References
[1]. V.G.Muralishankar, E. G. D. P.Raj, (2014). “ Routing
Protocols for MANET: A Literature Survey”, International
Journal of Computer Science and Mobile Applications,
Vol. 2, No. 3, pp: 18-24.
[2]. M. Chitkara and M. W. Ahmad, (2014). “Review on
MANET: Characteristics, Challenges, Imperatives and
Routing Protocols”, Vol. 3, No. 2, pp: 432 – 437.
[3]. M. Cont, S. Giordano, (2014). “Mobile Ad Hoc
Networking: Milestones, Challenges, and New Research
Directions”, IEEE Communications Magazine, PP: 85-96.
[4]. C. Gandhi, V. Arya, (2014). “A Survey of Energy-Aware
Routing Protocols and Mechanisms for Mobile Ad Hoc
Networks”, Intelligent Computing, Networking, and
Informatics, Vol. 243, pp: 111-117.
[5]. E. M. Shakshuki, N. Kang and T. R. Sheltami, (2013).
“EAACK—A Secure Intrusion-Detection System for
MANETs”, IEEE Transactions on Industrial Electronics, Vol. 60, No. 3 pp: 21-25.
[6]. V. G. Menon, C.S. Sreekala, V. Johny, T. Tony, E. Alias,
(2013). “Performance Analysis of Traditional Topology
based Routing Protocols in Mobile Ad hoc Networks”, The
International Journal of Computer Science &
Applications (TIJCSA), Vol. 2, No. 1, pp: 1-6.
[7]. A. Aggarwal, S. Gandhi and N. Chaubey, (2011).
“Performance Analysis of AODV, DSDV and DSR in
MANETS”, International Journal of Distributed and Parallel
Systems (IJDPS) Vol. 2, No. 6, pp: 167-170.
[8]. S. Taneja, A. Kush, (2010). “A Survey of Routing
Protocols in Mobile Ad Hoc Networks”, International
Journal of Innovation, Management and Technology, Vol.
1, No. 3, pp: 279-282.
[9]. A. H. A. Rahman and Z. A. Zukarnain, (2009).
“Performance Comparison of AODV, DSDV and I-DSDV
Routing Protocols in Mobile Ad Hoc Networks”, European
Journal of Scientific Research, Vol.31, No.4, pp: 566-576.
[10]. K. Saleem, N. Fisal, S. Hafizah, S. Kamilah, and R.A.
Rashid, (2009). “A Self-Optimized Multipath Routing
Protocol for Wireless Sensor Networks”, International
Journal of Recent trends In Engineering, Vol. 2, No. 1, pp:
93-94.
[11]. N. S. Kulkarni, B. Raman and I. Gupta, (2009). “On
Demand Routing Protocols For Mobile Ad Hoc Networks-A
Review ”, IEEE International Advance Computing
Conference, Patiala, India, pp: 6-7.
[12]. N. H. Saeed, M. F. Abbod and H. S. Al-Raweshidy,
(2008). “Intelligent MANET Routing System”, Advances
Information Networking and Applications-Workshops, pp:
1260-1261.
[13]. R. Patil and A. Damodaram, (2008). “Cost Based
Power Aware Cross Layer Routing Protocol For MANET”,
International Journal of Computer Science and Network
Security, Vol. 8 No. 12, pp: 388-391.
[14]. A. Kumar, L. C. Reddy and P. S. Hiremath, (2008).
“Performance Comparision Of Wireless Mobile ad Hoc
Network Routing Protocols”, International Journal of
Computer Science And Network Security, Vol. 8, No. 6.,
pp: 337-340.
[15]. C. Mbarushimana and A. Shahrabi, (2007).
“Comparative Study of Reactive and Proactive Routing
Protocols Performance in Mobile Ad Hoc Networks”, Proc.
of The 21st International conference on Advanced
Information Networking and Applications Workshops
(AINAW'07), pp: 679-684.
[16]. M. Abolhasan, T. A. Wysocki and E. Dutkiewicz,
(2004). “A Review of Routing Protocols for Mobile Adhoc
Networks”, Adhoc Networks, Vol. 2, pp: 1-22.
[17]. I. Chlamtac, M. Conti and J. J. N. Liu, “Mobile Adhoc
Networking: Imperatives and Challenges”, Adhoc
Networks, Vol. 1, pp: 13-64
[18]. E. M. Royer, and C. K. Toh, (1999). “A Review of
Current Routing Protocols for Adhoc Mobile Wireless
Networks”, Personal Communications IEEE 6, No. 2 pp: 46-
55.
[19]. http://teacher.buet.ac.bd/ashikur/ns2/ [accessed:
11/6/2014 ]
[ 2 0 ] . h t t p : / / n s 2 u l t i m a t e . t u m b l r . c o m /
post/2496927327/post-processing-ns2-result-using-ns2-
trace-trace [accessed: 9/6/2014]