SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Computer science and EngineeringResearch and Development (IJCSERD),
 International Journal of Computer Science Engineering Research
                                                                      IJCSERD
and Development(Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
 ISSN 2248- 9363 (IJCSERD), ISSN 2248 – 9363(Print)
ISSN 2248 – 9371(Online), Volume 3, Number 1
Jan- March (2013), pp: 23-29
© PRJ Publication, http://www.prjpublication.com/IJCSERD.asp          © PRJ PUBLICATION




   COMPARATIVE ANALYSIS OF MANET REACTIVE PROTOCOLS


                                     Nisha kumari,
                   CS Department, Manav Rachna College of Engineering
                                   Faridabad, Haryana

                                     Ritu Saluja
                           Associate Professor, Deptt of CS
                    Manav Rachna College of Engg, Faridabad, Haryana


ABSTRACT

An Ad-hoc network is a group of mobile nodes. In an ad-hoc network a mobile node can
directly communicate with the other node that lies in its transmission range or it can forward
its information to the other node that will act as an intermediate node and forwards the
information to the desired node using multi-hop links. In such a network there is no need of
any infrastructure. Ad-hoc networks routing protocols are classified into two categories:
Proactive/table-driven and reactive/on-demand. Reactive routing protocol is used whenever a
communication is requested. There are two types of reactive protocols: AODV (Ad hoc on-
demand distance vector protocol) and DSR (Dynamic source routing protocol). In one type of
scenario one protocol may perform best while another may perform worst, so there is a need
to determine an optimal one out of these in a more dynamic environment. The differences in
the working of these protocols lead to significant performance differentials for both of these
protocols.

Keywords: MANET, AODV, DSR, RREQ, RREP

INTRODUCTION

With the development in technologies there is a rapid increase in the use of devices like
mobile phones and computers. These devices provide access to network through wireless
interfaces. Ad-hoc networks are the wireless networks without any fixed infrastructure. An
Ad-hoc network is a collection of nodes that are mobile in nature therefore they are also
known as MANETS (mobile ad hoc networks).
      A MANET (mobile ad hoc network) is an independent collection of mobile users that
communicate with each other via wireless links that is through radio waves. In an ad-hoc
network a mobile node can directly communicate with the other node that lies in its

                                             23
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)

transmission range or it can forward its information to the other node that will act as an
intermediate node. The network is decentralized as all the network activities for example
discovering the topologies and delivering messages must be executed by the nodes
themselves. Therefore routing is necessary for the mobile nodes. Such type of networks can
be used in the environments where there is no infrastructure or setting of an infrastructure is
very expensive or the existing wired infrastructure has been destroyed by the natural calamity
,for example earthquakes, floods.

Characteristics of MANETS are:
   • Nodes can act like both hosts and routers (intermediate nodes).
   • Communication via radio waves.
   • Limited Bandwidth.
   • Less Security.
   • Dynamic network topology.

Applications of MANET are:
   • Emergency situations or disaster areas, where a hurricane or earthquake has destroyed
       the communication infrastructure.
   • Coverage area expansion of cellular networks.
   • Commercial and Industrial areas where associates can share information during a
       meeting and participants in a conference can exchange documents or presentations.
   • Inter-vehicle communication.
   • Sensor Networks represent a special kind of ad hoc networks that consist of nodes
       having sensing communication and processing abilities.

Properties of MANET Routing protocols are:
   • The routing protocols should be capable of using not only the bi-directional links but
       also the unidirectional links that will improve the performance of routing protocols.
   • The nodes in the ad-hoc network can be laptops or cell phones that are limited in
       battery power so it is very important that the routing protocol has support for sleep
       modes.
   • The protocol should be reactive in nature that the protocol should react only when
       needed and should not periodically broadcast information This minimize the control
       overhead in the network and prevent misuse of the network resources.
   • The protocol should be distributed that is it should not be dependent on any
       centralized controlling system. The nodes in an ad-hoc network are mobile in nature
       so they can enter or leave the network any time causing partitions.
   • The radio environment is especially vulnerable to attacks so some sort of security
       measures should be followed like Authentication and encryption.
   • The routes used for communication should be loop free. This avoids any misuse of
       bandwidth and improves the overall performance.
   • Multiple routes can be used to reduce the number of reactions to topological changes
       and congestion. If one route becomes invalid, it is possible that another route can be
       used.
   • The routing protocols should incorporate Quality of service that helps to find where
       these networks can be used for example for real time traffic support.

                                              24
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)

    II ROUTING PROTOCOLS
       Ad-hoc networks have routing protocols that can be classified into two categories:
Proactive/table-driven
Reactive/on-demand.




                               Fig 2: Type of Routing Protocols

A.     Proactive Protocol
     Proactive protocols are also known as table-driven protocols. These protocols always
maintain routes between every host that means there is a regular exchange of network
topology packets between the nodes of the network. So there is a minimal delay in
determining which route should to be taken. These protocols consume bandwidth to keep
routes up-to-date and also maintain routes which may never be used. The increased mobility
in the network causes traffic overhead. If the nodes transmit packets infrequently then the
routing information is considered redundant.
Proactive protocols are most suitable in the networks that have low node mobility and where
the nodes transmit data frequently. Examples of Proactive Protocols are: Optimized Link
State Routing (OLSR), Fish-eye State Routing (FSR), Destination-Sequenced Distance
Vector (DSDV), and Cluster-head Gateway Switch Routing Protocol (CGSR).

B.       Reactive Protocol
        Reactive routing protocols are also known as on-demand routing protocols as they are
used whenever a communication is requested. Firstly, Source node checks its route cache if
there is a route available from source to destination and if the route is not available then it
initiates route discovery process.

The reactive routing protocols perform two functions:

Route discovery: In this the source node initiates a route discovery process on demand basis.
A source node then sees its route cache for the available route and if the route from source to
destination is not present then it initiates a route discovery process. The packet includes the
destination address of the node as well as address of the intermediate nodes to the destination.
Route maintenance: Due to dynamic topology of the ad hoc networks, route failures
between the nodes are more frequent that arises due to link breakage between the nodes.
Route maintenance is done to avoid this problem by using an acknowledgement mechanism.
Examples of Reactive protocols are Dynamic Source Routing (DSR) and Ad-hoc on- demand
distance vector (AODV).




                                              25
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)

III.AD HOC ON-DEMAND DISTANCE VECTOR (AODV)
       Ad hoc On-Demand Distance Vector (AODV) routing is a reactive routing protocol for
mobile ad hoc networks. It is an on-demand and distance-vector routing protocol that is a
route is established by AODV from a destination only on demand. AODV routing protocol is
capable of both unicast and multicast routing. It keeps the routes in the routing table as long
as they are needed by the source nodes. AODV generates a tree or trees are composed of the
group members and the nodes that are needed to connect their members. AODV uses
destination sequence numbers to ensure the freshness of routes. Its operations are loop-free.
AODV can also scales to large numbers of mobile nodes.
Each mobile node in the network maintains a route table entry for each destination in its route
table.

   •   Number of hops (Hop count)
   •   Destination sequence number
   •   Destination IP address
   •   Active neighbors for this route
   •   Lifetime (Expiration time of the route)
   •   Next hop

When a node suppose S wants to communicate with another node suppose D, then it initiates
route discovery process by broadcasting a Route Request packet (RREQ) to its neighbors. If
the neighbor node has a route to the destination then it replies with a route reply packet,
otherwise it broadcast the route request packet to all its neighbors and some packets reach to
the destination D.
        When the Route Reply (RREP) is generated, it reaches back to the source node, based
on the reverse path. Each node along this path sets a forward pointer to the node and records
the latest destination sequence number.

The RREQ has the following fields:
   • Source address
   • Source sequence number used to maintain freshness info about the route to the source.
   • Destination address
   • Destination sequence number
   • Hop-count
   •
Route Request (RREQ) Message Format

                                                                Hop
                       Type J R G D U Reserved
                                                               Count
                                          RREQ ID
                                   Destination IP Address
                                Destination Sequence Number
                                     Source IP Address
                                  Source Sequence Number

                                              26
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)

The Route Request message includes the following fields:
Type        1

J              Join flag, reserved for multicast
R              Repair flag, reserved for multicast
G             Gratuitous RREP flag
D             Destination only flag, idicates that destination can respond to this RREQ.
U              Unknown sequence number indicates that destination sequence number is
               unknown.
Reserved       Sent as 0.
Hop Count      Number of hops from Source to the node handling the request.

A. Advantages and Disadvantages
      The main advantage of AODV protocol is that AODV established routes on demand
basis and uses destination sequence numbers to find the latest route to the destination. The
connection setup delay is also less in AODV. The HELLO messages used in AODV that
supports the routes maintenance are range-limited so they do not cause unnecessary overhead
in the network. AODV are well suited for large networks.
       A disadvantage of this protocol is that intermediate nodes can lead to inconsistent routes
if the sequence number is very old and the intermediate nodes have a higher but not the latest
destination sequence number. Multiple Route Reply messages in response to a single Route
Request packet can lead to heavy control overhead. The periodic HELLO message leads to
gratuitous bandwidth consumption.

IV       Dynamic Source Routing (DSR)
        Dynamic Source Routing (DSR) is also a reactive routing protocol for ad hoc networks.
It is similar to AODV as it establishes a route on-demand. It uses source routing instead of
relying on the routing table at each intermediate node. Dynamic source routing protocol is an
on-demand, source routing protocol, where all the routing information is maintained at
mobile nodes. Every node contains a route cache. Each entry in route cache specifies the
intermediate nodes to a destination. The route cache is used to respond to RREQs even if it is
not the destination. The route cache is always updated when it learns a new route. The entries
from the route cache are removed only when a node receives an RERR.
        DSR allows the network to be self-organizing and self-configuring without the need for
any existing infrastructure. The protocol is based on two main mechanisms: Route Discovery
and Route Maintenance.
        In Route discovery the source node floods the network with RREQ packets. The RREQ
contain the source and destination address and also the unique identity of the request. When a
node receives an RREQ and if it is the destination then it responds back with an RREP
containing the route from the source to the destination required, if not the node appends its
own address to the RREQ header and rebroadcasts the RREQ to all its neighbour nodes. But
a node that is not the destination receives the RREQ and contains a route to the destination
may send an RREP. Upon receiving the RREP packet the source node records the route
indicated in RREP in its route cache.
        A shortest path for the communication between a source node and destination node is
determined by Route Discovery process. Route Maintenance mechanism ensures that the



                                               27
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)

communication path remains loop-free according the change in network conditions. Route
Reply is generated only in the case if the message has reached the destination node.

A.     Advantages and Disadvantages
      DSR uses a reactive approach which eliminates the need to periodically flooding the
network with update messages which are required in a table-driven approach. The
intermediate node utilizes the route cache information efficiently to reduce the control
overhead. DSR has information of multiple routes.
     The disadvantage of DSR is that it is not suitable for large networks and the route
maintenance mechanism does not repair a broken link. The performance of DSR degrades
rapidly with increasing mobility. Routing overhead is involved due to the source-routing
mechanism used in DSR.

V.COMPARISON BETWEEN AODV AND DSR

                                           TABLE I

       Sr.     AODV                            DSR
       No.
       1.      It uses table-driven routing.   It uses source routing.

       2.      It delivers virtually      all It is very good at all mobility rates.
               packets at low mobility.

       3.                                      It has low end to end delay.

       4.      AODV uses one route per DSR uses routing cache aggressively,
               destination.            and maintains multiple routes per
                                       destination.

       5.      For real time traffic AODV
               is preferred.

       6.      It is more conservative as DSR does not have any explicit
               the fresher route is always mechanism to expire stale routes in the
               chosen.                     cache.
       7.      It outperforms DSR in more It outperforms AODV in less stressful
               stress situations (more load, situations (smaller # of nodes and
               higher mobility.              lower load and/or mobility).




                                               28
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)

CONCLUSION

      In this paper an effort has been made on the theoretical study of mobile ad hoc network
routing protocols. There are mainly two types of routing protocols: Proactive and Reactive
routing protocols. Various advantages and disadvantages of these protocols are also included
in this. There are various shortcomings in different routing protocols and it is very difficult to
choose a right routing protocol for a particular situation as there are tradeoffs between various
protocols.

ACKNOWLEDGMENT

   I WOULD LIKE TO THANK MRS. RITU SALUJA AND MANAV RACHNA COLLEGE OF ENGG. FOR
THEIR SUPPORT AND GUIDANCE

REFERENCES

[1]    S .Taneja, A.Kush, A.Makkar, “Experimental analysis of DSR and AODV using
       speed and pause time”, International Journal of Innovation, Management and
       Technology, Vol. 1, No. 5, December 2010.
[2]    C.E, E.M. Royer and S.R. Das, “Performance comparison of two on-demand routing
       protocols for Ad hoc networks”, IEEE Personal Communications Magazine, 8: 16-28,
       2001.
[3]    G.Kaur, “Performance Analysis of AODV routing protocol in Manets”,
       International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.08
       August 2012.
[4]    T.Singh, S.Dua, V.Das, “Energy-Efficient Routing Protocols In Mobile Ad-Hoc
       Networks”, International Journal of Advanced Research in Computer Science and
       Software Engineering, Volume 2, Issue 1, January 2012.
[5]    D.Maltz, J.Broch, J.Jetcheva, D.Johnson. The effects of on-demand behavior in
       routing protocols for multihop wireless ad hoc networks IEEE Journal on Selected
       Areas in Communication, 1999
[6]    Poonam Thakur, M.Vijaya Raju, “survey on routing techniques for Manets and
       Wireless sensor networks: a comparison” international journal of computer
       engineering & technology (ijcet) Volume 4, Issue 1, January -February2013.
[7]    Sunita Kushwaha, Bhavna Narain, Deepti Verma, Sanjay kumar, “effect of scenario
       environment on the performance of Manets routing protocol: aodv” international
       journal of computer engineering & technology (ijcet) Volume 2, Issue 1, January-
       April 2011.
[8]    Shah Vrutik, Dr.Nilesh Modi, Patani Ashwin, “aodvgap-an acknowledgment based
       approach to mitigate selective forwarding attacks in Manet” international journal of
       computer engineering& technology (ijcet) Volume 3, Issue 2, July-September
       2010.




                                               29

Weitere ähnliche Inhalte

Was ist angesagt?

QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET Journal
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 

Was ist angesagt? (18)

J0935461
J0935461J0935461
J0935461
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
A0110104
A0110104A0110104
A0110104
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
A340105
A340105A340105
A340105
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 

Andere mochten auch

3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyprjpublications
 
5 a study of bacteriological contamination of
5 a study of bacteriological contamination of5 a study of bacteriological contamination of
5 a study of bacteriological contamination ofprjpublications
 
Strategies of women entrepreneurs in economic development
Strategies of women entrepreneurs in economic developmentStrategies of women entrepreneurs in economic development
Strategies of women entrepreneurs in economic developmentprjpublications
 
01 a study on the reference service in college libraries
01 a study on the reference service in college libraries01 a study on the reference service in college libraries
01 a study on the reference service in college librariesprjpublications
 
Customer preference and consumption of various
Customer preference and consumption of variousCustomer preference and consumption of various
Customer preference and consumption of variousprjpublications
 
Dualfrequency oshaped 3 way bagley power divider based on tlt
Dualfrequency oshaped 3 way bagley power divider based on tltDualfrequency oshaped 3 way bagley power divider based on tlt
Dualfrequency oshaped 3 way bagley power divider based on tltprjpublications
 
Construction industry in kuwait – an analysis on e procurement-2
Construction industry in kuwait – an analysis on e procurement-2Construction industry in kuwait – an analysis on e procurement-2
Construction industry in kuwait – an analysis on e procurement-2prjpublications
 
An appraisal on small firms corporate culture
An appraisal on small firms corporate cultureAn appraisal on small firms corporate culture
An appraisal on small firms corporate cultureprjpublications
 

Andere mochten auch (10)

Work life balance 2
Work life balance 2Work life balance 2
Work life balance 2
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
5 a study of bacteriological contamination of
5 a study of bacteriological contamination of5 a study of bacteriological contamination of
5 a study of bacteriological contamination of
 
2 prayla
2 prayla2 prayla
2 prayla
 
Strategies of women entrepreneurs in economic development
Strategies of women entrepreneurs in economic developmentStrategies of women entrepreneurs in economic development
Strategies of women entrepreneurs in economic development
 
01 a study on the reference service in college libraries
01 a study on the reference service in college libraries01 a study on the reference service in college libraries
01 a study on the reference service in college libraries
 
Customer preference and consumption of various
Customer preference and consumption of variousCustomer preference and consumption of various
Customer preference and consumption of various
 
Dualfrequency oshaped 3 way bagley power divider based on tlt
Dualfrequency oshaped 3 way bagley power divider based on tltDualfrequency oshaped 3 way bagley power divider based on tlt
Dualfrequency oshaped 3 way bagley power divider based on tlt
 
Construction industry in kuwait – an analysis on e procurement-2
Construction industry in kuwait – an analysis on e procurement-2Construction industry in kuwait – an analysis on e procurement-2
Construction industry in kuwait – an analysis on e procurement-2
 
An appraisal on small firms corporate culture
An appraisal on small firms corporate cultureAn appraisal on small firms corporate culture
An appraisal on small firms corporate culture
 

Ähnlich wie Comparative analysis of manet reactive protocols

Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsprj_publication
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingeSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
A Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSA Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSSabrina Ball
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfLaurie Smith
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 

Ähnlich wie Comparative analysis of manet reactive protocols (20)

Comparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocolsComparative analysis of manet reactive protocols
Comparative analysis of manet reactive protocols
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
A Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSA Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETS
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
Aodv
AodvAodv
Aodv
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 

Mehr von prjpublications

Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementprjpublications
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...prjpublications
 
An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...prjpublications
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...prjpublications
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsprjpublications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...prjpublications
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageprjpublications
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...prjpublications
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality modelprjpublications
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...prjpublications
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...prjpublications
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood managementprjpublications
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumersprjpublications
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...prjpublications
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...prjpublications
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...prjpublications
 

Mehr von prjpublications (20)

Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurement
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality model
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood management
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...
 

Kürzlich hochgeladen

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Kürzlich hochgeladen (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Comparative analysis of manet reactive protocols

  • 1. International Journal of Computer science and EngineeringResearch and Development (IJCSERD), International Journal of Computer Science Engineering Research IJCSERD and Development(Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) ISSN 2248- 9363 (IJCSERD), ISSN 2248 – 9363(Print) ISSN 2248 – 9371(Online), Volume 3, Number 1 Jan- March (2013), pp: 23-29 © PRJ Publication, http://www.prjpublication.com/IJCSERD.asp © PRJ PUBLICATION COMPARATIVE ANALYSIS OF MANET REACTIVE PROTOCOLS Nisha kumari, CS Department, Manav Rachna College of Engineering Faridabad, Haryana Ritu Saluja Associate Professor, Deptt of CS Manav Rachna College of Engg, Faridabad, Haryana ABSTRACT An Ad-hoc network is a group of mobile nodes. In an ad-hoc network a mobile node can directly communicate with the other node that lies in its transmission range or it can forward its information to the other node that will act as an intermediate node and forwards the information to the desired node using multi-hop links. In such a network there is no need of any infrastructure. Ad-hoc networks routing protocols are classified into two categories: Proactive/table-driven and reactive/on-demand. Reactive routing protocol is used whenever a communication is requested. There are two types of reactive protocols: AODV (Ad hoc on- demand distance vector protocol) and DSR (Dynamic source routing protocol). In one type of scenario one protocol may perform best while another may perform worst, so there is a need to determine an optimal one out of these in a more dynamic environment. The differences in the working of these protocols lead to significant performance differentials for both of these protocols. Keywords: MANET, AODV, DSR, RREQ, RREP INTRODUCTION With the development in technologies there is a rapid increase in the use of devices like mobile phones and computers. These devices provide access to network through wireless interfaces. Ad-hoc networks are the wireless networks without any fixed infrastructure. An Ad-hoc network is a collection of nodes that are mobile in nature therefore they are also known as MANETS (mobile ad hoc networks). A MANET (mobile ad hoc network) is an independent collection of mobile users that communicate with each other via wireless links that is through radio waves. In an ad-hoc network a mobile node can directly communicate with the other node that lies in its 23
  • 2. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) transmission range or it can forward its information to the other node that will act as an intermediate node. The network is decentralized as all the network activities for example discovering the topologies and delivering messages must be executed by the nodes themselves. Therefore routing is necessary for the mobile nodes. Such type of networks can be used in the environments where there is no infrastructure or setting of an infrastructure is very expensive or the existing wired infrastructure has been destroyed by the natural calamity ,for example earthquakes, floods. Characteristics of MANETS are: • Nodes can act like both hosts and routers (intermediate nodes). • Communication via radio waves. • Limited Bandwidth. • Less Security. • Dynamic network topology. Applications of MANET are: • Emergency situations or disaster areas, where a hurricane or earthquake has destroyed the communication infrastructure. • Coverage area expansion of cellular networks. • Commercial and Industrial areas where associates can share information during a meeting and participants in a conference can exchange documents or presentations. • Inter-vehicle communication. • Sensor Networks represent a special kind of ad hoc networks that consist of nodes having sensing communication and processing abilities. Properties of MANET Routing protocols are: • The routing protocols should be capable of using not only the bi-directional links but also the unidirectional links that will improve the performance of routing protocols. • The nodes in the ad-hoc network can be laptops or cell phones that are limited in battery power so it is very important that the routing protocol has support for sleep modes. • The protocol should be reactive in nature that the protocol should react only when needed and should not periodically broadcast information This minimize the control overhead in the network and prevent misuse of the network resources. • The protocol should be distributed that is it should not be dependent on any centralized controlling system. The nodes in an ad-hoc network are mobile in nature so they can enter or leave the network any time causing partitions. • The radio environment is especially vulnerable to attacks so some sort of security measures should be followed like Authentication and encryption. • The routes used for communication should be loop free. This avoids any misuse of bandwidth and improves the overall performance. • Multiple routes can be used to reduce the number of reactions to topological changes and congestion. If one route becomes invalid, it is possible that another route can be used. • The routing protocols should incorporate Quality of service that helps to find where these networks can be used for example for real time traffic support. 24
  • 3. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) II ROUTING PROTOCOLS Ad-hoc networks have routing protocols that can be classified into two categories: Proactive/table-driven Reactive/on-demand. Fig 2: Type of Routing Protocols A. Proactive Protocol Proactive protocols are also known as table-driven protocols. These protocols always maintain routes between every host that means there is a regular exchange of network topology packets between the nodes of the network. So there is a minimal delay in determining which route should to be taken. These protocols consume bandwidth to keep routes up-to-date and also maintain routes which may never be used. The increased mobility in the network causes traffic overhead. If the nodes transmit packets infrequently then the routing information is considered redundant. Proactive protocols are most suitable in the networks that have low node mobility and where the nodes transmit data frequently. Examples of Proactive Protocols are: Optimized Link State Routing (OLSR), Fish-eye State Routing (FSR), Destination-Sequenced Distance Vector (DSDV), and Cluster-head Gateway Switch Routing Protocol (CGSR). B. Reactive Protocol Reactive routing protocols are also known as on-demand routing protocols as they are used whenever a communication is requested. Firstly, Source node checks its route cache if there is a route available from source to destination and if the route is not available then it initiates route discovery process. The reactive routing protocols perform two functions: Route discovery: In this the source node initiates a route discovery process on demand basis. A source node then sees its route cache for the available route and if the route from source to destination is not present then it initiates a route discovery process. The packet includes the destination address of the node as well as address of the intermediate nodes to the destination. Route maintenance: Due to dynamic topology of the ad hoc networks, route failures between the nodes are more frequent that arises due to link breakage between the nodes. Route maintenance is done to avoid this problem by using an acknowledgement mechanism. Examples of Reactive protocols are Dynamic Source Routing (DSR) and Ad-hoc on- demand distance vector (AODV). 25
  • 4. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) III.AD HOC ON-DEMAND DISTANCE VECTOR (AODV) Ad hoc On-Demand Distance Vector (AODV) routing is a reactive routing protocol for mobile ad hoc networks. It is an on-demand and distance-vector routing protocol that is a route is established by AODV from a destination only on demand. AODV routing protocol is capable of both unicast and multicast routing. It keeps the routes in the routing table as long as they are needed by the source nodes. AODV generates a tree or trees are composed of the group members and the nodes that are needed to connect their members. AODV uses destination sequence numbers to ensure the freshness of routes. Its operations are loop-free. AODV can also scales to large numbers of mobile nodes. Each mobile node in the network maintains a route table entry for each destination in its route table. • Number of hops (Hop count) • Destination sequence number • Destination IP address • Active neighbors for this route • Lifetime (Expiration time of the route) • Next hop When a node suppose S wants to communicate with another node suppose D, then it initiates route discovery process by broadcasting a Route Request packet (RREQ) to its neighbors. If the neighbor node has a route to the destination then it replies with a route reply packet, otherwise it broadcast the route request packet to all its neighbors and some packets reach to the destination D. When the Route Reply (RREP) is generated, it reaches back to the source node, based on the reverse path. Each node along this path sets a forward pointer to the node and records the latest destination sequence number. The RREQ has the following fields: • Source address • Source sequence number used to maintain freshness info about the route to the source. • Destination address • Destination sequence number • Hop-count • Route Request (RREQ) Message Format Hop Type J R G D U Reserved Count RREQ ID Destination IP Address Destination Sequence Number Source IP Address Source Sequence Number 26
  • 5. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) The Route Request message includes the following fields: Type 1 J Join flag, reserved for multicast R Repair flag, reserved for multicast G Gratuitous RREP flag D Destination only flag, idicates that destination can respond to this RREQ. U Unknown sequence number indicates that destination sequence number is unknown. Reserved Sent as 0. Hop Count Number of hops from Source to the node handling the request. A. Advantages and Disadvantages The main advantage of AODV protocol is that AODV established routes on demand basis and uses destination sequence numbers to find the latest route to the destination. The connection setup delay is also less in AODV. The HELLO messages used in AODV that supports the routes maintenance are range-limited so they do not cause unnecessary overhead in the network. AODV are well suited for large networks. A disadvantage of this protocol is that intermediate nodes can lead to inconsistent routes if the sequence number is very old and the intermediate nodes have a higher but not the latest destination sequence number. Multiple Route Reply messages in response to a single Route Request packet can lead to heavy control overhead. The periodic HELLO message leads to gratuitous bandwidth consumption. IV Dynamic Source Routing (DSR) Dynamic Source Routing (DSR) is also a reactive routing protocol for ad hoc networks. It is similar to AODV as it establishes a route on-demand. It uses source routing instead of relying on the routing table at each intermediate node. Dynamic source routing protocol is an on-demand, source routing protocol, where all the routing information is maintained at mobile nodes. Every node contains a route cache. Each entry in route cache specifies the intermediate nodes to a destination. The route cache is used to respond to RREQs even if it is not the destination. The route cache is always updated when it learns a new route. The entries from the route cache are removed only when a node receives an RERR. DSR allows the network to be self-organizing and self-configuring without the need for any existing infrastructure. The protocol is based on two main mechanisms: Route Discovery and Route Maintenance. In Route discovery the source node floods the network with RREQ packets. The RREQ contain the source and destination address and also the unique identity of the request. When a node receives an RREQ and if it is the destination then it responds back with an RREP containing the route from the source to the destination required, if not the node appends its own address to the RREQ header and rebroadcasts the RREQ to all its neighbour nodes. But a node that is not the destination receives the RREQ and contains a route to the destination may send an RREP. Upon receiving the RREP packet the source node records the route indicated in RREP in its route cache. A shortest path for the communication between a source node and destination node is determined by Route Discovery process. Route Maintenance mechanism ensures that the 27
  • 6. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) communication path remains loop-free according the change in network conditions. Route Reply is generated only in the case if the message has reached the destination node. A. Advantages and Disadvantages DSR uses a reactive approach which eliminates the need to periodically flooding the network with update messages which are required in a table-driven approach. The intermediate node utilizes the route cache information efficiently to reduce the control overhead. DSR has information of multiple routes. The disadvantage of DSR is that it is not suitable for large networks and the route maintenance mechanism does not repair a broken link. The performance of DSR degrades rapidly with increasing mobility. Routing overhead is involved due to the source-routing mechanism used in DSR. V.COMPARISON BETWEEN AODV AND DSR TABLE I Sr. AODV DSR No. 1. It uses table-driven routing. It uses source routing. 2. It delivers virtually all It is very good at all mobility rates. packets at low mobility. 3. It has low end to end delay. 4. AODV uses one route per DSR uses routing cache aggressively, destination. and maintains multiple routes per destination. 5. For real time traffic AODV is preferred. 6. It is more conservative as DSR does not have any explicit the fresher route is always mechanism to expire stale routes in the chosen. cache. 7. It outperforms DSR in more It outperforms AODV in less stressful stress situations (more load, situations (smaller # of nodes and higher mobility. lower load and/or mobility). 28
  • 7. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) CONCLUSION In this paper an effort has been made on the theoretical study of mobile ad hoc network routing protocols. There are mainly two types of routing protocols: Proactive and Reactive routing protocols. Various advantages and disadvantages of these protocols are also included in this. There are various shortcomings in different routing protocols and it is very difficult to choose a right routing protocol for a particular situation as there are tradeoffs between various protocols. ACKNOWLEDGMENT I WOULD LIKE TO THANK MRS. RITU SALUJA AND MANAV RACHNA COLLEGE OF ENGG. FOR THEIR SUPPORT AND GUIDANCE REFERENCES [1] S .Taneja, A.Kush, A.Makkar, “Experimental analysis of DSR and AODV using speed and pause time”, International Journal of Innovation, Management and Technology, Vol. 1, No. 5, December 2010. [2] C.E, E.M. Royer and S.R. Das, “Performance comparison of two on-demand routing protocols for Ad hoc networks”, IEEE Personal Communications Magazine, 8: 16-28, 2001. [3] G.Kaur, “Performance Analysis of AODV routing protocol in Manets”, International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.08 August 2012. [4] T.Singh, S.Dua, V.Das, “Energy-Efficient Routing Protocols In Mobile Ad-Hoc Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012. [5] D.Maltz, J.Broch, J.Jetcheva, D.Johnson. The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks IEEE Journal on Selected Areas in Communication, 1999 [6] Poonam Thakur, M.Vijaya Raju, “survey on routing techniques for Manets and Wireless sensor networks: a comparison” international journal of computer engineering & technology (ijcet) Volume 4, Issue 1, January -February2013. [7] Sunita Kushwaha, Bhavna Narain, Deepti Verma, Sanjay kumar, “effect of scenario environment on the performance of Manets routing protocol: aodv” international journal of computer engineering & technology (ijcet) Volume 2, Issue 1, January- April 2011. [8] Shah Vrutik, Dr.Nilesh Modi, Patani Ashwin, “aodvgap-an acknowledgment based approach to mitigate selective forwarding attacks in Manet” international journal of computer engineering& technology (ijcet) Volume 3, Issue 2, July-September 2010. 29