Rahman,"Simulation, Analysis and PerformanceComparison among different RoutingProtocols for Wireless Sensor Network",Computer Engineering and IntelligentSystems Vol 2, No.4, pp.61- 71, 2011
The most important advantage of this traffic generator model is that it can be applied to all one and two dimensional traffic scenarios where the traffic load may fluctuate due to sensor activities.
Key words: Wireless sensor network, Power model, Mobility, QualNet Simulator 5.0, Routing Protocols
Each node acts as a router in network and no fixed infrastructure for mobile nodes and there is no base station of it, forwarding data packets for other nodes .
Performance comparison of AOMDV and POR with ns-2 (version 2.34) simulations shows that throughput as POR packet delivery is better than that of AOMDV.
Key words: MANETS, AOMDV, POR, Data delivery, routing protocol.
 Vicomsoft, "Knowledge share whitepapers wireless networking Q&A", Vicomsoft connect and protect, Jan 2003.
 Charles E.
Humaira Ehsan and Zartash Afzal Uzmi "Performance Comparison of Ad Hoc Wireless Network Routing Protocols," Proceedings of INMIC 8th International, 24-26 Dec.
 IEEE P802.22/D0.3.7, Draft Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands, IEEE, July 2007.
 IEEE 802.11h-2003, Spectrum and Transmit Power Management Extensions in the 5 GHz Band in Europe, IEEE, 2003.
In designing the scheme, we consider that the PU signal may cover only a part of the network and the nodes can have the different sensing result for the same PU even on the same channel.
The mainpurpose of this paper is to focus on analysis andcomparison of the routing protocols so that thiswill help researchers to add their contribution inthe field of VANET.
Key words: Routing protocols, simulation,VANET, Network Simulator, AODV, DSDV,VANETRBC
 Sweta Verma Sweta Verma* & Dr.
In sensor networks where traffic is bursty, with long periods of silence between the bursts of data, this multicast state maintenance adds a large amount of overhead for no benefit to the application.
Simulation results show that the proposed simple analytical forms are quite accurate for different modulation techniques , which lead to the conclusion that BPSK gives the best and ideal performance as compared to other PSK in wireless communications
Key words: AWGN, BPSK, QPSK, 8-PSK, 16-PSK, 32-PSK, BER, OFDM
 IEEE Std 802.11a-1999, Supplement to IEEE standard for information technology - telecommunications and information exchange between systems - local and metroplitan area networks - specific requirements.
Babau; An Ontology for Attacks in Wireless Sensor Networks; INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE (INRIA); Oct 2008.
 Marti, S., Giuli, T.
The core infrastructure of NGMN network is packet based, all IP and heterogeneous where Long Term Evolution (LTE), WiMax & Wireless local area networks (WLAN) are examples of viable access technologies.
Tsai,A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing,2008.
The various performance parameters like average end-to-end delay, packets sent and received, jitter in network, throughput, commutative distribution and frequency distributions has been analyzed.