Published April 10, 2023 | Version v1
Journal article Open

Study of Relay Node

  • 1. Department Of ECE, Government College of Engineering, Bodinayakkanur, Theni, India

Description

This paper describes or says what is Relay node, Internal processing of relay nodes are discussed and their merits and demerits. This paper also tells how node act as relay point and what are the important of relay node. It also describe relay application and its limitations. It also tells about basic concept of relay node in LTE.

Files

Study of Relay Node.pdf

Files (243.0 kB)

Name Size Download all
md5:2ce2c10fd23c3b5b23f4140c7ae1d973
243.0 kB Preview Download

Additional details

References

  • 1. Sharma, N. (2017). A Review of Information Security using Cryptography Technique. International Journal of Advanced Research in Computer Science, 8(4).
  • 2. ChristofPaar, J. P., & Preneel, B. (2010). Understanding Cryptography: A Textbook for Students and ractitioners. Springer.
  • 3. Katz, J., & Lindell, Y. (2020). Introduction to modern cryptography. CRC press.
  • 4. Lincke, S. J., & Holland, A. (2007, October). Network security: Focus on security, skills, and stability. In 2007 37th Annual Frontiers In Education Conference-Global Engineering: Knowledge Without Borders, Opportunities Without Passports (pp. F1D-10). IEEE.
  • 5. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A review paper on network security and cryptography. Advances in Computational Sciences and Technology, 10(5), 763-770.
  • 6. Jirwan, N., Singh, A., & Vijay, S. (2013). Review and analysis of cryptography techniques. International Journal of Scientific & Engineering Research, 4(3), 1-6.
  • 7. Thamizhmaran, K., Mahto, R. S. K., & Tripathi, V. S. K. (2012). Performance analysis of secure routing protocols in MANET. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 651-654.
  • 8. Arivazhagan, A., Thamizhmaran, K., & Thamilselvi, N. (2015). Performance Comparison of on Demand Routing Protocols under Back whole For MANET. Advance Research in Computer science and software Engineering, 5(3), 407-411.
  • 9. Prabu, K., & Thamizhmaran, K. (2016). Cluster Head Selection Techniques and Algorithm for Mobile Ad-hoc Networks (MANETS). Advance Research in Computer science and software Engg, 6(7), 169-173.
  • 10. Thamizhmaran, K. (2016). Performance Evaluation of EA3ACK in different topologies Using EAACK for MANET. i-Manager's Journal on Information Technology, 5(4), 5.