Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure and un-accessibility to the trusted servers. The performance of various MANET routing protocols is significantly affected due to frequently changing network topology, confined network resources and security of data packets. In this paper, a simulation based performance comparison of one of the most commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node energy for data transmission.
In this era of information technology, enterprise needs the automation of every business process to get the competitive advantage and multidimensional growth of the business. For this every enterprises need to observe the incoming and out going time of every employee and to stop the entry of unauthorized persons. For CICO many automated and manual systems are available like smart card, RFID, manual ID card, thumb impression techniques, etc. Every technique has its advantages and disadvantages. But the biggest problems with people /employee in this IT era is that employees have to carry a number of electronic devices (PDA, Mobile Phone, Smart card, Client for RFID, Library card, ATM Card, Credit Card etc) with them for different purposes. Carrying so many e-devices/e-cards is not comfortable for a person. To reduce the number of e-devices one has to carry, many IT/Electronic industries are working towards integration. As a result, mobile phone today can be used for MP3/MP4 player, FM radio, storing data, surfing Internet and much other application in business transactions etc. The purpose of this paper is to integrate the authentication process at the time of entry and exit of employee using mobile phones with the support of Bluetooth (BT) Ad-Hoc network. Today the cost of BT enabled mobile is not very high. The minimum cost of a BT and Kilobyte Virtual Machine (KVM) mobile is Rs.2500/-and an employee can easily afford it. An analysis report says that -95% employees are having BT and KVM mobiles. It means mobile phone can be used as an ID card also for the purpose of authentication in CICO system.
General Terms
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.