Border Gateway Protocol (BGP)
Interdomain guiding between private IGP directing zones is handled by the Boundary Door Convention (BGP), the industry-standard web directing convention. A course vector convention is one that applies the outside entryway convention (EGP). BGP is essentially a distance vector convention that transmits the AS course to notify neighbors of changes to the direction table. Instead of burden adjustment, path property rules take into account load sharing. Advertised courses aren't always packaged in difficult directorial conventions. Under this non-progressive scheme, independent framework numbers (ASNs) are allocated to inside BGP (iBGP) and outside BGP (eBGP) associations. Instead of iBGP peers, all eBGP neighbors are sent to the relevant independent system. There is a BGP independent framework number that is either public or private (ASN). A specialty cooperative's function.
A public ASN is intended to be used for web access. For BGP web routable associations, the public range is from 1 to 6451. In the iBGP or possibly eBGP network, private AS numbers between 64512 and 65535 are used. IBGP and eBGP independent frameworks are used in a few significant business network spaces.
RESULTS AND DISCUSSION
Speed at which an effective message typically moves across a correspondence route. Figure 1 displays how much of the organization's resources are being used and represents the normal start to end throughput for standard directing conventions. The highest throughput, with an offered heap of 1 parcel/sec, is about 6kbps. Throughput for DSR and DYMO quickly rises with fewer hubs. On the other hand, OLSR performs better when the number of hubs increases. DSR outperforms other methods, especially when the number of hubs differs from 75, as seen in figure 2. The typical jitter number indicates that packages from the source will experience variable delays when they reach their destination.As shown in figure 3, the defer changes when a parcel is questioned by switches as it transitions from a source to an objective. The typical loss rate is the number of bundles that are lost as a result of broken or unavailable courses and Macintosh layer effects. Figure 4's graphic uses network size and the typical bundle discarded to evaluate the reliability of each convention against others. All conventions, with the exception of DSR, see a reduction in the number of information bundles lost as the organization gets smaller. Because of this, AODV and DYMO show higher levels of stability. As the number of hubs increases, more packets are dropped for the two conventions, but more so for DSR. Figure 5 proves this.
2326-9865
Vol. 68 No. 1 (2019) 71 http://philstat.org.ph
Fig. 1 Packet delivery ratio
Fig.2 Average End-to End Delay
Fig. 3Throughput
2326-9865
Vol. 68 No. 1 (2019) 72 http://philstat.org.ph
Fig. 4 Average Jitter Value
Fig. 5 Average Packet loss
II. FUTURE SCOPE AND CONCLUSION
It has been demonstrated that proactive directing techniques outperform on-request steering for low traffic and low versatility. Almost no delay from the beginning to the end. On the spot the variety and high volume of traffic make directing techniques more practical. The fastest rate of bundle delivery is between OSLV and Tear Conventions. Both BGP and RIP2 are capable of producing outcomes that are indistinguishable, but RIP2 has a higher above.
Depending on the type of model being used, results in transportation change. The directing style and versatility are chosen in consideration of the requirements of the application.BGP and EIGRP offer the best performance when compared to the IS and OLSR standards. Since the Manhattan Portability Model provides a larger parcel conveyance proportion while needing less above-ground management, it is more frequently used than the irregular waypoint or irregular gathering versatility models.
2326-9865
Vol. 68 No. 1 (2019) 73 http://philstat.org.ph
REFERENCES
[1] P. Kalamani, M. Venkatesh Kumar , M. Chithambarathanu, Reji Thomas, Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) by using OPNET Simulator tool - A Practical Approach-IOSR-JCE,e-ISSN: 2278- 0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VI (Jul- Aug. 2014).
[2] Rajan, R., Shipra, S.“WLAN Performance Improvisation by Fine Tuning IEEE 802.11Parameters”, International Journal of Computer Applications, April 2012.
[3] Tanenbaum, Andrew s. Computer Networks. s.l.: Pearson Education, 2003.
[4] R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi,Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols, International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005.
[5]V.Vetriselvan, PravinR.Patil, M.Mahendran, Survey on the RIP, OSPF, EIGRP Routing
Protocols, (IJCSIT)
International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 1058-1065.
[6] Y. Zhang and Y. Shi, "Tactical Wireless Network Visualization: Requirements and Representations," 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), Guangzhou, China, 2018, pp. 740-743
[7] Wan Aida Nadia Wan Abdullah et al, “Impact of clustering in AODV routing protocol for wireless body area network in remote health monitoring system”, Indonesian Journal of Electrical Engineering and Computer Science Vol. 13, No. 2, February 2019, pp.
689~695
[8] P. Bellavista, G. Cardone, A. Corradi and L. Foschini, "Convergence of MANET and WSN in IoT Urban Scenarios," in IEEE Sensors Journal, vol. 13, no. 10, pp. 3558-3567, Oct. 2013.
[9] W. A. Hussein, B. M. Ali, M. F. A. Rasid and F. Hashim, "Design and performance analysis of high reliability-optimal routing protocol for mobile wireless multimedia sensor networks," 2017 IEEE 13th Malaysia International Conference on Communications (MICC), Johor Bahru, 2017, pp. 136-140
[10] T. T. Son, H. Le Minh, G. Sexton and N. Aslam, "Self-adaptive proactive routing scheme for mobile ad-hoc networks," in IET Networks, vol. 4, no. 2, pp. 128-136, 3 2015.
[11] Rahul Desai, B P Patil, “Analysis of Reinforcement Based Adaptive Routing in MANET”, Indonesian Journal of Electrical Engineering and Computer Science Vol. 2, No. 3, 2016, pp. 684 ~ 694
[12] N. Meghanathan, "A Location Prediction-Based Reactive Routing Protocol to Minimize the Number of Route Discoveries and Hop Count per Path in Mobile Ad Hoc Networks,"
in The Computer Journal, vol. 52, no. 4, pp. 461-482, July 2009
[13] Y. Fengjie, Y. Hui and Z. Ying, "Research on DSDV routing protocol based on wireless Mesh network," 2018 Chinese Control and Decision Conference (CCDC), Shenyang, China, 2018, pp. 4292-4297.
2326-9865
Vol. 68 No. 1 (2019) 74 http://philstat.org.ph
[14] Zhihao Ding, Pinyi Ren, Qinghe Du, "Mobility Based Routing Protocol with MAC Collision Improvement in Vehicular Ad Hoc Networks", Communications Workshops (ICC Workshops) 2018 IEEE International Conference on, 2018.
[15]Yujun Zhang, Guiling Wang, Qi Hu, Zhongcheng Li, Jie Tian, "Design and performance study of a Topology-Hiding Multipath Routing protocol for mobile ad hoc networks", INFOCOM 2012 Proceedings IEEE, pp. 10-18, 2012.
[16] A. Garcia-Santiago, J. Castaneda-Camacho, J. F. Guerrero-Castellanos and G. Mino- Aguilar, "Evaluation of AODV and DSDV routing protocols for a FANET: Further results towards robotic vehicle networks," 2018 IEEE 9th Latin American Symposium on Circuits & Systems (LASCAS), Puerto Vallarta, Mexico, 2018, pp. 1-4.
[17] A. K. Yogi and J. Surana, "An implementation of Modified AOMDV routing protocol in different wireless networks," 2016 International Conference on ICT in Business Industry
& Government (ICTBIG), Indore, 2016, pp. 1-5.
[18] ManijehKeshtgary, NegarRikhtegar, "Performance evaluation of routing protocols for wireless sensor networks in forest fire detection application", Information and Knowledge Technology (IKT) 2013 5th Conference on, pp. 248-251, 2013
[19] Rahul Desai, B P Patil, “Routing protocols for Mobile Ad Hoc Network - A Survey and Analysis”, Indonesian Journal of Electrical Engineering and Computer Science Vol. 7, No. 3, 2017
[20] S. K. Srivastava, R. D. Raut and P. T. Karule, "Analyzing the performance of routing protocols based on evaluation of different parameters in MANETs," 2015 International Conference on Communication Networks (ICCN), Gwalior, 2015, pp. 258-261.
[21] U. Draz, T. Ali, S. Yasin and A. Shaf, "Evaluation based analysis of packet delivery ratio for AODV and DSR under UDP and TCP environment," 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, 2018, pp. 1-7
[22] Wan Aida Nadia Wan Abdullah et al, “Corrupted packets discarding mechanism to alleviate congestion in wireless body area network”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 14, No. 2, May 2019, pp. 581~587
[23] NurAishah Bt. Zainal, Mohamed HadiHabaebi, IsrathJahan Chowdhury, MdRafiqul Islam, Jamal I. Daoud, “Gateway sink placement for sensor node grid distribution in lora smart city networks”, Indonesian Journal of Electrical Engineering and Computer Science, Vol 14, No 2: May 2019, pp. 834-842
[24] NabeenaAmeen, Najumnissa Jamal, L. Arun Raj, “Comparative analysis of energy based optimized dynamic source multipath routing protocol in WSNs”, Indonesian Journal of Electrical Engineering and Computer Science, Vol. 16, No. 1, October 2019, pp.
441~455
[25] Adnan Ahmed. Energy-aware and secure routing with trust for disaster response wireless sensor network. Peer-toPeer Netw. Appl. # Springer Science+Business Media New York. 2015.
[26] P Ramprakash, M Sakthivadivel, N Krishnaraj, J Ramprasath. ”Host-based Intrusion Detection System using Sequence of System Calls” International Journal of Engineering and Management Research, Vandana Publications, Volume 4, Issue 2, 241-247, 2014
2326-9865
Vol. 68 No. 1 (2019) 75 http://philstat.org.ph
[27] N Krishnaraj, S Smys.”A multihoming ACO-MDV routing for maximum power efficiency in an IoT environment” Wireless Personal Communications 109 (1), 243-256, 2019.
[28] N Krishnaraj, R Bhuvanesh Kumar, D Rajeshwar, T Sanjay Kumar, Implementation of energy aware modified distance vector routing protocol for energy efficiency in wireless sensor networks, 2020 International Conference on Inventive Computation Technologies (ICICT),201-204
[29] Ibrahim, S. Jafar Ali, and M. Thangamani. "Enhanced singular value decomposition for prediction of drugs and diseases with hepatocellular carcinoma based on multi-source bat algorithm based random walk." Measurement 141 (2019): 176-183.
https://doi.org/10.1016/j.measurement.2019.02.056
[30] Ibrahim, Jafar Ali S., S. Rajasekar, Varsha, M. Karunakaran, K. Kasirajan, Kalyan NS Chakravarthy, V. Kumar, and K. J. Kaur. "Recent advances in performance and effect of Zr doping with ZnO thin film sensor in ammonia vapour sensing." GLOBAL NEST JOURNAL 23, no. 4 (2021): 526-531. https://doi.org/10.30955/gnj.004020 , https://journal.gnest.org/publication/gnest_04020
[31] N.S. Kalyan Chakravarthy, B. Karthikeyan, K. Alhaf Malik, D.Bujji Babbu,. K. Nithya S.Jafar Ali Ibrahim , Survey of Cooperative Routing Algorithms in Wireless Sensor Networks, Journal of Annals of the Romanian Society for Cell Biology ,5316-5320, 2021 [32] Rajmohan, G, Chinnappan, CV, John William, AD, Chandrakrishan Balakrishnan, S, Anand Muthu, B, Manogaran, G. Revamping land coverage analysis using aerial satellite image mapping. Trans Emerging Tel Tech. 2021; 32:e3927.
https://doi.org/10.1002/ett.3927
[33] Vignesh, C.C., Sivaparthipan, C.B., Daniel, J.A. et al. Adjacent Node based Energetic Association Factor Routing Protocol in Wireless Sensor Networks. Wireless Pers Commun 119, 3255–3270 (2021). https://doi.org/10.1007/s11277-021-08397-0.
[34] C Chandru Vignesh, S Karthik, Predicting the position of adjacent nodes with QoS in mobile ad hoc networks, Journal of Multimedia Tools and Applications, Springer US,Vol 79, 8445-8457,2020