Registered User Login
Research Journal of Engineering and Technology
ISSN: 2321-581X(Online), 0976-2973(Print)
News & Conferences
Volume No. :
Issue No. :
ISSN Print :
ISSN Online :
Click to Login
A Comprehensive Survey Paper on Multi Casting Routing Protocols
S. P. Singh
Ajay Kumar and S. P. Singh
Madan Mohan Malaviya Engineering College, Gorakhpur-273010, India
In a multi-hop mobile ad-hoc network, mobile nodes cooperate to form a network without using any infrastructure such as access points and base stations. Instead, the mobile nodes forward packets for each other’s allowing communication among nodes outside wireless transmission range. Examples of applications for ad-hoc networks range from military operation and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In this ad-hoc networking applications, security is necessary to guard the network from various types of attacks. In ad-hoc networks, adverse nodes can freely join the network, listen to and/or interfere with network traffic, and compromise network nodes leads to various network failures. Since routing protocols are a fundamental tool of network-based computation, attacks on unsecured routing protocols can disrupt network performance and reliability. Multicasting is a more efficient method of supporting group communication, as it allows transmission and routing of packets to multiple destinations with fewer network resources. Multicasting can improve the efficiency of the wireless links, when sending multiple copies of messages, by exploiting the inherent broadcast property of the wireless medium when multiple mobile nodes are located within the transmission range of a node. Providing efficient multicasting over MANET faces many challenges, including dynamic group membership and constant update of delivery path due to node movement.
Routing protocols, MANET, Multicasting, Nodes.
Ajay Kumar , S. P. Singh. A Comprehensive Survey Paper on Multi Casting Routing Protocols. Research J. Engineering and Tech. 2(3): July-Sept. 2011 page 172-178.
Visitor's No. :