SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 2, Issue 9 (August 2012), PP. 17-27


CBR based Performance Evaluation on FSR, DSR,STAR-LORA,
           DYMO Routing Protocols in MANET
                                Y.Ramesh1, Usha Ch2, Jagadish Gurrala3
            1,2
                Department of CSE, Aditya Institute of Technology and Management, JNTU, TEKKALI, INDIA
   3
    Department of CSE, Anil Neerukonda Institute of Technology and Sciences, AU, Sangivalasa, Visakhapatnam, INDIA



Abstract—For last one decade lot of researchers were conducted extensive work on performance evaluation among
routing for tremendous rise in technological advancement.In these protocols, Routing process is a tedious job due to
changing its topology over time. Since Mobile ad hoc network is a set of independent nodes move freely throughout
network, to which all of them are created for the purpose of data transfer with limited battery backup. We need efficient
routing protocol is needed to guide signals from source to destination through number of hops within time and several
routing strategies has been proposed in last decade for ad-hoc network. In this paper, we leave efficient routing strategy
to public to determine and extract efficiency from thoroughly perform simulations and comparative analysis of specified
proactive type routing protocols and specified reactive type routing protocols with few nodes using Qual-Net Simulator
and summarizes the results.

Keywords— DSR,DYMO,STAR-LORA,FSR, Routing Strategies

                                                I.       INTRODUCTION
           In past ten years, several researchers have conducted comparative study and performance evaluation[1][2][3]
among several routing protocols with respect to performance metrics over nodes ranges from 50 to 200 were deployed in
MANET. In the twenty first century there have been a lot of articles are published regarding routing protocols in the field of
wireless mobile ad hoc networks using ns2 simulator and Qualnet simulator5.0.2. But there is missing in practicality in real
world and really useful for public. In this paper we leave efficient routing strategy to public from obtaining results
through[18] comparative study between proactive type Fisheye State Routing Protocol (FSR), proactive type Source Tree
Adaptive Routing protocol(STAR) and Reactive type Dynamic Source Routing(DSR) and Reactive type Dynamic MANET
On demand Routing Protocol(DYMO) are analyzed and presented and left to implementers whatever ease of routing
technology is available in which how packets are delivered without Access Point. With this paper to explores the impact of
QoS[22] metrics such as throughput, average end to end delay and average jitter on routing between nodes where we applied
under Constant Bit Rate(CBR) client server traffic conditions using QualNet 5.0.2 simulator[13]. To show the performance
efficiency in terms of plotting graphs represents that X axis indicates Node Count starting from 2 nodes to 12 nodes and Y
axis indicates the Quality of Service metric by using simulator only. The rest of this paper is organized as follows.
           In section 2 brief introductions to various routing strategies and its literature survey has been presented. Section 3
briefly explores test scenarios between STAR,FSR and DSR,DYMO routing protocol using QualNet 5.0.2 network
simulator for 2, 4, 8, 10, 12 stationary nodes. In section 3 related works about test cases is presented. Simulation
environment and simulation setup used in the work and running a scenario is discussed in section 4. In section 5 the results
of the performance evaluation are thoroughly discussed. Conclusion & Future work is given in section 6.

                                          II.        LITERATURE SURVEY
          Routing protocol in MANET is the prototype in which determination of selecting path by initiation of each
node(especially source node) to route packets to concerned destination over wireless media based CBR traffic. This work
focuses on efficiency of routing protocol among protocols for better construction of mobile ad-hoc networks. Each node[2]
participates in an ad hoc routing protocol that allows it to discover “multi-hop” paths through the network to any other node.
Some researchers proposed another article about routing is concerned with in electronic data networks which uses packet
switching technology[3]. The fundamental principle of a routing protocol is to deliver the packets from source to destination
with enhanced performance in terms of minimization of delay. Routing protocols are generally necessary for maintaining
effective communication between distinct nodes. Routing protocol not only discovers network topology but also built the
route for forwarding data packets and dynamically maintains routes between any pair of communicating nodes. Routing
protocols are designed to adapt frequent updates in the network due to mobility nature in MANET.Traditionally, MANet
Routing protocol strategies classified into two ways as shown in fig. 1




                                                              17
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET




                                     Figure 1 Classification of MANET routing protocols

2.1   Proactive Routing Strategy
          Proactive Routing Strategy also called table driven, or data gram approach in packet switching network. It
maintains routing table using the routing information learnt from neighbours on periodic basis. Main characteristics of these
protocols include: distributed, shortest-path protocols, maintain routes between every host pair at all times, based on periodic
updates of routing table and high routing overhead and consumes more bandwidth[4]. We are discuss comparative analysis
between the following strategies in detail. Now we discuss the following kinds in this strategy.
     1. Fisheye State Routing (FSR) [6]
     2. Source Tree Adaptive Routing (STAR) [10]

2.1.1 Fisheye State Routing (FSR)
          The FSR protocol[6] is the next generation technology of Global State Routing strategy(GSR). FSR maintains
Entries of nearby nodes in the routing table are updated and exchanged with neighbours more frequently (to reduce the
update message size).The accuracy of route increases as packets gets closer to the destination. The main drawback of FSR is
as the mobility of remote nodes increases the accuracy of the routing information decreases.

2.1.2 Source -Tree Adaptive Routing (STAR)
           The STAR protocol [10][11] is also called STAR – LORA(Least Overhead Routing Adaptive) based on the link
state algorithm. Each router maintains a source tree, which is a set of links form a graph (V,E) containing the preferred paths
to destinations. This protocol has significantly reduced the amount of routing overhead disseminated into the network by
using a least overhead routing approach (LORA), to exchange routing information. It also support optimum routing approach
(ORA) if required. This approach eliminated the periodic updating procedure present in the Link State algorithm by making
update dissemination conditional. Each node keeps the state of subset of the links, i.e., the links of the source trees of other
nodes and all of its links.The source tree of a node is the tree composed of all links that constitute the preferred routes to all
destinations. STAR based on the trees reported by neighbours and the state of its links, each node builds a partial topology
graph that is used to build the routing table. STAR is a scalable algorithm.

2.2    Reactive Routing Strategy
          Reactive Routing strategy[4] are also called demand driven approach or virtual circuit approach in packet
switching network. that find path as and when required. They maintain information about the active routes only. They
performs route discovery phase before data transmission by flooding route request packet and destination node reply with
route reply packet. A separate route maintenance procedure is required in case of route failure. Main Characteristics of these
routing protocols are: determine routes as and when required, less routing overhead, source initiated route discovery and
more route discovery delay. The following are used for this kind.
     1. Dynamic MANET On-Demand Routing (DYMO) [7]
     2. Dynamic Source Routing (DSR) [9]

2.2.1 DYnamic MANET On-Demand Routing (DYMO)
          Dynamic MANET On-demand (DYMO)[7] routing protocol is a source initiated or reactive routing strategy in
which multihop routing is built up between participating nodes that wish to communicate. The basic operations of the
DYMO protocol are route discovery and route maintenance. During route discovery the originating node initiates
dissemination of a Route Request (RREQ) throughout the network to find the target node. During this dissemination process,
each intermediate node records a route to the originating node. When the target node receives the RREQ, it responds with a
Route Reply (RREP) unicast toward the originating node. Each node that receives the RREP records a route to the target
node, and then the RREP is unicast toward the originating node. When the originating node receives the RREP, routes have
then been established between the originating node and the target node in both directions. During route maintenance, all
nodes maintain their routes and monitor their links. When a packet is received for a route that is no longer available the
source of the packet is notified. A Route Error (RERR) is sent to the packet source to indicate the current route is broken.
Once the source receives the RERR, it re-initiates route discovery if it still has packets to deliver.

2.2.2 Dynamic Source Routing (DSR)
          DSR is an on demand routing protocol in which a sender determines the exact sequence of nodes through which a
packet is propagated. The packet header contains a list of intermediate nodes for routing. Route cache is maintained by each

                                                               18
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET

node which caches the source route that it has learned. The major components of DSR are “Route Discovery” and “Route
Maintenance” which work together for determining and maintaining routes to arbitrary destinations [5]. It is designed to
restrict the bandwidth consumed by control packets in ad hoc wireless networks by eliminating the periodic table-update
messages required in the table-driven approach. A route is established by flooding Route Request packets in the network.
[8].

                                              III.      RELATED WORK
         In this paper, we have taken two different scenarios[19]. In the first scenario, traffic pattern is taken as CBR Client
and no. of nodes have been varied and performance comparisons have been made between STAR-LORA,FSR and
DYMO,DSR protocol. In the second scenario, traffic pattern is taken as CBR Server have been varied and performance
comparisons have been made between STAR-LORA,FSR and DYMO,DSR protocols.. The QoS can be defined as the
manner that the service of delivery of packages is supplied and who can be characterized by various parameters of
performance like, the throughput, the delay variation (jitter).

3.1 Test Scenario 1
In first scenario we have taken CBR Client as traffic pattern. Parameters are specified in table 1

                                             Table 1: Parameters for Scenario 1
                           Parameter                                                        value

                           Terrain size                                                 1500 X 1500

                        Number of nodes                                                  2,4,6,8,12

                           Traffic type                                           Constant Bit Rate client

                           Packet size                                                       512

                            Mobility                                                    Random way

                              Speed                                                       100 mps

                           Pause time                                                     15,20,25


                         Simulation time                                                  3000 sec

                        Routing protocol                                      FSR,STAR-LORA,DYMO,DSR

3.2 Test Scenario 2
In first scenario we have taken CBR Server as traffic pattern. Parameters are specified in table 2

                                             Table 2: Parameters for Scenario 2
                           Parameter                                                       value

                           Terrain size                                                  500 X 500

                        Number of nodes                                                  2,4,6,8,12

                           Traffic type                                           Constant Bit Rate Server

                           Packet size                                                      512

                             Mobility                                                   Random way

                              Speed                                                       100 mps

                            Pause time                                                    15,20,25

                         Simulation time                                              300sec, 3000 sec

                        Routing protocol                                     FSR,STAR- LORA,DYMO,DSR

                                                              19
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET

                                     IV.       SIMULATION ENVIRONMENT
          The Qualnet 5.0.2 simulator is used for the design of scenarios in graphical environment. To[15] give an idea of
how (in terms of quantitative) the scenario performs it can be run using the QualNet Animator. Figure 2 shows the Animator
with the previously designed scenario in action. On the right side you can enable or disable various types of animations. In
the Layers tab animations for each of the 7 OSI layers can be enabled or disabled individually.




                                   Figure 2 : Snap shot of QualNet5.0.2 Animator in Action
4.1 Experimental Setup
           The study has been done to place require number of nodes changes dynamically on canvass plane as shown in Fig
3 and compare the efficiency of four different routing protocols, two of them are from proactive type and rest of them are
reactive type in Mobile Ad hoc Networks. The tool used is QualNet5.0.2, the Quality of Service parameters are Throughput,
Average End to End Delay and Average Jitter. The simulation using 2,4,6,8 and 12 nodes. The performance of all four
routing protocols is carried out and results are compiled.

4.2 Performance Metrics
          Now we are conducted extensive calculation on metrics based on terrain size. Hence terrain size varies, the
corresponding metrics are rapidly changes while number of nodes are fixed. Here we perform rigorous experimental
scenarios are deployed in QualNet simulator to generate graphs with suitable metrics. The following metrics are studied and
applied to current scenarios as shown in table 3,4 and 5.

4.2.1 Average End To End Delay
It is the average time it takes a signal travel from process at source node service access point(SAP) to process at destination
node service access point(done at SAP of transportation layer in TCP/IP protocol suite). This metric is calculated by
subtracting time at which first packet was transmitted by source from time at which first data packet arrived to destination.
This metric is significant in understanding the delay introduced by path discovery.

4.2.2 Throughput
         The throughput of the protocols can be defined as total number of signalling elements travelled at a unit time. It is
the amount of data per time unit that is delivered from one node to another via a communication link. The throughput is
measured in bits per second (bit/s or bps).

4.2.3 Average Jitter
          Average Jitter[21] is the variation of the packet arrival time. In jitter calculation the variation in the packet arrival
time is expected to be low. The delays between the different packets need to be low for better performance in ad-hoc
networks. It becomes a matter of concern if it is more than the threshold value, which is different for data, voice or video
transmission services.




                                                               20
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET

4.3 Results & Comparisons
                                           Table . 3 CBR client Througput (Bits/sec)

                     nodes #                  FSR               STAR-LORA              DYMO            DSR
                        2                     4274                 4274
                                                                                        4274           8520
                        4                     4274                 4274
                                                                                        4274           8520
                        6                     4274                 4274
                                                                                        4274           8520
                        8                     4274                 4274
                                                                                        4274           8520
                        12                    4274                 4274
                                                                                        4274           8520


                                     Table. 4 CBR Server Average End to End delay (s)

              Nodes #          FSR                    STAR-LORA            DYMO                    DSR
              2                0.003721               0.004988             0.001978                0.026
              4                0.003734               0.004988             0.018556                0.026
              6                0.003756               0.004988             0.01964                 0.139
              8                0.003769               0.00698              0.018                   0.139
              12               0.003794               0.004789             0.02164                 0.04587


                                          Table. 5 CBR Server Average Jitter (s)
             Nodes #         FSR                 STAR-LORA         DYMO                   DSR
             2               0.0003288           0.00015867        0.0128654              0.0135689
             4               0.0003287           0.00015869        0.0126261              0.032145
             6               0.0003324           0.00015874        0.012964               0.015894
             8               0.0003365           0.00015876        0.013                  0.016154
             12              0.0003381           0.00105865        0.013                  0.016257

Note: The above results will be taken from analyzer screen in Qualnet and it is plotted with the help of Microsoft Excel
2007 tool. Figures 5,6, 7,8,9 and 10 shown figures 0,5,10,15 in X axis instead of display figures 2,4,6,8,10 and 12 nodes on
X axis in Qualnet experimentation. Readers can understood these numbering notations.

4.4 Running A Scenario
          QualNet 5.0.2 has a configuration window which contains several attributes of each node layer information.
However we have to focus on network layer protocols such as DYMO, STAR,DSR and application layer protocol such as
Fisheye routing protocol. To run each protocol[20][21] we are loading values of simulation time, number of seeds (here only
one seed is used in simulator) and throughput, average end to end delay, average jitter, then apply run simulation and play it
then automatically the present scenario is get animated. Ultimately we have been produce several graphs according metrics
such as number of control packets on media, total packets sent, number of control packets transmitted, being transmitted
through animation, control overhead with respect to Node ID as shown in Fig. 3 to Fig 8. These results are obtained from the
following analyzer windows.




                                                              21
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET




                 Figure 3 Number of control packets Vs node ID in Analyzer Window




                         Figure 4 Total packet sent Vs node ID in Analyzer




                        Figure 5 Throughput Vs node ID in Analyzer screen

                                                22
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET




       Figure 6 Fisheye Routing type No. of control packets transmitted Vs node ID in Analyzer Screen




                        Figure 7 Two Nodes are being transmitted in Animation screen




                           Figure 8. Control overhead Vs node ID in Analyzer screen

                                                     23
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET

                                   V.        PERFORMANCE EVALUATION
        The Qualnet 5.0.2 network simulator[14] has been used to analyze[16][17] the parametric performance of Source
Tree Adaptive Routing Protocol (STAR), Fisheye State Routing Protocol (FSR), Dynamic Source Routing (DSR) and
Dynamic MANET On demand Routing protocol (DYMO). The metric based evaluation is shown in Fig. 9 to Fig. 14.

5.1 Throughput
          With the varying CBR data traffic the throughput is analyzed. The successful packet delivery at given nodes
having number (ID) in an adhoc network is observed with increasing MAC based traffic load and mobility. It is found that
DSR with least routing overhead uniformly performs better than FSR and STAR The performance is shown in figure 9 and
10. Therefore FSR,STAR and DYMO has been plotted in first graph and DSR is plotted in second and next graph because
DSR values are beyond the values of Previous graph. Similarly in next sections 5.2 and 5.3 assumed to put graphs
separately.




                                     Figure 9 Graph for Throughput(Bits/sec) Vs nodes




                                 Figure 10 Graph for Average Throughput(Bits/s) Vs nodes

5.2 Average End-To-End Delay
          It is a propagation time to deliver packet or signal from process (Application Programming Interface) at source to
process at destination. To average up all times when data transfer phase is completed that process to process delivery time is
called average end-to-end delay. Simply we call setup time+data transfer time+tear down time is referred to as delay of
packet delivery. In this analysis it is observed as expected the delays are high in DSR in comparison to FSR and STAR.
These delays are incurred by the FSR methods. The end-to-end delay is very less in case of FSR and STAR. Because FSR is
a less over head to the packet within small geographical area. The performance is shown in fig. 11 and 12




                                                             24
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET




                                   Figure 11 Graph for Average End-to-End delay Vs nodes




                                  Figure 12 Graph for Average End-to-End delay Vs nodes

5.3 Average Jitter
          Jitter, the variation of the packet arrival time, is an important metrics for any routing protocol. In this analysis it is
found to vary. Initially it is low but for higher nodes ID than 12 it is high. The jitter for nodes 2,4,6,8 is high for both of the
protocols due to larger distance between source and destination. In STAR it is due to limited no.of nodes as in FSR and
DYMO, it is due to higher frequency of propagation. The jitter results are shown in fig. 13 and 14




                                               Fig. 13 Average Jitter (s) Vs nodes




                                                                25
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET




                                        Fig. 14 Graph for Average Jitter Vs nodes

                                 VI.       CONCLUSION & FUTURE WORK
           The performance evaluation of two proactive routing strategies(FSR,STAR) and two reactive routing strategies
(DSR, DYMO) for stationary nodes are evaluated by varying the node density (2,4,6,8,12) using Qualnet 5.0.2network
simulator. From these graphs it can be realised that reactive routing protocol DSR only are suited for applications where
average jitter and throughput are in danger situation and FSR are suited for Average end to end delay. The worst drawback
[15] of the QualNet animator is its extreme high CPU utilization and its implementation in Java which makes it run very
slowly on most machines. In this paper we leaves to researchers to enhance our mission to run scenarios not only these tools
usage. However there is scope of examination over strategies for better tomorrow. One of our future research works is to
develop an proposed algorithm on routing strategy can work in Bandwidth on demand working environment like banking
sector, high secure communication, education system using high end tools.

                                                   REFERENCES
  [1].    M.Uma, G.Padmavathi, ”A Comparative Study and Performance Evaluation of Reactive Quality of Service
          Routing Protocols in Mobile Advhoc networks”, Journal of Theoretical and Applied Information Technology,
          copyright 2005 – 2009.
  [2].    Parma Nand, S.C. Sharma, “Comparative study and Performance Analysis of FSR, ZRP and AODV Routing
          Protocols for MANET”, 2nd International Conference and workshop on Emerging Trends in Technology
          (ICWET) 2011 Proceedings published by International Journal of Computer Applications® (IJCA).
  [3].    Subramanya Bhat.M, et al.,“ A Performance Study of Proactive, Reactive and Hybrid Routing Protocols using
          Qualnet Simulator”, International Journal of Computer Applications (0975 – 8887) Volume 28– No.5, August
          2011
  [4].    Ravinder Ahuja, “Simulation based Performance Evaluation and Comparison of Reactive, Proactive and Hybrid
          Routing Protocols based on Random Waypoint Mobility Model”, International Journal of Computer Applications
          (0975 – 8887) Volume 7– No.11, October 2010.
  [5].    D. Johnson and D. Maltz. “Dynamic source routing in ad hoc wireless networks”, In T. Imielinski and H. Korth,
          editors, Mobile computing, chapter 5. Kluwer Academic, 1996.
  [6].    [6] G. Pei, M. Gerla, and T. W. Chen, “Fisheye State Routing in Mobile Ad Hoc Networks,” In Proceedings of the
          2000 ICDCS workshops, Taipei, Taiwan, Apr. 2000.
  [7].    http://moment.cs.ucsb.edu/pub/draft-ietf-manet-dymo- 02.html
  [8].    Gergely Acs, Levente Buttyan and Istvan Vajda “ Provably Secure on-demand Source routing in Mobile Ad-Hoc
          Networks” Accepted for publication in the IEEE transactions on Mobile Computing, November 28, 2005
  [9].    Josh Broch, David Johnson, and David Maltz. “The dynamic source routing protocol for mobile ad hoc networks
          for IPv4 IETF RFC 4728, Feb 2007.
  [10].   J.J. Garcia-Luna-Aceves, C. Marcelo Spohn, Source-tree routing in wireless networks, in: Proceedings of the
          Seventh Annual International Conference on Network Protocols Toronto, Canada, October 1999, p. 273.
  [11].   Parma Nand, S.C. Sharma, Rani Astya, “Traffic Load based Performance Analysis of DSR, STAR & AODV Ad
          hoc Routing Protocol”, International Journal of AdvancedComputer Science and Applications, vol 1 No 4, pp 58-
          62,Oct 2010.
  [12].   Suresh Kumar, R K Rathy and Diwakar Pandey, ”Traffic pattern based performance comparison of two reactive
          routing protocols for ad hoc networks using NS2, © 2005-2009 IEEE.
  [13].   Qualnet Simulator www.scalable-networks.com
  [14].   Parma Nand, S.C. Sharma, “Performance study of Broadcast based Mobile Ad hoc Routing Protocols AODV,
          DSR and DYMO”, International Journal of Security and Its Applications, vol.5 No. 1, pp 53-64, January, 2011.
  [15].   ftp://ftp.tik.ee.ethz.ch/pub/publications/TIK-Report-255.pdf,page11




                                                            26
CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET

 [16].   Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva, “A Performance Comparison
         of Multi-Hop Wireless Ad Hoc Network Routing Protocols”, Proceedings of the Fourth Annual ACM/IEEE
         International Conference on Mobile Computing and Networking, Dallas-Texas, October 1998.
 [17].   M. Scott Corson and Joseph Macker, “Mobile Adhoc Networking (MANET): Routing Protocol Performance
         Issues and Evaluation Considerations”,RFC2501, Request for Comments, January 1999.
 [18].   Samir R. Das, Charles E. Perkins, and Elizabeth M.Royer, “Performance Comparison of Two On demand Routing
         Protocols for Ad Hoc Networks”, Proceedings of the IEEE Conference on Computer Communications INFOCOM),
         pages 3-12,Tel Aviv, Israel, March 2000.
 [19].   Satyabrata Chakrabarti and Amitabh Mishra, “QoS Issues in Ad Hoc Wireless Networks”, IEEE Communications
         Magazine, February 2001.
 [20].   Shigang Chen and Klara Nahrstedt, “Distributed Quality-of-Service Routing in Ad Hoc Networks”,IEEE Journal
         on Selected Areas in Communications,Vol. 17, No. 8, pp. 1488-1505, August 1999.
 [21].   Songwu Lu, Vaduvur Bharghavan and R. Srikant,“Fair Scheduling in Wireless Packet Networks”,IEEE/ACM
         Transactions on Networking, Vol. 7, No.4, August 1999.
 [22].   T.-W. Chen, J. T. Tsai and M. Gerla, “QoS RoutingPerformance in Multihop, Wireless Networks”, IEEE 6th
         ICUPC’97, October 1997.




                                                       27

Weitere ähnliche Inhalte

Was ist angesagt?

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 

Was ist angesagt? (16)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
E010322531
E010322531E010322531
E010322531
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
A02100108
A02100108A02100108
A02100108
 
En33838844
En33838844En33838844
En33838844
 
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 

Ähnlich wie IJERD (www.ijerd.com) International Journal of Engineering Research and Development

Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
 

Ähnlich wie IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Be31390392
Be31390392Be31390392
Be31390392
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
J0935461
J0935461J0935461
J0935461
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
K017426872
K017426872K017426872
K017426872
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
A340105
A340105A340105
A340105
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 

Mehr von IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mehr von IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 2, Issue 9 (August 2012), PP. 17-27 CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET Y.Ramesh1, Usha Ch2, Jagadish Gurrala3 1,2 Department of CSE, Aditya Institute of Technology and Management, JNTU, TEKKALI, INDIA 3 Department of CSE, Anil Neerukonda Institute of Technology and Sciences, AU, Sangivalasa, Visakhapatnam, INDIA Abstract—For last one decade lot of researchers were conducted extensive work on performance evaluation among routing for tremendous rise in technological advancement.In these protocols, Routing process is a tedious job due to changing its topology over time. Since Mobile ad hoc network is a set of independent nodes move freely throughout network, to which all of them are created for the purpose of data transfer with limited battery backup. We need efficient routing protocol is needed to guide signals from source to destination through number of hops within time and several routing strategies has been proposed in last decade for ad-hoc network. In this paper, we leave efficient routing strategy to public to determine and extract efficiency from thoroughly perform simulations and comparative analysis of specified proactive type routing protocols and specified reactive type routing protocols with few nodes using Qual-Net Simulator and summarizes the results. Keywords— DSR,DYMO,STAR-LORA,FSR, Routing Strategies I. INTRODUCTION In past ten years, several researchers have conducted comparative study and performance evaluation[1][2][3] among several routing protocols with respect to performance metrics over nodes ranges from 50 to 200 were deployed in MANET. In the twenty first century there have been a lot of articles are published regarding routing protocols in the field of wireless mobile ad hoc networks using ns2 simulator and Qualnet simulator5.0.2. But there is missing in practicality in real world and really useful for public. In this paper we leave efficient routing strategy to public from obtaining results through[18] comparative study between proactive type Fisheye State Routing Protocol (FSR), proactive type Source Tree Adaptive Routing protocol(STAR) and Reactive type Dynamic Source Routing(DSR) and Reactive type Dynamic MANET On demand Routing Protocol(DYMO) are analyzed and presented and left to implementers whatever ease of routing technology is available in which how packets are delivered without Access Point. With this paper to explores the impact of QoS[22] metrics such as throughput, average end to end delay and average jitter on routing between nodes where we applied under Constant Bit Rate(CBR) client server traffic conditions using QualNet 5.0.2 simulator[13]. To show the performance efficiency in terms of plotting graphs represents that X axis indicates Node Count starting from 2 nodes to 12 nodes and Y axis indicates the Quality of Service metric by using simulator only. The rest of this paper is organized as follows. In section 2 brief introductions to various routing strategies and its literature survey has been presented. Section 3 briefly explores test scenarios between STAR,FSR and DSR,DYMO routing protocol using QualNet 5.0.2 network simulator for 2, 4, 8, 10, 12 stationary nodes. In section 3 related works about test cases is presented. Simulation environment and simulation setup used in the work and running a scenario is discussed in section 4. In section 5 the results of the performance evaluation are thoroughly discussed. Conclusion & Future work is given in section 6. II. LITERATURE SURVEY Routing protocol in MANET is the prototype in which determination of selecting path by initiation of each node(especially source node) to route packets to concerned destination over wireless media based CBR traffic. This work focuses on efficiency of routing protocol among protocols for better construction of mobile ad-hoc networks. Each node[2] participates in an ad hoc routing protocol that allows it to discover “multi-hop” paths through the network to any other node. Some researchers proposed another article about routing is concerned with in electronic data networks which uses packet switching technology[3]. The fundamental principle of a routing protocol is to deliver the packets from source to destination with enhanced performance in terms of minimization of delay. Routing protocols are generally necessary for maintaining effective communication between distinct nodes. Routing protocol not only discovers network topology but also built the route for forwarding data packets and dynamically maintains routes between any pair of communicating nodes. Routing protocols are designed to adapt frequent updates in the network due to mobility nature in MANET.Traditionally, MANet Routing protocol strategies classified into two ways as shown in fig. 1 17
  • 2. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET Figure 1 Classification of MANET routing protocols 2.1 Proactive Routing Strategy Proactive Routing Strategy also called table driven, or data gram approach in packet switching network. It maintains routing table using the routing information learnt from neighbours on periodic basis. Main characteristics of these protocols include: distributed, shortest-path protocols, maintain routes between every host pair at all times, based on periodic updates of routing table and high routing overhead and consumes more bandwidth[4]. We are discuss comparative analysis between the following strategies in detail. Now we discuss the following kinds in this strategy. 1. Fisheye State Routing (FSR) [6] 2. Source Tree Adaptive Routing (STAR) [10] 2.1.1 Fisheye State Routing (FSR) The FSR protocol[6] is the next generation technology of Global State Routing strategy(GSR). FSR maintains Entries of nearby nodes in the routing table are updated and exchanged with neighbours more frequently (to reduce the update message size).The accuracy of route increases as packets gets closer to the destination. The main drawback of FSR is as the mobility of remote nodes increases the accuracy of the routing information decreases. 2.1.2 Source -Tree Adaptive Routing (STAR) The STAR protocol [10][11] is also called STAR – LORA(Least Overhead Routing Adaptive) based on the link state algorithm. Each router maintains a source tree, which is a set of links form a graph (V,E) containing the preferred paths to destinations. This protocol has significantly reduced the amount of routing overhead disseminated into the network by using a least overhead routing approach (LORA), to exchange routing information. It also support optimum routing approach (ORA) if required. This approach eliminated the periodic updating procedure present in the Link State algorithm by making update dissemination conditional. Each node keeps the state of subset of the links, i.e., the links of the source trees of other nodes and all of its links.The source tree of a node is the tree composed of all links that constitute the preferred routes to all destinations. STAR based on the trees reported by neighbours and the state of its links, each node builds a partial topology graph that is used to build the routing table. STAR is a scalable algorithm. 2.2 Reactive Routing Strategy Reactive Routing strategy[4] are also called demand driven approach or virtual circuit approach in packet switching network. that find path as and when required. They maintain information about the active routes only. They performs route discovery phase before data transmission by flooding route request packet and destination node reply with route reply packet. A separate route maintenance procedure is required in case of route failure. Main Characteristics of these routing protocols are: determine routes as and when required, less routing overhead, source initiated route discovery and more route discovery delay. The following are used for this kind. 1. Dynamic MANET On-Demand Routing (DYMO) [7] 2. Dynamic Source Routing (DSR) [9] 2.2.1 DYnamic MANET On-Demand Routing (DYMO) Dynamic MANET On-demand (DYMO)[7] routing protocol is a source initiated or reactive routing strategy in which multihop routing is built up between participating nodes that wish to communicate. The basic operations of the DYMO protocol are route discovery and route maintenance. During route discovery the originating node initiates dissemination of a Route Request (RREQ) throughout the network to find the target node. During this dissemination process, each intermediate node records a route to the originating node. When the target node receives the RREQ, it responds with a Route Reply (RREP) unicast toward the originating node. Each node that receives the RREP records a route to the target node, and then the RREP is unicast toward the originating node. When the originating node receives the RREP, routes have then been established between the originating node and the target node in both directions. During route maintenance, all nodes maintain their routes and monitor their links. When a packet is received for a route that is no longer available the source of the packet is notified. A Route Error (RERR) is sent to the packet source to indicate the current route is broken. Once the source receives the RERR, it re-initiates route discovery if it still has packets to deliver. 2.2.2 Dynamic Source Routing (DSR) DSR is an on demand routing protocol in which a sender determines the exact sequence of nodes through which a packet is propagated. The packet header contains a list of intermediate nodes for routing. Route cache is maintained by each 18
  • 3. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET node which caches the source route that it has learned. The major components of DSR are “Route Discovery” and “Route Maintenance” which work together for determining and maintaining routes to arbitrary destinations [5]. It is designed to restrict the bandwidth consumed by control packets in ad hoc wireless networks by eliminating the periodic table-update messages required in the table-driven approach. A route is established by flooding Route Request packets in the network. [8]. III. RELATED WORK In this paper, we have taken two different scenarios[19]. In the first scenario, traffic pattern is taken as CBR Client and no. of nodes have been varied and performance comparisons have been made between STAR-LORA,FSR and DYMO,DSR protocol. In the second scenario, traffic pattern is taken as CBR Server have been varied and performance comparisons have been made between STAR-LORA,FSR and DYMO,DSR protocols.. The QoS can be defined as the manner that the service of delivery of packages is supplied and who can be characterized by various parameters of performance like, the throughput, the delay variation (jitter). 3.1 Test Scenario 1 In first scenario we have taken CBR Client as traffic pattern. Parameters are specified in table 1 Table 1: Parameters for Scenario 1 Parameter value Terrain size 1500 X 1500 Number of nodes 2,4,6,8,12 Traffic type Constant Bit Rate client Packet size 512 Mobility Random way Speed 100 mps Pause time 15,20,25 Simulation time 3000 sec Routing protocol FSR,STAR-LORA,DYMO,DSR 3.2 Test Scenario 2 In first scenario we have taken CBR Server as traffic pattern. Parameters are specified in table 2 Table 2: Parameters for Scenario 2 Parameter value Terrain size 500 X 500 Number of nodes 2,4,6,8,12 Traffic type Constant Bit Rate Server Packet size 512 Mobility Random way Speed 100 mps Pause time 15,20,25 Simulation time 300sec, 3000 sec Routing protocol FSR,STAR- LORA,DYMO,DSR 19
  • 4. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET IV. SIMULATION ENVIRONMENT The Qualnet 5.0.2 simulator is used for the design of scenarios in graphical environment. To[15] give an idea of how (in terms of quantitative) the scenario performs it can be run using the QualNet Animator. Figure 2 shows the Animator with the previously designed scenario in action. On the right side you can enable or disable various types of animations. In the Layers tab animations for each of the 7 OSI layers can be enabled or disabled individually. Figure 2 : Snap shot of QualNet5.0.2 Animator in Action 4.1 Experimental Setup The study has been done to place require number of nodes changes dynamically on canvass plane as shown in Fig 3 and compare the efficiency of four different routing protocols, two of them are from proactive type and rest of them are reactive type in Mobile Ad hoc Networks. The tool used is QualNet5.0.2, the Quality of Service parameters are Throughput, Average End to End Delay and Average Jitter. The simulation using 2,4,6,8 and 12 nodes. The performance of all four routing protocols is carried out and results are compiled. 4.2 Performance Metrics Now we are conducted extensive calculation on metrics based on terrain size. Hence terrain size varies, the corresponding metrics are rapidly changes while number of nodes are fixed. Here we perform rigorous experimental scenarios are deployed in QualNet simulator to generate graphs with suitable metrics. The following metrics are studied and applied to current scenarios as shown in table 3,4 and 5. 4.2.1 Average End To End Delay It is the average time it takes a signal travel from process at source node service access point(SAP) to process at destination node service access point(done at SAP of transportation layer in TCP/IP protocol suite). This metric is calculated by subtracting time at which first packet was transmitted by source from time at which first data packet arrived to destination. This metric is significant in understanding the delay introduced by path discovery. 4.2.2 Throughput The throughput of the protocols can be defined as total number of signalling elements travelled at a unit time. It is the amount of data per time unit that is delivered from one node to another via a communication link. The throughput is measured in bits per second (bit/s or bps). 4.2.3 Average Jitter Average Jitter[21] is the variation of the packet arrival time. In jitter calculation the variation in the packet arrival time is expected to be low. The delays between the different packets need to be low for better performance in ad-hoc networks. It becomes a matter of concern if it is more than the threshold value, which is different for data, voice or video transmission services. 20
  • 5. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET 4.3 Results & Comparisons Table . 3 CBR client Througput (Bits/sec) nodes # FSR STAR-LORA DYMO DSR 2 4274 4274 4274 8520 4 4274 4274 4274 8520 6 4274 4274 4274 8520 8 4274 4274 4274 8520 12 4274 4274 4274 8520 Table. 4 CBR Server Average End to End delay (s) Nodes # FSR STAR-LORA DYMO DSR 2 0.003721 0.004988 0.001978 0.026 4 0.003734 0.004988 0.018556 0.026 6 0.003756 0.004988 0.01964 0.139 8 0.003769 0.00698 0.018 0.139 12 0.003794 0.004789 0.02164 0.04587 Table. 5 CBR Server Average Jitter (s) Nodes # FSR STAR-LORA DYMO DSR 2 0.0003288 0.00015867 0.0128654 0.0135689 4 0.0003287 0.00015869 0.0126261 0.032145 6 0.0003324 0.00015874 0.012964 0.015894 8 0.0003365 0.00015876 0.013 0.016154 12 0.0003381 0.00105865 0.013 0.016257 Note: The above results will be taken from analyzer screen in Qualnet and it is plotted with the help of Microsoft Excel 2007 tool. Figures 5,6, 7,8,9 and 10 shown figures 0,5,10,15 in X axis instead of display figures 2,4,6,8,10 and 12 nodes on X axis in Qualnet experimentation. Readers can understood these numbering notations. 4.4 Running A Scenario QualNet 5.0.2 has a configuration window which contains several attributes of each node layer information. However we have to focus on network layer protocols such as DYMO, STAR,DSR and application layer protocol such as Fisheye routing protocol. To run each protocol[20][21] we are loading values of simulation time, number of seeds (here only one seed is used in simulator) and throughput, average end to end delay, average jitter, then apply run simulation and play it then automatically the present scenario is get animated. Ultimately we have been produce several graphs according metrics such as number of control packets on media, total packets sent, number of control packets transmitted, being transmitted through animation, control overhead with respect to Node ID as shown in Fig. 3 to Fig 8. These results are obtained from the following analyzer windows. 21
  • 6. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET Figure 3 Number of control packets Vs node ID in Analyzer Window Figure 4 Total packet sent Vs node ID in Analyzer Figure 5 Throughput Vs node ID in Analyzer screen 22
  • 7. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET Figure 6 Fisheye Routing type No. of control packets transmitted Vs node ID in Analyzer Screen Figure 7 Two Nodes are being transmitted in Animation screen Figure 8. Control overhead Vs node ID in Analyzer screen 23
  • 8. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET V. PERFORMANCE EVALUATION The Qualnet 5.0.2 network simulator[14] has been used to analyze[16][17] the parametric performance of Source Tree Adaptive Routing Protocol (STAR), Fisheye State Routing Protocol (FSR), Dynamic Source Routing (DSR) and Dynamic MANET On demand Routing protocol (DYMO). The metric based evaluation is shown in Fig. 9 to Fig. 14. 5.1 Throughput With the varying CBR data traffic the throughput is analyzed. The successful packet delivery at given nodes having number (ID) in an adhoc network is observed with increasing MAC based traffic load and mobility. It is found that DSR with least routing overhead uniformly performs better than FSR and STAR The performance is shown in figure 9 and 10. Therefore FSR,STAR and DYMO has been plotted in first graph and DSR is plotted in second and next graph because DSR values are beyond the values of Previous graph. Similarly in next sections 5.2 and 5.3 assumed to put graphs separately. Figure 9 Graph for Throughput(Bits/sec) Vs nodes Figure 10 Graph for Average Throughput(Bits/s) Vs nodes 5.2 Average End-To-End Delay It is a propagation time to deliver packet or signal from process (Application Programming Interface) at source to process at destination. To average up all times when data transfer phase is completed that process to process delivery time is called average end-to-end delay. Simply we call setup time+data transfer time+tear down time is referred to as delay of packet delivery. In this analysis it is observed as expected the delays are high in DSR in comparison to FSR and STAR. These delays are incurred by the FSR methods. The end-to-end delay is very less in case of FSR and STAR. Because FSR is a less over head to the packet within small geographical area. The performance is shown in fig. 11 and 12 24
  • 9. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET Figure 11 Graph for Average End-to-End delay Vs nodes Figure 12 Graph for Average End-to-End delay Vs nodes 5.3 Average Jitter Jitter, the variation of the packet arrival time, is an important metrics for any routing protocol. In this analysis it is found to vary. Initially it is low but for higher nodes ID than 12 it is high. The jitter for nodes 2,4,6,8 is high for both of the protocols due to larger distance between source and destination. In STAR it is due to limited no.of nodes as in FSR and DYMO, it is due to higher frequency of propagation. The jitter results are shown in fig. 13 and 14 Fig. 13 Average Jitter (s) Vs nodes 25
  • 10. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET Fig. 14 Graph for Average Jitter Vs nodes VI. CONCLUSION & FUTURE WORK The performance evaluation of two proactive routing strategies(FSR,STAR) and two reactive routing strategies (DSR, DYMO) for stationary nodes are evaluated by varying the node density (2,4,6,8,12) using Qualnet 5.0.2network simulator. From these graphs it can be realised that reactive routing protocol DSR only are suited for applications where average jitter and throughput are in danger situation and FSR are suited for Average end to end delay. The worst drawback [15] of the QualNet animator is its extreme high CPU utilization and its implementation in Java which makes it run very slowly on most machines. In this paper we leaves to researchers to enhance our mission to run scenarios not only these tools usage. However there is scope of examination over strategies for better tomorrow. One of our future research works is to develop an proposed algorithm on routing strategy can work in Bandwidth on demand working environment like banking sector, high secure communication, education system using high end tools. REFERENCES [1]. M.Uma, G.Padmavathi, ”A Comparative Study and Performance Evaluation of Reactive Quality of Service Routing Protocols in Mobile Advhoc networks”, Journal of Theoretical and Applied Information Technology, copyright 2005 – 2009. [2]. Parma Nand, S.C. Sharma, “Comparative study and Performance Analysis of FSR, ZRP and AODV Routing Protocols for MANET”, 2nd International Conference and workshop on Emerging Trends in Technology (ICWET) 2011 Proceedings published by International Journal of Computer Applications® (IJCA). [3]. Subramanya Bhat.M, et al.,“ A Performance Study of Proactive, Reactive and Hybrid Routing Protocols using Qualnet Simulator”, International Journal of Computer Applications (0975 – 8887) Volume 28– No.5, August 2011 [4]. Ravinder Ahuja, “Simulation based Performance Evaluation and Comparison of Reactive, Proactive and Hybrid Routing Protocols based on Random Waypoint Mobility Model”, International Journal of Computer Applications (0975 – 8887) Volume 7– No.11, October 2010. [5]. D. Johnson and D. Maltz. “Dynamic source routing in ad hoc wireless networks”, In T. Imielinski and H. Korth, editors, Mobile computing, chapter 5. Kluwer Academic, 1996. [6]. [6] G. Pei, M. Gerla, and T. W. Chen, “Fisheye State Routing in Mobile Ad Hoc Networks,” In Proceedings of the 2000 ICDCS workshops, Taipei, Taiwan, Apr. 2000. [7]. http://moment.cs.ucsb.edu/pub/draft-ietf-manet-dymo- 02.html [8]. Gergely Acs, Levente Buttyan and Istvan Vajda “ Provably Secure on-demand Source routing in Mobile Ad-Hoc Networks” Accepted for publication in the IEEE transactions on Mobile Computing, November 28, 2005 [9]. Josh Broch, David Johnson, and David Maltz. “The dynamic source routing protocol for mobile ad hoc networks for IPv4 IETF RFC 4728, Feb 2007. [10]. J.J. Garcia-Luna-Aceves, C. Marcelo Spohn, Source-tree routing in wireless networks, in: Proceedings of the Seventh Annual International Conference on Network Protocols Toronto, Canada, October 1999, p. 273. [11]. Parma Nand, S.C. Sharma, Rani Astya, “Traffic Load based Performance Analysis of DSR, STAR & AODV Ad hoc Routing Protocol”, International Journal of AdvancedComputer Science and Applications, vol 1 No 4, pp 58- 62,Oct 2010. [12]. Suresh Kumar, R K Rathy and Diwakar Pandey, ”Traffic pattern based performance comparison of two reactive routing protocols for ad hoc networks using NS2, © 2005-2009 IEEE. [13]. Qualnet Simulator www.scalable-networks.com [14]. Parma Nand, S.C. Sharma, “Performance study of Broadcast based Mobile Ad hoc Routing Protocols AODV, DSR and DYMO”, International Journal of Security and Its Applications, vol.5 No. 1, pp 53-64, January, 2011. [15]. ftp://ftp.tik.ee.ethz.ch/pub/publications/TIK-Report-255.pdf,page11 26
  • 11. CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET [16]. Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva, “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols”, Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas-Texas, October 1998. [17]. M. Scott Corson and Joseph Macker, “Mobile Adhoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”,RFC2501, Request for Comments, January 1999. [18]. Samir R. Das, Charles E. Perkins, and Elizabeth M.Royer, “Performance Comparison of Two On demand Routing Protocols for Ad Hoc Networks”, Proceedings of the IEEE Conference on Computer Communications INFOCOM), pages 3-12,Tel Aviv, Israel, March 2000. [19]. Satyabrata Chakrabarti and Amitabh Mishra, “QoS Issues in Ad Hoc Wireless Networks”, IEEE Communications Magazine, February 2001. [20]. Shigang Chen and Klara Nahrstedt, “Distributed Quality-of-Service Routing in Ad Hoc Networks”,IEEE Journal on Selected Areas in Communications,Vol. 17, No. 8, pp. 1488-1505, August 1999. [21]. Songwu Lu, Vaduvur Bharghavan and R. Srikant,“Fair Scheduling in Wireless Packet Networks”,IEEE/ACM Transactions on Networking, Vol. 7, No.4, August 1999. [22]. T.-W. Chen, J. T. Tsai and M. Gerla, “QoS RoutingPerformance in Multihop, Wireless Networks”, IEEE 6th ICUPC’97, October 1997. 27