SlideShare a Scribd company logo
1 of 5
Download to read offline
Performance Evaluation of Various Routing
Protocols with Geographic Greedy
Forwarding In Ad-Hoc Network
Chaman Singh*
, Sandeep Kumar*
, Jethu Singh*
, Vaishali Inagle**
, Rahul Desai**
* Final year students, Information Technology, Army Institute of Technology, Pune
** Asst Professor, Information Technology, Army Institute of Technology, Pune
Abstract –The wireless networks is most advanced
in the field of networking. Ad-hoc is the new era in
the field of networking. An Ad-hoc doesn’t required
support of any kind of fixed infrastructure or any
administration to handle out the work. They have
very limited range in which Ad-hoc work irrespective
of their geographical situation. Mainly the work in
two forms one is node as carrier and transmitter
which is very complex in any case. They are not
restricted to only one position the can move to other
location as time pass. In general is said to be wireless
Ad-hoc network. They are called peer-to–peer, and
self-constructing network. These are various
protocols such AODV, DSDV, AOMDV, DSR and
GREEDY are used in an ad hoc network. In this
paper different ad hoc routing protocols are compared
using different performance matrices such as
Percentage out of order Delivery, End to End delay,
Jitter, Throughput.
Keywords – MANET, AODV, DSDV, AOMDV,
GREEDY, DSR, PDR
1. Introduction
The wireless networking is most prominent now
a day’s which allow one particular person share
the data and the services which may be
regardless of their geographic position. Wireless
networking is classified in two types: one is
Infrastructured Networking and Infrastructure
less (Ad-hoc) Networking. Infrastructure
network is a networking which mainly is the
collection physical things that can be anything
like server or network components. They are
mainly bunch of things which are moveable
from one place to other place and they are only
things which can think intelligently.
Infrastructures less (Ad-hoc) networks are
generally created by Wi-Fi routers while ad-hoc
networks are usually short lived networks
created by a device. But it isn’t always so
simple. Mobile networking in which all nodes
can be connected dynamically in the arbitrary
fashion, their ranges are short, in this each node
acts as a router and transmits or forwards the
data. Ad-hoc mode is also known as “peer-to-
peer” mode. The Ad-hoc networks don’t require
an admin access point. Devices on the wireless
mode can connect to other in this mode
services[1,2].
Geographic Greedy Forwarding
Geographic greedy is one out of several types of
ad hoc routing protocols which are reactive,
proactive geographic stateless routing. The
geographic is the simple routing protocol to be
implemented on the NS2. NS2 is the network
simulator which is open source and used for
simulating various wired and wireless networks.
It has various factors to be used first one is that
no node in a network does not maintain any
routing table. That we are going to keep
neighbors list at the routing component but such
information is available at logical link layer.
Geographic greedy forwarding is one of the
most simple to implement and as efficient to
transmit the data. This is the reason why we are
using the greedy in networking. This makes it as
a most favorite selection in wireless routing. In
this destination of particular node is selected by
the forwarding the node through the selection of
each intermediate node in a completely full
filled distributed system. Then the packet has to
be forwarded to make a hop by hop with its
route.
Geographic greedy has to face some challenges
like holes are used to make sure that forwarding
process should be blocked. This type of node is
called stuck node. It can be caused by jamming,
power exhaustion and noise interference.
The geographic greedy forwarding protocol can
be implemented by five steps.
1) On receiving a packet from the upper most
layers, the source node adds a header including
the destination Identification and location.
2) Source nodes sends packet closer to their all
neighborhood which remain always close to
them.
3) After receiving packet from a neighborhood,
node forwards the packet if it has been already
exists. Then it became destination.
4) If there is no neighborhood closer than it is
called local minimum simply drops the packet.
5) When the packet is made through this entire
step it finally reaches its destination then the
geographic routing gets completed.
Fig 1: Greedy forwarding node
2. Installation and Compilation in NS2
The installation take place in LINUX operating
system the steps are -:
1) Unzip the ns-allinone-2.34.tar_1.gz file into
/usr/local/ns-allinone-2.34 folder.
2) Go to ns-ns-allinone-2.34 folder and use
command /install which will install all necessary
files and configures it automatically.
Then type /usr/local/ns-allinone-2.34/ns-2.34
directory inside terminal and type this.
#.configure
# .make clean
# .make
# .makes install
After completion of the installation part and
recompilation, then this NS file is created.
#ns [<file>][<args>]
3 Ad-hoc Routing Protocols for Wireless
Network
Ad Hoc On-Demand Distance Vector Routing
(AODV)
The AODV is active only when we want to
discover routes .It has similarity to Dynamic
Source Routing (DSR) which discovers route
when they are on demand by user. AODV has a
mechanism in which it maintains routing
information in the routing table in which only
one entry of packet is allowed for particular
destination. But in DSR it allows multi point
destination because of the cache which highly
store the routing information in table. They are
completely dependent on the routing table’s
entry for the destination. When packets has
source of information and route of destination
known to then first they will send Router
Request (RREQ) which means request then after
that route will Router Reply (RREP) to the
packet for transmission[3-5].
Dynamic Source Routing (DSR)
The DSR is advance form of AODV in which it
has the route cache. Route maintenance is
carried out whenever required. DSR is reactive
and it’s also to be known as bi-directional links.
These nodes are used to be self-maintained
without the need of administration. A hop which
provide next pass to packet which is passed
through source to get to the destination the
source must tell the address of destination after
this it pass the all route info to hop which is
nothing but gateway, switch between the source
to destination. Cache memory is used in DSR. It
has two operational mode one is “route
discovery” and second one is “route
maintenance” [3-5].
Ad-hoc On-demand Multiple Distance Vector
(AOMDV)
AOMDV is Ad-hoc multipath distance vector
which is an advance version on AODV. In this
all routers gives advertise to hop count to other,
because of its property of route discovery it
always try to find more and more multi paths
between source and destination. When the route
fails to deliver the packets it search for new
route to deliver that. Sudden routes are not
formed only new routes are formed when all
other not able to deliver the packet. This is the
one of the best efficient way to transfer of data.
Greedy Routing on Ad-hoc
Greedy routing is a position based routing is
routing principal that heavily rely on the base of
geographic position information. It can be used
in wireless networks because of its greedy
nature. This protocol always looks for shortest
and best path irrespective of the conscious. In
this routing protocol nodes are self-determine to
tell their current position and so that of the
source has the current information of
destination. In this, the packet which is carrying
the information of destination should not come
in contact with network topology or route
discovery.
4. Factors for Performance Evaluation in Ad-
Hoc network
Percentage out of order Delivery
In this the information which has to send to
destination the rate of dropped information by
the mean of external measure of connectionless
routing of particular node to transport layer
protocols such as TCP which prefer in-order
delivery.
Measure
d
50 Nodes
AODV DSR DSDV Greedy
No. of
packets
Send
447 488 469 493
No. of
packet
receive
440 485 287 490
Packet
delivery
ratio
98.45 99.37 61.23 99.49
Control
Overhea
d
40598 8698 1880 41723
Delay 1.1726 40665 0.33807 0.29792
6 6 1
Jitter 0.03195
6
0.0363
1
0.02533 0.04123
65
No .of
packets
dropped
3451 5 242 3
Table 1: Performance Analysis for No. of Nodes
50
End to End Delay
Simple term to express delay is average time or
actual time of a packet to reach its destination
with respective time given to it but delay caused
by various factor like search for route discovery
by router, data packet in queue wait of its turn to
get transmitted to final destination. The packet
which made through the queue is counted or gets
marked by the router. If the end to end delay is
lesser in any protocol the efficiency of data
packet delivery almost become high [5-7].
End To End delay = ∑ Arrival time- send time
∑ Number of connection
Throughput
In general the throughput is measured by the
productivity of a machine [6-7]. Total number of
packet send in a particular period of time,
basically we see check for the system
performance, efficiency, rate of transfer from
one node to another node at fixed time provided
to it. By simple mean we can say that throughput
is one of the main factor in the routing protocol
which give us idea of bit rate/time for packet .It
is measured in Kbps, Mbps, and Gbps.
Fig: 2 Throughput vs. Number of nodes
Jitter
Jitter is one of the factors in wireless networks
which make connection nervous all the time.
Due to the various delays in reaching of packets
in time, efficiency, congestion, hardware and
more in that list but main factor is from.
Sometime the jitter factor is high that packets
are out of reach this causes the drop in packets.
Fig 3: Jitter vs. Number of nodes
CONCLUSION
After evaluating all the factors of routing the
AODV, DSDV, DSR, AOMDV and GREEDY
on some cases like End to End delay,
Throughput, Jitter Greedy Routing Protocol
always has showed up advanced improvement
.The other Protocols may not directly affect data
routing Performance. The data traffic in the
greedy is compared to be less so that packet
deliveries always improving in many any case.
We see greedy always give better result in any
case. In many cases the power efficiency is more
likely get reduce as the data load or packet
transfer is more, for that we make sure that
routing protocols should have the power factor
remains always high.
REFERENCES
[1] C. Perkins and P. Bhagwat. Routing Over
Multi-hop Wireless Network of Mobile
Computers, 1994.
[2] K. Sivakumar, “Mobile Ad-Hoc Network
Routing Principle and Protocol Evaluation
Metrics” ISSN: 2229-4333 IJCST Vol. 2, Issue
4, Oct - Dec. 2011
[3] Rahul Desai, B P Patil, “Analysis of Routing
Protocols for Ad Hoc Networks” International
Conference Circuits, Systems, Communication
and Information technology Applications
CSCITA -2014, pp.111,115, 4-5 April 2014
DOI: 10.1109/CSCITA.2014.6839244
[4] Haseeb Zafar, Nancy Alhamahmy, David Harle
and Ivan Andonovic “Survey of Reactive and
Hybrid Routing Protocols for Mobile Ad Hoc
Networks” International Journal of
Communication Networks and Information
Security (IJCNIS) Vol. 3, No. 3, December
2011
[5] Rahul Desai, B P Patil, “Performance Analysis
of Ad Hoc Routing Protocols” 3rd
International
Conference on Recent Trends in Engineering
and technology (ICRTET 2014)
[6] Rahul Desai, B P Patil, “Survey of On Demand
Routing Protocols for Mobile Ad Hoc network.”
International Journal of IT, Engineering and
Applied Sciences Research (IJIEASR)
(www.irjcjournals.org) ISSN: 2319-4413,
Volume 1, No. 2, November 2012 ISBN No.:
978-93-5107-220-1, Date :28-30 March, 2014
© Elsevier Publication 2014
[7] D B Johnson, D A Maltz, Y. Hu and J G
Jetcheva. The Dynamic Source Routing
Protocol for Mobile Ad Hoc Networks (DSR)
http://www.ietf.org/internet-drafts/draft-ietf-
manet-dsr-07.txt , Feb 2002, IETF Internet
Draft.

More Related Content

What's hot

What's hot (20)

Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
A41040105
A41040105A41040105
A41040105
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
O26087092
O26087092O26087092
O26087092
 
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
 
Network layer
Network layerNetwork layer
Network layer
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
P01754110117
P01754110117P01754110117
P01754110117
 

Viewers also liked

3d printing technology
3d printing technology3d printing technology
3d printing technology
Prachi Agarwal
 

Viewers also liked (7)

3d printing weekly update - 10.26.15
3d printing weekly update - 10.26.153d printing weekly update - 10.26.15
3d printing weekly update - 10.26.15
 
3d printing technology
3d printing technology3d printing technology
3d printing technology
 
Frugal innovations: A “Necessary” Trend For The Future!
Frugal innovations: A “Necessary” Trend For The Future!Frugal innovations: A “Necessary” Trend For The Future!
Frugal innovations: A “Necessary” Trend For The Future!
 
3d printing technology
3d printing technology3d printing technology
3d printing technology
 
3D printer Technology _ A complete presentation
3D printer Technology _ A complete presentation3D printer Technology _ A complete presentation
3D printer Technology _ A complete presentation
 
3D Printing: Endless Opportunities
3D Printing: Endless Opportunities3D Printing: Endless Opportunities
3D Printing: Endless Opportunities
 
3D Printing
3D Printing3D Printing
3D Printing
 

Similar to new-Modified

Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 

Similar to new-Modified (20)

Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
G343741
G343741G343741
G343741
 
G343741
G343741G343741
G343741
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Aodv
AodvAodv
Aodv
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Br31467472
Br31467472Br31467472
Br31467472
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Network layer new
Network layer newNetwork layer new
Network layer new
 

new-Modified

  • 1. Performance Evaluation of Various Routing Protocols with Geographic Greedy Forwarding In Ad-Hoc Network Chaman Singh* , Sandeep Kumar* , Jethu Singh* , Vaishali Inagle** , Rahul Desai** * Final year students, Information Technology, Army Institute of Technology, Pune ** Asst Professor, Information Technology, Army Institute of Technology, Pune Abstract –The wireless networks is most advanced in the field of networking. Ad-hoc is the new era in the field of networking. An Ad-hoc doesn’t required support of any kind of fixed infrastructure or any administration to handle out the work. They have very limited range in which Ad-hoc work irrespective of their geographical situation. Mainly the work in two forms one is node as carrier and transmitter which is very complex in any case. They are not restricted to only one position the can move to other location as time pass. In general is said to be wireless Ad-hoc network. They are called peer-to–peer, and self-constructing network. These are various protocols such AODV, DSDV, AOMDV, DSR and GREEDY are used in an ad hoc network. In this paper different ad hoc routing protocols are compared using different performance matrices such as Percentage out of order Delivery, End to End delay, Jitter, Throughput. Keywords – MANET, AODV, DSDV, AOMDV, GREEDY, DSR, PDR 1. Introduction The wireless networking is most prominent now a day’s which allow one particular person share the data and the services which may be regardless of their geographic position. Wireless networking is classified in two types: one is Infrastructured Networking and Infrastructure less (Ad-hoc) Networking. Infrastructure network is a networking which mainly is the collection physical things that can be anything like server or network components. They are mainly bunch of things which are moveable from one place to other place and they are only things which can think intelligently. Infrastructures less (Ad-hoc) networks are generally created by Wi-Fi routers while ad-hoc networks are usually short lived networks created by a device. But it isn’t always so simple. Mobile networking in which all nodes can be connected dynamically in the arbitrary fashion, their ranges are short, in this each node acts as a router and transmits or forwards the data. Ad-hoc mode is also known as “peer-to- peer” mode. The Ad-hoc networks don’t require an admin access point. Devices on the wireless mode can connect to other in this mode services[1,2]. Geographic Greedy Forwarding Geographic greedy is one out of several types of ad hoc routing protocols which are reactive, proactive geographic stateless routing. The geographic is the simple routing protocol to be implemented on the NS2. NS2 is the network simulator which is open source and used for simulating various wired and wireless networks. It has various factors to be used first one is that no node in a network does not maintain any
  • 2. routing table. That we are going to keep neighbors list at the routing component but such information is available at logical link layer. Geographic greedy forwarding is one of the most simple to implement and as efficient to transmit the data. This is the reason why we are using the greedy in networking. This makes it as a most favorite selection in wireless routing. In this destination of particular node is selected by the forwarding the node through the selection of each intermediate node in a completely full filled distributed system. Then the packet has to be forwarded to make a hop by hop with its route. Geographic greedy has to face some challenges like holes are used to make sure that forwarding process should be blocked. This type of node is called stuck node. It can be caused by jamming, power exhaustion and noise interference. The geographic greedy forwarding protocol can be implemented by five steps. 1) On receiving a packet from the upper most layers, the source node adds a header including the destination Identification and location. 2) Source nodes sends packet closer to their all neighborhood which remain always close to them. 3) After receiving packet from a neighborhood, node forwards the packet if it has been already exists. Then it became destination. 4) If there is no neighborhood closer than it is called local minimum simply drops the packet. 5) When the packet is made through this entire step it finally reaches its destination then the geographic routing gets completed. Fig 1: Greedy forwarding node 2. Installation and Compilation in NS2 The installation take place in LINUX operating system the steps are -: 1) Unzip the ns-allinone-2.34.tar_1.gz file into /usr/local/ns-allinone-2.34 folder. 2) Go to ns-ns-allinone-2.34 folder and use command /install which will install all necessary files and configures it automatically. Then type /usr/local/ns-allinone-2.34/ns-2.34 directory inside terminal and type this. #.configure # .make clean # .make # .makes install After completion of the installation part and recompilation, then this NS file is created. #ns [<file>][<args>] 3 Ad-hoc Routing Protocols for Wireless Network Ad Hoc On-Demand Distance Vector Routing (AODV) The AODV is active only when we want to discover routes .It has similarity to Dynamic Source Routing (DSR) which discovers route when they are on demand by user. AODV has a
  • 3. mechanism in which it maintains routing information in the routing table in which only one entry of packet is allowed for particular destination. But in DSR it allows multi point destination because of the cache which highly store the routing information in table. They are completely dependent on the routing table’s entry for the destination. When packets has source of information and route of destination known to then first they will send Router Request (RREQ) which means request then after that route will Router Reply (RREP) to the packet for transmission[3-5]. Dynamic Source Routing (DSR) The DSR is advance form of AODV in which it has the route cache. Route maintenance is carried out whenever required. DSR is reactive and it’s also to be known as bi-directional links. These nodes are used to be self-maintained without the need of administration. A hop which provide next pass to packet which is passed through source to get to the destination the source must tell the address of destination after this it pass the all route info to hop which is nothing but gateway, switch between the source to destination. Cache memory is used in DSR. It has two operational mode one is “route discovery” and second one is “route maintenance” [3-5]. Ad-hoc On-demand Multiple Distance Vector (AOMDV) AOMDV is Ad-hoc multipath distance vector which is an advance version on AODV. In this all routers gives advertise to hop count to other, because of its property of route discovery it always try to find more and more multi paths between source and destination. When the route fails to deliver the packets it search for new route to deliver that. Sudden routes are not formed only new routes are formed when all other not able to deliver the packet. This is the one of the best efficient way to transfer of data. Greedy Routing on Ad-hoc Greedy routing is a position based routing is routing principal that heavily rely on the base of geographic position information. It can be used in wireless networks because of its greedy nature. This protocol always looks for shortest and best path irrespective of the conscious. In this routing protocol nodes are self-determine to tell their current position and so that of the source has the current information of destination. In this, the packet which is carrying the information of destination should not come in contact with network topology or route discovery. 4. Factors for Performance Evaluation in Ad- Hoc network Percentage out of order Delivery In this the information which has to send to destination the rate of dropped information by the mean of external measure of connectionless routing of particular node to transport layer protocols such as TCP which prefer in-order delivery. Measure d 50 Nodes AODV DSR DSDV Greedy No. of packets Send 447 488 469 493 No. of packet receive 440 485 287 490 Packet delivery ratio 98.45 99.37 61.23 99.49 Control Overhea d 40598 8698 1880 41723 Delay 1.1726 40665 0.33807 0.29792
  • 4. 6 6 1 Jitter 0.03195 6 0.0363 1 0.02533 0.04123 65 No .of packets dropped 3451 5 242 3 Table 1: Performance Analysis for No. of Nodes 50 End to End Delay Simple term to express delay is average time or actual time of a packet to reach its destination with respective time given to it but delay caused by various factor like search for route discovery by router, data packet in queue wait of its turn to get transmitted to final destination. The packet which made through the queue is counted or gets marked by the router. If the end to end delay is lesser in any protocol the efficiency of data packet delivery almost become high [5-7]. End To End delay = ∑ Arrival time- send time ∑ Number of connection Throughput In general the throughput is measured by the productivity of a machine [6-7]. Total number of packet send in a particular period of time, basically we see check for the system performance, efficiency, rate of transfer from one node to another node at fixed time provided to it. By simple mean we can say that throughput is one of the main factor in the routing protocol which give us idea of bit rate/time for packet .It is measured in Kbps, Mbps, and Gbps. Fig: 2 Throughput vs. Number of nodes Jitter Jitter is one of the factors in wireless networks which make connection nervous all the time. Due to the various delays in reaching of packets in time, efficiency, congestion, hardware and more in that list but main factor is from. Sometime the jitter factor is high that packets are out of reach this causes the drop in packets. Fig 3: Jitter vs. Number of nodes CONCLUSION After evaluating all the factors of routing the AODV, DSDV, DSR, AOMDV and GREEDY on some cases like End to End delay, Throughput, Jitter Greedy Routing Protocol always has showed up advanced improvement .The other Protocols may not directly affect data routing Performance. The data traffic in the
  • 5. greedy is compared to be less so that packet deliveries always improving in many any case. We see greedy always give better result in any case. In many cases the power efficiency is more likely get reduce as the data load or packet transfer is more, for that we make sure that routing protocols should have the power factor remains always high. REFERENCES [1] C. Perkins and P. Bhagwat. Routing Over Multi-hop Wireless Network of Mobile Computers, 1994. [2] K. Sivakumar, “Mobile Ad-Hoc Network Routing Principle and Protocol Evaluation Metrics” ISSN: 2229-4333 IJCST Vol. 2, Issue 4, Oct - Dec. 2011 [3] Rahul Desai, B P Patil, “Analysis of Routing Protocols for Ad Hoc Networks” International Conference Circuits, Systems, Communication and Information technology Applications CSCITA -2014, pp.111,115, 4-5 April 2014 DOI: 10.1109/CSCITA.2014.6839244 [4] Haseeb Zafar, Nancy Alhamahmy, David Harle and Ivan Andonovic “Survey of Reactive and Hybrid Routing Protocols for Mobile Ad Hoc Networks” International Journal of Communication Networks and Information Security (IJCNIS) Vol. 3, No. 3, December 2011 [5] Rahul Desai, B P Patil, “Performance Analysis of Ad Hoc Routing Protocols” 3rd International Conference on Recent Trends in Engineering and technology (ICRTET 2014) [6] Rahul Desai, B P Patil, “Survey of On Demand Routing Protocols for Mobile Ad Hoc network.” International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) (www.irjcjournals.org) ISSN: 2319-4413, Volume 1, No. 2, November 2012 ISBN No.: 978-93-5107-220-1, Date :28-30 March, 2014 © Elsevier Publication 2014 [7] D B Johnson, D A Maltz, Y. Hu and J G Jetcheva. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) http://www.ietf.org/internet-drafts/draft-ietf- manet-dsr-07.txt , Feb 2002, IETF Internet Draft.