RED Strategy for Improving Performance in MANET: A Review

  • Chetan Batra Lecturer, SBSSTC Poly wing, Ferozepur (Pb.), Punjab Technical University(sbsstc), India
  • Vishal Arora Assistant Professor, SBSSTC, Ferozepur (Pb.), India
Keywords: MANET, RED Strategy, WSN


A MANET is a type ofad hoc network in which mobiles are connected without wires. They use the wireless connections to connect to various networks. It can be Wi-Fi or other medium like satellite transmission. A VANET (Vehicular Ad Hoc Network), is a type of MANET that allows vehicles to communicate with roadside equipment. In this paper we discuss the concept of congestion that how it happens in the network and lead to packet losses. RED ( Random Early Detection) is described to minimize the packet loss ratio.


Download data is not yet available.


S. Simaiya, A.Shrivastava and N.P. Keer, “IRED Algorithm for Improvement in Performance of Mobile Ad Hoc Networks,” IEEE Fourth International Conference on Communication Systems and Network Technologies, pp. 283-287, 2014.

X. Jiang, J.Yang and G. Jin, “RED-FT: A Scalable Random Early Detection Scheme with Flow Trust against DoS Attacks,” IEEE Communications letters, vol. 17, pp 1032-1035, 2013.

S.S. Rajput, V.Kumar and S..K Paul, “Comparative analysis of Random Early Detection (RED) and Virtual Output Queue (VOQ) algorithms in Differentiated Services Network,” IEEE International Conference on Signal Processing and Integrated Networks, pp 237-240, 2014.

S.A Thorat and P.J.Kulkarni, “Design issues in trust based routing for MANET,” IEEE International Conference on Computing, Communication and Networking Technologies, pp 1-7, 2014.

S. Patel, “Performance Analysis of RED for Stabilized Queue,” Conf. no. 978-1-4799-5173-4 IEEE, 2014.

C.W. Feng, L.F. Huang, X.Cheng, “Congestion Control Scheme Performance Analysis Based on Nonlinear RED,” IEEE Systems Journal, pp 1-8, 2014.

How to Cite
Batra, C., & Arora, V. (2015). RED Strategy for Improving Performance in MANET: A Review. Journal of Information Sciences and Computing Technologies, 3(2), 217-221. Retrieved from