SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012



   Performance Evaluation of ad-hoc Network Routing
            Protocols using ns2 Simulation
                                                 Pratik Gite1, Manish Sharma2
                                       1Medi-Caps Inst. of Tech. and Mgmt, Indore, India
                                                   pratikgite135@gmail.com
                                       2 Medi-Caps Inst. of Tech. and Mgmt, Indore, India
                                                    er.mann24@gmail.com


Abstract —Ad-hoc networks are basically peer to peer multi-         portable of devices as well as progress in wireless
hop mobile wireless networks in which the information packets       communication, Ad-hoc network gaining importance with the
are transmitted in a ‘store and forward’ manner from a source       increasing number of widespread application. The following
to an arbitrary destination via intermediate nodes. The main        point shows the importance of ad hoc networks [5, 6].
objective of this paper is to evaluate the performance of various
                                                                    Instant Infrastructure: Unplanned meetings, spontaneous
ad-hoc networks routing protocols viz. DSDV (Destination
                                                                    interpersonal communications etc., cannot rely on any
Sequence Distance Vector), DSR (Dynamic Source Routing)
and AODV (Ad-hoc On Demand Distance Vector). The                    infrastructure, it needs planning and administration. It would
comparison of these protocols is based on different                 take too long to set up this kind of infrastructure; therefore ad-
performance metrics, which are throughput, packet delivery          hoc connectivity has to setup.
ratio, routing overheads, packet drop and average end to end        Disaster Relief: Infrastructure typically breakdown in disaster
delay. The performance evaluation has been done by using            area. Hurricanes cut phone and power lines, floods destroy Base
simulation tool NS2 (Network Simulator) which is the main           stations, fires burn servers. No forward planning can be done,
simulator.                                                          and the set-up must be externally fast and reliable. The same
                                                                    applies to many military activities, which are, to be honest, one
Index Term- Destination Sequence Distance Vector (DSDV),
Dynamic Source Routing (DSR), Ad-hoc On Demand Distance
                                                                    of the major driving forces behind mobile ad-hoc networking
Vector (AODV), Network Simulator (NS2)                              research.
                                                                    Effectiveness: Service provided by existing infrastructure might
                                                                    be too expensive for certain applications. If, for example only
                        I. INTRODUCTION                             connection oriented cellular network exist, but an application
    Wireless networking is an emerging technology that              sends only small status information every other minute, cheaper
allows user to access information and services electronically,      ad-hoc packet-oriented network might be a better solution.
regardless of their geographic position. The Wireless networks      Registration procedure might take too long and communication
are classified as infrastructure networks and infrastructure        overheads might be too high with existing networks. Tailored
less (ad-hoc) networks. Infrastructure networks consist of          ad- hoc networks can offer a better solution.
fixed and wired gateways. A mobile host communicates with           Remote Areas: Even if infrastructure could be planned ahead, it
a bridge in the network (called base station) within its            is sometimes too expensive to set up an infrastructure in sparsely
Communicate radius. The mobile unit can move                        populated areas. Depending on the communication pattern, so
geographically while it is communicating. When it goes out          ad-hoc networks or satellite infrastructure can be a solution.
of Range of one base station, it connects with new base                  Due to their quick and economically less demanding
station and start communicating through it. This is called          deployment, this network finds many applications in several
handoff. In this approach the base station are fixed [1].           areas. Some of these include military applications,
Infrastructures less or Ad-hoc networks are basically self          collaborative and distributed computing, emergency
organizing and self configuring multi-hop mobile wireless           operations, wireless mesh networks, wireless sensor
networks where the structure of the network changes                 networks, and hybrid wireless networks etc. Regardless of
dynamically. This is mainly due to the mobility of nodes [2].       these attractive applications, ad-hoc networks have many
Nodes in this network utilize the same random access wireless       salient features, but these features also introduce several
channel cooperating in friendly manner to engaging                  challenges. The major issues that affect the design,
themselves in multi-hop forwarding. The node in this network        deployment and performance of an ad-hoc network wireless
not only acts as hosts but also as routers that route data to       system are as follows [5-8]:
and from other nodes in the network [3].Therefore                   Packet losses due to transmission errors: -Mobile ad-hoc
communication between mobile nodes always requires routing          network experiences a much higher packet losses due to some
over multi-hop paths. In this paper an attempt has been made        factors such as high bit error rate (BER) in the wireless channel,
to evaluate the performance of three well known routing             increased collision due to the hidden terminal problem,
protocols DSDV, AODV and DSR on the basis of different              presence of interference, location dependent contention,
performance metrics. Apart from that with the increase of           unidirectional links, frequent path break due to node mobility
© 2012 ACEEE                                                   14
DOI: 01.IJNS.03.01.113
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


and the inherent fading property of wires medium [6].                   has been examined. Once a route has been discovered and
Route changes due to mobility: -The network topology in an              established, it is maintained by some form of route
ad-hoc wireless network is highly dynamic due to mobility of            maintenance procedure until either the destination becomes
nodes; hence an on-going session may suffer from frequently             inaccessible along every path from the source or route is no
path breaking. This session often leads to frequent route               longer desired [9]. Certain proactive routing protocols are
changes therefore mobility management itself is very vast               Ad-hoc On-Demand Distance Vector (AODV), Dynamic
research topic in mobile ad-hoc wireless networks [6].                  Source Routing (DSR), Temporally Ordered Routing
Security issues: -The radio channel is used for ad-hoc wireless         Algorithm (TORA), Associatively-Based Routing (ABR),
network is broadcast in nature and is shared by all the nodes           Signal Stability Routing (SSR).
in the network. Data transmitted by a node is received by all
the nodes within its direct transmission range. So attacker                          III. OVERVIEW OF DSDV, AODV AND DSR
can easily snoops the data being transmitted by a node in the
network. Here the Requirement for confidentiality can be                A. DESTINATION SEQUENCE DISTANCE VECTOR ROUTING (DSDV)
violated if an adversary is able to interpret the data gathered             Destination sequenced distance vector (DSDV) routing
through snooping [7].                                                   protocol is a table driven routing protocol based on the
Limited wireless transmission range: - In wireless network              classical Bellman- Ford routing algorithm. The improvement
the radio band will be limited and hence data rates it can offer        made here is the avoidance of routing loops in a mobile
are much lesser than what a wired network can offer. This               network of routers. Each node in the mobile network maintains
requires an optimal manner by keeping the overhead as low               a routing table for all possible destinations within the network
as possible [7].                                                        and the number of hops to each destination node. Each entry
Routing overhead: -in wireless ad hoc networks, nodes often             is marked with a sequence number and this number is
change their location within the network. So stales route are           assigned by the destination node.
generated in the routing tables which leads to unnecessary                  A sequence numbering system is used to allow mobile
routing overheads [8].                                                  hosts to distinguish stale routes from new ones. Routing
Battery constraints: -This is one of the limited resources that         table updates are periodically transmitted throughout the
form a major constraint for the nodes in ad hoc networks.               network in order to maintain table consistency. Large amount
Devices used in these networks have restriction on the power            of network traffic, route updates can employ in two types of
source in order to maintain portability, size, and weight of the        packets they are first is the “Full Dump” and second is the
device. [8].                                                            “Incremental routing”. A full dump sends the full routing table
Potentially frequent network partition: - The randomly                  to the neighbors and could cover many packets whereas, in
moving nodes in an ad- hoc can lead to network partition. In            an incremental update only those entries from the routing
major cases the intermediate nodes are the one which are                table are sent that has a metric change since the last update
highly affected by this partitioning.                                   and it must fit in a packet. When the network is relatively
                                                                        stable, incremental updates are sent to avoid extra Traffic
    II. CLASSIFICATION OF ROUTING PROTOCOLS                             and full dump are relatively infrequent. In a fast changing
                                                                        network, incremental packets can grow big, so full dumps will
Routing protocols for mobile ad-hoc networks can be broadly
                                                                        be more frequent [10].
classified into two main categories:
                                                                        B. AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING (AODV)
A. TABLE DRIVEN ROUTING PROTOCOLS (PROACTIVE)
                                                                            The AODV is a Reactive on- demand “ad-hoc distance
    Proactive or table-driven routing protocols attempts to
                                                                        vector routing protocol”. AODV is an improvement on DSDV
maintain consistent and up-to date routing information from
                                                                        because it typically minimizes the number of required
each node to every other node in the network. These
                                                                        broadcasts by creating routes on demand basis as opposed
protocols require each node to maintain one or more tables
                                                                        to maintaining a complete list of routes, as in the DSDV
to store routing information, and they respond to change in
                                                                        algorithm. When a source node desires to send a message to
network topology by propagating route update throughout
                                                                        some destination node and does not already have a valid
the network to maintain consistent network view [9]. Certain
                                                                        route to that destination, it initiates a path discovery process
proactive routing protocols are Destination Sequenced
                                                                        to locate the destination. In AODV each router maintains
Distance Vector (DSDV), Wireless Routing Protocol (WRP),
                                                                        route table entries with the destination IP address, destination
Global State Routing (GSR) and Cluster-head Gateway Switch
                                                                        sequence number, hop count, next hop ID and lifetime [10].
Routing (CGSR).
                                                                           RREQs route requests and RREPs route replies are the two
B. ON-DEMAND ROUTING PROTOCOLS (REACTIVE)                               message types defined by the AODV. When a route to a new
    In reactive or on demand routing protocols, the routes              destination is needed, the node uses a broadcast RREQ to
are created as when required. When a source wants to send               find a route to destination. A route can be determined when
to a destination, it invokes the route discovery mechanism to           the request reaches either the destination itself or an
find the path to the destination. This process is completed             intermediate node with a fresh route to the destination.The
when once a source is found or all possible route permutation           route is made available by unicasting a RREP back to the

© 2012 ACEEE                                                       15
DOI: 01.IJNS.03.01.113
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


source of RREQ. Each node maintains its own broadcast id,                multicast routing protocols over a wired and wireless
sequence number.The broadcast ID is incremented for every                network.NS2 is written in C++ and OTCL. C++ for data per
RREQ packet. Since each node receiving the request keeps                 event packets and OTCL are used for periodic and triggered
track of a route back to the source of the request, the RREP             event [12]. NS2 includes a network animator called nam
reply can be unicast back from the destination to the source,            animator which provides visual view of simulation. NS2
or from any intermediate node that is able to satisfy the request        preprocessing provides traffic and topology generation and
back to the source [11].                                                 post processing provide simple trace analysis. AWK
                                                                         programming is used for trace file analysis [13].
C. DYNAMIC SOURCE ROUTING (DSR)
    The dynamic source routing (DSR) protocol is an “on-                 B. PERFORMANCE METRICS:
demand routing protocol” that is based on the concept of                 The following performance metrics are used in this paper for
source routing. Mobile nodes are required to maintain route              the performance evaluation of AODV, DSDV and DSR Routing
caches that contain the source routes of which the mobile is             protocols.
aware. Entries in the route cache are continually updated as             1) Throughout: - It is the amount of data transferred over the
new routes are discovered. The protocol consists of two major            period of time expressed in bits per second or bytes per
phases: Route discovery and route maintenance [11].                      second.
    When a mobile node has a packet to send to some                      2) Packet delivery ratio: - It is the ratio of the number of data
destination, it first consults its route cache to determine              packets received by the destination node to the number of
whether it already has a route to the destination. If it has an          data packets sent by the source mobile node. It can be
unexpired route to the destination it will use this route to             evaluated in terms of percentage (%)
send packets. On the other hand, if the node does not have               3) Routing overheads: - The number of control packets
such a route to the destination it initiates route discovery by          generated by each routing protocols.
broadcasting a route request packet this route request                   4) Packet drop: - The number of data packets that are not
contains the address to the destination along with the source            successfully sent to the destination.
nodes address and a unique identification number. A route                5) Average end to end delay: - The average time between
reply is generated when the route request reaches either the             packet transmission from source node, until packet received
destination itself, or an intermediate node whose route cache            at destination.
contains an unexpired route to the destination.
                                                                         C. NETWORK TOPOLOGY AND SIMULATION PARAMETERS:
    Route maintenance is a procedure, which maintains
transmission of packets in the routing through the use of                The following topology and simulation parameters are used
route error packets and acknowledgement. Route error                     in this paper to analyze the performance of proactive (DSDV)
generated at a node, when data link layer encounters                     and reactive (AODV and DSR) routing protocols as shown in
transmission error. Acknowledgements are used to verify the              the figure1 and table1.
correct operation of the route link [12].
    DSR uses a reactive approach which eliminates the need
to periodically flood the network with table update messages
which are required in a table driven approach. The
intermediate nodes also utilize the route cache information
efficiently to reduce the control overheads. The disadvantage
of DSR is that, the route maintenance mechanism does not
locally repair a broken down link. Even though the protocol
performs well in static and low mobility environments, the
performance degrades rapidly in with increasing mobility.

           IV SIMULA
             .      TION BASEDANALYSIS
This section described the simulation tool, network topology,
Simulation parameters and simulation results. The
performances of proactive (DSDV) and reactive (AODV and
DSR) routing protocols are evaluated on the basis of five
                                                                                              Fig.1 Network Topology
performance metrics mentioned below.
                                                                             This topology consists of 12 nodes, where first Coolum
A. SIMULATION TOOL:                                                      of six nodes are senders and second column of six nodes are
 In this paper the simulation of AODV, DSDV, and DSR routing             receivers. All the senders start the traffic at different-different
protocols is done by using network simulator (NS2) software              time and share the channel bandwidth with other previous
due to its simplicity and availability. NS is a discrete event           transmitting nodes. This topology is generated by the
Simulator targeted at networking research NS provides                    network animator tool, after running TCL script by
substantial support for simulation of TCP, routing and                   considering the following simulation parameters table.
© 2012 ACEEE                                                        16
DOI: 01.IJNS.03.01.113
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012

           TABLE I. SIMULATION PARAMETERS




                                                                                Fig.3. Throughput Comparison for 8-nodes




D. SIMULATION RESULTS:                                                         Fig.4. Throughput Comparison for 12-nodes

    The simulation results are shown in the following section            Throughput is the amount of data per unit time that is
in the form of comparative graphs. In this paper an attempt          delivered from one node to another node via communication
has been made to compare the performance of three well               link. The throughput is measured in bits/second. Efficient
known routing protocol DSDV, AODV, and DSR according to              routing protocols must have a greater throughput. Fig.2, Fig.3
his simulation results. The simulation results are genrated          and Fig.4 shows that, the throughput of DSR is better than
through the excel graphs according to above mentioned                ‘AODV and DSDV’ for 4-nodes, 8-nodes and 12-nodes
topology and criteria as shown in table.                             scenario.




           Fig.2. Throughput Comparison for 4-nodes                      Fig.5. Packet Drop Comparison for DSDV, AODV and DSR

© 2012 ACEEE                                                    17
DOI: 01.IJNS.03.01.113
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012



A packet is dropped in two cases: the buffer is full when the
packet needs to be buffer and the time that packets have
been buffer exceeds the limit. Packet drop comparison graph
show in fig.5. The packet drop for DSDV is maximum, DSR is
minimum and AODV is between the DSDV and DSR ‘for 4-
nodes, 8-nodes and 12-nodes’ scenario.




                                                                         Fig.8. Average end to end delay for DSDV, AODV and DSR
                                                                         Average end to end delay comparison graph shown in
                                                                     fig.8. Average end to end delay of DSDV is maximum, DSR is
                                                                     minimum and AODV is between the DSDV and DSR for ‘4-
                                                                     nodes, 8-nodes and 12-nodes’ scenario.

                                                                                                   CONCLUSION
       Fig.6. Routing overheads for DSDV, AODV and DSR
Routing overheads comparison graph shown in fig.6. The                   In this paper, the performance evaluation of DSDV, AODV
Routing overheads of DSDV is maximum, DSR is minimum                 and DSR routing protocols is done through the simulation
and AODV is between the DSDV and DSR for all the cases of            tool NS2 which gives the knowledge how to use routing
‘4-nodes, 8-nodes and 12-nodes’ scenario.                            schemes in dynamic network. Simulation results show that,
                                                                     as the number of nodes increases in the network, the
                                                                     performance of routing protocols decreases. In the above
                                                                     simulation results:
                                                                         ‘Comparative throughput graphs’ show that, the DSR
                                                                     throughput is better than ‘DSDV and AODV’ for ‘4-nodes, 8-
                                                                     nodes and 12-nodes’ scenario. ‘Comparative Graph for packet
                                                                     drop’ shows that, the packet drop for the DSDV is maximum,
                                                                     DSR is minimum and AODV is between the DSDV and DSR
                                                                     for ‘4-nodes, 8-nodes and 12-nodes’ scenario.
                                                                          ‘Comparative Graph for routing overheads’ shows that,
                                                                     the DSDV has maximum routing overheads, DSR has minimum
                                                                     routing overheads and AODV is between the DSDV and DSR
                                                                     for ‘4-nodes, 8-nodes, 12-nodes. ‘Comparative graph for
                                                                     packet delivery ratio’ shows that, DSR provides highest
                                                                     packet delivery ratio, DSDV provides lowest packet delivery
                                                                     ratio and AODV is between the DSDV and DSR for cases of
                                                                     ‘4-nodes, 8-nodes and 12-nodes’ scenario.
                                                                         ‘Comparative graph for average end to end delay’ shows
 Fig.7. Packet Delivery Ratio Comparisons for DSDV, AODV and         that, the DSR has minimum average end to end delay, DSDV
                               DSR                                   has maximum average end to end delay and AODV is between
    The Packet delivery ratio is expressed as the percentage         the DSR and DSDV for ‘4-nodes, 8-nodes and 12-nodes’
of number of received packets by the destination node to the         scenario. In the analyzed scenario, it is found that, the DSR is
number of packets sent by the source node with in the period         performing better than AODV and DSDV in all the cases of
of simulation time. It is an essential performance metrics of        ‘4-nodes, 8-nodes, and 12 nodes, scenario.
routing protocols. According to simulation results the packet
Packet delivery ratio of DSR is maximum, DSDV is minimum
and AODV is between the DSDV and DSR for ‘4-nodes, 8-
nodes and 12-nodes’ scenario as shown in fig.9.


© 2012 ACEEE                                                    18
DOI: 01.IJNS.03.01.113
ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012


                          REFERENCES                                     THE MANET VARIATIONS, CHALLENGES, CAPACITY
                                                                         ANDPROTOCOL ISSUES”, “International Journal of Computer
[1] David B. Johnson and David A. Maltz. Dynamic source “Routing         Science & Engineering Survey (IJCSES) Vol.1, No.1, August 2010”
in ad hoc wireless networks” Technical report, Carnegie Mellon           [9] Nor Surayati Mohamad, Usop Azizol Abdullah, Ahmad Faisal
University, 1996.                                                        and Amri Abidin, “Performance Evaluation of AODV, DSDV &
[2] Mehran Abolhasan, Tadeusz Wysocki and Eryk Dutkiewicz.               DSR Routing Protocol in Grid Environment, “IJCSNS International
“A review of routing protocols for mobile ad hoc networks”               Journal of Computer Science and Network Security, VOL.9 No.7,
Technical report, Telecommunication and Information Research             July 2009.
Institute, University of Wollongong, Wollong, NSW 2522. Motorola         [10] Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis
Australia Research Centre, 12 Lord St., Botany, NSW 2525,                Papadimitratos, and S. Sajama, “Wireless Ad Hoc Networks”
Australia, 2003.                                                         Cornell University School of Electrical and Computer Engineering,
[3] Azzedine Boukerche “Algorithm and Protocols for wireless             2004.
and Mobile Ad-hoc networks”.                                             [11] Elizabeth M. Royer and Chai-Keong Toh, “A review of current
[4] Integration of mobile ad-hoc networks, EU project DAIDALOS,          routing protocols for ad-hoc mobile wireless networks” Technical
Susana Sargento, and Institute of Telecommunications.                    report, University of California and Georgia Institute of Technology,
[5] C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless                 USA, 1999.
Networks, Architectures and Protocols”, Second Edition, Low price        [12] C.E. Perkins and E.M. Royer, “Ad-hoc on Demand Distance
Edition, Pearson Education, 2007.                                        Vector Routing Protocols”, in proceeded 2nd IEEE work shop mobile
[6] Mobile Ad Hoc Networking: An Essential Technology for                computing system and applications, new ore leans, Loss Angelis,
Pervasive Computing Jun-Zhao Sun MediaTeam, Machine Vision               pp 90-100, February 2011.
and Media Processing Unit, 2002.                                         [13] Md Shohidul Islam, Md Naim Hider, Md. Touhidul Haque,
[7] Jun-Zhao Sun “Mobile Ad Hoc Networking: An Essential                 Leton miah “An Extensive Comparison among DSDV, DSR and
Technology for Pervasive Computing” USA 2003.                            AODV Protocols in MANET, “International journal of computer
[8] G. S. Mamatha1 and Dr. S. C. Sharma, “ANALYZING                      application (0975-8887) Volume 15-no.2, February 2011.




© 2012 ACEEE                                                        19
DOI: 01.IJNS.03.01. 113

Weitere ähnliche Inhalte

Was ist angesagt?

Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01graphhoc
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - JournalLaili Aidi
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsIRJET Journal
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Abid Afsar Khan Malang Falsafi
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networksambitlick
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Multi hop wireless-networks
Multi hop wireless-networksMulti hop wireless-networks
Multi hop wireless-networksambitlick
 

Was ist angesagt? (18)

Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
DTN
DTNDTN
DTN
 
Mini Project- Implementation & Evaluation Of Wireless La Ns
Mini Project- Implementation & Evaluation Of Wireless La NsMini Project- Implementation & Evaluation Of Wireless La Ns
Mini Project- Implementation & Evaluation Of Wireless La Ns
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
B0781013215
B0781013215B0781013215
B0781013215
 
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in ManetsDistance Based Cluster Formation for Enhancing the Network Life Time in Manets
Distance Based Cluster Formation for Enhancing the Network Life Time in Manets
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
 
Ttacca
TtaccaTtacca
Ttacca
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Multi hop wireless-networks
Multi hop wireless-networksMulti hop wireless-networks
Multi hop wireless-networks
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
Br33421423
Br33421423Br33421423
Br33421423
 

Ähnlich wie Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation

Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless networkElanthendral Mariappan
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486Sathish Pilla
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...ijwmn
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ijwmn
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolIOSR Journals
 
Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms IJORCS
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 

Ähnlich wie Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation (20)

Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
 
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETBlack-Hole and Wormhole Attack in Routing Protocol AODV in MANET
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
525 529
525 529525 529
525 529
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
 
B010130508
B010130508B010130508
B010130508
 
Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms
 
H010524049
H010524049H010524049
H010524049
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Aodv
AodvAodv
Aodv
 

Mehr von IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mehr von IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Kürzlich hochgeladen

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation

  • 1. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation Pratik Gite1, Manish Sharma2 1Medi-Caps Inst. of Tech. and Mgmt, Indore, India pratikgite135@gmail.com 2 Medi-Caps Inst. of Tech. and Mgmt, Indore, India er.mann24@gmail.com Abstract —Ad-hoc networks are basically peer to peer multi- portable of devices as well as progress in wireless hop mobile wireless networks in which the information packets communication, Ad-hoc network gaining importance with the are transmitted in a ‘store and forward’ manner from a source increasing number of widespread application. The following to an arbitrary destination via intermediate nodes. The main point shows the importance of ad hoc networks [5, 6]. objective of this paper is to evaluate the performance of various Instant Infrastructure: Unplanned meetings, spontaneous ad-hoc networks routing protocols viz. DSDV (Destination interpersonal communications etc., cannot rely on any Sequence Distance Vector), DSR (Dynamic Source Routing) and AODV (Ad-hoc On Demand Distance Vector). The infrastructure, it needs planning and administration. It would comparison of these protocols is based on different take too long to set up this kind of infrastructure; therefore ad- performance metrics, which are throughput, packet delivery hoc connectivity has to setup. ratio, routing overheads, packet drop and average end to end Disaster Relief: Infrastructure typically breakdown in disaster delay. The performance evaluation has been done by using area. Hurricanes cut phone and power lines, floods destroy Base simulation tool NS2 (Network Simulator) which is the main stations, fires burn servers. No forward planning can be done, simulator. and the set-up must be externally fast and reliable. The same applies to many military activities, which are, to be honest, one Index Term- Destination Sequence Distance Vector (DSDV), Dynamic Source Routing (DSR), Ad-hoc On Demand Distance of the major driving forces behind mobile ad-hoc networking Vector (AODV), Network Simulator (NS2) research. Effectiveness: Service provided by existing infrastructure might be too expensive for certain applications. If, for example only I. INTRODUCTION connection oriented cellular network exist, but an application Wireless networking is an emerging technology that sends only small status information every other minute, cheaper allows user to access information and services electronically, ad-hoc packet-oriented network might be a better solution. regardless of their geographic position. The Wireless networks Registration procedure might take too long and communication are classified as infrastructure networks and infrastructure overheads might be too high with existing networks. Tailored less (ad-hoc) networks. Infrastructure networks consist of ad- hoc networks can offer a better solution. fixed and wired gateways. A mobile host communicates with Remote Areas: Even if infrastructure could be planned ahead, it a bridge in the network (called base station) within its is sometimes too expensive to set up an infrastructure in sparsely Communicate radius. The mobile unit can move populated areas. Depending on the communication pattern, so geographically while it is communicating. When it goes out ad-hoc networks or satellite infrastructure can be a solution. of Range of one base station, it connects with new base Due to their quick and economically less demanding station and start communicating through it. This is called deployment, this network finds many applications in several handoff. In this approach the base station are fixed [1]. areas. Some of these include military applications, Infrastructures less or Ad-hoc networks are basically self collaborative and distributed computing, emergency organizing and self configuring multi-hop mobile wireless operations, wireless mesh networks, wireless sensor networks where the structure of the network changes networks, and hybrid wireless networks etc. Regardless of dynamically. This is mainly due to the mobility of nodes [2]. these attractive applications, ad-hoc networks have many Nodes in this network utilize the same random access wireless salient features, but these features also introduce several channel cooperating in friendly manner to engaging challenges. The major issues that affect the design, themselves in multi-hop forwarding. The node in this network deployment and performance of an ad-hoc network wireless not only acts as hosts but also as routers that route data to system are as follows [5-8]: and from other nodes in the network [3].Therefore Packet losses due to transmission errors: -Mobile ad-hoc communication between mobile nodes always requires routing network experiences a much higher packet losses due to some over multi-hop paths. In this paper an attempt has been made factors such as high bit error rate (BER) in the wireless channel, to evaluate the performance of three well known routing increased collision due to the hidden terminal problem, protocols DSDV, AODV and DSR on the basis of different presence of interference, location dependent contention, performance metrics. Apart from that with the increase of unidirectional links, frequent path break due to node mobility © 2012 ACEEE 14 DOI: 01.IJNS.03.01.113
  • 2. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 and the inherent fading property of wires medium [6]. has been examined. Once a route has been discovered and Route changes due to mobility: -The network topology in an established, it is maintained by some form of route ad-hoc wireless network is highly dynamic due to mobility of maintenance procedure until either the destination becomes nodes; hence an on-going session may suffer from frequently inaccessible along every path from the source or route is no path breaking. This session often leads to frequent route longer desired [9]. Certain proactive routing protocols are changes therefore mobility management itself is very vast Ad-hoc On-Demand Distance Vector (AODV), Dynamic research topic in mobile ad-hoc wireless networks [6]. Source Routing (DSR), Temporally Ordered Routing Security issues: -The radio channel is used for ad-hoc wireless Algorithm (TORA), Associatively-Based Routing (ABR), network is broadcast in nature and is shared by all the nodes Signal Stability Routing (SSR). in the network. Data transmitted by a node is received by all the nodes within its direct transmission range. So attacker III. OVERVIEW OF DSDV, AODV AND DSR can easily snoops the data being transmitted by a node in the network. Here the Requirement for confidentiality can be A. DESTINATION SEQUENCE DISTANCE VECTOR ROUTING (DSDV) violated if an adversary is able to interpret the data gathered Destination sequenced distance vector (DSDV) routing through snooping [7]. protocol is a table driven routing protocol based on the Limited wireless transmission range: - In wireless network classical Bellman- Ford routing algorithm. The improvement the radio band will be limited and hence data rates it can offer made here is the avoidance of routing loops in a mobile are much lesser than what a wired network can offer. This network of routers. Each node in the mobile network maintains requires an optimal manner by keeping the overhead as low a routing table for all possible destinations within the network as possible [7]. and the number of hops to each destination node. Each entry Routing overhead: -in wireless ad hoc networks, nodes often is marked with a sequence number and this number is change their location within the network. So stales route are assigned by the destination node. generated in the routing tables which leads to unnecessary A sequence numbering system is used to allow mobile routing overheads [8]. hosts to distinguish stale routes from new ones. Routing Battery constraints: -This is one of the limited resources that table updates are periodically transmitted throughout the form a major constraint for the nodes in ad hoc networks. network in order to maintain table consistency. Large amount Devices used in these networks have restriction on the power of network traffic, route updates can employ in two types of source in order to maintain portability, size, and weight of the packets they are first is the “Full Dump” and second is the device. [8]. “Incremental routing”. A full dump sends the full routing table Potentially frequent network partition: - The randomly to the neighbors and could cover many packets whereas, in moving nodes in an ad- hoc can lead to network partition. In an incremental update only those entries from the routing major cases the intermediate nodes are the one which are table are sent that has a metric change since the last update highly affected by this partitioning. and it must fit in a packet. When the network is relatively stable, incremental updates are sent to avoid extra Traffic II. CLASSIFICATION OF ROUTING PROTOCOLS and full dump are relatively infrequent. In a fast changing network, incremental packets can grow big, so full dumps will Routing protocols for mobile ad-hoc networks can be broadly be more frequent [10]. classified into two main categories: B. AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING (AODV) A. TABLE DRIVEN ROUTING PROTOCOLS (PROACTIVE) The AODV is a Reactive on- demand “ad-hoc distance Proactive or table-driven routing protocols attempts to vector routing protocol”. AODV is an improvement on DSDV maintain consistent and up-to date routing information from because it typically minimizes the number of required each node to every other node in the network. These broadcasts by creating routes on demand basis as opposed protocols require each node to maintain one or more tables to maintaining a complete list of routes, as in the DSDV to store routing information, and they respond to change in algorithm. When a source node desires to send a message to network topology by propagating route update throughout some destination node and does not already have a valid the network to maintain consistent network view [9]. Certain route to that destination, it initiates a path discovery process proactive routing protocols are Destination Sequenced to locate the destination. In AODV each router maintains Distance Vector (DSDV), Wireless Routing Protocol (WRP), route table entries with the destination IP address, destination Global State Routing (GSR) and Cluster-head Gateway Switch sequence number, hop count, next hop ID and lifetime [10]. Routing (CGSR). RREQs route requests and RREPs route replies are the two B. ON-DEMAND ROUTING PROTOCOLS (REACTIVE) message types defined by the AODV. When a route to a new In reactive or on demand routing protocols, the routes destination is needed, the node uses a broadcast RREQ to are created as when required. When a source wants to send find a route to destination. A route can be determined when to a destination, it invokes the route discovery mechanism to the request reaches either the destination itself or an find the path to the destination. This process is completed intermediate node with a fresh route to the destination.The when once a source is found or all possible route permutation route is made available by unicasting a RREP back to the © 2012 ACEEE 15 DOI: 01.IJNS.03.01.113
  • 3. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 source of RREQ. Each node maintains its own broadcast id, multicast routing protocols over a wired and wireless sequence number.The broadcast ID is incremented for every network.NS2 is written in C++ and OTCL. C++ for data per RREQ packet. Since each node receiving the request keeps event packets and OTCL are used for periodic and triggered track of a route back to the source of the request, the RREP event [12]. NS2 includes a network animator called nam reply can be unicast back from the destination to the source, animator which provides visual view of simulation. NS2 or from any intermediate node that is able to satisfy the request preprocessing provides traffic and topology generation and back to the source [11]. post processing provide simple trace analysis. AWK programming is used for trace file analysis [13]. C. DYNAMIC SOURCE ROUTING (DSR) The dynamic source routing (DSR) protocol is an “on- B. PERFORMANCE METRICS: demand routing protocol” that is based on the concept of The following performance metrics are used in this paper for source routing. Mobile nodes are required to maintain route the performance evaluation of AODV, DSDV and DSR Routing caches that contain the source routes of which the mobile is protocols. aware. Entries in the route cache are continually updated as 1) Throughout: - It is the amount of data transferred over the new routes are discovered. The protocol consists of two major period of time expressed in bits per second or bytes per phases: Route discovery and route maintenance [11]. second. When a mobile node has a packet to send to some 2) Packet delivery ratio: - It is the ratio of the number of data destination, it first consults its route cache to determine packets received by the destination node to the number of whether it already has a route to the destination. If it has an data packets sent by the source mobile node. It can be unexpired route to the destination it will use this route to evaluated in terms of percentage (%) send packets. On the other hand, if the node does not have 3) Routing overheads: - The number of control packets such a route to the destination it initiates route discovery by generated by each routing protocols. broadcasting a route request packet this route request 4) Packet drop: - The number of data packets that are not contains the address to the destination along with the source successfully sent to the destination. nodes address and a unique identification number. A route 5) Average end to end delay: - The average time between reply is generated when the route request reaches either the packet transmission from source node, until packet received destination itself, or an intermediate node whose route cache at destination. contains an unexpired route to the destination. C. NETWORK TOPOLOGY AND SIMULATION PARAMETERS: Route maintenance is a procedure, which maintains transmission of packets in the routing through the use of The following topology and simulation parameters are used route error packets and acknowledgement. Route error in this paper to analyze the performance of proactive (DSDV) generated at a node, when data link layer encounters and reactive (AODV and DSR) routing protocols as shown in transmission error. Acknowledgements are used to verify the the figure1 and table1. correct operation of the route link [12]. DSR uses a reactive approach which eliminates the need to periodically flood the network with table update messages which are required in a table driven approach. The intermediate nodes also utilize the route cache information efficiently to reduce the control overheads. The disadvantage of DSR is that, the route maintenance mechanism does not locally repair a broken down link. Even though the protocol performs well in static and low mobility environments, the performance degrades rapidly in with increasing mobility. IV SIMULA . TION BASEDANALYSIS This section described the simulation tool, network topology, Simulation parameters and simulation results. The performances of proactive (DSDV) and reactive (AODV and DSR) routing protocols are evaluated on the basis of five Fig.1 Network Topology performance metrics mentioned below. This topology consists of 12 nodes, where first Coolum A. SIMULATION TOOL: of six nodes are senders and second column of six nodes are In this paper the simulation of AODV, DSDV, and DSR routing receivers. All the senders start the traffic at different-different protocols is done by using network simulator (NS2) software time and share the channel bandwidth with other previous due to its simplicity and availability. NS is a discrete event transmitting nodes. This topology is generated by the Simulator targeted at networking research NS provides network animator tool, after running TCL script by substantial support for simulation of TCP, routing and considering the following simulation parameters table. © 2012 ACEEE 16 DOI: 01.IJNS.03.01.113
  • 4. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 TABLE I. SIMULATION PARAMETERS Fig.3. Throughput Comparison for 8-nodes D. SIMULATION RESULTS: Fig.4. Throughput Comparison for 12-nodes The simulation results are shown in the following section Throughput is the amount of data per unit time that is in the form of comparative graphs. In this paper an attempt delivered from one node to another node via communication has been made to compare the performance of three well link. The throughput is measured in bits/second. Efficient known routing protocol DSDV, AODV, and DSR according to routing protocols must have a greater throughput. Fig.2, Fig.3 his simulation results. The simulation results are genrated and Fig.4 shows that, the throughput of DSR is better than through the excel graphs according to above mentioned ‘AODV and DSDV’ for 4-nodes, 8-nodes and 12-nodes topology and criteria as shown in table. scenario. Fig.2. Throughput Comparison for 4-nodes Fig.5. Packet Drop Comparison for DSDV, AODV and DSR © 2012 ACEEE 17 DOI: 01.IJNS.03.01.113
  • 5. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 A packet is dropped in two cases: the buffer is full when the packet needs to be buffer and the time that packets have been buffer exceeds the limit. Packet drop comparison graph show in fig.5. The packet drop for DSDV is maximum, DSR is minimum and AODV is between the DSDV and DSR ‘for 4- nodes, 8-nodes and 12-nodes’ scenario. Fig.8. Average end to end delay for DSDV, AODV and DSR Average end to end delay comparison graph shown in fig.8. Average end to end delay of DSDV is maximum, DSR is minimum and AODV is between the DSDV and DSR for ‘4- nodes, 8-nodes and 12-nodes’ scenario. CONCLUSION Fig.6. Routing overheads for DSDV, AODV and DSR Routing overheads comparison graph shown in fig.6. The In this paper, the performance evaluation of DSDV, AODV Routing overheads of DSDV is maximum, DSR is minimum and DSR routing protocols is done through the simulation and AODV is between the DSDV and DSR for all the cases of tool NS2 which gives the knowledge how to use routing ‘4-nodes, 8-nodes and 12-nodes’ scenario. schemes in dynamic network. Simulation results show that, as the number of nodes increases in the network, the performance of routing protocols decreases. In the above simulation results: ‘Comparative throughput graphs’ show that, the DSR throughput is better than ‘DSDV and AODV’ for ‘4-nodes, 8- nodes and 12-nodes’ scenario. ‘Comparative Graph for packet drop’ shows that, the packet drop for the DSDV is maximum, DSR is minimum and AODV is between the DSDV and DSR for ‘4-nodes, 8-nodes and 12-nodes’ scenario. ‘Comparative Graph for routing overheads’ shows that, the DSDV has maximum routing overheads, DSR has minimum routing overheads and AODV is between the DSDV and DSR for ‘4-nodes, 8-nodes, 12-nodes. ‘Comparative graph for packet delivery ratio’ shows that, DSR provides highest packet delivery ratio, DSDV provides lowest packet delivery ratio and AODV is between the DSDV and DSR for cases of ‘4-nodes, 8-nodes and 12-nodes’ scenario. ‘Comparative graph for average end to end delay’ shows Fig.7. Packet Delivery Ratio Comparisons for DSDV, AODV and that, the DSR has minimum average end to end delay, DSDV DSR has maximum average end to end delay and AODV is between The Packet delivery ratio is expressed as the percentage the DSR and DSDV for ‘4-nodes, 8-nodes and 12-nodes’ of number of received packets by the destination node to the scenario. In the analyzed scenario, it is found that, the DSR is number of packets sent by the source node with in the period performing better than AODV and DSDV in all the cases of of simulation time. It is an essential performance metrics of ‘4-nodes, 8-nodes, and 12 nodes, scenario. routing protocols. According to simulation results the packet Packet delivery ratio of DSR is maximum, DSDV is minimum and AODV is between the DSDV and DSR for ‘4-nodes, 8- nodes and 12-nodes’ scenario as shown in fig.9. © 2012 ACEEE 18 DOI: 01.IJNS.03.01.113
  • 6. ACEEE Int. J. on Network Security , Vol. 03, No. 01, Jan 2012 REFERENCES THE MANET VARIATIONS, CHALLENGES, CAPACITY ANDPROTOCOL ISSUES”, “International Journal of Computer [1] David B. Johnson and David A. Maltz. Dynamic source “Routing Science & Engineering Survey (IJCSES) Vol.1, No.1, August 2010” in ad hoc wireless networks” Technical report, Carnegie Mellon [9] Nor Surayati Mohamad, Usop Azizol Abdullah, Ahmad Faisal University, 1996. and Amri Abidin, “Performance Evaluation of AODV, DSDV & [2] Mehran Abolhasan, Tadeusz Wysocki and Eryk Dutkiewicz. DSR Routing Protocol in Grid Environment, “IJCSNS International “A review of routing protocols for mobile ad hoc networks” Journal of Computer Science and Network Security, VOL.9 No.7, Technical report, Telecommunication and Information Research July 2009. Institute, University of Wollongong, Wollong, NSW 2522. Motorola [10] Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Australia Research Centre, 12 Lord St., Botany, NSW 2525, Papadimitratos, and S. Sajama, “Wireless Ad Hoc Networks” Australia, 2003. Cornell University School of Electrical and Computer Engineering, [3] Azzedine Boukerche “Algorithm and Protocols for wireless 2004. and Mobile Ad-hoc networks”. [11] Elizabeth M. Royer and Chai-Keong Toh, “A review of current [4] Integration of mobile ad-hoc networks, EU project DAIDALOS, routing protocols for ad-hoc mobile wireless networks” Technical Susana Sargento, and Institute of Telecommunications. report, University of California and Georgia Institute of Technology, [5] C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless USA, 1999. Networks, Architectures and Protocols”, Second Edition, Low price [12] C.E. Perkins and E.M. Royer, “Ad-hoc on Demand Distance Edition, Pearson Education, 2007. Vector Routing Protocols”, in proceeded 2nd IEEE work shop mobile [6] Mobile Ad Hoc Networking: An Essential Technology for computing system and applications, new ore leans, Loss Angelis, Pervasive Computing Jun-Zhao Sun MediaTeam, Machine Vision pp 90-100, February 2011. and Media Processing Unit, 2002. [13] Md Shohidul Islam, Md Naim Hider, Md. Touhidul Haque, [7] Jun-Zhao Sun “Mobile Ad Hoc Networking: An Essential Leton miah “An Extensive Comparison among DSDV, DSR and Technology for Pervasive Computing” USA 2003. AODV Protocols in MANET, “International journal of computer [8] G. S. Mamatha1 and Dr. S. C. Sharma, “ANALYZING application (0975-8887) Volume 15-no.2, February 2011. © 2012 ACEEE 19 DOI: 01.IJNS.03.01. 113