SlideShare a Scribd company logo
1 of 8
Download to read offline
Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 64 | P a g e
A Simulated Behavioral Study of DSR Routing Protocol Using
NS-2
Ali El-Desoky*,Amany Sarhan**, Reham Arnous***
*Department of computers and system engineering, Faculty of Engineering, Mansoura University, Egypt
** Department of Computer and system engineering, Faculty of Engineering, Tanta University.
**Department of computers and system engineering, Faculty of Engineering, Mansoura University, Egypt
Abstract
Mobile ad hoc network (MANETS) consists of wireless nodes communicating without any centralized
administration .thus each node acts as a host and a router. There are many routing protocols designed for
MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed
specifically for use in multi-hop wireless mobile nodes. This paper describes the design the implementation of
DSR protocol in NS-2 simulator environment. We also analyze the performance of the DSR for various
performance matrixes such as average end to- end delay, throughput and packet delivery ratio. The analysis was
made for different number of nodes using the NS-2 simulator.
Keywords – MANETs, DSR, routing protocol, performance evaluation, NS-2
I. Introduction
Wireless networks are emerging new technology
where there is no physical wired connection between
sender and receiver, but rather the network is
connected by radio waves and/or microwaves to
maintain communications. Wireless networks are
rapidly evolving, and is playing an increasing role in
the lives of people throughout the world as they
provide connection flexibility between users in
different places. Wireless networks are classified into
two categories; Infrastructure networks and Ad Hoc
networks. In Infrastructure networks devices are
connected using a central device, namely a wireless
access point. An access point (AP) represents a
central coordinator for all nodes. AP acts as a master
with all the other stations associating to it. All
communications pass through the AP. A wireless ad
hoc network is a decentralized type of wireless
network. Ad hoc networks do not rely on a
preexisting infrastructure or any centralized access
points. Mobile ad hoc networks (MANETs) are self-
organized and self-configuring infrastructurless
networks of mobile devices communicating through
wireless links. In MANETs the nodes which are in
the transmission range of each other communicate
directly, otherwise communication is done through
intermediate nodes which forward packets; hence the
node acts as a router and a node, these networks are
also called as multi-hop networks [1, 2]. Routing in
MANETs is considered a challenging task due to the
mobility of nodes and limited bandwidth and energy.
There are several types of routing protocol developed
for efficient routing in MANETs [3]. Theycan be
categorized into two different approaches; position-
based routing and topology-based routing [4-
7].Position-based or geographic routing approaches
rely on knowing the nodes’ physical location
information. Thus, it is necessary for nodes to obtain
their coordinates either by using a location service
such as GPS or other types of positioning services. In
Topology-based routing protocols the paths are
maintained and routes are established based on the
information about the links that exist in the network.
These protocols can be further divided into proactive
(table driven), reactive (on demand) and hybrid
approaches.
Table-driven (proactive) routing protocol:
Proactive protocols discover routes and maintain
them in routing tables, each node maintains up-to-
date routing table containing a list of all the
destinations, next hop, number of hops to each
destination. Hello packets are exchanged periodically
in order to inform nodes about changes in the
topology. Destination sequenced distance vector
(DSDV), wireless routing protocol (WRP) and global
state routing (GSR) are examples of proactive routing
protocols.
On demand (Reactive) routing protocol: The main
idea in reactive routing (on-demand routing) is to
find and maintain routes 'only when there is needs
(on demand) which by turn minimize routing
overhead but it may result in initial delays until the
routes are set up. There are different types of on
demand routing protocols such as Ad hoc On
Demand Distance Vector (AODV), Dynamic Source
routing protocol (DSR), temporally ordered routing
RESEARCH ARTICLE OPEN ACCESS
Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 65 | P a g e
algorithm (TORA), Ad-hoc On-demand Multipath
Distance Vector Routing (AOMDV). Our discussion
is limited to DSR protocol.
Hybrid routing protocols area combination of both
reactive and proactive approaches. Zone routing
protocol (ZRP) is an example [8-11].
II. DSR protocol description
The DSR is a pure reactive routing protocol
based on the concept of source routing. it employs
route discovery and route maintenance procedures
working together in a way that that can enable nodes
to discover and maintain routes to arbitrary
destinations in thenetwork [12-15]. Each node
maintains its route cache which is kept in the memory
to save the discovered route for future use. The node
updates entries in the route cache when it learns
about new routes.The original DSR keeps multiple
routes to a destination ordered by hop count. It
selects a route having the minimal number of hops
between the available routes. DSR uses the route
selection based on the shortest path algorithm; it
selects a route having the minimal number of hops
between the available routes. When a source node
wants to send a data packet to destination node, it
first checks its route cache for a route to the desired
destination; If a route is found the node uses it to
send the packet. The route is inserted in the packet
header and then the packet is forwarded to its
destination through this route. In case there is no
route to the desired destination in the node's route
cache, it applies a route discovery process by
broadcasting a route request packet (RREQ) to all its
neighbors. The source node appends source ID,
destination ID and a unique request ID to it. The
packet also contains a route record listing the address
of each intermediate node it passes through. The
source route initializes this record as an empty list.
When an intermediate node receives a RREQ packet
it appends its id to the RREQ packet’s route- record
then it rebroadcasts the RREQ again, unless it is the
destination node, or it has a route to the intended
destination in its cache. When initiating a Route
Discovery, the sending node saves the original packet
in a local buffer called the Send Buffer. Each packet
in the Send Buffer is stamped with the time that it
was placed into the Buffer the packet is saved in the
send buffer until a route found or it reaches time out
period. The packet is discarded in case of timeout.
Timeout period is necessary for preventing the Send
Buffer from overflowing. When the route request
reaches either the destination itself or a node that has
a route to the destination, a route reply (RREP) is
generated. The RREP is then sent back (through the
reverse path found in the route record of RREQ) to
the source node. The source node then appends this
path to the original packet saved in the send buffer
and forwards it to destination through it. It also
updates its route cache with this new learned route
[16-20]. For route maintenance procedure; DSR uses
two types of packets; route error packets and
acknowledgment. When a node detects a
transmission problem on forwarding a packet, it
generates a route error packet while acknowledgment
packets are used to confirm the correct operation of
the route links [21-25].
III. DSR implementation in NS-2
simulator
NS-2 is a an object oriented ,open source
network simulation tool which can be used by
researchers working on wired or wireless networks as
it supplies numerous models and source codes of
routing protocols. There are two programming
languages used in NS-2 otcl and C++ language. C++
is used for detailed protocol implementation where
otcl language is used to write script files (simulation
script) where users describe the model to be
simulated then NS-2 interpret the script and output
the simulation process and result to an output file
(trace file). The simulation process and result can be
shown by Nam and Xgraph files [26, 27]. There are
two main types of NS-2 agents routing agents and
transport layer agents. A routing agent creates,
transmits and receives control packets and routing
protocol commands to act accordingly, where as
Connecting an application to a low level network, a
transport layer agent controls the congestion and
reliability of a data flow based on an underling
transport layer protocol .NS-2 implements agents in
C++ [28, 29]. The DSR routing protocol is
implemented in NS-2as Agent (DSR Agent). This
section analyses the DSR source code in NS-2. The
chart in figure 1 shows the basic functions of the
DSR agent. When a DSR agent receives a packet it
first arrives at recv method (basic function) which
first checks the packet header to see if it has a valid
source route (srh) then calls different functions to
handle the packet as shown in flow chart described in
figure 1. If no source route found in packet header
and it is not a broadcast packet, it will be handled
through the method named handlePktWithoutSR
which is described later in the flow chart shown in fig
2. If there is a valid source route then the packet is
handled through methods handlePacketReceipt
described in figure 3. If the current node is the
destination (P.dest= net_id) else it is handled either
through the method handleRouteRequest (described
in flowchart shown in figure 4) if it is a RREQ
packet, or through handleForwarding method if it is
not a RREQ packet.
IV. Simulation
In this paper the DSR is analyzed using the NS-2
simulator. Three performance metrics are used to
evaluate the performance Average End-To-End
Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 66 | P a g e
Delay, Throughput, and packet delivery ratio for
various numbers of nodes considering TCP as the
transport protocol and FTP as the traffic generator.
4.1. Simulation tool and parameter
The simulations tool used is NS-2. Before starting the
simulation a tcl script is created that describes the
simulated model which defines the network topology
composed of nodes, routers, links, and shared media.
Otcl language is used to write the script file.Table 1
shows a part of the tcl script containing the tcl coding
which specify the simulation parameters.
Table 1 tcl code for simulation setup parameters
Set val(chan) channel /wireless channel ;# channel type
Set val(prop) propagation /two rayground ;# radio-propagation model
Set val(netif) phy/wirelessphy ;# network interface type
Set val(mac) mac802_11 ;# mac type
Set val(ifq) cmupriqueue
Set val(ll) ll
Set val(ant) AntenaomniAntena
Set val(ifqlen) 50 ;# max packet in ifq
Set val(nn) 120 ;# number of mobile nodes
Set val(rp) dsr ;# routing protocol
Set val(x) 500
Set val(y) 400
Set val(stop) 150 ;# time of simulation end
4.2. Simulation analysis and Performance metrics
After running the tcl script at the end of each simulation, a NAM trace file and a tr file which is a trace file will
be created by NS-2 automatically. NAM trace file is used as an input to network animator (NAM) which is used
to graphically visualize the simulator while the trace file is used for simulations analysis. AWK Scripts are used
for processing the data from the output (trace files). The performance of the simulation is evaluated according to
the following performance metrics.
Average end to end delay: Average End-to-End delay is the average time it takes a data packet to reach the
destination. Low average end-to end delay indicating good performance. it is calculated using awk script
(delay.awk) which processes the trace file and produces the result.Table3 represents the average end-to-end
delay for all packets received for (20,30,40,50,60,70,80,90,100,110,120,130,140,150) nodes.
Table 2. Average End-to-End Delay of DSR at different numbers of nodes.
No of nodes 20 30 40 50 60 70 80 90 100 110 120 130 140
Delay (ms) 199.470 191.878
179.74
7
199.38
5
205.325
147.31
7
148.67
3
223.39
9
179.04
3
176.976
209.56
9
171.9
02
210.424
DSR end to end delay decreases with increase the number of nodes till 80 nodes. So DSR protocol good for
nodes less than 80. Increasing number of nodes Increases the number of hops in routes and in its turn increases
the time it take the packet to reach the destination.
Throughput: The throughput is defined as the total amount of received data packets divided by the simulation
time. The throughput is measured in bits per second (bps). Table3 represents the throughput for different
numbers of nodes.
Table3. Throughput at different numbers of nodes
Number of
nodes
20 30 40 50 60 70 80 90 100 110 120 130 140
Throughput
(kbps)
521.3
3
536.6
6
542.38
541.6
4
522.0
2
577.3
8
558.77 521.43 520.64 556.38
522.9
2
557.45 532.46
DSR throughput increases with increase the number of nodes till 80 nodes. With the increase of number of
nodes than 80 the throughput decreases. This may result due to the increase of routing overhead by increasing
the number of nodes.
Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 67 | P a g e
Packet Delivery Ratio: Packet delivery ratio is the ratio of number of packets received at the destination to the
number of packets sent from the source. The performance is better when packet delivery ratio is high .The
reason for having better packet delivery ratio of DSR is that allow packets to stay in the send buffer until a valid
route found then data packets are sent on that route to be delivered at the destination.
Table 4. Packet delivery ratio at different numbers of nodes.
N o o f n o d e s 20 30 40 50 60 70 80 90 100 110 120 130 140
No of packets sent 1337
3
1378
8
1258
2
1256
3
1339
3
1201
4
1296
9
1340
5
1210
9
1294
4
1341
7
1293
9
1366
5No of received packets 1334
8
1376
4
1255
7
1253
7
1336
9
1195
8
1294
4
1338
2
1204
9
1292
0
1339
4
1291
3
1364
2Packet delivery
ratio
.998
1
.998
3
.998
0
.997
9
.998
2
.995
3
.998
1
.998
3
.995
0
.998
1
.998
3
.998
0
.998
3
V. Conclusion
In this paper, a detailed description of DSR routing algorithm and its implementation as arouting agent
(DSR agent) in NS-2 is presented. The performance of DSR is evaluated in terms of throughput,average end-to-
end delay, and packet delivery ratio for various numbersof nodes using the NS-2 simulator. From the above
simulation result analysis, we can conclude that DSR provides good performance for routing in wireless ad hoc
networks.
VI. Future work
DSR protocol for routing in ad-hoc networks works fine where nodes are not equipped with GPS or any
other device to be aware of its own positions.Networks are assumed to be heterogeneous; some nodes may be
aware of their position through GPS while some others are not. We are currently working to develop a routing
algorithm which is able to take the advantages of position information of nodes when available but also to be
able to continue the routing through a reactive on demand fashion like DSR scenario.
References
[1.] SS. Dhenakaran, and A Parvathavarthini. An overview of routing protocols in Mobile ad-hoc network.
International journal of advanced research in computer science and software engineering, 3(2), 2013,
251-259.
[2.] M Kumar, N Geethanjali, and N. Ramesh Babu. Performance evaluation of AODV and FSR routing
protocols in MANETS. Global Journal of computer science and technology, 13(4), 2013, 29-34.
[3.] A. Odeh, E. AbdelFattah, and M. Alshwokan. Performance evaluation of AODV and DSR routing
protocols in MANET networks. International journal of distributed and parallel systems, 3(4), 2012,
13-17
[4.] K. Pandey K, and A. Swaroop. A comprehensive performance analysis of proactive, reactive and hybrid
MANETs routing protocols. International journal of computer science, 8(6), 2011, 432-436
[5.] K. Vanaja, and R. Umaram. A simulated behavioural study of prominent reactive routing protocol
AODV of MANET using NS-2. International journal of advanced research in commuter and
communication engineering, 1(3), 2012, 161-166
[6.] H. Soni, and P. Verma. Performance based survey of routing protocol in MANET. International Journal
of Advanced Research in Computer Engineering & Technology, 2(1), 2013, 145-154
[7.] K. Patel, R. Kumar, andK. Daniel. Performance analysis and behaviouralstudy of proactive and reactive
routing protocols in MANET. International journal of advanced research in computer and
communication engineering, 2(4), 2013, 1789-1796
[8.] KR. Reddy, S. Venkata Raju, and N. Venkatadri. Reactive, proactive MANET routing protocol
comparison. International journal of Video&image processing and network security, 12(5), 2012, 22-27
[9.] G. Balamurugan, P. Sakthivel, and C. Jayanavithraa. The comparative study of adhoc network routing
protocols. International Journal of Advanced Research in Computer and Communication Engineering,
3(2), 2014, 5337-5340.
[10.] A. Hinds, M. Ngulube, S. Zhu, and H. Al-Aqrabi. A review of routing protocols for mobile ad-hoc
NETworks (MANET). International journal of information and education technology,3(1), 2013, 1-5
[11.] TP. Singh, S. Dua, and V. Das. Energy-efficient routing protocols in mobile ad-hoc networks.
International journal of advanced research in computer science and software engineering, 2(1), 2012,
132-137.
[12.] R. Saleh, M Saman, and N. Rahman N. A new policy for path selection in dynamic source routing
protocol for mobile ad-hoc networks. Journal of computer science, 9(5), 2013, 551-557
Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 68 | P a g e
[13.] K. Manoj, R. Kumar, and K. Arti. Analysis of delay and throughput in MANET for DSR protocol.
world academy of science, engineering and technology, 5(2), 2011, 653-656
[14.] S. sofat, and A Gupta. A Survey on Throughput Analysis of DSR Routing Protocol in
MANETs.International Journal of Multidisciplinary in Cryptology and Information Security, 2(2),
2013, 56-63
[15.] N. Khan, and N. Agarwal. Adaptive routing in mobile adhoc networks and comparison between routing
protocols aodv and dsr for apu strategy. Journal of computer science 2014 (ICAET-2014): 58-65
[16.] R. Jagannadha, K. Sreenu, and P. Kalpana. A study on dynamic source routing protocol for wireless ad-
hoc networks. International Journal of Advanced Research in Computer and Communication
Engineering, 1(8), 2012, 522-529
[17.] Y. Saravanan, and D Vijayakumar. Performance of reactive and proactive MANET routing protocols
with trajectories. International Journal of Engineering Research and Technology, 1(8), 2012, 24-29
[18.] D. NareshVadhwani, D. Kulhare, and M. Singh. Behavior analysis of DSR MANET protocol with http
traffic using opNET simulator, The International Journal of Innovative Research in Computer and
Communication Engineering, 1(3), 2013, 680-686.
[19.] S. Ali and A. Ali.Performance analysis of AODV, DSR and OLSR in MANET (LAP LAMBERT
Academic Publishing, 2011).
[20.] R. Sharma, and S. Sabharwal. Dynamic source routing protocol (DSR). International journal of
advanced research in computer science and software engineering, 3(4), 2013, 293-241
[21.] S.V. Gumaste, M.U. Kharat, and V.M. Thakare. Performance analysis of DSR protocol. International
journal of scientific and engineering research, 1(3), 2013, 62-68
[22.] R. Saleh, M. Saman, and M. Rahman. Impact of route selection metrics on the performance of DSR
protocols for MANETs. International Journal of Computer Science Issues, 10(2), 2013, 123-126
[23.] D. Goel. A new approach of route selection in DSR using time routing metric in MANET. International
Journal of Advanced Research in Computer Science and Software Engineering, 4(4), 2014, 360-363
[24.] P Rohal, R. Dahiya, and P. Dahiya. Study and analysis of throughput, delay and packet delivery ratio in
MANET for topology based routing protocols (AODV, DSR, and DSDV). International Journal of
Advanced Research in Engineering and Technology, 1(2), 2013, 54-58
[25.] D.N. Vadhwani, M. Singh, D. Kulhare. Simulation of wireless dynamic source routing protocol with IP
traffic flow analysis, memory efficiency and increased throughput. IJCom, 3(4), 2013, 136-141
[26.] S. Upadhyay, P. Joshi, N. Gandotra, and A. Kumari. Comparison and performance analysis of reactive
type DSR, AODV and proactive type DSDV routing protocol for wireless mobile ad-hoc network, using
NS-2 simulator. Journal of engineering and computer innovations, 2(10), 2012, 36-47
[27.] M. Chandrika, and N. Papanna. Performance comparison of AOMDV and POR routing protocols in
MANETs. International Journal of Engineering Research and Applications, 3(4), 2013, 37-41
[28.] T. Issariyakul, and E. Hossain, Introduction to network simulator NS2 (New York: Springer, 2012
[29.] A. Gani, Q. Han, N. B. adrulAnuar, and O. Zakaria. Enhancing DSR protocol performance in mobile ad
hoc network using ACK reply. WSEAS TRANSACTIONS On Communications, 2(2), 2009, 227-236
Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 69 | P a g e
Fig1. Handling packet arrival in DSR agent implemented in NS2
Yes
No
Is RREQ No
(Iam a hop)
handleForwardin
g
(Get next hop,
Forward pkt to)
Done
handleRouteRequest
(process RREQthat is not for me)
Done
p.dst=net-id
Done
handlePacketReceip
t
Yes
N
o
DSR Packet Received
YesIs srh valid
(souce route in pkt
header)
Is BcastPkt
Yes
handlePacketWithoutS
R
Done
No
Init sr
(Give a pkt source
header)
sendOutBcastPkt
Done
Yes
P.src=net-id
(I am initiator)
Error
No
Done
Verify if another
packet in send buffer
waiting this Route
sendOutPacketWithRoute
Begin
Yes
Ignore pkt
Yes No
acceptDataPkt
(it is a data packet for me)
Done
Yes No
Update route cache
acceptRouteReply
R.REP
Done
returnSrcRouteToRequestor
(Take the route in pkt, add my ID to end of it
then return Route to the sender of pkt)
No
Seen before
R.Req
Fig3. handlePacketReceipt method
Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 70 | P a g e
Fig 5. Average-end-to-end delay for number of nodes.
0
50
100
150
200
250
20
30
40
50
60
70
80
90
100
110
120
130
140
average end-to-end delay
average end-to-end
delay
Fig 4. handleRouteRequest method
Yes
No
Ignore packet
(Pkt is a request that has been
already processed)
Done
Propagate R.Req to neighbors
Is there a Route
to dest in cache
Add my ID to Route Record
Done
Send R.REP to Source
Done
Begin
Is pkt seen
before
YesNo
Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 71 | P a g e
Fig 6. Throughput over number of nodes.
Fig 7. Packet delivery ratio at different nodes.
490
500
510
520
530
540
550
560
570
580
590
20 30 40 50 60 70 80 90 100 110 120 130 140
throughput
throughput
0.993
0.994
0.995
0.996
0.997
0.998
0.999
20
30
40
50
60
70
80
90
100
110
120
130
140
packet delivery ratio
packet delivery ratio

More Related Content

What's hot

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...IJCNCJournal
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
17 21 jan17 9dec16 13655 27902-1-ed(edit)
17 21 jan17 9dec16 13655 27902-1-ed(edit)17 21 jan17 9dec16 13655 27902-1-ed(edit)
17 21 jan17 9dec16 13655 27902-1-ed(edit)IAESIJEECS
 
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerDelay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerAM Publications
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingeSAT Publishing House
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 

What's hot (19)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
A41040105
A41040105A41040105
A41040105
 
Br31467472
Br31467472Br31467472
Br31467472
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
17 21 jan17 9dec16 13655 27902-1-ed(edit)
17 21 jan17 9dec16 13655 27902-1-ed(edit)17 21 jan17 9dec16 13655 27902-1-ed(edit)
17 21 jan17 9dec16 13655 27902-1-ed(edit)
 
O26087092
O26087092O26087092
O26087092
 
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerDelay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 

Viewers also liked

A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...
A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...
A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...IJERA Editor
 
Pengantar Bisnis
Pengantar BisnisPengantar Bisnis
Pengantar Bisnisha8ib
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierIJERA Editor
 
LOAN TO VALUE RATIO BI (GENERASI II)
LOAN TO VALUE RATIO BI (GENERASI II)LOAN TO VALUE RATIO BI (GENERASI II)
LOAN TO VALUE RATIO BI (GENERASI II)DGT
 
Random Lead Time of the acute ghrelin response to a psychological stress
Random Lead Time of the acute ghrelin response to a psychological stressRandom Lead Time of the acute ghrelin response to a psychological stress
Random Lead Time of the acute ghrelin response to a psychological stressIJERA Editor
 
Planning and Selection of Heavy Construction Equipment in Civil Engineering
Planning and Selection of Heavy Construction Equipment in Civil EngineeringPlanning and Selection of Heavy Construction Equipment in Civil Engineering
Planning and Selection of Heavy Construction Equipment in Civil EngineeringIJERA Editor
 
Kansrekening les5 gvan alst
Kansrekening les5 gvan alstKansrekening les5 gvan alst
Kansrekening les5 gvan alstGerard van Alst
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data SharingIJERA Editor
 
What to Expect on the FAFSA
What to Expect on the FAFSAWhat to Expect on the FAFSA
What to Expect on the FAFSAJodi Okun
 
Tender and Bidding in Construction Projects
Tender and Bidding in Construction ProjectsTender and Bidding in Construction Projects
Tender and Bidding in Construction ProjectsIJERA Editor
 
Numerical Study Of Flue Gas Flow In A Multi Cyclone Separator
Numerical Study Of Flue Gas Flow In A Multi Cyclone SeparatorNumerical Study Of Flue Gas Flow In A Multi Cyclone Separator
Numerical Study Of Flue Gas Flow In A Multi Cyclone SeparatorIJERA Editor
 
Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...
Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...
Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...IJERA Editor
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
 
291 ( space solar power satellite system) (1)
291 ( space solar power satellite system) (1)291 ( space solar power satellite system) (1)
291 ( space solar power satellite system) (1)sanjiivambati59
 
Print admit card.docx santosh
Print admit card.docx santoshPrint admit card.docx santosh
Print admit card.docx santoshmadan1979
 
251063003 minte-caracter-personalitate
251063003 minte-caracter-personalitate251063003 minte-caracter-personalitate
251063003 minte-caracter-personalitateMihnevici Madalina
 

Viewers also liked (20)

A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...
A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...
A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...
 
Pengantar Bisnis
Pengantar BisnisPengantar Bisnis
Pengantar Bisnis
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic Multiplier
 
LOAN TO VALUE RATIO BI (GENERASI II)
LOAN TO VALUE RATIO BI (GENERASI II)LOAN TO VALUE RATIO BI (GENERASI II)
LOAN TO VALUE RATIO BI (GENERASI II)
 
на сайт 7а класс
на сайт 7а классна сайт 7а класс
на сайт 7а класс
 
ASITF (English)_ASITF Certificate
ASITF (English)_ASITF CertificateASITF (English)_ASITF Certificate
ASITF (English)_ASITF Certificate
 
Random Lead Time of the acute ghrelin response to a psychological stress
Random Lead Time of the acute ghrelin response to a psychological stressRandom Lead Time of the acute ghrelin response to a psychological stress
Random Lead Time of the acute ghrelin response to a psychological stress
 
Planning and Selection of Heavy Construction Equipment in Civil Engineering
Planning and Selection of Heavy Construction Equipment in Civil EngineeringPlanning and Selection of Heavy Construction Equipment in Civil Engineering
Planning and Selection of Heavy Construction Equipment in Civil Engineering
 
Kansrekening les5 gvan alst
Kansrekening les5 gvan alstKansrekening les5 gvan alst
Kansrekening les5 gvan alst
 
Attribute-Based Data Sharing
Attribute-Based Data SharingAttribute-Based Data Sharing
Attribute-Based Data Sharing
 
What to Expect on the FAFSA
What to Expect on the FAFSAWhat to Expect on the FAFSA
What to Expect on the FAFSA
 
Tender and Bidding in Construction Projects
Tender and Bidding in Construction ProjectsTender and Bidding in Construction Projects
Tender and Bidding in Construction Projects
 
Numerical Study Of Flue Gas Flow In A Multi Cyclone Separator
Numerical Study Of Flue Gas Flow In A Multi Cyclone SeparatorNumerical Study Of Flue Gas Flow In A Multi Cyclone Separator
Numerical Study Of Flue Gas Flow In A Multi Cyclone Separator
 
Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...
Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...
Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...
 
Usługi sieci internet cz ii 2012
Usługi sieci internet cz ii   2012Usługi sieci internet cz ii   2012
Usługi sieci internet cz ii 2012
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
291 ( space solar power satellite system) (1)
291 ( space solar power satellite system) (1)291 ( space solar power satellite system) (1)
291 ( space solar power satellite system) (1)
 
Print admit card.docx santosh
Print admit card.docx santoshPrint admit card.docx santosh
Print admit card.docx santosh
 
251063003 minte-caracter-personalitate
251063003 minte-caracter-personalitate251063003 minte-caracter-personalitate
251063003 minte-caracter-personalitate
 

Similar to A Simulated Behavioral Study of DSR Routing Protocol Using NS-2

Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksijujournal
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
 

Similar to A Simulated Behavioral Study of DSR Routing Protocol Using NS-2 (20)

Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
J0935461
J0935461J0935461
J0935461
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSPERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networks
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
 

Recently uploaded

Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 

Recently uploaded (20)

Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 

A Simulated Behavioral Study of DSR Routing Protocol Using NS-2

  • 1. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71 www.ijera.com 64 | P a g e A Simulated Behavioral Study of DSR Routing Protocol Using NS-2 Ali El-Desoky*,Amany Sarhan**, Reham Arnous*** *Department of computers and system engineering, Faculty of Engineering, Mansoura University, Egypt ** Department of Computer and system engineering, Faculty of Engineering, Tanta University. **Department of computers and system engineering, Faculty of Engineering, Mansoura University, Egypt Abstract Mobile ad hoc network (MANETS) consists of wireless nodes communicating without any centralized administration .thus each node acts as a host and a router. There are many routing protocols designed for MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed specifically for use in multi-hop wireless mobile nodes. This paper describes the design the implementation of DSR protocol in NS-2 simulator environment. We also analyze the performance of the DSR for various performance matrixes such as average end to- end delay, throughput and packet delivery ratio. The analysis was made for different number of nodes using the NS-2 simulator. Keywords – MANETs, DSR, routing protocol, performance evaluation, NS-2 I. Introduction Wireless networks are emerging new technology where there is no physical wired connection between sender and receiver, but rather the network is connected by radio waves and/or microwaves to maintain communications. Wireless networks are rapidly evolving, and is playing an increasing role in the lives of people throughout the world as they provide connection flexibility between users in different places. Wireless networks are classified into two categories; Infrastructure networks and Ad Hoc networks. In Infrastructure networks devices are connected using a central device, namely a wireless access point. An access point (AP) represents a central coordinator for all nodes. AP acts as a master with all the other stations associating to it. All communications pass through the AP. A wireless ad hoc network is a decentralized type of wireless network. Ad hoc networks do not rely on a preexisting infrastructure or any centralized access points. Mobile ad hoc networks (MANETs) are self- organized and self-configuring infrastructurless networks of mobile devices communicating through wireless links. In MANETs the nodes which are in the transmission range of each other communicate directly, otherwise communication is done through intermediate nodes which forward packets; hence the node acts as a router and a node, these networks are also called as multi-hop networks [1, 2]. Routing in MANETs is considered a challenging task due to the mobility of nodes and limited bandwidth and energy. There are several types of routing protocol developed for efficient routing in MANETs [3]. Theycan be categorized into two different approaches; position- based routing and topology-based routing [4- 7].Position-based or geographic routing approaches rely on knowing the nodes’ physical location information. Thus, it is necessary for nodes to obtain their coordinates either by using a location service such as GPS or other types of positioning services. In Topology-based routing protocols the paths are maintained and routes are established based on the information about the links that exist in the network. These protocols can be further divided into proactive (table driven), reactive (on demand) and hybrid approaches. Table-driven (proactive) routing protocol: Proactive protocols discover routes and maintain them in routing tables, each node maintains up-to- date routing table containing a list of all the destinations, next hop, number of hops to each destination. Hello packets are exchanged periodically in order to inform nodes about changes in the topology. Destination sequenced distance vector (DSDV), wireless routing protocol (WRP) and global state routing (GSR) are examples of proactive routing protocols. On demand (Reactive) routing protocol: The main idea in reactive routing (on-demand routing) is to find and maintain routes 'only when there is needs (on demand) which by turn minimize routing overhead but it may result in initial delays until the routes are set up. There are different types of on demand routing protocols such as Ad hoc On Demand Distance Vector (AODV), Dynamic Source routing protocol (DSR), temporally ordered routing RESEARCH ARTICLE OPEN ACCESS
  • 2. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71 www.ijera.com 65 | P a g e algorithm (TORA), Ad-hoc On-demand Multipath Distance Vector Routing (AOMDV). Our discussion is limited to DSR protocol. Hybrid routing protocols area combination of both reactive and proactive approaches. Zone routing protocol (ZRP) is an example [8-11]. II. DSR protocol description The DSR is a pure reactive routing protocol based on the concept of source routing. it employs route discovery and route maintenance procedures working together in a way that that can enable nodes to discover and maintain routes to arbitrary destinations in thenetwork [12-15]. Each node maintains its route cache which is kept in the memory to save the discovered route for future use. The node updates entries in the route cache when it learns about new routes.The original DSR keeps multiple routes to a destination ordered by hop count. It selects a route having the minimal number of hops between the available routes. DSR uses the route selection based on the shortest path algorithm; it selects a route having the minimal number of hops between the available routes. When a source node wants to send a data packet to destination node, it first checks its route cache for a route to the desired destination; If a route is found the node uses it to send the packet. The route is inserted in the packet header and then the packet is forwarded to its destination through this route. In case there is no route to the desired destination in the node's route cache, it applies a route discovery process by broadcasting a route request packet (RREQ) to all its neighbors. The source node appends source ID, destination ID and a unique request ID to it. The packet also contains a route record listing the address of each intermediate node it passes through. The source route initializes this record as an empty list. When an intermediate node receives a RREQ packet it appends its id to the RREQ packet’s route- record then it rebroadcasts the RREQ again, unless it is the destination node, or it has a route to the intended destination in its cache. When initiating a Route Discovery, the sending node saves the original packet in a local buffer called the Send Buffer. Each packet in the Send Buffer is stamped with the time that it was placed into the Buffer the packet is saved in the send buffer until a route found or it reaches time out period. The packet is discarded in case of timeout. Timeout period is necessary for preventing the Send Buffer from overflowing. When the route request reaches either the destination itself or a node that has a route to the destination, a route reply (RREP) is generated. The RREP is then sent back (through the reverse path found in the route record of RREQ) to the source node. The source node then appends this path to the original packet saved in the send buffer and forwards it to destination through it. It also updates its route cache with this new learned route [16-20]. For route maintenance procedure; DSR uses two types of packets; route error packets and acknowledgment. When a node detects a transmission problem on forwarding a packet, it generates a route error packet while acknowledgment packets are used to confirm the correct operation of the route links [21-25]. III. DSR implementation in NS-2 simulator NS-2 is a an object oriented ,open source network simulation tool which can be used by researchers working on wired or wireless networks as it supplies numerous models and source codes of routing protocols. There are two programming languages used in NS-2 otcl and C++ language. C++ is used for detailed protocol implementation where otcl language is used to write script files (simulation script) where users describe the model to be simulated then NS-2 interpret the script and output the simulation process and result to an output file (trace file). The simulation process and result can be shown by Nam and Xgraph files [26, 27]. There are two main types of NS-2 agents routing agents and transport layer agents. A routing agent creates, transmits and receives control packets and routing protocol commands to act accordingly, where as Connecting an application to a low level network, a transport layer agent controls the congestion and reliability of a data flow based on an underling transport layer protocol .NS-2 implements agents in C++ [28, 29]. The DSR routing protocol is implemented in NS-2as Agent (DSR Agent). This section analyses the DSR source code in NS-2. The chart in figure 1 shows the basic functions of the DSR agent. When a DSR agent receives a packet it first arrives at recv method (basic function) which first checks the packet header to see if it has a valid source route (srh) then calls different functions to handle the packet as shown in flow chart described in figure 1. If no source route found in packet header and it is not a broadcast packet, it will be handled through the method named handlePktWithoutSR which is described later in the flow chart shown in fig 2. If there is a valid source route then the packet is handled through methods handlePacketReceipt described in figure 3. If the current node is the destination (P.dest= net_id) else it is handled either through the method handleRouteRequest (described in flowchart shown in figure 4) if it is a RREQ packet, or through handleForwarding method if it is not a RREQ packet. IV. Simulation In this paper the DSR is analyzed using the NS-2 simulator. Three performance metrics are used to evaluate the performance Average End-To-End
  • 3. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71 www.ijera.com 66 | P a g e Delay, Throughput, and packet delivery ratio for various numbers of nodes considering TCP as the transport protocol and FTP as the traffic generator. 4.1. Simulation tool and parameter The simulations tool used is NS-2. Before starting the simulation a tcl script is created that describes the simulated model which defines the network topology composed of nodes, routers, links, and shared media. Otcl language is used to write the script file.Table 1 shows a part of the tcl script containing the tcl coding which specify the simulation parameters. Table 1 tcl code for simulation setup parameters Set val(chan) channel /wireless channel ;# channel type Set val(prop) propagation /two rayground ;# radio-propagation model Set val(netif) phy/wirelessphy ;# network interface type Set val(mac) mac802_11 ;# mac type Set val(ifq) cmupriqueue Set val(ll) ll Set val(ant) AntenaomniAntena Set val(ifqlen) 50 ;# max packet in ifq Set val(nn) 120 ;# number of mobile nodes Set val(rp) dsr ;# routing protocol Set val(x) 500 Set val(y) 400 Set val(stop) 150 ;# time of simulation end 4.2. Simulation analysis and Performance metrics After running the tcl script at the end of each simulation, a NAM trace file and a tr file which is a trace file will be created by NS-2 automatically. NAM trace file is used as an input to network animator (NAM) which is used to graphically visualize the simulator while the trace file is used for simulations analysis. AWK Scripts are used for processing the data from the output (trace files). The performance of the simulation is evaluated according to the following performance metrics. Average end to end delay: Average End-to-End delay is the average time it takes a data packet to reach the destination. Low average end-to end delay indicating good performance. it is calculated using awk script (delay.awk) which processes the trace file and produces the result.Table3 represents the average end-to-end delay for all packets received for (20,30,40,50,60,70,80,90,100,110,120,130,140,150) nodes. Table 2. Average End-to-End Delay of DSR at different numbers of nodes. No of nodes 20 30 40 50 60 70 80 90 100 110 120 130 140 Delay (ms) 199.470 191.878 179.74 7 199.38 5 205.325 147.31 7 148.67 3 223.39 9 179.04 3 176.976 209.56 9 171.9 02 210.424 DSR end to end delay decreases with increase the number of nodes till 80 nodes. So DSR protocol good for nodes less than 80. Increasing number of nodes Increases the number of hops in routes and in its turn increases the time it take the packet to reach the destination. Throughput: The throughput is defined as the total amount of received data packets divided by the simulation time. The throughput is measured in bits per second (bps). Table3 represents the throughput for different numbers of nodes. Table3. Throughput at different numbers of nodes Number of nodes 20 30 40 50 60 70 80 90 100 110 120 130 140 Throughput (kbps) 521.3 3 536.6 6 542.38 541.6 4 522.0 2 577.3 8 558.77 521.43 520.64 556.38 522.9 2 557.45 532.46 DSR throughput increases with increase the number of nodes till 80 nodes. With the increase of number of nodes than 80 the throughput decreases. This may result due to the increase of routing overhead by increasing the number of nodes.
  • 4. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71 www.ijera.com 67 | P a g e Packet Delivery Ratio: Packet delivery ratio is the ratio of number of packets received at the destination to the number of packets sent from the source. The performance is better when packet delivery ratio is high .The reason for having better packet delivery ratio of DSR is that allow packets to stay in the send buffer until a valid route found then data packets are sent on that route to be delivered at the destination. Table 4. Packet delivery ratio at different numbers of nodes. N o o f n o d e s 20 30 40 50 60 70 80 90 100 110 120 130 140 No of packets sent 1337 3 1378 8 1258 2 1256 3 1339 3 1201 4 1296 9 1340 5 1210 9 1294 4 1341 7 1293 9 1366 5No of received packets 1334 8 1376 4 1255 7 1253 7 1336 9 1195 8 1294 4 1338 2 1204 9 1292 0 1339 4 1291 3 1364 2Packet delivery ratio .998 1 .998 3 .998 0 .997 9 .998 2 .995 3 .998 1 .998 3 .995 0 .998 1 .998 3 .998 0 .998 3 V. Conclusion In this paper, a detailed description of DSR routing algorithm and its implementation as arouting agent (DSR agent) in NS-2 is presented. The performance of DSR is evaluated in terms of throughput,average end-to- end delay, and packet delivery ratio for various numbersof nodes using the NS-2 simulator. From the above simulation result analysis, we can conclude that DSR provides good performance for routing in wireless ad hoc networks. VI. Future work DSR protocol for routing in ad-hoc networks works fine where nodes are not equipped with GPS or any other device to be aware of its own positions.Networks are assumed to be heterogeneous; some nodes may be aware of their position through GPS while some others are not. We are currently working to develop a routing algorithm which is able to take the advantages of position information of nodes when available but also to be able to continue the routing through a reactive on demand fashion like DSR scenario. References [1.] SS. Dhenakaran, and A Parvathavarthini. An overview of routing protocols in Mobile ad-hoc network. International journal of advanced research in computer science and software engineering, 3(2), 2013, 251-259. [2.] M Kumar, N Geethanjali, and N. Ramesh Babu. Performance evaluation of AODV and FSR routing protocols in MANETS. Global Journal of computer science and technology, 13(4), 2013, 29-34. [3.] A. Odeh, E. AbdelFattah, and M. Alshwokan. Performance evaluation of AODV and DSR routing protocols in MANET networks. International journal of distributed and parallel systems, 3(4), 2012, 13-17 [4.] K. Pandey K, and A. Swaroop. A comprehensive performance analysis of proactive, reactive and hybrid MANETs routing protocols. International journal of computer science, 8(6), 2011, 432-436 [5.] K. Vanaja, and R. Umaram. A simulated behavioural study of prominent reactive routing protocol AODV of MANET using NS-2. International journal of advanced research in commuter and communication engineering, 1(3), 2012, 161-166 [6.] H. Soni, and P. Verma. Performance based survey of routing protocol in MANET. International Journal of Advanced Research in Computer Engineering & Technology, 2(1), 2013, 145-154 [7.] K. Patel, R. Kumar, andK. Daniel. Performance analysis and behaviouralstudy of proactive and reactive routing protocols in MANET. International journal of advanced research in computer and communication engineering, 2(4), 2013, 1789-1796 [8.] KR. Reddy, S. Venkata Raju, and N. Venkatadri. Reactive, proactive MANET routing protocol comparison. International journal of Video&image processing and network security, 12(5), 2012, 22-27 [9.] G. Balamurugan, P. Sakthivel, and C. Jayanavithraa. The comparative study of adhoc network routing protocols. International Journal of Advanced Research in Computer and Communication Engineering, 3(2), 2014, 5337-5340. [10.] A. Hinds, M. Ngulube, S. Zhu, and H. Al-Aqrabi. A review of routing protocols for mobile ad-hoc NETworks (MANET). International journal of information and education technology,3(1), 2013, 1-5 [11.] TP. Singh, S. Dua, and V. Das. Energy-efficient routing protocols in mobile ad-hoc networks. International journal of advanced research in computer science and software engineering, 2(1), 2012, 132-137. [12.] R. Saleh, M Saman, and N. Rahman N. A new policy for path selection in dynamic source routing protocol for mobile ad-hoc networks. Journal of computer science, 9(5), 2013, 551-557
  • 5. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71 www.ijera.com 68 | P a g e [13.] K. Manoj, R. Kumar, and K. Arti. Analysis of delay and throughput in MANET for DSR protocol. world academy of science, engineering and technology, 5(2), 2011, 653-656 [14.] S. sofat, and A Gupta. A Survey on Throughput Analysis of DSR Routing Protocol in MANETs.International Journal of Multidisciplinary in Cryptology and Information Security, 2(2), 2013, 56-63 [15.] N. Khan, and N. Agarwal. Adaptive routing in mobile adhoc networks and comparison between routing protocols aodv and dsr for apu strategy. Journal of computer science 2014 (ICAET-2014): 58-65 [16.] R. Jagannadha, K. Sreenu, and P. Kalpana. A study on dynamic source routing protocol for wireless ad- hoc networks. International Journal of Advanced Research in Computer and Communication Engineering, 1(8), 2012, 522-529 [17.] Y. Saravanan, and D Vijayakumar. Performance of reactive and proactive MANET routing protocols with trajectories. International Journal of Engineering Research and Technology, 1(8), 2012, 24-29 [18.] D. NareshVadhwani, D. Kulhare, and M. Singh. Behavior analysis of DSR MANET protocol with http traffic using opNET simulator, The International Journal of Innovative Research in Computer and Communication Engineering, 1(3), 2013, 680-686. [19.] S. Ali and A. Ali.Performance analysis of AODV, DSR and OLSR in MANET (LAP LAMBERT Academic Publishing, 2011). [20.] R. Sharma, and S. Sabharwal. Dynamic source routing protocol (DSR). International journal of advanced research in computer science and software engineering, 3(4), 2013, 293-241 [21.] S.V. Gumaste, M.U. Kharat, and V.M. Thakare. Performance analysis of DSR protocol. International journal of scientific and engineering research, 1(3), 2013, 62-68 [22.] R. Saleh, M. Saman, and M. Rahman. Impact of route selection metrics on the performance of DSR protocols for MANETs. International Journal of Computer Science Issues, 10(2), 2013, 123-126 [23.] D. Goel. A new approach of route selection in DSR using time routing metric in MANET. International Journal of Advanced Research in Computer Science and Software Engineering, 4(4), 2014, 360-363 [24.] P Rohal, R. Dahiya, and P. Dahiya. Study and analysis of throughput, delay and packet delivery ratio in MANET for topology based routing protocols (AODV, DSR, and DSDV). International Journal of Advanced Research in Engineering and Technology, 1(2), 2013, 54-58 [25.] D.N. Vadhwani, M. Singh, D. Kulhare. Simulation of wireless dynamic source routing protocol with IP traffic flow analysis, memory efficiency and increased throughput. IJCom, 3(4), 2013, 136-141 [26.] S. Upadhyay, P. Joshi, N. Gandotra, and A. Kumari. Comparison and performance analysis of reactive type DSR, AODV and proactive type DSDV routing protocol for wireless mobile ad-hoc network, using NS-2 simulator. Journal of engineering and computer innovations, 2(10), 2012, 36-47 [27.] M. Chandrika, and N. Papanna. Performance comparison of AOMDV and POR routing protocols in MANETs. International Journal of Engineering Research and Applications, 3(4), 2013, 37-41 [28.] T. Issariyakul, and E. Hossain, Introduction to network simulator NS2 (New York: Springer, 2012 [29.] A. Gani, Q. Han, N. B. adrulAnuar, and O. Zakaria. Enhancing DSR protocol performance in mobile ad hoc network using ACK reply. WSEAS TRANSACTIONS On Communications, 2(2), 2009, 227-236
  • 6. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71 www.ijera.com 69 | P a g e Fig1. Handling packet arrival in DSR agent implemented in NS2 Yes No Is RREQ No (Iam a hop) handleForwardin g (Get next hop, Forward pkt to) Done handleRouteRequest (process RREQthat is not for me) Done p.dst=net-id Done handlePacketReceip t Yes N o DSR Packet Received YesIs srh valid (souce route in pkt header) Is BcastPkt Yes handlePacketWithoutS R Done No Init sr (Give a pkt source header) sendOutBcastPkt Done Yes P.src=net-id (I am initiator) Error No Done Verify if another packet in send buffer waiting this Route sendOutPacketWithRoute Begin Yes Ignore pkt Yes No acceptDataPkt (it is a data packet for me) Done Yes No Update route cache acceptRouteReply R.REP Done returnSrcRouteToRequestor (Take the route in pkt, add my ID to end of it then return Route to the sender of pkt) No Seen before R.Req Fig3. handlePacketReceipt method
  • 7. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71 www.ijera.com 70 | P a g e Fig 5. Average-end-to-end delay for number of nodes. 0 50 100 150 200 250 20 30 40 50 60 70 80 90 100 110 120 130 140 average end-to-end delay average end-to-end delay Fig 4. handleRouteRequest method Yes No Ignore packet (Pkt is a request that has been already processed) Done Propagate R.Req to neighbors Is there a Route to dest in cache Add my ID to Route Record Done Send R.REP to Source Done Begin Is pkt seen before YesNo
  • 8. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71 www.ijera.com 71 | P a g e Fig 6. Throughput over number of nodes. Fig 7. Packet delivery ratio at different nodes. 490 500 510 520 530 540 550 560 570 580 590 20 30 40 50 60 70 80 90 100 110 120 130 140 throughput throughput 0.993 0.994 0.995 0.996 0.997 0.998 0.999 20 30 40 50 60 70 80 90 100 110 120 130 140 packet delivery ratio packet delivery ratio