SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1746
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc
Environment
Deepak Gupta1
S. S. Dhakad2
Umesh Barahdiya3
Manoj Jakheniya4
Bharat Raj Pandey5
1, 5
Research Student 2, 3, 4
Assistant Professor
1, 2, 3, 4, 5
NITM, Gwalior
Abstract—In Wireless Adhoc Network is a group of
wireless mobile nodes is an autonomous system of mobile
nodes connected by wireless links. Every node operates as
an end system and as a router to forward packets. In this
paper mainly focused on Mac layer because this layer is
most important for the data communication using control the
packet loss and we worked on the comparison based
performance of wimax802.16 and wireless802.11 networks
using Ad hoc on- demand Distance Vector Routing Protocol
and Dynamic Source Routing Protocol. In this paper we
used the different maximum speed for the network. And this
comparison based on unicast On-demand routing procedure
and our simulation for mobile ad hoc networks discover and
maintain only needed the design and follows the idea that
each node by sending routing packets whenever a
communication is requested and compared various
parameter packet delivery ratio, normalized routing load and
e-e delay. These simulations are carried out using the
Network simulator version-2. The results presented in this
work illustrate the importance in carefully evaluating and
implementing routing protocols in an ad hoc environment.
Key words: AODV, DSR, 802.11, 802.16, Adhoc
Environment, NS-2.31.
I. INTRODUCTION
Wireless communication between mobile users is becoming
more popular than ever before. This is due to recent
technological advances in laptop computers and wireless
data communication devices, like wireless LANs. This leads
to lower prices and higher data rates; these are two main
reasons why mobile computing continues to enjoy rapid
growth.
There are two distinct approaches for enabling
wireless communication between two hosts. First approach
is the existing cellular network infrastructures carry data as
carried as voice. The major problems include the problem of
handoff that tries to control the situation when a connection
should be smoothly handed over from one base station to
another base station without packet loss or noticeable delay.
Another problem is that networks based on the cellular
infrastructure are limited to places where there exists such a
cellular network infrastructure.
The second approach is to form an Ad hoc network
among all users wanting to communicate with each other.
This means that all users participating in the Ad hoc
network must be willing to forward data packets to make
sure that the packets are delivered from source to
destination. This form of networking is limited in range by
the individual nodes transmission ranges and is typically
smaller compared to the range of cellular systems [1, 4].
Ad-hoc networking is a concept in computer
communications, which means that user’s wants to
communicate with each other form a temporary based
network, without any form of centralized administration.
Each node participating in the network can acts both as host
and a router with willingness to forward packets for other
nodes. For this purpose, a routing protocol is needed [6]. In
this work Demand Distance Vector Routing have in used. A
simulation model feature based on MAC and physical layer
models is used to study interlayer interactions, their
performance and implications. The performance
differentials are analyzed using varying, mobility, network
size and network load [2]. These simulations are carried out
using the network simulator version 2, which is used to run
Ad hoc simulations. The results presented in this work
illustrate the importance in carefully evaluating and
implementing routing protocols when evaluating an Ad hoc
network protocol.
Wireless communication between mobile users is
becoming more popular than ever before. This is due to
recent technological advances in laptop computers and
wireless data communication devices, like wireless LANs
and wireless modems. This has led to higher data rates and
lower prices, which are the two main reasons why mobile
computing continues to enjoy rapid growth.
Unconstrained connectivity Ad hoc networks do
not rely on any pre established infrastructure and can
therefore be deployed in places with no infrastructure. This
is useful in disaster recovery situations and places with non-
existing or damaged communication infrastructure where
rapid deployment of a communication network is needed
[8]. Ad hoc networks can also be useful on conferences
where people participating in the conference can form a
temporary network without engaging the services of any pre
existing network. The WiMAX Forum is an industry body
formed to promote the IEEE 802.16 standard and perform
interoperability testing. The WiMAX Forum has adopted
certain profiles based on the 802.16 standards for
interoperability testing and “WiMAX certification” [2].
These operate in different frequency bands, which are
typically licensed by various government bodies. WiMAX,
is basically based on an RF technology called Orthogonal
Frequency Division Multiplexing (OFDM), which is a very
effective means of transferring data when carriers of width
of 5MHz or greater. Below 5MHz carrier width, current
CDMA based 3G systems are comparable to OFDM in
terms of performance.
WiMAX is a standard-based wireless technology
that provides high throughput broadband connections over
long distance. WiMAX could be used for a number of
applications, including “last mile” hotspots, broadband
connections and high-speed connectivity for commercial
purpose. It provides wireless metropolitan area network
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment
(IJSRD/Vol. 1/Issue 9/2013/0013)
All rights reserved by www.ijsrd.com 1747
(MAN) connectivity at speeds up to 70 Mbps and the
WiMAX base station on the average can cover between 5 to
10 km [1].
II. AODV
The Ad hoc On Demand Distance Vector (AODV) routing
protocol builds on the DSDV algorithm previously
described. AODV is an improvement on DSDV because it
typically minimizes the number of required broadcasts by
creating routes on a demand basis, opposed to maintain a
complete list of routes as in the DSDV algorithm [3].
AODV classified as a pure on-demand route acquisition
system, cause nodes that aren’t on a selected path do not
maintain routing information or participate in routing table
exchanges.
When a source node desires to send a message to
some destination node and does not already have a valid
route to that destination, it initiates a path discovery process
to locate the other node [9]. It broadcasts a route request
(RREQ) packet to its neighbors, which then forward the
request to neighbors, and so on, until either the destination
or an intermediate node with a fresh enough routes to the
destination is located. AODV used destination sequence
numbers to ensure all routes are loop free and contain the
most recent route information detail. Each node maintains
sequence number and broadcast ID. The broadcast ID is
incremented for the every RREQ the node initiates, and
together with node’s IP address, identifies an RREQ. Along
with its own sequence number and the broadcast ID, source
node includes the RREQ the most recent sequence number it
has for destination. Intermediate nodes reply to the RREQ
only if they have a route to the destination whose
corresponding destination sequence number is greater than
or equal to that contained in the RREQ [5, 7].
During the process of forwarding the RREQ,
intermediate nodes record in their route tables the address of
the neighbor from which the first copy of the broadcast
packet is received, i.e. establishing a reverse path. If
additional copies of the same RREQ are later received, these
packets are discarded [1, 4].
Once the RREQ reaches the destination or an
intermediate node with a fresh enough route, destination
intermediate node responds by unicasting a route reply
(RREP) packet back to the neighbor from which it first
received the RREQ. As the RREP is routed back along the
reverse path, nodes along with this path, set up forward
route entries in their route tables which point to the node
from which the RREP came. These forward route entries
indicate the active forward route [3]. With each route entry
is a route timer that will cause the deletion of the entry if it
is not used within the defined lifetime. Because RREP is
forwarded along the path established by the RREQ, AODV
only supports the use of symmetric links. If a source node
changes the position, it is able to reinitiate the route
discovery protocol to find a new route to the destination. If a
node along with the route moves, its upstream neighbor
notices the move and propagates a link failure message (an
RREP with infinite metric) to each of its active upstream
neighbors to inform them of the erasure of that part of the
route. These nodes propagate the link failure notification
message to their upstream neighbors, and continue the
process until the source node is reached. The source node
then choose to reinitiate route discovery for that destination
if a route is still desired [1, 2, 5]
An additional aspect of the protocol is the use of
hello messages, periodically broadcasts by a node to inform
each mobile node of other nodes in its neighborhood. Hello
messages can be used to maintain the local connectivity of a
node. Sometimes the use of hello messages is not required.
Nodes listen for retransmission of data packets to ensure that
the next hop is still within reach. If such a retransmission is
not heard, the node may be used available of another
technique, including the hello messages, to find out whether
the next hop is within communication range. The hello
messages may list the other nodes from which a mobile has
heard, thereby yielding greater knowledge of network
connectivity [4, 8].
III. DSR
DSR is a reactive routing protocol that is determines the
proper route only when packet needs to be forwarded. For
restricting the bandwidth, process to find a path is only
executed when a path is required by a node (On-Demand
Routing). In DSR the sender (source, initiator) determines
the whole path from the source to the destination node
(Source-Routing) and deposits the addresses of the
intermediate nodes of the route in the packets. DSR is
beacon-less which means that there are no hello-messages
used between the nodes to notify their neighbors about their
presence. DSR was developed for mobile Ad-hoc networks
with a small diameter between 5 and 10 hops and the nodes
should only move around at a moderate speed. DSR is based
on Link-State Algorithms which mean that each node is
capable to save the best way to a destination. Also when a
change appears in network topology, then the whole
network will get this information by flooding. DSR protocol
is composed the two main mechanisms that work together to
allow discovery and maintenance of source routes in
MANET [8, 9].
IV. SIMULATION
The simulations were performed using Network Simulator 2
(NS-2.31). Constant bit rate (CBR) traffic was used in
simulation. Simulation was done by varying Max speed
from 20, 25, 30, 35 and 40. The pause time was kept
constant at 1.0sec in a simulation and area of 400mX700m.
During the simulation, each node started its journey from a
random spot to a random chosen destination. Once the
destination was reached, the node took a rest period of time
in second and another random destination is chosen after
that pause time. This process was repeated throughout
simulation, due to continuous changes in the topology of the
underlying network. The following table gives the
simulation parameters used during the simulation [2].
V. SIMULATION PARAMETERS
Parameter Values
Routing protocol AODV,DSR
Simulator NS-2.31
MAC Protocol 802.11 & 802.16
No. of Mobile Nodes 60
Simulation Time 100 Seconds
Packet Size 512 byte
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment
(IJSRD/Vol. 1/Issue 9/2013/0013)
All rights reserved by www.ijsrd.com 1748
Traffic Sources CBR
Transmit Power 250 w
Network Area 400m X 700m
Maximum Connection 30
Max Speed 20m/s
Transmission Rate 2.0m/s
Table. 1: Parameters and their results
VI. PERFORMANCE METRICS
The main objective of this paper is comparing the
performance of MAC 802.11(wireless) and MAC 802.16
(WiMAX) using on demand routing strategy following
metrics.
A. Packet Delivery Fraction
The ratio of the data packets delivered to the destinations to
those generated by the CBR sources is known as packet
delivery fraction [3].
B. Routing overhead
It gives the total number of routing packets transmitted
during the simulation. It is the ratio of routing packets to the
total no. of packets generated by the source [3].
C. End-to-End Delay
Network delay is the total latency experienced by a packet
to traverse the network from the source to the destination. At
the network layer, the end-to-end packet latency is the sum
of propagation delay, processing delay, queuing delay and
packet, transmission delay. The end-to-end delay of a path is
the sum of the node delay at each node plus the link delay at
each link on the path [5].
D. Packet loss (%)
Packet loss is the failure of one or more transmitted packets
to arrive at their destination [5].
Fig. 1: Graph of PDR using On Demand Uncast Reactive
Routing Protocol
Fig. 2: Graph of PDR using On DSR Protocol
Fig 2-shows that the packet delivery ratio for MAC layer
control 802.11 and 802.16 using on DSR. The value of PDF
have better for 802.11.
Fig. 3: Network Load for MAC layer control 802.11 and
802.16 using AODV
Fig. 4: NRL for MAC layer control 802.11 and 802.16 using
DSR.
20 25 30 35 40
802.16 65.19 58.32 75.26 62.2 55.73
802.11 97.38 97.12 97.5 98.11 94.41
0
20
40
60
80
100
120
PDF
Maximum speed
PDF with varying maximum speed
802.16 802.11
20 25 30 35 40
802.16 68.29 61.81 62.02 51.59 38.98
802.11 98.68 98.18 98.36 98.57 98.03
0
20
40
60
80
100
120
PDF
Maximum speed
PDF with varying maximum speed
802.16 802.11
20 25 30 35 40
802.16 0.95 1.08 0.83 1.03 1.21
802.11 2.86 2.75 2.78 2.65 4.09
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
NRL
Maximum speed
NRL with varying maximum speed
802.16 802.11
20 25 30 35 40
802.16 0.34 0.43 0.25 0.57 0.59
802.11 1.1 0.89 0.99 1.17 1.49
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
NRL
Maximum speed
NRL with varying maximum speed
802.16 802.11
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment
(IJSRD/Vol. 1/Issue 9/2013/0013)
All rights reserved by www.ijsrd.com 1749
Fig. 5: E-E delay for MAC layer control 802.11 and 802.16
using AODV
Fig. 6: E-E delay for MAC layer control 802.11 and 802.16
using DSR
VII. CONCLUSION
In this paper we performed the simulation to compare the
performance of MAC 802.11 and MAC 802.16 using on-
demand AODV and DSR routing protocols on different
performance parameters i.e. packet delivery ratio, network
load and end to end delay with varying maximum speed.
The results show that the performance of wireless is better
than WiMAX for small area. The overall performance
802.11 AODV is better than 802.11DSR.
REFERENCES
[1] Charles Perkins, Elizabeth Royer “Ad hoc on demand
distance vector (AODV) routing,” WMCSA 2nd
IEEE
Workshop, ISBN: 0-7695-0025-0, pp. 90–100, 1999.
[2] Suresh Kumar, R K Rathy, DiwakarPandey, “Traffic
Pattern Based Performance Comparison of Two
Reactive Routing Protocols for Ad Hoc Networks
Using NS2,” ICCSIT 2nd IEEE International
Conference, pp. 369-373, 2009.
[3] Ms. Shilpa Jindal, Ms. Alka Jindal, Dr. (Mrs.) Neena
Gupta, “Grouping WI-MAX, 3G and Wi-Fi for
Wireless Broadband,” Internet First IEEE and IFIP
International Conference, 2005.
[4] Lioyi, Kai Miao, A. Liu, “A comparative study of
WiMAX and LTE as the next generation mobile
enterprise network,” ICACT 13th International
Conference, ISBN: 978-1-4244-8830-8, pp. 654-658,
2011.
[5] Naveen Bilandi, Harsh K Verma, “Comparative
Analysis of Reactive, Proactive and Hybrid Routing
Protocols in MANET,” IJECSE, Vol-1 Issue-3, ISSN:
2277-1956, pp. 1660-1667, 2009.
[6] RambirJoon, Sandeep and Manveen Singh Chadha,
“Analysis of WIMAX Handover,” IJSCE, Vol-2 Issue-
3, ISSN: 2231-2307, 2012.
[7] Telvis E. Calhoun Jr, Xiaojun Cao, Yingshu Li and
Raheem Beyah, “An 802.11 MAC layer covert
channel,” Wireless. Commun. And Mob. Computing,
Vol-12 Issue-5, pp. 393-405, 2012.
[8] Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma,
“Performance Analysis of MANET Routing Protocols
in different Mobility Models,” IJITCS, Vol-5 No-6, pp.
73-82, 2013.
[9] Harris Simaremare, RiriFitri Sari, “Performance
Evaluation of AODV variants on DDOS, Blackhole and
Malicious Attacks,” IJCSNS, Vol-11 No-6, pp. 277-
287, 2011.
20 25 30 35 40
802.16 0.11 0.09 0.09 0.11 0.11
802.11 58.2 117.54 54.67 106.46 180.93
0
20
40
60
80
100
120
140
160
180
200
E-EDelay
Maximum speed
E-E Delay with varying maximum speed
802.16 802.11
20 25 30 35 40
802.16 0.25 0.28 0.26 0.31 0.38
802.11 34.95 37.58 103.03 48.59 108.78
0
20
40
60
80
100
120
E-EDelay
Maximum speed
E-E Delay with varying maximum speed
802.16 802.11

Weitere ähnliche Inhalte

Was ist angesagt?

Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorialtritv
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 

Was ist angesagt? (19)

Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
A02100108
A02100108A02100108
A02100108
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
E010322531
E010322531E010322531
E010322531
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorial
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 

Ähnlich wie Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment

A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Ähnlich wie Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment (20)

J011137479
J011137479J011137479
J011137479
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1073644
E1073644E1073644
E1073644
 

Mehr von ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

Mehr von ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Kürzlich hochgeladen

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1746 Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment Deepak Gupta1 S. S. Dhakad2 Umesh Barahdiya3 Manoj Jakheniya4 Bharat Raj Pandey5 1, 5 Research Student 2, 3, 4 Assistant Professor 1, 2, 3, 4, 5 NITM, Gwalior Abstract—In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment. Key words: AODV, DSR, 802.11, 802.16, Adhoc Environment, NS-2.31. I. INTRODUCTION Wireless communication between mobile users is becoming more popular than ever before. This is due to recent technological advances in laptop computers and wireless data communication devices, like wireless LANs. This leads to lower prices and higher data rates; these are two main reasons why mobile computing continues to enjoy rapid growth. There are two distinct approaches for enabling wireless communication between two hosts. First approach is the existing cellular network infrastructures carry data as carried as voice. The major problems include the problem of handoff that tries to control the situation when a connection should be smoothly handed over from one base station to another base station without packet loss or noticeable delay. Another problem is that networks based on the cellular infrastructure are limited to places where there exists such a cellular network infrastructure. The second approach is to form an Ad hoc network among all users wanting to communicate with each other. This means that all users participating in the Ad hoc network must be willing to forward data packets to make sure that the packets are delivered from source to destination. This form of networking is limited in range by the individual nodes transmission ranges and is typically smaller compared to the range of cellular systems [1, 4]. Ad-hoc networking is a concept in computer communications, which means that user’s wants to communicate with each other form a temporary based network, without any form of centralized administration. Each node participating in the network can acts both as host and a router with willingness to forward packets for other nodes. For this purpose, a routing protocol is needed [6]. In this work Demand Distance Vector Routing have in used. A simulation model feature based on MAC and physical layer models is used to study interlayer interactions, their performance and implications. The performance differentials are analyzed using varying, mobility, network size and network load [2]. These simulations are carried out using the network simulator version 2, which is used to run Ad hoc simulations. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols when evaluating an Ad hoc network protocol. Wireless communication between mobile users is becoming more popular than ever before. This is due to recent technological advances in laptop computers and wireless data communication devices, like wireless LANs and wireless modems. This has led to higher data rates and lower prices, which are the two main reasons why mobile computing continues to enjoy rapid growth. Unconstrained connectivity Ad hoc networks do not rely on any pre established infrastructure and can therefore be deployed in places with no infrastructure. This is useful in disaster recovery situations and places with non- existing or damaged communication infrastructure where rapid deployment of a communication network is needed [8]. Ad hoc networks can also be useful on conferences where people participating in the conference can form a temporary network without engaging the services of any pre existing network. The WiMAX Forum is an industry body formed to promote the IEEE 802.16 standard and perform interoperability testing. The WiMAX Forum has adopted certain profiles based on the 802.16 standards for interoperability testing and “WiMAX certification” [2]. These operate in different frequency bands, which are typically licensed by various government bodies. WiMAX, is basically based on an RF technology called Orthogonal Frequency Division Multiplexing (OFDM), which is a very effective means of transferring data when carriers of width of 5MHz or greater. Below 5MHz carrier width, current CDMA based 3G systems are comparable to OFDM in terms of performance. WiMAX is a standard-based wireless technology that provides high throughput broadband connections over long distance. WiMAX could be used for a number of applications, including “last mile” hotspots, broadband connections and high-speed connectivity for commercial purpose. It provides wireless metropolitan area network
  • 2. Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment (IJSRD/Vol. 1/Issue 9/2013/0013) All rights reserved by www.ijsrd.com 1747 (MAN) connectivity at speeds up to 70 Mbps and the WiMAX base station on the average can cover between 5 to 10 km [1]. II. AODV The Ad hoc On Demand Distance Vector (AODV) routing protocol builds on the DSDV algorithm previously described. AODV is an improvement on DSDV because it typically minimizes the number of required broadcasts by creating routes on a demand basis, opposed to maintain a complete list of routes as in the DSDV algorithm [3]. AODV classified as a pure on-demand route acquisition system, cause nodes that aren’t on a selected path do not maintain routing information or participate in routing table exchanges. When a source node desires to send a message to some destination node and does not already have a valid route to that destination, it initiates a path discovery process to locate the other node [9]. It broadcasts a route request (RREQ) packet to its neighbors, which then forward the request to neighbors, and so on, until either the destination or an intermediate node with a fresh enough routes to the destination is located. AODV used destination sequence numbers to ensure all routes are loop free and contain the most recent route information detail. Each node maintains sequence number and broadcast ID. The broadcast ID is incremented for the every RREQ the node initiates, and together with node’s IP address, identifies an RREQ. Along with its own sequence number and the broadcast ID, source node includes the RREQ the most recent sequence number it has for destination. Intermediate nodes reply to the RREQ only if they have a route to the destination whose corresponding destination sequence number is greater than or equal to that contained in the RREQ [5, 7]. During the process of forwarding the RREQ, intermediate nodes record in their route tables the address of the neighbor from which the first copy of the broadcast packet is received, i.e. establishing a reverse path. If additional copies of the same RREQ are later received, these packets are discarded [1, 4]. Once the RREQ reaches the destination or an intermediate node with a fresh enough route, destination intermediate node responds by unicasting a route reply (RREP) packet back to the neighbor from which it first received the RREQ. As the RREP is routed back along the reverse path, nodes along with this path, set up forward route entries in their route tables which point to the node from which the RREP came. These forward route entries indicate the active forward route [3]. With each route entry is a route timer that will cause the deletion of the entry if it is not used within the defined lifetime. Because RREP is forwarded along the path established by the RREQ, AODV only supports the use of symmetric links. If a source node changes the position, it is able to reinitiate the route discovery protocol to find a new route to the destination. If a node along with the route moves, its upstream neighbor notices the move and propagates a link failure message (an RREP with infinite metric) to each of its active upstream neighbors to inform them of the erasure of that part of the route. These nodes propagate the link failure notification message to their upstream neighbors, and continue the process until the source node is reached. The source node then choose to reinitiate route discovery for that destination if a route is still desired [1, 2, 5] An additional aspect of the protocol is the use of hello messages, periodically broadcasts by a node to inform each mobile node of other nodes in its neighborhood. Hello messages can be used to maintain the local connectivity of a node. Sometimes the use of hello messages is not required. Nodes listen for retransmission of data packets to ensure that the next hop is still within reach. If such a retransmission is not heard, the node may be used available of another technique, including the hello messages, to find out whether the next hop is within communication range. The hello messages may list the other nodes from which a mobile has heard, thereby yielding greater knowledge of network connectivity [4, 8]. III. DSR DSR is a reactive routing protocol that is determines the proper route only when packet needs to be forwarded. For restricting the bandwidth, process to find a path is only executed when a path is required by a node (On-Demand Routing). In DSR the sender (source, initiator) determines the whole path from the source to the destination node (Source-Routing) and deposits the addresses of the intermediate nodes of the route in the packets. DSR is beacon-less which means that there are no hello-messages used between the nodes to notify their neighbors about their presence. DSR was developed for mobile Ad-hoc networks with a small diameter between 5 and 10 hops and the nodes should only move around at a moderate speed. DSR is based on Link-State Algorithms which mean that each node is capable to save the best way to a destination. Also when a change appears in network topology, then the whole network will get this information by flooding. DSR protocol is composed the two main mechanisms that work together to allow discovery and maintenance of source routes in MANET [8, 9]. IV. SIMULATION The simulations were performed using Network Simulator 2 (NS-2.31). Constant bit rate (CBR) traffic was used in simulation. Simulation was done by varying Max speed from 20, 25, 30, 35 and 40. The pause time was kept constant at 1.0sec in a simulation and area of 400mX700m. During the simulation, each node started its journey from a random spot to a random chosen destination. Once the destination was reached, the node took a rest period of time in second and another random destination is chosen after that pause time. This process was repeated throughout simulation, due to continuous changes in the topology of the underlying network. The following table gives the simulation parameters used during the simulation [2]. V. SIMULATION PARAMETERS Parameter Values Routing protocol AODV,DSR Simulator NS-2.31 MAC Protocol 802.11 & 802.16 No. of Mobile Nodes 60 Simulation Time 100 Seconds Packet Size 512 byte
  • 3. Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment (IJSRD/Vol. 1/Issue 9/2013/0013) All rights reserved by www.ijsrd.com 1748 Traffic Sources CBR Transmit Power 250 w Network Area 400m X 700m Maximum Connection 30 Max Speed 20m/s Transmission Rate 2.0m/s Table. 1: Parameters and their results VI. PERFORMANCE METRICS The main objective of this paper is comparing the performance of MAC 802.11(wireless) and MAC 802.16 (WiMAX) using on demand routing strategy following metrics. A. Packet Delivery Fraction The ratio of the data packets delivered to the destinations to those generated by the CBR sources is known as packet delivery fraction [3]. B. Routing overhead It gives the total number of routing packets transmitted during the simulation. It is the ratio of routing packets to the total no. of packets generated by the source [3]. C. End-to-End Delay Network delay is the total latency experienced by a packet to traverse the network from the source to the destination. At the network layer, the end-to-end packet latency is the sum of propagation delay, processing delay, queuing delay and packet, transmission delay. The end-to-end delay of a path is the sum of the node delay at each node plus the link delay at each link on the path [5]. D. Packet loss (%) Packet loss is the failure of one or more transmitted packets to arrive at their destination [5]. Fig. 1: Graph of PDR using On Demand Uncast Reactive Routing Protocol Fig. 2: Graph of PDR using On DSR Protocol Fig 2-shows that the packet delivery ratio for MAC layer control 802.11 and 802.16 using on DSR. The value of PDF have better for 802.11. Fig. 3: Network Load for MAC layer control 802.11 and 802.16 using AODV Fig. 4: NRL for MAC layer control 802.11 and 802.16 using DSR. 20 25 30 35 40 802.16 65.19 58.32 75.26 62.2 55.73 802.11 97.38 97.12 97.5 98.11 94.41 0 20 40 60 80 100 120 PDF Maximum speed PDF with varying maximum speed 802.16 802.11 20 25 30 35 40 802.16 68.29 61.81 62.02 51.59 38.98 802.11 98.68 98.18 98.36 98.57 98.03 0 20 40 60 80 100 120 PDF Maximum speed PDF with varying maximum speed 802.16 802.11 20 25 30 35 40 802.16 0.95 1.08 0.83 1.03 1.21 802.11 2.86 2.75 2.78 2.65 4.09 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 NRL Maximum speed NRL with varying maximum speed 802.16 802.11 20 25 30 35 40 802.16 0.34 0.43 0.25 0.57 0.59 802.11 1.1 0.89 0.99 1.17 1.49 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 NRL Maximum speed NRL with varying maximum speed 802.16 802.11
  • 4. Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment (IJSRD/Vol. 1/Issue 9/2013/0013) All rights reserved by www.ijsrd.com 1749 Fig. 5: E-E delay for MAC layer control 802.11 and 802.16 using AODV Fig. 6: E-E delay for MAC layer control 802.11 and 802.16 using DSR VII. CONCLUSION In this paper we performed the simulation to compare the performance of MAC 802.11 and MAC 802.16 using on- demand AODV and DSR routing protocols on different performance parameters i.e. packet delivery ratio, network load and end to end delay with varying maximum speed. The results show that the performance of wireless is better than WiMAX for small area. The overall performance 802.11 AODV is better than 802.11DSR. REFERENCES [1] Charles Perkins, Elizabeth Royer “Ad hoc on demand distance vector (AODV) routing,” WMCSA 2nd IEEE Workshop, ISBN: 0-7695-0025-0, pp. 90–100, 1999. [2] Suresh Kumar, R K Rathy, DiwakarPandey, “Traffic Pattern Based Performance Comparison of Two Reactive Routing Protocols for Ad Hoc Networks Using NS2,” ICCSIT 2nd IEEE International Conference, pp. 369-373, 2009. [3] Ms. Shilpa Jindal, Ms. Alka Jindal, Dr. (Mrs.) Neena Gupta, “Grouping WI-MAX, 3G and Wi-Fi for Wireless Broadband,” Internet First IEEE and IFIP International Conference, 2005. [4] Lioyi, Kai Miao, A. Liu, “A comparative study of WiMAX and LTE as the next generation mobile enterprise network,” ICACT 13th International Conference, ISBN: 978-1-4244-8830-8, pp. 654-658, 2011. [5] Naveen Bilandi, Harsh K Verma, “Comparative Analysis of Reactive, Proactive and Hybrid Routing Protocols in MANET,” IJECSE, Vol-1 Issue-3, ISSN: 2277-1956, pp. 1660-1667, 2009. [6] RambirJoon, Sandeep and Manveen Singh Chadha, “Analysis of WIMAX Handover,” IJSCE, Vol-2 Issue- 3, ISSN: 2231-2307, 2012. [7] Telvis E. Calhoun Jr, Xiaojun Cao, Yingshu Li and Raheem Beyah, “An 802.11 MAC layer covert channel,” Wireless. Commun. And Mob. Computing, Vol-12 Issue-5, pp. 393-405, 2012. [8] Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma, “Performance Analysis of MANET Routing Protocols in different Mobility Models,” IJITCS, Vol-5 No-6, pp. 73-82, 2013. [9] Harris Simaremare, RiriFitri Sari, “Performance Evaluation of AODV variants on DDOS, Blackhole and Malicious Attacks,” IJCSNS, Vol-11 No-6, pp. 277- 287, 2011. 20 25 30 35 40 802.16 0.11 0.09 0.09 0.11 0.11 802.11 58.2 117.54 54.67 106.46 180.93 0 20 40 60 80 100 120 140 160 180 200 E-EDelay Maximum speed E-E Delay with varying maximum speed 802.16 802.11 20 25 30 35 40 802.16 0.25 0.28 0.26 0.31 0.38 802.11 34.95 37.58 103.03 48.59 108.78 0 20 40 60 80 100 120 E-EDelay Maximum speed E-E Delay with varying maximum speed 802.16 802.11