SlideShare a Scribd company logo
1 of 7
Download to read offline
S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering
             Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                     Vol. 3, Issue 1, January -February 2013, pp.1634-1640
Analysis Of Routing Protocols In Wmn Using Certain Parameters
                To Maintain Quality Of Service
                     S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar
  *Department of Computer Science and Engineering Manonmanium Sundaranar University Trinelveli, India
        **Department of Computer Science and Engineering Sathyabama University Chennai, India
 ***Department of Computer Science and Engineering Manonmanium Sundaranar University Trinelveli, India


Abstract                                                with each other by forwarding the packets to one
         Wireless Mesh Networks (WMNs) are              another.
bringing rapid change in the field of wireless
networking. It is a trustworthy technology in           II. SECURITY IN WMNS
applications like broadband home networking,                      There are various challenges in WMNs on
network management and latest transportation            which it is necessary to overcome and hence making
systems. WMNs consist of mesh routers, mesh             the WMN more and more ideal. While making an
clients and gateways. It is a special kind of           efficient network, there exist these kinds of
wireless Ad-hoc networks. Parameters in WMNs            challenges, on which it is necessary to tackle. The
include delay, throughput, network load etc.            challenges that arise in WMNs are authentication,
There are two types of routing protocols i.e.           authorization, encryption, key management, attacks,
reactive protocols and proactive protocols. Three       intrusion detection and prevention, secure routing
routing protocols AODV, DSR and OLSR have               and security policies [23]. Authentication is one of
been tested in WMNs under certain parameters            the core issues in network security. When there is no
which are delay, throughput and network load.           interruption in our network, it is said that network is
The testing of these protocols will be performed        providing authentication or in other words data
in the Optimized Network Evaluation Tool                cannot be made stop by any third party. In WMNs
(OPNET) Modeler 14.5. The obtained results              thousands of nodes are being connected wirelessly
from OPNET will be displayed in this paper in           with each other and as it is already said that stealing
the form of graphs.                                     the data from a wireless network is easier than a
                                                        wired network. Hence while building a WMN it is
Keywords- Wireless Mesh Networks, Dynamic               necessary to keep in minds that it must provide
Source Routing, QoS, Mesh Routing Protocol              authentication so that users gain more confidence on
                                                        a network. Authorization is the kind of permission
I. INTRODUCTION                                         that particular thing is accessible.
          Wireless communication has an enormous
use these days and is still becoming popular from       III. SECURITY MODEL FOR WMNS
times immemorial. This is because of the latest                   In every network there are key issues i.e.
technological demands nowadays arising from             availability,     integrity,     authenticity      and
laptops, wireless devices such as wireless local area   confidentiality. If some actions attempt to disturb
networks (LANs), etc. Because of its fast growing       these issues, they are called intrusions. There is one
popularity day by day, it has led wireless              system by which intrusions can be detected i.e.
communication data rates higher and it has made its     Intrusion Detection System (IDS). Intrusions can be
prices cheaper, that is why wireless communication      prevented by using different kind of software. There
is growing so fast. Wireless communication can          is intrusion prevention system (IPS) which is a sub
work between hosts by two different methods; one        part of IDS that prevents the network from
method is to allow the existing network carry data      intrusions. In simple words to make the WMNs
and voice, and second method is to make ad-hoc          secure from attacks it is necessary to do intrusion
network so that hosts can communicate with each         detection and prevention. There is a proposed
other [1]. Wireless Mesh Networks (WMNs) are one        security model for WMNs that explains how the
of the types of ad-hoc networks. Ad-hoc networks        security services are put together [24]. In the
are also called as mobile ad-hoc networks               intrusion prevention model, first three including
(MANETs). Companies use wireless mesh networks          authentication, integrity and data confidentiality
for making large coverage area of wireless local area   works on Medium Access Control (MAC) layer
networks. WMNs are the latest technology that has       while integrity, data confidentiality, authorization
lot of things in common with MANETs. Basically          and source routing works on network layer. The right
WMNs are consisted of wireless nodes; each node         model shows that availability, intrusion detection and
with its own packet, these nodes can communicate        automated response can work on both layers i.e.
                                                        network and MAC layers.



                                                                                              1634 | P a g e
S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering
             Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                     Vol. 3, Issue 1, January -February 2013, pp.1634-1640




                                            Figure 1.   Security Model


IV.   WIRELESS             MESH        NETWORK                 telecommunication as well as internet services;
PROTOCOLS                                                      however there are still some challenges and
          Wireless Mesh Networks are generally                 problems which have been faced by trouble
considered as the type of mobile ad-hoc networks.              shooters.
However there are some differences between them.
Firstly in wireless mesh networks almost the traffic           V. DESIGN PARAMETERS
starts from gateways and ends ups also on gateway.                      There are various parameters that are
Secondly in wireless mesh networks, nodes are                  available in WMNs and they are also termed as
clearly separated from each other either they are in           performance metrics or design parameters. Every
the form of stagnant nodes or mobile nodes.                    parameter has its own importance. These parameters
MANETs are linked with mobile ad-hoc networks,                 are named and described below. These design
general MANETs routing protocols can be used in                parameters/performance metrics are used for the
WMNs. Additionally WMNs are new technological                  evaluation of routing protocols. These design
networks which are similar to MANETs. One of the               parameters have a great impact on overall
applications of WMNs is that, it provides                      performance of a communication network. This
connection to an infrastructure node. It plays vital           paper has dealt with the first three performance
role for providing broadband internet access. Some             metrics of a network i.e. delay, throughput and
of the effects of routing protocols in WMNs are                network load. These three performance metrics are
listed below.                                                  evaluated with respect to routing protocols to see
1. They are responsible to strength the network.               the performance. The descriptions of all the design
2. They are helpful to make connection between                 parameters that are useful in WMNs are as follows.
    nodes.
3. Creates synchronization between nodes.                      1.   Delay
4. Provides quality of service in terms of                     2.   Throughput
    bandwidth utilization, delay, throughput,                  3.   Network Load
    network load, and jitter.                                  4.   Jitter
          As mentioned earlier general MANETs                  5.   Packet Loss
protocols can be implemented in WMNs, however                  6.   Routing overhead
the more efficient protocol which synchronizes with            7.   Packet Delivery Ratio
wireless mesh networks is mesh routing protocol
(MRP). The protocol creates the continuity between             VI. SIMULATION RESULTS AND ANALYSIS
routing paths and gateway destinations. It has also            1 First Scenario
the ability to select the route, which is basic                         We made first scenario in which we used
requirement to make better communication in                    15 mobile nodes from the object palette window of
WMNs. There are lots of relevant protocols in this             OPNET Modeler 14.5 and pasted all of them in the
context. Many of them have been authorized by                  workspace window. For these 15 mobiles there had
IETF, some of them are reactive and some of them               to be one server, so we took one fixed wlan_server
are proactive for example AODV and DSR are                     from the object palette. These nodes were being
implemented for ad-hoc networks. Wireless mesh                 pasted in the campus network size of 1000 x 1000
technology is the latest well developed technology             meters. Once all the mobile nodes and fixed node
which has vital role in the field of                           server have been pasted on a workspace window,



                                                                                                  1635 | P a g e
S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering
               Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 1, January -February 2013, pp.1634-1640
IPv4 addressing was assigned automatically to all
nodes. After this we drag application config and
profile config from object palette to workspace
window. All the attributes of these two config(s)
contain mostly the number of rows, speed in
meters/seconds and pause time in seconds. So these
settings must be done according to the requirement.
The FTP was selected as traffic and FTP was set to
High Load FTP traffic. After doing all the
configurations to a network now it’s time to deploy
the configured profile which can be done by
clicking Protocol tab in OPNET workspace window
and selecting the Deploy Defined Application.
Mobility Config was also dragged into workspace
window, all its necessary attributes had been set and   Figure 3.   Paper Simulation Scenario with 30 nodes
then random mobility was set to MANET as a
profile. Before running simulation, individual          3 Simulation Results
statistics had been selected from where we can                     After making all three scenarios in OPNET
choose protocols and wireless LAN etc. The figure       Modeler 14.5, we run the simulation and compared
of this first scenario is shown as follows in which     the results of these three scenarios. Initially
all the three protocols (AODV, DSR and OLSR)            simulation time was set to 50 minutes and graphs
were tested against the three parameters (Delay,        were taken, but for statistical calculation we found
Throughput and Network Load).                           those graphs very difficult as the graphs are
                                                        showing very little variations in it. That is why we
                                                        then performed the simulation for 3 minutes (180
                                                        seconds) and graphs were taken and saved in bitmap
                                                        image. These graphs were found very helpful for
                                                        statistical analysis as they are showing reasonable
                                                        variations in the graphs. Hence we preferred those
                                                        graphs that were obtained during 3 minutes
                                                        simulation. The DES execution manager window
                                                        for both the simulation periods clearly shows that
                                                        simulation has been performed for 50 minutes and
                                                        30 minutes also.

                                                        3.1.1 When Nodes=15, AODV Performance
                                                                 This figure was taken when we were
                                                        working in our scenario 1 when we have 15 mobile
                                                        nodes and 1 fixed node server. The protocol run in
                                                        this case was Ad-hoc On-Demand Vector (AODV)
Figure 2.   Paper Simulation Scenario with 15 nodes     against all three parameters. In this figure delay,
                                                        throughput and network load are being shown when
2 Second Scenario                                       AODV protocol is used in MANETs. The graphs
         Similarly we made our second scenario in       are showing in time average form. The upper small
which have increased the number of mobile nodes         window is showing the delay when AODV protocol
from 15 to 30.All the settings in this scenario         was used, the x-axis denotes time which is in
remained same like it had in the first scenario, only   minutes and y-axis is also in time but in seconds.
the number of nodes was increased. In this scenario     According to the upper figure the average peak
also, the protocols are tested against the three        value of delay is almost 0.027 seconds, and it
parameters. The figure of our second scenario in        gradually drops and attains a constant value of
simulation environment is shown as follows.             approximately 0.001 seconds, after 3 minutes the
                                                        value of delay is almost 0.001 seconds. Similarly
                                                        the middle graph is for network load when protocol
                                                        was AODV and nodes were 15. The x-axis of this
                                                        graph denotes time which is in minutes and y-axis
                                                        denotes data rate which is in bits/seconds.
                                                        According to this graph the peak value of network
                                                        load is 500,000 bits/sec and it gradually drops as
                                                        time progresses and reaches to almost 80,000
                                                        bits/sec after 3 minutes. The third graph is for



                                                                                             1636 | P a g e
S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering
               Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 1, January -February 2013, pp.1634-1640
throughput when AODV protocol was used and
numbers of nodes were 15. The x-axis denotes time
which is in minutes and y-axis denotes data rate
which is in bits/seconds. According to this graph the
peak value of throughput is almost 510,000 bits/sec
and after this it gradually decreases and reaches to
almost 100,000 bits/sec at time 3 minutes.




                                                                Showing Graphs of all parameters when
                                                         Figure 5.
                                                         nodes=15 (DSR)

                                                         3.1.3 When Nodes=15, OLSR Performance
                                                                   Like above two criteria the figure for
       Showing Graphs of all parameters when
Figure 4.                                                OLSR is also collected and saved when there are 15
nodes=15 (AODV)                                          mobile nodes in a scenario. The x-axis denotes time
                                                         in minutes and y-axis denotes time in seconds for
3.1.2 When Nodes=15, DSR Performance                     the upper window in this below figure. While the
          This figure was taken when the numbers of      second middle figure has x-axis in minutes and y-
nodes were 15 and the protocol was Dynamic               axis in bits/sec because y-axis shows data rate. In
Source Routing (DSR) in MANETs. This below               the third small window the x-axis denotes time in
figure is also showing the delay, network load and       minutes and y-axis denotes data rate in bits/sec. The
throughput of DSR protocol. The upper small figure       average delay of OLSR after 3 minutes is
is showing delay, in which x-axis denotes time           approximately 0.0009 seconds which is very low as
which is in minutes and the y-axis also denotes time     compared to first two routing protocols. The
which is in seconds. The middle figure is for            network load in OLSR is approximately 50,000
network load in which x-axis denotes time which is       bits/sec after 3 minutes and its peak value 450,000
in minutes and the y-axis denotes data rate which is     bits/sec. The peak value of throughput of OLSR in
in bits/seconds. The third figure is for throughput in   15 nodes scenario is almost equal to 580,000
which x-axis denotes time which is in minutes and        bits/sec.
the y-axis denotes data rate which is in bits/sec. The
peak value of delay in DSR is approx 0.030 seconds
and after 3 minutes it reaches to almost 0.010
seconds. The peak value of network load in DSR is
almost attaining a value of 400,000 bits/sec and then
gradually decreases and reaches to approx 50,000
bits/sec at 3 minutes time. The behavior of
throughput in DSR protocol is showing that after 3
minutes the value of throughput is approximately
equal to 50,000 bits/sec when the numbers of nodes
are 15.




                                                                Showing Graphs of all parameters when
                                                         Figure 6.
                                                         nodes=15 (OLSR)




                                                                                             1637 | P a g e
S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering
               Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 1, January -February 2013, pp.1634-1640
3.2.1 When Nodes=30, AODV Performance
          When we have increased the number of
nodes from 15 to 30, the protocols are checked
individually on all parameters. First of all we have
chosen AODV to see its performance on delay,
throughput and network load. On increasing the
number of nodes it made a slight difference on the
graph of AODV delay, the delay’s peak value is
starting from almost 0.048 seconds and reaches to
almost 0.001 seconds after 3 minutes time.
Similarly the load on network is also showing a
different behavior than the one that was in 15 nodes.
The peak value of network load is 790,000 bits/sec.
Throughput of DSR in this scenario has also
increased as the number of nodes was also
increased. ADOV protocol gives throughput almost
equal to 250,000 bits/sec when number of nodes is
30. This is shown in figure below.
                                                               Showing Graphs of all Parameters when
                                                        Figure 8.
                                                        nodes=30 (DSR)

                                                        3.2.3 When Nodes=30, OLSR Performance
                                                                  The figure of 30 nodes scenario with
                                                        OLSR protocol is also showing that on increasing
                                                        the number of nodes the delay generating by OLSR
                                                        is also increasing but when we compared the delay
                                                        of this figure with 15 nodes OLSR it is observable
                                                        that the delay has the same value equal to 0.009
                                                        seconds after 3 minutes and the graph of delay also
                                                        looks like same as in 15 nodes scenario. The peak
                                                        value of network load in this scenario for OLSR
                                                        protocol is approx 750,000 bits/sec and after 3
                                                        minutes the value is 150,000 bits/sec. Similarly we
                                                        can measure and observe the value of throughput
                                                        and can see the changing behavior of this graph.



       Showing Graphs of all parameters when
Figure 7.
nodes=30 (AODV)

3.2.2 When Nodes=30, DSR Performance
          When we have number of mobile nodes
equal to 30, we checked the behavior of DSR
protocol when run on MANETs. The design of this
figure is also the same like the previous figures. If
we have a deep look on this figure we can observe
easily that while increasing the numbers of nodes,
definitely the delay of all protocols increase but
their delays vary in numeric values. Like in this
figure the delay in 30 nodes scenario is almost equal
to 0.02 sec exactly after 3 minutes. And if we see
the delay in 15 nodes scenario it was 0.010 sec.
Because number of nodes is increased the delay has
also increased because when data has to pass more
nodes while reaching to its destination node,
definitely the delay will be introduced in it. And in
the middle figure the network load is also increased           Showing Graphs of all Parameters with
                                                        Figure 9.
and reaches up to 125,000 bits/sec in 3 minutes, the    nodes=30 (OLSR)
figure is as below.



                                                                                           1638 | P a g e
S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering
             Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                     Vol. 3, Issue 1, January -February 2013, pp.1634-1640
VII. PERFORMANCE COMPARISON
          These figures are specially taken for the         1 All Protocols, 15 Nodes
sake of comparison and for making the statistical               These figures are showing delay, network load
calculation more easy and precise. However these            and throughput respectively in 15 nodes scenario
figures are another view of our simulation results.         with all three routing protocols AOD, DSR and
These figures include all protocols in one scenario         OLSR. The color scheme above the graphs are
and for one parameter. The figures for all three            clearly showing, which graph belongs to which
nodes scenario with all protocols for delay, network        protocol.
load and throughput separately are as under.




Figure 10.   10 Showing Delay, Network load and Throughput (15 nodes)

2 All Protocols, 30 Nodes




Figure 11.   Showing Delay, Network load and Throughput (30 nodes)

VIII. CONCLUSION                                            should be distributed in nature. Routing protocols
         The analytical study of this paper                 used in ad-hoc networks should develop loop free
demonstrates that WMN technology proved to be a             routes; due to loop free environment bandwidth
revolutionary and modern technology which has               consumption becomes low. Routing protocols
remarkable      impacts       in    the     field     of    should have capability to maintain QOS in terms of
Telecommunications and Internet Systems. Routing            different parameters such as delay, load, jitter and
protocols play vital role to increase the credibility of    throughput etc. Mainly there are two categories of
WMNs. The selection of appropriate routing                  protocols used in WMNs or MANETs i.e. reactive
protocol with respect to network improves the               and proactive. Both types of protocols have
efficiency and reliability of network. There are            different utilization in MANETs. Both categories
some suggestions regarding analytical study,                have advantages and disadvantages discussed in this
routing protocols should not be centralized. These          paper. Thus to achieve good results and efficiency


                                                                                               1639 | P a g e
S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering
               Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                       Vol. 3, Issue 1, January -February 2013, pp.1634-1640
in communication according to scenarios and               Analysis of OLSR and comparison with
parameters, selection of suitable category of             OSPF and AODV”, School of Electrical
protocol is very important. The simulation study of       Engineering KTH Royal Institute of
this paper reveals that, Optimized Link State             Technology Stockholm, Sweden.
Routing (OLSR) protocol works better than Ad-hoc
on-demand Vector (AODV) and Dynamic Source
Routing (DSR) protocols regarding end to end delay
and throughput in all three scenarios (15, 30 and 60
nodes), while regarding network load it was
observed that OLSR had better result in 60 nodes
scenario only, in 15 and 30 nodes scenario OLSR
network load was high. Traffic is distributed to all
nodes in each scenario in equal amount. From our
simulation we can conclude that DSR is a very slow
routing protocol as it has taken lot of time while
simulating each scenario (15, 30 and 60), OLSR
does not take so much time. Finally we conclude
that OLSR gives better results in terms of delay and
throughput due to its proactive behavior. OLSR has
the quality to reduce size of information that is why
it gives less delay, controls flood within a network
therefore throughput is better than other protocols.
So we can easily recommend that in these kinds of
networks and parameters that we have created in
this paper, OLSR is a good option to use as
compared to AODV and DSR.

REFERENCES
  [1]     Karchik, Ramakrishnan, “An improved
          model for dynamic routing effect
          algorithm    for    mobility   protocol”,
          Electrical Engineering Waterloo, Ontario,
          Canada 2004.
  [2]     Jangeun Jun and Mihail L. Sichitiu,
          “MRP: Wireless Mesh Networks Routing
          Protocol”. Raleigh, NC 27695-7911.
  [3]     Rainer Baumann, Simon Heimlicher,
          Vincent Lenders and Martin May,
          “Routing Packets into Wireless Mesh
          Networks”.
  [4]     Sonia Waharte, Raouf Boutaba, Youssef
          Iraqi and Brent Ishibashi, “Routing
          Protocols in Wireless Mesh Networks:
          Challenges and Design Considerations”.
          School of Computer Science Waterloo,
          Canada.
  [5]     Tony Larsson and Nicklas Hedman,
          “Routing Protocols in wireless Ad-hoc
          Networks-A simulation study”. Stockholm
          1998.
  [6]     Yuyan Xue, “Security issues in Wireless
          Mesh Networks”, Department of computer
          science and engineering, University of
          Nebraska-Lincoln, July 2007.
  [7]     Zhang Yan, Luo Jijun, Hu Honglin.
          “Wireless        Mesh        Networking,
          Architectures Protocols and Standard”.
          USA: Auerbach Publications 2007.
  [8]     Ioannis Glaropoulos, Athanasios Makris
          and Bobak Tighnavard, “Performance



                                                                                1640 | P a g e

More Related Content

What's hot

Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509IJMER
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for floodingijcsa
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesEswar Publications
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detectioniosrjce
 
Pcf investigation to improve the
Pcf investigation to improve thePcf investigation to improve the
Pcf investigation to improve theIJCSES Journal
 
BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN A...
BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN A...BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN A...
BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN A...IJNSA Journal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkIOSR Journals
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 

What's hot (17)

Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
A countermeasure for flooding
A countermeasure for floodingA countermeasure for flooding
A countermeasure for flooding
 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh Networks
 
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
 
Pcf investigation to improve the
Pcf investigation to improve thePcf investigation to improve the
Pcf investigation to improve the
 
BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN A...
BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN A...BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN A...
BYZANTINE BEHAVIOUR (B2) – MITIGATING MIDWAY MULTICAST MISBEHAVIOUR (M4) IN A...
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 

Viewers also liked

Viewers also liked (10)

Naiane rodrigues 7b
Naiane rodrigues 7bNaiane rodrigues 7b
Naiane rodrigues 7b
 
Documentacion en la wed
Documentacion en la wedDocumentacion en la wed
Documentacion en la wed
 
ipad
ipadipad
ipad
 
Atitudes corretas em grandes decisões
Atitudes corretas em grandes decisõesAtitudes corretas em grandes decisões
Atitudes corretas em grandes decisões
 
Rafaela e thalia
Rafaela e thaliaRafaela e thalia
Rafaela e thalia
 
Paulinho 7 b
Paulinho 7 bPaulinho 7 b
Paulinho 7 b
 
O brasil
O brasilO brasil
O brasil
 
Apresentação 4T08
Apresentação 4T08Apresentação 4T08
Apresentação 4T08
 
Entrevista m teresa g
Entrevista m teresa gEntrevista m teresa g
Entrevista m teresa g
 
Etn 801
Etn 801Etn 801
Etn 801
 

Similar to Is3116341640

cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptxSANTHAKUMARP5
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networkschris zlatis
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless NetworksIRJET Journal
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
List Other Types Of Attacks
List Other Types Of AttacksList Other Types Of Attacks
List Other Types Of AttacksKimberly Brooks
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNAM Publications
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETIJAEMSJORNAL
 

Similar to Is3116341640 (20)

N010617783
N010617783N010617783
N010617783
 
cse Wireless Mesh Networks ppt.pptx
cse  Wireless Mesh Networks ppt.pptxcse  Wireless Mesh Networks ppt.pptx
cse Wireless Mesh Networks ppt.pptx
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless Networks
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
List Other Types Of Attacks
List Other Types Of AttacksList Other Types Of Attacks
List Other Types Of Attacks
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
Requisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSNRequisite Trust Based Routing Protocol for WSN
Requisite Trust Based Routing Protocol for WSN
 
Proposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
 

Is3116341640

  • 1. S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1634-1640 Analysis Of Routing Protocols In Wmn Using Certain Parameters To Maintain Quality Of Service S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar *Department of Computer Science and Engineering Manonmanium Sundaranar University Trinelveli, India **Department of Computer Science and Engineering Sathyabama University Chennai, India ***Department of Computer Science and Engineering Manonmanium Sundaranar University Trinelveli, India Abstract with each other by forwarding the packets to one Wireless Mesh Networks (WMNs) are another. bringing rapid change in the field of wireless networking. It is a trustworthy technology in II. SECURITY IN WMNS applications like broadband home networking, There are various challenges in WMNs on network management and latest transportation which it is necessary to overcome and hence making systems. WMNs consist of mesh routers, mesh the WMN more and more ideal. While making an clients and gateways. It is a special kind of efficient network, there exist these kinds of wireless Ad-hoc networks. Parameters in WMNs challenges, on which it is necessary to tackle. The include delay, throughput, network load etc. challenges that arise in WMNs are authentication, There are two types of routing protocols i.e. authorization, encryption, key management, attacks, reactive protocols and proactive protocols. Three intrusion detection and prevention, secure routing routing protocols AODV, DSR and OLSR have and security policies [23]. Authentication is one of been tested in WMNs under certain parameters the core issues in network security. When there is no which are delay, throughput and network load. interruption in our network, it is said that network is The testing of these protocols will be performed providing authentication or in other words data in the Optimized Network Evaluation Tool cannot be made stop by any third party. In WMNs (OPNET) Modeler 14.5. The obtained results thousands of nodes are being connected wirelessly from OPNET will be displayed in this paper in with each other and as it is already said that stealing the form of graphs. the data from a wireless network is easier than a wired network. Hence while building a WMN it is Keywords- Wireless Mesh Networks, Dynamic necessary to keep in minds that it must provide Source Routing, QoS, Mesh Routing Protocol authentication so that users gain more confidence on a network. Authorization is the kind of permission I. INTRODUCTION that particular thing is accessible. Wireless communication has an enormous use these days and is still becoming popular from III. SECURITY MODEL FOR WMNS times immemorial. This is because of the latest In every network there are key issues i.e. technological demands nowadays arising from availability, integrity, authenticity and laptops, wireless devices such as wireless local area confidentiality. If some actions attempt to disturb networks (LANs), etc. Because of its fast growing these issues, they are called intrusions. There is one popularity day by day, it has led wireless system by which intrusions can be detected i.e. communication data rates higher and it has made its Intrusion Detection System (IDS). Intrusions can be prices cheaper, that is why wireless communication prevented by using different kind of software. There is growing so fast. Wireless communication can is intrusion prevention system (IPS) which is a sub work between hosts by two different methods; one part of IDS that prevents the network from method is to allow the existing network carry data intrusions. In simple words to make the WMNs and voice, and second method is to make ad-hoc secure from attacks it is necessary to do intrusion network so that hosts can communicate with each detection and prevention. There is a proposed other [1]. Wireless Mesh Networks (WMNs) are one security model for WMNs that explains how the of the types of ad-hoc networks. Ad-hoc networks security services are put together [24]. In the are also called as mobile ad-hoc networks intrusion prevention model, first three including (MANETs). Companies use wireless mesh networks authentication, integrity and data confidentiality for making large coverage area of wireless local area works on Medium Access Control (MAC) layer networks. WMNs are the latest technology that has while integrity, data confidentiality, authorization lot of things in common with MANETs. Basically and source routing works on network layer. The right WMNs are consisted of wireless nodes; each node model shows that availability, intrusion detection and with its own packet, these nodes can communicate automated response can work on both layers i.e. network and MAC layers. 1634 | P a g e
  • 2. S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1634-1640 Figure 1. Security Model IV. WIRELESS MESH NETWORK telecommunication as well as internet services; PROTOCOLS however there are still some challenges and Wireless Mesh Networks are generally problems which have been faced by trouble considered as the type of mobile ad-hoc networks. shooters. However there are some differences between them. Firstly in wireless mesh networks almost the traffic V. DESIGN PARAMETERS starts from gateways and ends ups also on gateway. There are various parameters that are Secondly in wireless mesh networks, nodes are available in WMNs and they are also termed as clearly separated from each other either they are in performance metrics or design parameters. Every the form of stagnant nodes or mobile nodes. parameter has its own importance. These parameters MANETs are linked with mobile ad-hoc networks, are named and described below. These design general MANETs routing protocols can be used in parameters/performance metrics are used for the WMNs. Additionally WMNs are new technological evaluation of routing protocols. These design networks which are similar to MANETs. One of the parameters have a great impact on overall applications of WMNs is that, it provides performance of a communication network. This connection to an infrastructure node. It plays vital paper has dealt with the first three performance role for providing broadband internet access. Some metrics of a network i.e. delay, throughput and of the effects of routing protocols in WMNs are network load. These three performance metrics are listed below. evaluated with respect to routing protocols to see 1. They are responsible to strength the network. the performance. The descriptions of all the design 2. They are helpful to make connection between parameters that are useful in WMNs are as follows. nodes. 3. Creates synchronization between nodes. 1. Delay 4. Provides quality of service in terms of 2. Throughput bandwidth utilization, delay, throughput, 3. Network Load network load, and jitter. 4. Jitter As mentioned earlier general MANETs 5. Packet Loss protocols can be implemented in WMNs, however 6. Routing overhead the more efficient protocol which synchronizes with 7. Packet Delivery Ratio wireless mesh networks is mesh routing protocol (MRP). The protocol creates the continuity between VI. SIMULATION RESULTS AND ANALYSIS routing paths and gateway destinations. It has also 1 First Scenario the ability to select the route, which is basic We made first scenario in which we used requirement to make better communication in 15 mobile nodes from the object palette window of WMNs. There are lots of relevant protocols in this OPNET Modeler 14.5 and pasted all of them in the context. Many of them have been authorized by workspace window. For these 15 mobiles there had IETF, some of them are reactive and some of them to be one server, so we took one fixed wlan_server are proactive for example AODV and DSR are from the object palette. These nodes were being implemented for ad-hoc networks. Wireless mesh pasted in the campus network size of 1000 x 1000 technology is the latest well developed technology meters. Once all the mobile nodes and fixed node which has vital role in the field of server have been pasted on a workspace window, 1635 | P a g e
  • 3. S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1634-1640 IPv4 addressing was assigned automatically to all nodes. After this we drag application config and profile config from object palette to workspace window. All the attributes of these two config(s) contain mostly the number of rows, speed in meters/seconds and pause time in seconds. So these settings must be done according to the requirement. The FTP was selected as traffic and FTP was set to High Load FTP traffic. After doing all the configurations to a network now it’s time to deploy the configured profile which can be done by clicking Protocol tab in OPNET workspace window and selecting the Deploy Defined Application. Mobility Config was also dragged into workspace window, all its necessary attributes had been set and Figure 3. Paper Simulation Scenario with 30 nodes then random mobility was set to MANET as a profile. Before running simulation, individual 3 Simulation Results statistics had been selected from where we can After making all three scenarios in OPNET choose protocols and wireless LAN etc. The figure Modeler 14.5, we run the simulation and compared of this first scenario is shown as follows in which the results of these three scenarios. Initially all the three protocols (AODV, DSR and OLSR) simulation time was set to 50 minutes and graphs were tested against the three parameters (Delay, were taken, but for statistical calculation we found Throughput and Network Load). those graphs very difficult as the graphs are showing very little variations in it. That is why we then performed the simulation for 3 minutes (180 seconds) and graphs were taken and saved in bitmap image. These graphs were found very helpful for statistical analysis as they are showing reasonable variations in the graphs. Hence we preferred those graphs that were obtained during 3 minutes simulation. The DES execution manager window for both the simulation periods clearly shows that simulation has been performed for 50 minutes and 30 minutes also. 3.1.1 When Nodes=15, AODV Performance This figure was taken when we were working in our scenario 1 when we have 15 mobile nodes and 1 fixed node server. The protocol run in this case was Ad-hoc On-Demand Vector (AODV) Figure 2. Paper Simulation Scenario with 15 nodes against all three parameters. In this figure delay, throughput and network load are being shown when 2 Second Scenario AODV protocol is used in MANETs. The graphs Similarly we made our second scenario in are showing in time average form. The upper small which have increased the number of mobile nodes window is showing the delay when AODV protocol from 15 to 30.All the settings in this scenario was used, the x-axis denotes time which is in remained same like it had in the first scenario, only minutes and y-axis is also in time but in seconds. the number of nodes was increased. In this scenario According to the upper figure the average peak also, the protocols are tested against the three value of delay is almost 0.027 seconds, and it parameters. The figure of our second scenario in gradually drops and attains a constant value of simulation environment is shown as follows. approximately 0.001 seconds, after 3 minutes the value of delay is almost 0.001 seconds. Similarly the middle graph is for network load when protocol was AODV and nodes were 15. The x-axis of this graph denotes time which is in minutes and y-axis denotes data rate which is in bits/seconds. According to this graph the peak value of network load is 500,000 bits/sec and it gradually drops as time progresses and reaches to almost 80,000 bits/sec after 3 minutes. The third graph is for 1636 | P a g e
  • 4. S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1634-1640 throughput when AODV protocol was used and numbers of nodes were 15. The x-axis denotes time which is in minutes and y-axis denotes data rate which is in bits/seconds. According to this graph the peak value of throughput is almost 510,000 bits/sec and after this it gradually decreases and reaches to almost 100,000 bits/sec at time 3 minutes. Showing Graphs of all parameters when Figure 5. nodes=15 (DSR) 3.1.3 When Nodes=15, OLSR Performance Like above two criteria the figure for Showing Graphs of all parameters when Figure 4. OLSR is also collected and saved when there are 15 nodes=15 (AODV) mobile nodes in a scenario. The x-axis denotes time in minutes and y-axis denotes time in seconds for 3.1.2 When Nodes=15, DSR Performance the upper window in this below figure. While the This figure was taken when the numbers of second middle figure has x-axis in minutes and y- nodes were 15 and the protocol was Dynamic axis in bits/sec because y-axis shows data rate. In Source Routing (DSR) in MANETs. This below the third small window the x-axis denotes time in figure is also showing the delay, network load and minutes and y-axis denotes data rate in bits/sec. The throughput of DSR protocol. The upper small figure average delay of OLSR after 3 minutes is is showing delay, in which x-axis denotes time approximately 0.0009 seconds which is very low as which is in minutes and the y-axis also denotes time compared to first two routing protocols. The which is in seconds. The middle figure is for network load in OLSR is approximately 50,000 network load in which x-axis denotes time which is bits/sec after 3 minutes and its peak value 450,000 in minutes and the y-axis denotes data rate which is bits/sec. The peak value of throughput of OLSR in in bits/seconds. The third figure is for throughput in 15 nodes scenario is almost equal to 580,000 which x-axis denotes time which is in minutes and bits/sec. the y-axis denotes data rate which is in bits/sec. The peak value of delay in DSR is approx 0.030 seconds and after 3 minutes it reaches to almost 0.010 seconds. The peak value of network load in DSR is almost attaining a value of 400,000 bits/sec and then gradually decreases and reaches to approx 50,000 bits/sec at 3 minutes time. The behavior of throughput in DSR protocol is showing that after 3 minutes the value of throughput is approximately equal to 50,000 bits/sec when the numbers of nodes are 15. Showing Graphs of all parameters when Figure 6. nodes=15 (OLSR) 1637 | P a g e
  • 5. S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1634-1640 3.2.1 When Nodes=30, AODV Performance When we have increased the number of nodes from 15 to 30, the protocols are checked individually on all parameters. First of all we have chosen AODV to see its performance on delay, throughput and network load. On increasing the number of nodes it made a slight difference on the graph of AODV delay, the delay’s peak value is starting from almost 0.048 seconds and reaches to almost 0.001 seconds after 3 minutes time. Similarly the load on network is also showing a different behavior than the one that was in 15 nodes. The peak value of network load is 790,000 bits/sec. Throughput of DSR in this scenario has also increased as the number of nodes was also increased. ADOV protocol gives throughput almost equal to 250,000 bits/sec when number of nodes is 30. This is shown in figure below. Showing Graphs of all Parameters when Figure 8. nodes=30 (DSR) 3.2.3 When Nodes=30, OLSR Performance The figure of 30 nodes scenario with OLSR protocol is also showing that on increasing the number of nodes the delay generating by OLSR is also increasing but when we compared the delay of this figure with 15 nodes OLSR it is observable that the delay has the same value equal to 0.009 seconds after 3 minutes and the graph of delay also looks like same as in 15 nodes scenario. The peak value of network load in this scenario for OLSR protocol is approx 750,000 bits/sec and after 3 minutes the value is 150,000 bits/sec. Similarly we can measure and observe the value of throughput and can see the changing behavior of this graph. Showing Graphs of all parameters when Figure 7. nodes=30 (AODV) 3.2.2 When Nodes=30, DSR Performance When we have number of mobile nodes equal to 30, we checked the behavior of DSR protocol when run on MANETs. The design of this figure is also the same like the previous figures. If we have a deep look on this figure we can observe easily that while increasing the numbers of nodes, definitely the delay of all protocols increase but their delays vary in numeric values. Like in this figure the delay in 30 nodes scenario is almost equal to 0.02 sec exactly after 3 minutes. And if we see the delay in 15 nodes scenario it was 0.010 sec. Because number of nodes is increased the delay has also increased because when data has to pass more nodes while reaching to its destination node, definitely the delay will be introduced in it. And in the middle figure the network load is also increased Showing Graphs of all Parameters with Figure 9. and reaches up to 125,000 bits/sec in 3 minutes, the nodes=30 (OLSR) figure is as below. 1638 | P a g e
  • 6. S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1634-1640 VII. PERFORMANCE COMPARISON These figures are specially taken for the 1 All Protocols, 15 Nodes sake of comparison and for making the statistical These figures are showing delay, network load calculation more easy and precise. However these and throughput respectively in 15 nodes scenario figures are another view of our simulation results. with all three routing protocols AOD, DSR and These figures include all protocols in one scenario OLSR. The color scheme above the graphs are and for one parameter. The figures for all three clearly showing, which graph belongs to which nodes scenario with all protocols for delay, network protocol. load and throughput separately are as under. Figure 10. 10 Showing Delay, Network load and Throughput (15 nodes) 2 All Protocols, 30 Nodes Figure 11. Showing Delay, Network load and Throughput (30 nodes) VIII. CONCLUSION should be distributed in nature. Routing protocols The analytical study of this paper used in ad-hoc networks should develop loop free demonstrates that WMN technology proved to be a routes; due to loop free environment bandwidth revolutionary and modern technology which has consumption becomes low. Routing protocols remarkable impacts in the field of should have capability to maintain QOS in terms of Telecommunications and Internet Systems. Routing different parameters such as delay, load, jitter and protocols play vital role to increase the credibility of throughput etc. Mainly there are two categories of WMNs. The selection of appropriate routing protocols used in WMNs or MANETs i.e. reactive protocol with respect to network improves the and proactive. Both types of protocols have efficiency and reliability of network. There are different utilization in MANETs. Both categories some suggestions regarding analytical study, have advantages and disadvantages discussed in this routing protocols should not be centralized. These paper. Thus to achieve good results and efficiency 1639 | P a g e
  • 7. S.Arun Rajesh, Dr.M.Lakshmi, S.Arun Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1634-1640 in communication according to scenarios and Analysis of OLSR and comparison with parameters, selection of suitable category of OSPF and AODV”, School of Electrical protocol is very important. The simulation study of Engineering KTH Royal Institute of this paper reveals that, Optimized Link State Technology Stockholm, Sweden. Routing (OLSR) protocol works better than Ad-hoc on-demand Vector (AODV) and Dynamic Source Routing (DSR) protocols regarding end to end delay and throughput in all three scenarios (15, 30 and 60 nodes), while regarding network load it was observed that OLSR had better result in 60 nodes scenario only, in 15 and 30 nodes scenario OLSR network load was high. Traffic is distributed to all nodes in each scenario in equal amount. From our simulation we can conclude that DSR is a very slow routing protocol as it has taken lot of time while simulating each scenario (15, 30 and 60), OLSR does not take so much time. Finally we conclude that OLSR gives better results in terms of delay and throughput due to its proactive behavior. OLSR has the quality to reduce size of information that is why it gives less delay, controls flood within a network therefore throughput is better than other protocols. So we can easily recommend that in these kinds of networks and parameters that we have created in this paper, OLSR is a good option to use as compared to AODV and DSR. REFERENCES [1] Karchik, Ramakrishnan, “An improved model for dynamic routing effect algorithm for mobility protocol”, Electrical Engineering Waterloo, Ontario, Canada 2004. [2] Jangeun Jun and Mihail L. Sichitiu, “MRP: Wireless Mesh Networks Routing Protocol”. Raleigh, NC 27695-7911. [3] Rainer Baumann, Simon Heimlicher, Vincent Lenders and Martin May, “Routing Packets into Wireless Mesh Networks”. [4] Sonia Waharte, Raouf Boutaba, Youssef Iraqi and Brent Ishibashi, “Routing Protocols in Wireless Mesh Networks: Challenges and Design Considerations”. School of Computer Science Waterloo, Canada. [5] Tony Larsson and Nicklas Hedman, “Routing Protocols in wireless Ad-hoc Networks-A simulation study”. Stockholm 1998. [6] Yuyan Xue, “Security issues in Wireless Mesh Networks”, Department of computer science and engineering, University of Nebraska-Lincoln, July 2007. [7] Zhang Yan, Luo Jijun, Hu Honglin. “Wireless Mesh Networking, Architectures Protocols and Standard”. USA: Auerbach Publications 2007. [8] Ioannis Glaropoulos, Athanasios Makris and Bobak Tighnavard, “Performance 1640 | P a g e