Open Access Open Access  Restricted Access Subscription Access

Study of Relay Node

V. Preethy, K. Thamizhmaran

Abstract


This paper describes or says what is Relay node, Internal processing of relay nodes are discussed and their merits and demerits. This paper also tells how node act as relay point and what are the important of relay node. It also describe relay application and its limitations. It also tells about basic concept of relay node in LTE.


Full Text:

PDF

References


Sharma, N. (2017). A Review of Information Security using Cryptography Technique. International Journal of Advanced Research in Computer Science, 8(4).

ChristofPaar, J. P., & Preneel, B. (2010). Understanding Cryptography: A Textbook for Students and ractitioners. Springer.

Katz, J., & Lindell, Y. (2020). Introduction to modern cryptography. CRC press.

Lincke, S. J., & Holland, A. (2007, October). Network security: Focus on security, skills, and stability. In 2007 37th Annual Frontiers In Education Conference-Global Engineering: Knowledge Without Borders, Opportunities Without Passports (pp. F1D-10). IEEE.

Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A review paper on network security and cryptography. Advances in Computational Sciences and Technology, 10(5), 763-770.

Jirwan, N., Singh, A., & Vijay, S. (2013). Review and analysis of cryptography techniques. International Journal of Scientific & Engineering Research, 4(3), 1-6.

Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654.

Arivazhagan, A., Thamizhmaran, K., & Thamilselvi, N. (2015). Performance Comparison of on Demand Routing Protocols under Back whole For MANET. Advance Research in Computer science and software Engineering, 5(3), 407-411.

Prabu, K., & Thamizhmaran, K. (2016). Cluster Head Selection Techniques and Algorithm for Mobile Ad-hoc Networks (MANETS). Advance Research in Computer science and software Engg, 6(7), 169-173.

Thamizhmaran, K. (2016). Performance Evaluation of EA3ACK in different topologies Using EAACK for MANET. i-Manager's Journal on Information Technology, 5(4), 5.


Refbacks

  • There are currently no refbacks.