SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering
           Research and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                       Vol. 2, Issue 4, July-August 2012, pp.1364-1369
           Comparative analysis of OLSR and Tora under IPv6
                             environment
                   Anjum Sharma, Rakesh Kumar, Manpreet Singh

Abstract
         A Mobile Ad Hoc Network (MANET) is             as routers for delivering the message throughout the
an autonomous network that can be formed                network. The mobile host must use broadcast for
without any established infrastructure. It consists     sending messages and should be in promiscuous
of mobile nodes equipped with a wireless                mode for accepting any messages that it receives. In
interface that are free to move and establish           the ad hoc network there can be unidirectional hosts,
communication on the fly. The mobile nodes act          that can transmit only to the one direction, so that
as hosts and routers, having routing capabilities       the communication is not bi-directional as in the
for multi-hop paths connecting nodes which              usual communication systems. [1,2,3].
cannot     directly     communicate.      Wireless      Routing protocols are divided into two categories
Communication technology is exploring at very           based on how and when routes are discovered, but
fast rate which lead to the increase in demand of       both find the shortest path to the destination.
infrastructure with such demand it is very              Proactive routing protocols are table-driven
difficult to have that much of fixed                    protocols, they always maintain current up-to-date
infrastructure. Routing is the prime concerns in        routing information by sending control messages
Manet network as there are many dependency              periodically between the hosts which update their
while choosing appropriate protocol for routing.        routing tables. When there are changes in the
OLSR and TORA are two most popular and                  structure then the updates are propagated throughout
hugely used protocols in Manet network. These           the network. The proactive routing protocols use
two are different in their behavior as OLSR is a        link-state routing algorithms which frequently flood
proactive protocol and TORA is a Reactive               the link information about its neighbours. Other
protocol. These two widely used protocols are           routing protocols are on-demand routing protocols,
compatable with new version of internet known           in other words reactive, ones which create routes
as Ipv6. In our research we have done                   when they are needed by the source host and these
comparative analysis for these two protocols            routes are maintained while they are needed. Such
under Interenet Protocol version 6 so that the          protocols use distance-vector routing algorithms,
issues and analysis for both can be analyzed.           they have vectors containing information about the
                                                        cost and the path to the destination. When nodes
Keywords: Adhoc network, optimized link sate            exchange vectors of information, each host modify
routing protocol, Temporally Ordered Routing            own routing information when needed. The ad hoc
Algorithm, Adhoc network routing protocols.             routing rotocols are usually classified as a pure
Internet protocol version 6, interenet protocol         proactive or a pure reactive protocol, but there are
version 4                                               also hybrid protocols. This only concern flat routing
                                                        protocols, but there are also hierarchical and graphic
1.   INTRODUCTION                                       position assisted routing protocols. [4]
         Recent       advances       in      wireless
communications and electronics have enabled the         2.   Routing Protocols in MANETs
development       of     low-cost,    low     power,              The function of ad hoc routing protocol is
multifunctional sensor nodes that are small in size     to control the node decisions when routing packets
and communicate unmetered in short distances.           between devices in MANET. When a node joins or
Wireless communication technology is increasing         tries to join the network it does not know about the
daily, with such growth sooner or later it would not    network topology. By announcing its presence or by
be practical or simply physically possible to have a    listening from the neighbor nodes it discover the
fixed architecture for this kind of network. Ad hoc     topology. In a network route discovery process
wireless network must be capable to self-organise       depends on the routing protocol implementation.
and self-configure due to the fact that the mobile      For wireless ad hoc networks, several routing
structure is changing all the time. Mobile hosts have   protocols have been designed and all these protocols
a limited range and sending the message to another      are classified under two major fields of protocols
host, which is not in the sender’s host transmission    called reactive or proactive. An ad hoc routing
range, must be forwarded through the network using      protocol with combination of these two is called a
other hosts which will be operated                      hybrid protocol [8].



                                                                                             1364 | P a g e
Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering
          Research and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue 4, July-August 2012, pp.1364-1369




                                                                  In OLSR, during the predetermined
                                                        interval Hello messages are periodically sent to the
                                                        neighbor nodes in order to determine the link status.
                                                        For instance, if node A and B are neighbors, Hello
                                                        message is sent to node B by node A and if the
Proactive Routing Protocols
                                                        message is successfully received by node B then the
          maintain and build routing information for
                                                        link is called asymmetric. This is also true for node
all nodes and it works independently of the router
                                                        B if it sends a Hello message to node A. For two
[20]. This is achieved by periodically transmitting
                                                        way communication the link is called symmetric as
the control messages. These protocols continuously
                                                        shown in figure 3.2. The information of neighboring
broadcast control messages even if there is no data
                                                        nodes is contained by Hello messages. A node is
flow, due to this reason these protocols are not
                                                        built in network with a routing table, which contains
bandwidth efficient. The proactive routing protocols
                                                        the information of multiple hope neighbors. After
have its advantages and disadvantages. One of the
                                                        the symmetric connections are established, a
main advantages is that nodes can easily establish a
                                                        minimal number of MPR nodes are selected to
session and can get routing information. When there
                                                        broadcast TC messages at a predetermined interval
is link failure its restructure process is slow, the
                                                        [20]. The information of selected MPR nodes is
nodes handles too much data for the route
                                                        contained by TC message. Routing calculations are
maintenance, which is the drawback of proactive
                                                        also handled by TC messages.
routing protocols.
                                                        Reactive Routing Protocols
Optimized Link State Routing                                     These protocols are bandwidth efficient.
         OLSR is proactive routing protocol for
                                                        The routes are built on demand, which is
wireless ad-hoc networks that is used in mobile ad-
                                                        accomplished by sending requests for routes in the
hoc networks. WIMAX Mesh (Backhaul) also uses
                                                        network. The disadvantage of reactive routing
this protocol. OLSR has its name because of its
                                                        protocols is that it offers high latency while finding
proactive nature. In order to discover their
                                                        the routes [21]. In our thesis we have considered
neighbors, the nodes get information of topology
                                                        DSR, AODV, and TORA.
being used in the network by topology control (TC)
and hello packets. Packets are not broadcasted by all
                                                        Temporally-Ordered           Routing        Algorithm
nodes. Packets are only 19
                                                        (TORA)
routed by multipoint relay (MPR) nodes. Source to
                                                                  Temporally-Ordered Routing Algorithm is
destination routes are established well before their
                                                        based on algorithm “link reversal” and is a
use.
                                                        distributed protocol. TORA guarantees the loop-free
There is a routing table kept by each node. These
                                                        routes, and provides the multiple routes for the
routing tables create higher routing overhead for
                                                        packets to alleviate the congestion. It is “source
OLSR compared to other reactive routing protocols.
                                                        initiated” protocol that creates different routes from
It decreases the delay for route discovery.
                                                        source to destination. Every node maintains the
                                                        information about his adjacent nodes. There are
                                                        three basic functions of TORA: route creation, route
                                                        maintenance and route erasure. Three control
                                                        packets are used to complete these functions: query
                                                        (QRY) for route creation, update (UPD) for creating
                                                        and maintaining of routes and clear (CLR) for route

                                                                                             1365 | P a g e
Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering
          Research and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue 4, July-August 2012, pp.1364-1369
erasure [24]. The route creation algorithm in TORA      had been significantly delayed by address changes
starts with “height” (propagation ordering parameter    such as classful network design, Classless Inter-
in quintuple) that sets the height of all nodes to      Domain Routing, and network address translation
NULL (undefined) and 0 for the destination. A node      (NAT).
having high height is considered upstream and
downstream in case of lower height [38]. The            Internet Protocol Version 6
“height” metric is used to establish the directed                 IPv6, like the most-commonly-used IPv4,
acyclic graph (DAG) at destination during the           is an Internet-layer protocol for packet-switched
creation and maintenance of route. In TORA every        internetworking and provides end-to-end datagram
node maintains a vector table stored in its memory      transmission across multiple IP networks. It is
that save the impression of its height as well as the   described in Internet standard document RFC 2460,
status of interrelated links to all connection backed   published in December 1998. In addition to offering
up by the network. For bandwidth, the node has to       more addresses, IPv6 also implements features not
broadcast its availability to other nodes in order to   present in IPv4. It simplifies aspects of address
update and manage topology variations [9].This          assignment (stateless address autoconfiguration),
routing algorithm is used to increase the scalability   network renumbering and router announcements
in MANET. This algorithm does not use the shortest      when changing network connectivity providers. The
path but it uses the optimized route [5].               IPv6 subnet size has been independent network.
The node that wants to communicate with the             Exchanging traffic between the two networks
destination sends query message to the destination,     requires special translator gateways, but this is not
which contains the node id of destination. When this    generally required, since most computer operating
query message reaches the destination the update        systems and software implement both protocols for
message is sent to the sender. This update message      transparent access to both networks, either natively
contains the destination field [5]. The process is      or using a tunneling protocol like 6to4, 6in4, or
shown below.                                            Teredo.standardized by fixing the size of the host
                                                        identifier portion of an address to 64 bits to facilitate
                                                        an automatic mechanism for forming the host
                                                        identifier from link-layer media addressing
                                                        information (MAC address). Network security is
                                                        also integrated into the design of the IPv6
                                                        architecture, including the option of IPsec.
                                                        IPv6 does not implement interoperability features
                                                        with IPv4, but essentially creates a parallel,
                                                        independent network. Exchanging traffic between
                                                        the two networks requires special translator
                                                        gateways, but this is not generally required, since
                                                        most computer operating systems and software
the source node is represented by A and the             implement both protocols for transparent access to
destination node is labeled by H. A query messages      both networks, either natively or using a tunneling
is broadcasted across the network by the source         protocol like 6to4, 6in4, or Teredo.
node A. This message is responded by only one-hop
neighbors. When query message is received, the
node updates the sender. In this figure the distance    4. Parameters and Simulation
of the node D and G from the destination is one hop.             In the evaluation of routing protocols
The main disadvantage of this network is that it        different performance metrics are used. They show
depends on the activated nodes which are selected       different characteristics of the whole network
while initiating the setup at the beginning [10]. The   performance. In this performance comparison we
other disadvantage is that the response to demand       evaluate the Network Load, throughput and End-to-
for traffic is dependent on the number of nodes (or     End delay of selected protocols in order to study the
rate of change of traffic) in the networks. In a        effects on the whole network.
network where the traffic volume has steep positive
gradient, this protocol would not work efficiently.     Network Load
                                                                  “In networking load refers to the amount of
    3. Internet Protocol                                data traffic being carried by the network”. Network
Internet Protocol Version 4                             load is a framework used in high-latency tolerant
         IPv4 uses 32-bit (four-byte) addresses,        mobile networks. It utilizes most effective network
which limits the address space to 4294967296 (232)      protocols to overcome congestion. A network faces
addresses. Addresses were assigned to users, and the    acute congestion when all its resources are over-
number of unassigned addresses decreased. IPv4          utilized and over-burdened. So Load refers to a
address exhaustion occurred on February 3, 2011. It

                                                                                               1366 | P a g e
Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering
          Research and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue 4, July-August 2012, pp.1364-1369
weight distribution system throughout network
infrastructure [6].
In [7] Sushant et al. calculates network load by
computing the ratio of volume of data received and
the maximum data fluctuates during net simulation
time.

Throughput
          Throughput is the ratio of total amounts of
data that reaches the receiver from the source to the
time taken by the receiver to receive the last packet
[11]. It is represented in packets per second or bits
per second. In the MANET unreliable
communication, limited energy, limited bandwidth
and frequent topology change affect throughput           Scenario of TORA in Ipv4
[12].

End-to End Delay
         The average time taken by the packets to
pass through the network is called end-to-end delay.
This is the time when a sender generates the packet
and it is received by the application layer of
destination, it is represented in seconds. This is the
whole time that includes all delay of network such
as transmission time, buffer queues, MAC control
exchanges and delay produced by routing activities.
Different applications require different packet delay
levels. Low average delay is required in the network     Scenario of OLSR in IPv4
of delay sensitive applications like voice. MANET
has the characteristics of packet transmissions due to
weak signal strengths of nodes, connection make
and break, and the node mobility. These are several
reasons that increase the delay in the network.
Therefore the end-to-end delay is the measure of
how a routing protocol accepts the various
constraints of network and shows reliability.
Simulator
We used Opnet Modeler 14.0 for simulating the
behavior of routing protocols.

5. SIMULATION AND RESULTS
          For evaluation the performance and
analysis of our research protocosl, in this section,
we use a simulation tool OPNET to conduct several
experiments
A. Simulation environment and parameters                 Scenario of TORA in Ipv6
In our simulations, we consider campus area
network as a dense network: 4000 m * 4000m, with
70 randomly deployed manet nodes. Every node is
initially equipped with 10 m/s speed and 60 sec of
pause. We define the mobilty profile as default
Random waypoint algorithm for mobilty. We have
implemented heavy load FTP traffic with 50000
bystes of file size. We also define the simulation
time which is 10 minutes for each scernarios. For
each simulation scenario, the results are drawn by
the average value of 10 mins.
B. Simulation results




                                                                                    1367 | P a g e
Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering
          Research and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                      Vol. 2, Issue 4, July-August 2012, pp.1364-1369




Scenario of OLSR in Ipv6
                                               Scenario of camparision for OLSR and TORA under
Comparison of both under Ipv6                  Ipv6


                                               7. CONCLUSION
                                                        In this paper, we discuss the routing
                                               protocols for manet. Two protocols have been
                                               judged under Ipv6 environmenet as it shows good
                                               results in Ipv6 environment then Ipv4. Both
                                               protocols show great compatability with Interenet
                                               protocol version6 under different scenario. In
                                               overall scenario OLSR outperform TORA in every
                                               term under Ipv6 which shows great support for
                                               OLSR under different Environmenets.

                                               REFERENCES
                                                 [1]    Xiaoyan Hong, Kaixin Xu and Mario Gerla
                                                        “Scalable Routing Protocols for Mobile Ad
                                                        Hoc     Networks.”      Computer      Science
                                                        Department, University of California, Los
                                                        Angeles, August 2002.
                                                 [2]    Koey Huishan, Chua Huimin and Koh Yeow
                                                        Nam “Routing Protocols in Ad hocWireless
                                                        Networks.”      National     University    of
                                                        Singapore.
                                                 [3]    P.Jacquet, P. Mühlethaler, T Clausen, A.
                                                        Laouiti, A.Qayyum and L. Viennot
                                                        “Optimized Link State Protocol for Ad Hoc
                                                        Networks.” IEEE INMIC Pakistan, 2001.
                                                 [4]    Xiaoyan Hong, Kaixin Xu and Mario Gerla
                                                        “Scalable Routing Protocols for Mobile Ad
                                                        Hoc     Networks.”      Computer      Science
                                                        Department, University of California, Los
                                                        Angeles, August 2002.
                                                 [5]    Jin Mook Kim, In Sung Han, Jin Baek
                                                        Kwon and Hwang Bin Ryou, “A Novel
                                                        Approach to Search a Node in MANET”,
                                                        Information Science and Security, ICISS,
                                                        2008, pp. 44 – 48.
                                                 [6]   Adriano Galati and Chris Greenhalgh, “A
                                                        New Metric for Network Load and Equation
                                                        of State”, Fifth International Conference on


                                                                                    1368 | P a g e
Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering
        Research and Applications (IJERA)      ISSN: 2248-9622 www.ijera.com
                    Vol. 2, Issue 4, July-August 2012, pp.1364-1369
     Networking and Services School of
     Computer Science, Nottingham, UK, 2009.
[7] S. Jain, R. Patra and K. Fall, “Routing in
     Delay Tolerent Networking”, ACM
     SIGCOMM, Portland, August / September
     2004.
[8] D. Kiwior and L. Lam, “Routing Protocol
     Performance over Intermittent Links”
     Military Communications Conference,
     MILCOM, IEEE, 2007, pp. 1 – 8.
[9] Q. Liang, “Pro-Active Route Maintenance in
     DSR”, School of Computer Science
     Carleton University, Ottawa, Canda, August,
     2001.
[10] S. R. Chaudhry, A. Al-Khwildi, Y. Casey
     and H. Aldelou, “A Performance
     Comparison of Multi On- Demand Routing
     in Wireless Ad Hoc Networks”, [2005],
     [IEEE], doi: [0-7803-9182-9/05/$20.00],
     Wireless Network and Communications
     Group (WNCG), School of Engineering &
     Design, Brunel University, West London.
[11] Uyen Trang Nguyen and Xing Xiong,
     “Rate-adaptive Multicast in Mobile Ad hoc
     Networks,” IEEE International Conference
     on Ad hoc and Mobile Computing,
     Networking and Communications, WiMob,
     Montreal, Canada, 2005.
[12] L. Girons Quesada, Y. Jiang and J. Xie, „„A
     Threshold-based Hybrid Routing Protocol
     for MANET‟‟. Department of Telematics,
     Norwegian University of Science and
     Technology




                                                                          1369 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDVRajesh Piryani
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyIOSR Journals
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 

Was ist angesagt? (20)

E010322531
E010322531E010322531
E010322531
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
J0935461
J0935461J0935461
J0935461
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 

Andere mochten auch (20)

Hv2413821386
Hv2413821386Hv2413821386
Hv2413821386
 
Hb2412611268
Hb2412611268Hb2412611268
Hb2412611268
 
Ks2518741883
Ks2518741883Ks2518741883
Ks2518741883
 
Jm2516821688
Jm2516821688Jm2516821688
Jm2516821688
 
Jq2517021708
Jq2517021708Jq2517021708
Jq2517021708
 
Jy2417091713
Jy2417091713Jy2417091713
Jy2417091713
 
Gb2511071110
Gb2511071110Gb2511071110
Gb2511071110
 
Hl2413221328
Hl2413221328Hl2413221328
Hl2413221328
 
Gt2412081212
Gt2412081212Gt2412081212
Gt2412081212
 
Gy2412371242
Gy2412371242Gy2412371242
Gy2412371242
 
Oh2423312334
Oh2423312334Oh2423312334
Oh2423312334
 
Hi2413031309
Hi2413031309Hi2413031309
Hi2413031309
 
Ic2414251429
Ic2414251429Ic2414251429
Ic2414251429
 
Az26337342
Az26337342Az26337342
Az26337342
 
Ex319981004
Ex319981004Ex319981004
Ex319981004
 
Ev31986991
Ev31986991Ev31986991
Ev31986991
 
5- Experiència a l'HUGTP. Dra. Cristina Pacho
5- Experiència a l'HUGTP. Dra. Cristina Pacho5- Experiència a l'HUGTP. Dra. Cristina Pacho
5- Experiència a l'HUGTP. Dra. Cristina Pacho
 
Power point coves
Power point covesPower point coves
Power point coves
 
Humanismo y renacimiento
Humanismo y renacimientoHumanismo y renacimiento
Humanismo y renacimiento
 
Synthesis -- Level 3 (social)
Synthesis -- Level 3 (social)Synthesis -- Level 3 (social)
Synthesis -- Level 3 (social)
 

Ähnlich wie Hs2413641369

Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 

Ähnlich wie Hs2413641369 (20)

A0110104
A0110104A0110104
A0110104
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Hs2413641369

  • 1. Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.1364-1369 Comparative analysis of OLSR and Tora under IPv6 environment Anjum Sharma, Rakesh Kumar, Manpreet Singh Abstract A Mobile Ad Hoc Network (MANET) is as routers for delivering the message throughout the an autonomous network that can be formed network. The mobile host must use broadcast for without any established infrastructure. It consists sending messages and should be in promiscuous of mobile nodes equipped with a wireless mode for accepting any messages that it receives. In interface that are free to move and establish the ad hoc network there can be unidirectional hosts, communication on the fly. The mobile nodes act that can transmit only to the one direction, so that as hosts and routers, having routing capabilities the communication is not bi-directional as in the for multi-hop paths connecting nodes which usual communication systems. [1,2,3]. cannot directly communicate. Wireless Routing protocols are divided into two categories Communication technology is exploring at very based on how and when routes are discovered, but fast rate which lead to the increase in demand of both find the shortest path to the destination. infrastructure with such demand it is very Proactive routing protocols are table-driven difficult to have that much of fixed protocols, they always maintain current up-to-date infrastructure. Routing is the prime concerns in routing information by sending control messages Manet network as there are many dependency periodically between the hosts which update their while choosing appropriate protocol for routing. routing tables. When there are changes in the OLSR and TORA are two most popular and structure then the updates are propagated throughout hugely used protocols in Manet network. These the network. The proactive routing protocols use two are different in their behavior as OLSR is a link-state routing algorithms which frequently flood proactive protocol and TORA is a Reactive the link information about its neighbours. Other protocol. These two widely used protocols are routing protocols are on-demand routing protocols, compatable with new version of internet known in other words reactive, ones which create routes as Ipv6. In our research we have done when they are needed by the source host and these comparative analysis for these two protocols routes are maintained while they are needed. Such under Interenet Protocol version 6 so that the protocols use distance-vector routing algorithms, issues and analysis for both can be analyzed. they have vectors containing information about the cost and the path to the destination. When nodes Keywords: Adhoc network, optimized link sate exchange vectors of information, each host modify routing protocol, Temporally Ordered Routing own routing information when needed. The ad hoc Algorithm, Adhoc network routing protocols. routing rotocols are usually classified as a pure Internet protocol version 6, interenet protocol proactive or a pure reactive protocol, but there are version 4 also hybrid protocols. This only concern flat routing protocols, but there are also hierarchical and graphic 1. INTRODUCTION position assisted routing protocols. [4] Recent advances in wireless communications and electronics have enabled the 2. Routing Protocols in MANETs development of low-cost, low power, The function of ad hoc routing protocol is multifunctional sensor nodes that are small in size to control the node decisions when routing packets and communicate unmetered in short distances. between devices in MANET. When a node joins or Wireless communication technology is increasing tries to join the network it does not know about the daily, with such growth sooner or later it would not network topology. By announcing its presence or by be practical or simply physically possible to have a listening from the neighbor nodes it discover the fixed architecture for this kind of network. Ad hoc topology. In a network route discovery process wireless network must be capable to self-organise depends on the routing protocol implementation. and self-configure due to the fact that the mobile For wireless ad hoc networks, several routing structure is changing all the time. Mobile hosts have protocols have been designed and all these protocols a limited range and sending the message to another are classified under two major fields of protocols host, which is not in the sender’s host transmission called reactive or proactive. An ad hoc routing range, must be forwarded through the network using protocol with combination of these two is called a other hosts which will be operated hybrid protocol [8]. 1364 | P a g e
  • 2. Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.1364-1369 In OLSR, during the predetermined interval Hello messages are periodically sent to the neighbor nodes in order to determine the link status. For instance, if node A and B are neighbors, Hello message is sent to node B by node A and if the Proactive Routing Protocols message is successfully received by node B then the maintain and build routing information for link is called asymmetric. This is also true for node all nodes and it works independently of the router B if it sends a Hello message to node A. For two [20]. This is achieved by periodically transmitting way communication the link is called symmetric as the control messages. These protocols continuously shown in figure 3.2. The information of neighboring broadcast control messages even if there is no data nodes is contained by Hello messages. A node is flow, due to this reason these protocols are not built in network with a routing table, which contains bandwidth efficient. The proactive routing protocols the information of multiple hope neighbors. After have its advantages and disadvantages. One of the the symmetric connections are established, a main advantages is that nodes can easily establish a minimal number of MPR nodes are selected to session and can get routing information. When there broadcast TC messages at a predetermined interval is link failure its restructure process is slow, the [20]. The information of selected MPR nodes is nodes handles too much data for the route contained by TC message. Routing calculations are maintenance, which is the drawback of proactive also handled by TC messages. routing protocols. Reactive Routing Protocols Optimized Link State Routing These protocols are bandwidth efficient. OLSR is proactive routing protocol for The routes are built on demand, which is wireless ad-hoc networks that is used in mobile ad- accomplished by sending requests for routes in the hoc networks. WIMAX Mesh (Backhaul) also uses network. The disadvantage of reactive routing this protocol. OLSR has its name because of its protocols is that it offers high latency while finding proactive nature. In order to discover their the routes [21]. In our thesis we have considered neighbors, the nodes get information of topology DSR, AODV, and TORA. being used in the network by topology control (TC) and hello packets. Packets are not broadcasted by all Temporally-Ordered Routing Algorithm nodes. Packets are only 19 (TORA) routed by multipoint relay (MPR) nodes. Source to Temporally-Ordered Routing Algorithm is destination routes are established well before their based on algorithm “link reversal” and is a use. distributed protocol. TORA guarantees the loop-free There is a routing table kept by each node. These routes, and provides the multiple routes for the routing tables create higher routing overhead for packets to alleviate the congestion. It is “source OLSR compared to other reactive routing protocols. initiated” protocol that creates different routes from It decreases the delay for route discovery. source to destination. Every node maintains the information about his adjacent nodes. There are three basic functions of TORA: route creation, route maintenance and route erasure. Three control packets are used to complete these functions: query (QRY) for route creation, update (UPD) for creating and maintaining of routes and clear (CLR) for route 1365 | P a g e
  • 3. Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.1364-1369 erasure [24]. The route creation algorithm in TORA had been significantly delayed by address changes starts with “height” (propagation ordering parameter such as classful network design, Classless Inter- in quintuple) that sets the height of all nodes to Domain Routing, and network address translation NULL (undefined) and 0 for the destination. A node (NAT). having high height is considered upstream and downstream in case of lower height [38]. The Internet Protocol Version 6 “height” metric is used to establish the directed IPv6, like the most-commonly-used IPv4, acyclic graph (DAG) at destination during the is an Internet-layer protocol for packet-switched creation and maintenance of route. In TORA every internetworking and provides end-to-end datagram node maintains a vector table stored in its memory transmission across multiple IP networks. It is that save the impression of its height as well as the described in Internet standard document RFC 2460, status of interrelated links to all connection backed published in December 1998. In addition to offering up by the network. For bandwidth, the node has to more addresses, IPv6 also implements features not broadcast its availability to other nodes in order to present in IPv4. It simplifies aspects of address update and manage topology variations [9].This assignment (stateless address autoconfiguration), routing algorithm is used to increase the scalability network renumbering and router announcements in MANET. This algorithm does not use the shortest when changing network connectivity providers. The path but it uses the optimized route [5]. IPv6 subnet size has been independent network. The node that wants to communicate with the Exchanging traffic between the two networks destination sends query message to the destination, requires special translator gateways, but this is not which contains the node id of destination. When this generally required, since most computer operating query message reaches the destination the update systems and software implement both protocols for message is sent to the sender. This update message transparent access to both networks, either natively contains the destination field [5]. The process is or using a tunneling protocol like 6to4, 6in4, or shown below. Teredo.standardized by fixing the size of the host identifier portion of an address to 64 bits to facilitate an automatic mechanism for forming the host identifier from link-layer media addressing information (MAC address). Network security is also integrated into the design of the IPv6 architecture, including the option of IPsec. IPv6 does not implement interoperability features with IPv4, but essentially creates a parallel, independent network. Exchanging traffic between the two networks requires special translator gateways, but this is not generally required, since most computer operating systems and software the source node is represented by A and the implement both protocols for transparent access to destination node is labeled by H. A query messages both networks, either natively or using a tunneling is broadcasted across the network by the source protocol like 6to4, 6in4, or Teredo. node A. This message is responded by only one-hop neighbors. When query message is received, the node updates the sender. In this figure the distance 4. Parameters and Simulation of the node D and G from the destination is one hop. In the evaluation of routing protocols The main disadvantage of this network is that it different performance metrics are used. They show depends on the activated nodes which are selected different characteristics of the whole network while initiating the setup at the beginning [10]. The performance. In this performance comparison we other disadvantage is that the response to demand evaluate the Network Load, throughput and End-to- for traffic is dependent on the number of nodes (or End delay of selected protocols in order to study the rate of change of traffic) in the networks. In a effects on the whole network. network where the traffic volume has steep positive gradient, this protocol would not work efficiently. Network Load “In networking load refers to the amount of 3. Internet Protocol data traffic being carried by the network”. Network Internet Protocol Version 4 load is a framework used in high-latency tolerant IPv4 uses 32-bit (four-byte) addresses, mobile networks. It utilizes most effective network which limits the address space to 4294967296 (232) protocols to overcome congestion. A network faces addresses. Addresses were assigned to users, and the acute congestion when all its resources are over- number of unassigned addresses decreased. IPv4 utilized and over-burdened. So Load refers to a address exhaustion occurred on February 3, 2011. It 1366 | P a g e
  • 4. Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.1364-1369 weight distribution system throughout network infrastructure [6]. In [7] Sushant et al. calculates network load by computing the ratio of volume of data received and the maximum data fluctuates during net simulation time. Throughput Throughput is the ratio of total amounts of data that reaches the receiver from the source to the time taken by the receiver to receive the last packet [11]. It is represented in packets per second or bits per second. In the MANET unreliable communication, limited energy, limited bandwidth and frequent topology change affect throughput Scenario of TORA in Ipv4 [12]. End-to End Delay The average time taken by the packets to pass through the network is called end-to-end delay. This is the time when a sender generates the packet and it is received by the application layer of destination, it is represented in seconds. This is the whole time that includes all delay of network such as transmission time, buffer queues, MAC control exchanges and delay produced by routing activities. Different applications require different packet delay levels. Low average delay is required in the network Scenario of OLSR in IPv4 of delay sensitive applications like voice. MANET has the characteristics of packet transmissions due to weak signal strengths of nodes, connection make and break, and the node mobility. These are several reasons that increase the delay in the network. Therefore the end-to-end delay is the measure of how a routing protocol accepts the various constraints of network and shows reliability. Simulator We used Opnet Modeler 14.0 for simulating the behavior of routing protocols. 5. SIMULATION AND RESULTS For evaluation the performance and analysis of our research protocosl, in this section, we use a simulation tool OPNET to conduct several experiments A. Simulation environment and parameters Scenario of TORA in Ipv6 In our simulations, we consider campus area network as a dense network: 4000 m * 4000m, with 70 randomly deployed manet nodes. Every node is initially equipped with 10 m/s speed and 60 sec of pause. We define the mobilty profile as default Random waypoint algorithm for mobilty. We have implemented heavy load FTP traffic with 50000 bystes of file size. We also define the simulation time which is 10 minutes for each scernarios. For each simulation scenario, the results are drawn by the average value of 10 mins. B. Simulation results 1367 | P a g e
  • 5. Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.1364-1369 Scenario of OLSR in Ipv6 Scenario of camparision for OLSR and TORA under Comparison of both under Ipv6 Ipv6 7. CONCLUSION In this paper, we discuss the routing protocols for manet. Two protocols have been judged under Ipv6 environmenet as it shows good results in Ipv6 environment then Ipv4. Both protocols show great compatability with Interenet protocol version6 under different scenario. In overall scenario OLSR outperform TORA in every term under Ipv6 which shows great support for OLSR under different Environmenets. REFERENCES [1] Xiaoyan Hong, Kaixin Xu and Mario Gerla “Scalable Routing Protocols for Mobile Ad Hoc Networks.” Computer Science Department, University of California, Los Angeles, August 2002. [2] Koey Huishan, Chua Huimin and Koh Yeow Nam “Routing Protocols in Ad hocWireless Networks.” National University of Singapore. [3] P.Jacquet, P. Mühlethaler, T Clausen, A. Laouiti, A.Qayyum and L. Viennot “Optimized Link State Protocol for Ad Hoc Networks.” IEEE INMIC Pakistan, 2001. [4] Xiaoyan Hong, Kaixin Xu and Mario Gerla “Scalable Routing Protocols for Mobile Ad Hoc Networks.” Computer Science Department, University of California, Los Angeles, August 2002. [5] Jin Mook Kim, In Sung Han, Jin Baek Kwon and Hwang Bin Ryou, “A Novel Approach to Search a Node in MANET”, Information Science and Security, ICISS, 2008, pp. 44 – 48. [6] Adriano Galati and Chris Greenhalgh, “A New Metric for Network Load and Equation of State”, Fifth International Conference on 1368 | P a g e
  • 6. Anjum Sharma, Rakesh Kumar, Manpreet Singh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.1364-1369 Networking and Services School of Computer Science, Nottingham, UK, 2009. [7] S. Jain, R. Patra and K. Fall, “Routing in Delay Tolerent Networking”, ACM SIGCOMM, Portland, August / September 2004. [8] D. Kiwior and L. Lam, “Routing Protocol Performance over Intermittent Links” Military Communications Conference, MILCOM, IEEE, 2007, pp. 1 – 8. [9] Q. Liang, “Pro-Active Route Maintenance in DSR”, School of Computer Science Carleton University, Ottawa, Canda, August, 2001. [10] S. R. Chaudhry, A. Al-Khwildi, Y. Casey and H. Aldelou, “A Performance Comparison of Multi On- Demand Routing in Wireless Ad Hoc Networks”, [2005], [IEEE], doi: [0-7803-9182-9/05/$20.00], Wireless Network and Communications Group (WNCG), School of Engineering & Design, Brunel University, West London. [11] Uyen Trang Nguyen and Xing Xiong, “Rate-adaptive Multicast in Mobile Ad hoc Networks,” IEEE International Conference on Ad hoc and Mobile Computing, Networking and Communications, WiMob, Montreal, Canada, 2005. [12] L. Girons Quesada, Y. Jiang and J. Xie, „„A Threshold-based Hybrid Routing Protocol for MANET‟‟. Department of Telematics, Norwegian University of Science and Technology 1369 | P a g e