Over the last three decades, network devices are increasing due to technology like the Internet of Things (IoT) and Bring Your Own Device (BYOD). These rapidly increasing devices open many venues for network attacks whereas modern attacks are more sophisticated and complex to detect. To detect these attacks efficiently, we have used recently available dataset UNSW-NB15. UNSW-NB15 is developed according to the modern flow of network traffic with 49 features including 9 types of network attacks. To analyze the traffic pattern for the intrusion detection system(IDS), we have used multiple classifiers to test the accuracy. From the dataset UNSWNB15, we have used medium and strong correlated features. All the results from different classifiers are compared. Prominent results are achieved by ensemble bagged tree which classifies normal and individual attacks with an accuracy of 79%.
{"title":"Comprehensive Performance Evaluation Of Network Intrusion System Using Machine Learning Approach","authors":"Shahzad Haroon, Syed Sajjad Hussain","doi":"10.31645/jisrc-019-01","DOIUrl":"https://doi.org/10.31645/jisrc-019-01","url":null,"abstract":"Over the last three decades, network devices are increasing due to technology like the Internet of Things (IoT) and Bring Your Own Device (BYOD). These rapidly increasing devices open many venues for network attacks whereas modern attacks are more sophisticated and complex to detect. To detect these attacks efficiently, we have used recently available dataset UNSW-NB15. UNSW-NB15 is developed according to the modern flow of network traffic with 49 features including 9 types of network attacks. To analyze the traffic pattern for the intrusion detection system(IDS), we have used multiple classifiers to test the accuracy. From the dataset UNSWNB15, we have used medium and strong correlated features. All the results from different classifiers are compared. Prominent results are achieved by ensemble bagged tree which classifies normal and individual attacks with an accuracy of 79%.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129227674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In mobile technology, vehicular network mobility becomes a major issue as the vehicle (node) is continuously in motion. Further, many research groups and telecom communities are working very hard to find solutions to provide robust, efficient and continuous connectivity to the end users in order to provide seamless connectivity. Furthermore, the goal of vehicular networks is to provide connectivity to the internet through which a user can be able to access the internet from anywhere without any geographical limitation and able to support different multimedia applications with high throughput efficiency and quality of service while in motion. Moreover, by the support of different application in vehicular networks enables the user to continuously aware from the traffic situations like accidents, traffic intensity and other useful information. There are two communication scenario vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) network in (VANET). In this report, we have discussed these two scenarios and its existing mobility management schemes. Further, there are some other open issues which are needed to be resolved, the main issues which we discuss is mobility in the vehicular networks and identify the best possible protocols through theoretical analysis.
{"title":"Mobility Management in Vehicular Networks","authors":"A. Abbas, Naveed Dilber","doi":"10.31645/2013.11.1.3","DOIUrl":"https://doi.org/10.31645/2013.11.1.3","url":null,"abstract":"In mobile technology, vehicular network mobility becomes a major issue as the vehicle (node) is continuously in motion. Further, many research groups and telecom communities are working very hard to find solutions to provide robust, efficient and continuous connectivity to the end users in order to provide seamless connectivity. Furthermore, the goal of vehicular networks is to provide connectivity to the internet through which a user can be able to access the internet from anywhere without any geographical limitation and able to support different multimedia applications with high throughput efficiency and quality of service while in motion. Moreover, by the support of different application in vehicular networks enables the user to continuously aware from the traffic situations like accidents, traffic intensity and other useful information. There are two communication scenario vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) network in (VANET). In this report, we have discussed these two scenarios and its existing mobility management schemes. Further, there are some other open issues which are needed to be resolved, the main issues which we discuss is mobility in the vehicular networks and identify the best possible protocols through theoretical analysis.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116637894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are many software development models that exist for software development like Extreme Programming, Waterfall, Spiral, Agile, RAD, SCRUM etc. These models are very useful for development but its usefulness varies from company to company in nature of product and services of companies. When we talk about software development in Pakistan then there are no specific or standard model followed by most of the software Development Companies due to which they are facing many problems regarding development and deployment of software and at the end did not succeed to maturity level, as a whole there are lacking in standardization of software model in Pakistan. Subsequently, the customer also suffers and reluctant to avail long-term business. This study focus and cover software development procedure that are followed by small and middle level software houses like how to overcome risk management factor in software development, how to improve software development process. My target is to counter those software houses that work on limited scope software but as all software are important for the industry and for the growth of that software house, they must follow some standards and best practices that are built on their ethics and culture so that they can be known as the software houses that fulfil the maturity level. Since every country has its own ethics and goals so here the study will cover the software houses in Pakistan and proposed a SDLC model that lead them to achieve successful maturity level. Since the study assume the company size to be 30-40 employees as it is suggested to be SME. The major reason of selecting the ratio of 30 – 40 is that the companies from where I have conducted the research are small SME’s and average company size of SME’s are 30 to 40 employees.
{"title":"Standardized Software Development Model For SME Software Houses In Pakistan","authors":"Asif Mansoori, M. E. Tayab","doi":"10.31645/2014.12.1.2","DOIUrl":"https://doi.org/10.31645/2014.12.1.2","url":null,"abstract":"There are many software development models that exist for software development like Extreme Programming, Waterfall, Spiral, Agile, RAD, SCRUM etc. These models are very useful for development but its usefulness varies from company to company in nature of product and services of companies. When we talk about software development in Pakistan then there are no specific or standard model followed by most of the software Development Companies due to which they are facing many problems regarding development and deployment of software and at the end did not succeed to maturity level, as a whole there are lacking in standardization of software model in Pakistan. Subsequently, the customer also suffers and reluctant to avail long-term business. This study focus and cover software development procedure that are followed by small and middle level software houses like how to overcome risk management factor in software development, how to improve software development process. My target is to counter those software houses that work on limited scope software but as all software are important for the industry and for the growth of that software house, they must follow some standards and best practices that are built on their ethics and culture so that they can be known as the software houses that fulfil the maturity level. Since every country has its own ethics and goals so here the study will cover the software houses in Pakistan and proposed a SDLC model that lead them to achieve successful maturity level. Since the study assume the company size to be 30-40 employees as it is suggested to be SME. The major reason of selecting the ratio of 30 – 40 is that the companies from where I have conducted the research are small SME’s and average company size of SME’s are 30 to 40 employees.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127417191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IN 2012 2.5 QB OF DATA (18 ZEROS AFTER 1) WAS GENERATED WORLDWIDE KNOW SO FAR. EVERY DAY DATA CREATION SIZE IS BECOMING BIG-TO-BIGGER THAN WAS SEEN BY EVERYONE SINCE THE BEGINNING OF HUMANKIND. BRIEF DATA GENERATION HISTORY IN CATEGORICAL FASHION IS AS FOLLOWS: 5 Petabytes: Data flowing through Walmart’s transactional databases. Consumers spend $272,000 on Web shopping /day. Apple receives around 47,000 app downloads /minute. On Facebook, Brands receive more than 34,000 “likes” /minute. 8 billion Email messages per day On Twitter 340 million tweets per day On Facebook 684,000 bits of content per day 3,125 new photos uploaded on Flicker per minute. As data size increased so are security threats, which comprise unauthorized modification/ alteration of big data. Conducting security visualization manually on such a large-scale data is beyond compression. Therefore, we need some automated easy to use, time saving technique that can give comprehensive results, which can help to track the integrity of big data.
{"title":"Security Visualization on Big Data","authors":"Waqar Ahmed, Uzair Hashmi","doi":"10.31645/2013.11.2.6","DOIUrl":"https://doi.org/10.31645/2013.11.2.6","url":null,"abstract":"IN 2012 2.5 QB OF DATA (18 ZEROS AFTER 1) WAS GENERATED WORLDWIDE KNOW SO FAR. EVERY DAY DATA CREATION SIZE IS BECOMING BIG-TO-BIGGER THAN WAS SEEN BY EVERYONE SINCE THE BEGINNING OF HUMANKIND. BRIEF DATA GENERATION HISTORY IN CATEGORICAL FASHION IS AS FOLLOWS: 5 Petabytes: Data flowing through Walmart’s transactional databases. Consumers spend $272,000 on Web shopping /day. Apple receives around 47,000 app downloads /minute. On Facebook, Brands receive more than 34,000 “likes” /minute. 8 billion Email messages per day On Twitter 340 million tweets per day On Facebook 684,000 bits of content per day 3,125 new photos uploaded on Flicker per minute. As data size increased so are security threats, which comprise unauthorized modification/ alteration of big data. Conducting security visualization manually on such a large-scale data is beyond compression. Therefore, we need some automated easy to use, time saving technique that can give comprehensive results, which can help to track the integrity of big data.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The content search of web content for large data and information presents enormous resourcing and quality challenges. Users expect to find information quickly, with minimal navigation and with consistency of information and nomenclature. For example content and solutions information, users expect clear, relevant lists of information and services that comprise those solutions, including research papers, publications, videos, images, interviews, conferences and case studies that provide referential examples. The foundation component of the Semantic Web is ontologies which are used to embody knowledge in the Semantic Web. Ontology is an information form is used to demonstrate a set of concepts and the relationships connecting those concepts within a domain. Taking unstructured data from the web and formalizing it so that it can be structured automatically is a difficult work to do, but apart from its significance it is interesting as well. Through this research it is intended to make the automation of ontology public, as it is based on open standard and constructed using publicly available resources of Google, like Google AJAX API and JavaScript parser JSON.
{"title":"Enhance the content search by using Semantic Web","authors":"Aeman Jamali, Asim Riaz","doi":"10.31645/2013.11.2.2","DOIUrl":"https://doi.org/10.31645/2013.11.2.2","url":null,"abstract":"The content search of web content for large data and information presents enormous resourcing and quality challenges. Users expect to find information quickly, with minimal navigation and with consistency of information and nomenclature. For example content and solutions information, users expect clear, relevant lists of information and services that comprise those solutions, including research papers, publications, videos, images, interviews, conferences and case studies that provide referential examples. The foundation component of the Semantic Web is ontologies which are used to embody knowledge in the Semantic Web. Ontology is an information form is used to demonstrate a set of concepts and the relationships connecting those concepts within a domain. Taking unstructured data from the web and formalizing it so that it can be structured automatically is a difficult work to do, but apart from its significance it is interesting as well. Through this research it is intended to make the automation of ontology public, as it is based on open standard and constructed using publicly available resources of Google, like Google AJAX API and JavaScript parser JSON.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Arham Hussaini, Syed Ali Shiraz Jafari, Muhammad Adeel Karim
Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry. More specifically dimensions of management information system in this study are system quality, information quality and information presentation. Total of 300 Self-administrated questionnaires were distributed among the general public of Pakistan. Smart PLS (partial least square) method were used to test the statically analysis. From statically analysis we have found that all the three dimensions of management information system significantly and positively impact the customer trust and satisfaction toward digital banking. Furthermore, this paper will surely contribute to the theoretical and managerial impactions.
{"title":"Effect Of Information Systems On Customer Satisfaction And Influence Of Trust: Evidence From Pakistani Digital Banking Industry","authors":"Syed Arham Hussaini, Syed Ali Shiraz Jafari, Muhammad Adeel Karim","doi":"10.31645/00","DOIUrl":"https://doi.org/10.31645/00","url":null,"abstract":"Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry. More specifically dimensions of management information system in this study are system quality, information quality and information presentation. Total of 300 Self-administrated questionnaires were distributed among the general public of Pakistan. Smart PLS (partial least square) method were used to test the statically analysis. From statically analysis we have found that all the three dimensions of management information system significantly and positively impact the customer trust and satisfaction toward digital banking. Furthermore, this paper will surely contribute to the theoretical and managerial impactions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126017951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The payment system has been the back bone of financial systems of a country. The stability and growth of an economy is directly related to the strength, reliability, scalability and efficiency of payment system. There are various kinds of instruments and channels in payment system; some are slow like paper cheques and some electronic transfers. And after the introduction of Electronic payment methods and their wide spread acceptance in many developed countries has played an important roles in stabilizing and growing their economies. But the use of electronic payment methods is still in infancy in Pakistan due to various incidents of frauds and identity thefts. In Pakistan only 12% of population has access to Bank branches but internet is available in almost every small town and mobile penetration is almost 80-90% of population. Currently there are two major systems payment systems i.e. one is using clearance of amount based on settlement of Physical cheques drawn between difference banks and second is using online interbank fund transfer . The second one is also divided into two segments. i.e. large and small amounts of transaction. Larger transactions having no limit of amount are conducted between Banks using Real Time Gross settlement Systems (RTGS ) managed by Stat bank of Pakistan and the other is using Online Interbank fund transfer for small payments having limitation of 250,000 (Two lacs fifty thousand rupees) categorized as retail payment systems. The cost of transfer for large amount is only 50 Rupees per transaction regardless of amount, but an ordinary customer has to be a good business client of bank to carry out transfer of amount online.
{"title":"Comparative analysis of payment system and suggesting solutions for data security issues in Pakistan","authors":"J. Akhtar, Husnain Ali","doi":"10.31645/2014.12.1.6","DOIUrl":"https://doi.org/10.31645/2014.12.1.6","url":null,"abstract":"The payment system has been the back bone of financial systems of a country. The stability and growth of an economy is directly related to the strength, reliability, scalability and efficiency of payment system. There are various kinds of instruments and channels in payment system; some are slow like paper cheques and some electronic transfers. And after the introduction of Electronic payment methods and their wide spread acceptance in many developed countries has played an important roles in stabilizing and growing their economies. But the use of electronic payment methods is still in infancy in Pakistan due to various incidents of frauds and identity thefts. In Pakistan only 12% of population has access to Bank branches but internet is available in almost every small town and mobile penetration is almost 80-90% of population. Currently there are two major systems payment systems i.e. one is using clearance of amount based on settlement of Physical cheques drawn between difference banks and second is using online interbank fund transfer . The second one is also divided into two segments. i.e. large and small amounts of transaction. Larger transactions having no limit of amount are conducted between Banks using Real Time Gross settlement Systems (RTGS ) managed by Stat bank of Pakistan and the other is using Online Interbank fund transfer for small payments having limitation of 250,000 (Two lacs fifty thousand rupees) categorized as retail payment systems. The cost of transfer for large amount is only 50 Rupees per transaction regardless of amount, but an ordinary customer has to be a good business client of bank to carry out transfer of amount online.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122451279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Syed Arham Hussaini, Syed Ali Shiraz Jafari, Muhammad Adeel Karim
Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry. More specifically dimensions of management information system in this study are system quality, information quality and information presentation. Total of 300 Self-administrated questionnaires were distributed among the general public of Pakistan. Smart PLS (partial least square) method were used to test the statically analysis. From statically analysis we have found that all the three dimensions of management information system significantly and positively impact the customer trust and satisfaction toward digital banking. Furthermore, this paper will surely contribute to the theoretical and managerial impactions.
{"title":"Effect of Information Systems on customer Satisfaction and Influence of Trust: Evidence from Pakistani Digital Banking Industry","authors":"Syed Arham Hussaini, Syed Ali Shiraz Jafari, Muhammad Adeel Karim","doi":"10.31645/jisrc","DOIUrl":"https://doi.org/10.31645/jisrc","url":null,"abstract":"Aim of this paper is to investigate the relationship among information system of digital banking, trust and customer satisfaction. For this we have applied the [1], S. J. (2009) model to Pakistani banking industry. More specifically dimensions of management information system in this study are system quality, information quality and information presentation. Total of 300 Self-administrated questionnaires were distributed among the general public of Pakistan. Smart PLS (partial least square) method were used to test the statically analysis. From statically analysis we have found that all the three dimensions of management information system significantly and positively impact the customer trust and satisfaction toward digital banking. Furthermore, this paper will surely contribute to the theoretical and managerial impactions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128087936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study elucidates various algorithms used for document or text classification challenge. A sample data is used in this study on which various algorithms like Support Vector Machines (SVM), Naïve Bayes, Neural Networks and K-Nearest Neighbor are used in order to analyze their performances and accuracies. This study tries to identify the limitations and strength of these algorithms on the given sample data that how optimally they can perform classification. Different validations are used in this study to examine the accuracies regarding the classification can be identified. Validations include Split-Validation, X-Validation and Bootstrapping. Different ways and methods are discussed through which classification is made possible in large hierarchy. Finally this study concludes on the basis of results obtained that which machine learning technique or classifier performed excellent on the provided sample data set and achieved higher accuracy as compared to others.
{"title":"Large Scale Hierarchical Classification","authors":"Adarsh Khalique, Rahim Hasnani","doi":"10.31645/2013.11.2.3","DOIUrl":"https://doi.org/10.31645/2013.11.2.3","url":null,"abstract":"This study elucidates various algorithms used for document or text classification challenge. A sample data is used in this study on which various algorithms like Support Vector Machines (SVM), Naïve Bayes, Neural Networks and K-Nearest Neighbor are used in order to analyze their performances and accuracies. This study tries to identify the limitations and strength of these algorithms on the given sample data that how optimally they can perform classification. Different validations are used in this study to examine the accuracies regarding the classification can be identified. Validations include Split-Validation, X-Validation and Bootstrapping. Different ways and methods are discussed through which classification is made possible in large hierarchy. Finally this study concludes on the basis of results obtained that which machine learning technique or classifier performed excellent on the provided sample data set and achieved higher accuracy as compared to others.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134294273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research paper work is about the analysis of routing protocol metrics in MANET. The routing protocols metrics are important subject matter in the mobile Adhoc network environment. The MANET environment connecting devices or nodes with each other energetically and develop mobile Adhoc wireless network . It offers the mobility to network devices to freely move in any direction and develop connection to any device. The aim of this research paper is to analyze the routing protocol metrics as, radio range, delay, load, media access delay and throughput by evaluating the simulation of AODV, DSR and TORA routing protocols using video conferencing application. The simulation results have been carried out through OPNET 14.5 modeler tool, however scenarios created, having different node densities and different WLAN physical characteristics and routing protocol metrics and analyzed results.
{"title":"Analysis Of Routing Protocol Metrics In MANET","authors":"H. Nawaz, H. Ali","doi":"10.31645/2014.12.1.12","DOIUrl":"https://doi.org/10.31645/2014.12.1.12","url":null,"abstract":"This research paper work is about the analysis of routing protocol metrics in MANET. The routing protocols metrics are important subject matter in the mobile Adhoc network environment. The MANET environment connecting devices or nodes with each other energetically and develop mobile Adhoc wireless network . It offers the mobility to network devices to freely move in any direction and develop connection to any device. The aim of this research paper is to analyze the routing protocol metrics as, radio range, delay, load, media access delay and throughput by evaluating the simulation of AODV, DSR and TORA routing protocols using video conferencing application. The simulation results have been carried out through OPNET 14.5 modeler tool, however scenarios created, having different node densities and different WLAN physical characteristics and routing protocol metrics and analyzed results.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129501741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}