SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 339
IMPLEMENTATION OF DYNAMIC SOURCE ROUTING (DSR) IN
MOBILE AD HOC NETWORK (MANET)
Thiyam Romila Devi1
, Rameswari Biswal2
, Vikram Kumar3
, Abhishek Jena4
1, 2, 3, 4
M.Tech, School of Electronics, KIIT University, Odisha, India
romilath@gmail.com, rameswaribiswal@gmail.com, vikram_2006be@yahoo.co.in, bapuni207@gmail.com
Abstract
Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s
is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays
an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network
(MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its
location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network.
The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest
path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in
Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The
performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing
overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection.
All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better
performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number
of hop to transfer information between nodes.
Keywords: MANET, DSR, ANT Algorithm
----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
1.1 MANET Overview
Mobile ad hoc network (MANET) is a autonomous and
dynamic network consist of wireless mobile hosts or nodes.
For example, communication between remote notes is based
on multiple hop. These nodes are dynamically and arbitrarily
located in such a manner that the interconnections between
nodes are capable of changing on a continual basis. Thus
MANETs are self configuring as there is no central
management system with configuration responsibilities. All
the mobile nodes can communicate each other directly if they
are in others wireless links radio range. In order to enable data
transfer they either communicate through single hop or multi
hop with the help of intermediate nodes. MANETs allow
ubiquitous service access anywhere, anytime without any
fixed infrastructure, thus named as an infrastructure-less
network that can be widely used in military, battlefields,
management services, classrooms, various multimedia
applications and conference halls. The Fig-1. shows the
MANET
Fig-1: Infrastructure less Network
1.2 DSR Protocol and Optimization
The DSR (Dynamic source routing) protocol is a simple and
efficient routing protocol for wireless mesh network which is
designed for the use in multi- hop wireless ad hoc network of
mobile nodes. DSR allows the network to be completely self-
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 340
organizing and self-configuring, without the need of any
predefined infrastructure. This protocol is composed of the
two main mechanisms of a) Route discovery and b) Route
maintenance. These two work together to allow nodes to
discover and maintain routes to arbitrarily destination in the ad
hoc network [1].
1.2.1 Route Discovery
Route Discovery is used to discover a route from source to
particular destination using two stages; Route request (RREQ)
and Route Reply(RREP). This method also includes some
optimization measures; during route request process, and
intermediate node can be authorized to issue a complete route
reply if it contains a valid route to the destination in its route
cache memory. Whenever a source wants to communicate
with destination and if it does not have a route in its Route
Cache, it broadcasts a RREQ message to find a particular
route. Each neighbour receives the RREQ and appends its
own address to the address list in the RREQ (if it has not
already processed the same request earlier) and re-broadcasts
the packet. This process will continue until either the
maximum hop counter is incremented (or RREQ is rejected)
or the destination is reached. The destination receives the
RREQ, appends its address and generates a route reply packet
(RREP) back towards the source using the reverse of the
accumulated route in latter case. When the source finally
receives RREP, it will store the route in its Route Cache [2].
Fig-2: DSR Route Discovery
During the process of discovery, there's a problem that should
be noticed. In the Figure1 above, node D may receive the
router requests both from node C and node E at the same time,
this will lead to the message collision, and the correct requests
cannot be accepted. Therefore, the broadcast in Ad hoc
network isn't reliable. This kind of problem can be avoided by
random delay transmission, authentication and so on.
However, random delay transmission cannot guarantee to
choose the best suitable router item, while the authentication
has to send more router control messages, thus results in more
resource wasted and load aggravation. There comes up a new
algorithm to solve this problem, i.e. ANT Algorithm
1.2.2 Route Maintenance
Route Maintenance is used to manage (cache, expire, switch
among) previously discovered routes. Once some nodes find
the neighbouring link that data is to be sent by is disconnected,
they immediately send a route error message RERR to source
node. When the source node receives the error packet, it
deletes all the routes that use the invalid link from the buffer,
and starts a new route discovery process if necessary. The
nodes that forward the error packet along the way delete all
the route in the broken link from their own routing table. The
route discovery procedure of DSR protocol often discovers
many routes from source node to destination node. And route
with minimal hop is more possible chosen for data
transmission than others, the nodes frequently chosen are more
likely to consume more energy, which results in short usage of
battery.
1.3 Architecture of Mobile communication system
based on DSR
DSR is used to replace the former routing protocol in BS. In
the same time the backbone network of mobile
communication system becomes an entire IP network. Every
BS has assigned a unique IP address and the data transmitted
between the BSs results into the IP formation of the same data.
The Fig- 2. Shows BS of Mobile communication network after
the improvement.
The basic elements of BS are-
a) Wireless link control layer- This layer defines reliable data
transmission between MS and BS in circuit mode and it can be
expanded like as link layer.
b) Wireless resource management layer- It both builds and
removes the wireless link between MS and BS for the MS
where it moves in network when the link state transmission is
being maintained.
c) Mobility management layer- It realizes some functions of
MS such as user's register and authorization in the service area
of different BSs.
d) Communication management layer- It realizes the functions
of management to wireless users such as routing management
and routing management.
e) Switching- It realizes the IP's disposal of data. It can be
discovered and maintained the route between BSs of source
MS and destination MS according to DSR protocol.
f) Wireless channels (Uu) interface- It defines the wireless
interface between BS and Ms.
g). Wireless channels (lu) interface- It defines the wireless
interface between BSs.
The Fig-3 shows the data flow from one BS to another BS
with two wireless hops in mobile communication with the
entire mobility of data and also shows how the inclusion of
more intermediate BSs would behave. The MS originates a
typical data packet and is arriving at the BS A through Uu
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 341
interface. At BS A the packet must transverse the entire
protocol stacks, from the Uu interface down to the lu interface.
At the intermediate BS, the packet must brought up to DSR
sub layer and will be examined and is sent out again. Hence ,
packets do not go beyond the DSR sub layer in the route. All
the packets are originated from and is terminated at the sub
layer of DSR. The relaying of control packets is same as that
of the data packets.
Fig-3: BS of Mobile Communication Network
2. ANT ALGORITHM
ANT algorithm is an algorithm that is similar as the behavior
of ant colonies, known as ant system. Ant can find the
shortest route between the nest and the food source by
footprints or pheromones on the path that has been
traversed. Ants are practically blind but they still manage to
find their way to and from food. These observations inspired a
new type of algorithm called ant algorithms (or ant
systems)[3][4][5][6]. In order to determine the shortest route,
Ant algorithm is being used and the steps of determining are
as follows:-
a). Initialization parameters value algorithm. The intensity of
inter-node ant trail and changes (τij), many of nodes (n)
includes the coordinates (x, y) or the distance between
nodes (dij), Origin node and destination node, constant
cycle of ants (Q), constant intensity controller ant trail (α),
the value of α ≥ 0, constant control visibility (β), the
value of β ≥ 0, visibility between nodes = 1/dij (ηij), the
number of ants (m), evaporation constant trail of ants (ρ),
ρ values must be > 0 and <1 to prevent infinite
pheromone trail, and the maximum number of cycles
(NCmax) is fixed during the algorithm run, while costs
(τij) will be updated at each cycle algorithm from the
first cycle (NC = 1) to reach the maximum number of
cycles (NC = NCmax) or until there is convergence. After
we initialization parameters, further we Initialize the first
node each ant. First performed initialization (τij), then (m)
ants are placed on certain first node randomly. This ant
called forward ant packet, it will trace the route to the
destination node. When it was discovered the destination
node, the ants would go back through the same route. In
this condition the ant called backward ant.
b). Charging the first node in the tabu list. Tabu list is a table
containing the visibility of information between nodes.The
results of the first node initialization every ant in first step
should be filled as the first element of the table list. The
result of this step is to fill its first element table list each ant
with a particular node index, which means that every
tabuk (1) can contain node index between 1and n as the
initialization in step (a).
c). Composition of each ant route to all node. Ant colonies
that have been distributed to some or each node will start to
travel from each first node as the origin node and one
other node as the destination node. Then from the second
node, respectively, ant colonies will continue the trip by
choosing one of the nodes that are not on tabuk as the next
destination node. Journey ant colony continues until all the
nodes one by one visited or have occupied tabuk.If s expressed
sequence index visit, expressed as tabuk origin node (s) and
other node is expressed as {Ntabuk}, then the destination
node is used to determine the probability of the node
equations to visit [3][4][5][6]:
= (1)
for j , for other j with I
as the index of the origin node and J as index destination
node.
d). Calculation of route length of every ant. Calculation of
closed route length (length closed tour) or Lk any ants
performed after one cycle completed by all ants. This
calculation is done based each tabuk with the following
equation with dij is the distance between node i to node j
[3][4][5][6] :
(2)
(3)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 342
to search the shortest route. After every ant Lk is
calculated, will get a minimum length of each cycle routes
closed or Lmin NC and minimum values on the whole length
of the route is closed or Lmin. Calculation of changes in
the value of the intensity of inter-node ant footprints. Ant
colonies will leave footprints on the path between the nodes in
its path. The existence of evaporation and the difference in
the number of ants making the possibility of a change in the
value of the intensity of inter-node ant footprints. The
equation this changes is [3][4][5][6] :
(4)
Changes in intensity values between nodes and
footprints every ant is calculated based on the equation:
, for (i,j) origin node and destination node
in tabuk (5)
= 0, for other (i,j)
e). The calculation of the value of the intensity of internodes
ant footprints for the next cycle. Ant footprints intensity
values between nodes on all paths between nodes is likely
to change due to evaporation and the difference in the
number of ants that passed. For the next cycle, the ant will
pass the track intensity prices have changed. Ant footprints
intensity values between nodes for the next cycle is
calculated by the equation [3][4][5][6]:
= P* (6)
further Reset the value of the intensity changes between
nodes ant footprints. For the next cycle of price changes
ant trail intensity between the nodes need to be rearranged
in order to have a value equal to zero.
f). Emptying of tabu list, and repeat step b if necessary.
Tabu list needs to be emptied to be filled again with the
new order of nodes in the next cycle, if the maximum
number of cycles has not been achieved or has not
convergence. Algorithm is repeated from step b with prices
intensity parameter ant footprints among nodes that have
been updated.
3. SIMULATION
3.1. Simulation Parameter
In this paper we simulate the transmission of packet data in
mobile Ad Hoc network using DSR protocol that has been
optimized using Ant algorithm ( DSR-Ant). For simulation we
have used Qualnet 5.2 Software. In our simulation we have
taken simulation area 500X500 meters, radio propagation
model Rayleigh and Rician and simulation time 100ms. The
performance will be measured in terms of Qos parameters of
delay and throughput. For analyzing routing scenario, we have
considered routing overhead and hop count. Above mentioned
parameters plays very important roles in analyzing the
network. Delay and throughput parameter gives performance
at receiver side and routing overhead and hop count parameter
used to analyze routing performance based on algorithm used.
3.2. Scenario Analysis
We have analyzed three scenarios to evaluate DSR
performance in velocity of node movement. This is to evaluate
the routing protocol performance in velocity variation and
environment.
• In first scenario, we have fixed nodes and increasing
the velocity of node and data is being transmitted
between the nodes. In this we used 9 values between
2m/s to 18m/s.
• In second scenario, we implement various pause time
to evaluate routing protocol performance in dynamic
network. We have used pause time values between
10s to 100s.
• In third scenario, we have implemented constant
velocity with increasing traffic connection between
the node. We have used ten different traffic
connection and the number of node between 2 to 20.
When there is more traffic then queuing is higher and
produces congestion in network.
4. RESULT AND ANALYSIS
4.1. For velocity scenario
The result shows higher throughput and smaller end -to-end
delay as shown in Fig-4.1(a) and Fig-4.1(b)[7]. DSR-ant
searches the best path needs more routing overhead in a
manner such that protocol find shortest path with smaller hop
change in velocity will effect the shape and configuration of
network data transmission path. In this scenario, we have
analyzed that DSR-ant performance is better than standard
DSR in throughput, smaller end-to-end delay and number of
hop to send the message but DSR-ant has larger routing
overhead.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 343
Fig-4.1: (a) Throughput
Fig-4.1: (b) End-to-end delay
4.2. Result and Analysis Pause Time Scenario
The Fig-4.2(a) and Fig-4.2(b)[7] shows the pause time
scenario of end-to-end delay and Throughput. We have
analyzed that DSR-ant has smaller end-to-end delay because
this algorithm can search most efficient path with higher
throughput than standard DSR.
Fig-4.2: (a) End-to-end delay
Fig-4.2: (b) Throughput
4.3. Result and Analysis Traffic Connection Scenario
The traffic connection scenario is shown in Fig-4.3 (a), (b), (c)
and (d)[7]. When we are increasing traffic connection in the
network between the user or node will create congestion,
larger number of packets will wait in queue in the system and
lesser bandwidth. The routing protocol that has been
optimized with Ant algorithm can improved the performance
with smaller end-to-end delay and lesser number of hop. DSR-
ant have higher throughput in comparison to standard DSR but
due to complex calculation in DSR-ant to find the shortest
path, we have higher value of routing overhead.
Fig-4.3: (a) End-to-end delay
Fig-4.3: (b) Throughput
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 344
Fig-4.3: (c) Routing overhead
Fig-4.3: (d) Average hop count
CONCLUSIONS
Ant algorithm is a very good tool to be implemented in
optimization of mobile ad hoc network. we have implemented
it using Qualnet 5.2 in reference to three different scenario and
compared our result with a standard DSR. Our result shows
that DSR-ant can improve the performance of MANET in
respect to end-to-end delay, throughput and number of hop to
transfer the message from sender to receiver. We can reduce
time needed to search for the shortest path using the Ant
algorithm. This will makes our mobile Ad hoc network faster
REFERENCES
[1]. Istikmal, Meylanie Olivya, "Performance Analysis of
Routing Protocol on Data Forwarding Effectiveness in
Mobile Ad hoc Network", Proceedings of The 5th
International Conference on Telematics System, Services
and Applications. Institute Technology of Bandung,
November 19-21, 2009.
[2]. Zhaohua Long, Zheng He."Optimization and
Implementation of DSR Route Protocol based on Ad hoc
network".
[3]. Gianni Di Caro and Marco Dorigo. “AntNet: Distributed
Stigmergetic Control for Communications Networks”. Journal
of Artificial Intelligence Research, 9:317–365, 1998.
[4]. Gianni Di Caro."Ant Colony Optimization and Its
Application to Adaptive Routing in Telecommunication
Network"
[5]. Vincensius LR, Indrarini Dyah I, Istikmal . "Performance
Analysis DSDV and ZRP based Ant algorithm at Mobile Ad
hoc network". Telecommunications Journal of Research and
Development, december 2010 volume 15-number 2,pp-109
[6]. Leksono, Agus.“Ant Colony Optimization (ACO)
Algorithm to Completed Travelling Salesman Problem (TSP).
Faculty of Mathematics and natural Sciences, University of
Dipengoro,2009.
[7]. Istikmal."Analysis And Evaluation Optimization Dynamic
Source Routing ( DSR ) Protocol in Mobile Adhoc Network
Based on Ant Algorithm". International Conference of
information and communication technology (ICoICT),2013.
BIOGRAPHIES
Thiyam Romila Devi:- Has received B.E
in Electronics and communication
Engineering from KNSIT, Bangalore
under Visvesvaraya Technological
University (VTU),Belgaum, India. She is
presently pursuing M. Tech from KIIT-
University, Bhubaneswar, Odisha, India with specialization in
Communication System Engineering (ETC).
Rameswari Biswal: Has received B.Tech in
Electronics and Communication Engineering
from BCET, Balasore under Biju Patnayak
University of Technology (BPUT), India.
She is presently pursuing M. Tech from
KIIT-University, Bhubaneswar, Odisha, with
specialization in Communication System Engineering (ETC).
Vikram Kumar:- Has received B.E. in
Electronics and communication
Engineering from LNCT, Bhopal under
Rajiv Gandhi Proudyogiki vishwavidyalaya
(RGTU), India. He is presently pursuing
M. Tech from KIIT-University, Bhubaneswar, Odisha, with
specialization in Communication System Engineering (ETC).
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 345
Abhishek Jena:- Has received B. Tech in
Electronics and communication
Engineering from SRM College of
Engineering ,Chennai under SRM
University, India. He is presently
pursuing M. Tech from KIIT-University,
Bhubaneswar, Odisha, with specialization
in Communication System Engineering (ETC)

More Related Content

What's hot

1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase theyasinalimohammed
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networkseSAT Publishing House
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaeSAT Publishing House
 
Location updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manetLocation updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in maneteSAT Journals
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in maneteSAT Publishing House
 
Geographical routing protocols for mobile ad hoc networks a survey on their ...
Geographical routing protocols for mobile ad hoc networks  a survey on their ...Geographical routing protocols for mobile ad hoc networks  a survey on their ...
Geographical routing protocols for mobile ad hoc networks a survey on their ...eSAT Journals
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkeSAT Publishing House
 

What's hot (17)

1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdma
 
Location updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manetLocation updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manet
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 
Geographical routing protocols for mobile ad hoc networks a survey on their ...
Geographical routing protocols for mobile ad hoc networks  a survey on their ...Geographical routing protocols for mobile ad hoc networks  a survey on their ...
Geographical routing protocols for mobile ad hoc networks a survey on their ...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
F04503057062
F04503057062F04503057062
F04503057062
 
E1073644
E1073644E1073644
E1073644
 

Viewers also liked

Design and economical of roof trusses & purlins (comparison of limit state an...
Design and economical of roof trusses & purlins (comparison of limit state an...Design and economical of roof trusses & purlins (comparison of limit state an...
Design and economical of roof trusses & purlins (comparison of limit state an...eSAT Publishing House
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blasteSAT Publishing House
 
Detection of hazard prone areas in the upper himalayan region in gis environment
Detection of hazard prone areas in the upper himalayan region in gis environmentDetection of hazard prone areas in the upper himalayan region in gis environment
Detection of hazard prone areas in the upper himalayan region in gis environmenteSAT Publishing House
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
 
Literature survey for 3 d reconstruction of brain mri
Literature survey for 3 d reconstruction of brain mriLiterature survey for 3 d reconstruction of brain mri
Literature survey for 3 d reconstruction of brain mrieSAT Publishing House
 
Analytical solutions for square shape pressure
Analytical solutions for square shape pressureAnalytical solutions for square shape pressure
Analytical solutions for square shape pressureeSAT Publishing House
 
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...eSAT Publishing House
 
Implementation of d space controlled dpwm based
Implementation of d space controlled dpwm basedImplementation of d space controlled dpwm based
Implementation of d space controlled dpwm basedeSAT Publishing House
 
A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationeSAT Publishing House
 
A novel mrp so c processor for dispatch time curtailment
A novel mrp so c processor for dispatch time curtailmentA novel mrp so c processor for dispatch time curtailment
A novel mrp so c processor for dispatch time curtailmenteSAT Publishing House
 
Motion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighborMotion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighboreSAT Publishing House
 
Image retrieval based on feature selection method
Image retrieval based on feature selection methodImage retrieval based on feature selection method
Image retrieval based on feature selection methodeSAT Publishing House
 
Design, simulation and hardware implementation of
Design, simulation and hardware implementation ofDesign, simulation and hardware implementation of
Design, simulation and hardware implementation ofeSAT Publishing House
 
Factors that influence the success of hsr stations
Factors that influence the success of hsr stationsFactors that influence the success of hsr stations
Factors that influence the success of hsr stationseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Quantum efficiency of 3, 5 dimethyl pyridine 2-
Quantum efficiency of 3, 5 dimethyl pyridine 2-Quantum efficiency of 3, 5 dimethyl pyridine 2-
Quantum efficiency of 3, 5 dimethyl pyridine 2-eSAT Publishing House
 
Design of wheelchair using finger operation with image processing algorithms
Design of wheelchair using finger operation with image processing algorithmsDesign of wheelchair using finger operation with image processing algorithms
Design of wheelchair using finger operation with image processing algorithmseSAT Publishing House
 
Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...eSAT Publishing House
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andeSAT Publishing House
 

Viewers also liked (20)

A novel approach to record sound
A novel approach to record soundA novel approach to record sound
A novel approach to record sound
 
Design and economical of roof trusses & purlins (comparison of limit state an...
Design and economical of roof trusses & purlins (comparison of limit state an...Design and economical of roof trusses & purlins (comparison of limit state an...
Design and economical of roof trusses & purlins (comparison of limit state an...
 
Simulation and performance analysis of blast
Simulation and performance analysis of blastSimulation and performance analysis of blast
Simulation and performance analysis of blast
 
Detection of hazard prone areas in the upper himalayan region in gis environment
Detection of hazard prone areas in the upper himalayan region in gis environmentDetection of hazard prone areas in the upper himalayan region in gis environment
Detection of hazard prone areas in the upper himalayan region in gis environment
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
Literature survey for 3 d reconstruction of brain mri
Literature survey for 3 d reconstruction of brain mriLiterature survey for 3 d reconstruction of brain mri
Literature survey for 3 d reconstruction of brain mri
 
Analytical solutions for square shape pressure
Analytical solutions for square shape pressureAnalytical solutions for square shape pressure
Analytical solutions for square shape pressure
 
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
Properties of the cake layer in the ultrafiltration of polydisperse colloidal...
 
Implementation of d space controlled dpwm based
Implementation of d space controlled dpwm basedImplementation of d space controlled dpwm based
Implementation of d space controlled dpwm based
 
A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimation
 
A novel mrp so c processor for dispatch time curtailment
A novel mrp so c processor for dispatch time curtailmentA novel mrp so c processor for dispatch time curtailment
A novel mrp so c processor for dispatch time curtailment
 
Motion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighborMotion based action recognition using k nearest neighbor
Motion based action recognition using k nearest neighbor
 
Image retrieval based on feature selection method
Image retrieval based on feature selection methodImage retrieval based on feature selection method
Image retrieval based on feature selection method
 
Design, simulation and hardware implementation of
Design, simulation and hardware implementation ofDesign, simulation and hardware implementation of
Design, simulation and hardware implementation of
 
Factors that influence the success of hsr stations
Factors that influence the success of hsr stationsFactors that influence the success of hsr stations
Factors that influence the success of hsr stations
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Quantum efficiency of 3, 5 dimethyl pyridine 2-
Quantum efficiency of 3, 5 dimethyl pyridine 2-Quantum efficiency of 3, 5 dimethyl pyridine 2-
Quantum efficiency of 3, 5 dimethyl pyridine 2-
 
Design of wheelchair using finger operation with image processing algorithms
Design of wheelchair using finger operation with image processing algorithmsDesign of wheelchair using finger operation with image processing algorithms
Design of wheelchair using finger operation with image processing algorithms
 
Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...Comparative review study of security of aran and aodv routing protocols in ma...
Comparative review study of security of aran and aodv routing protocols in ma...
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms and
 

Similar to Implementation of dynamic source routing (dsr) in

A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingeSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackeSAT Publishing House
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...eSAT Publishing House
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using eSAT Journals
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNEswar Publications
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in maneteSAT Journals
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Publishing House
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Journals
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes ineSAT Publishing House
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingeSAT Publishing House
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
 

Similar to Implementation of dynamic source routing (dsr) in (20)

A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attack
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes in
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Recently uploaded

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 

Recently uploaded (20)

(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 

Implementation of dynamic source routing (dsr) in

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 339 IMPLEMENTATION OF DYNAMIC SOURCE ROUTING (DSR) IN MOBILE AD HOC NETWORK (MANET) Thiyam Romila Devi1 , Rameswari Biswal2 , Vikram Kumar3 , Abhishek Jena4 1, 2, 3, 4 M.Tech, School of Electronics, KIIT University, Odisha, India romilath@gmail.com, rameswaribiswal@gmail.com, vikram_2006be@yahoo.co.in, bapuni207@gmail.com Abstract Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network (MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network. The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection. All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number of hop to transfer information between nodes. Keywords: MANET, DSR, ANT Algorithm ----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION 1.1 MANET Overview Mobile ad hoc network (MANET) is a autonomous and dynamic network consist of wireless mobile hosts or nodes. For example, communication between remote notes is based on multiple hop. These nodes are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Thus MANETs are self configuring as there is no central management system with configuration responsibilities. All the mobile nodes can communicate each other directly if they are in others wireless links radio range. In order to enable data transfer they either communicate through single hop or multi hop with the help of intermediate nodes. MANETs allow ubiquitous service access anywhere, anytime without any fixed infrastructure, thus named as an infrastructure-less network that can be widely used in military, battlefields, management services, classrooms, various multimedia applications and conference halls. The Fig-1. shows the MANET Fig-1: Infrastructure less Network 1.2 DSR Protocol and Optimization The DSR (Dynamic source routing) protocol is a simple and efficient routing protocol for wireless mesh network which is designed for the use in multi- hop wireless ad hoc network of mobile nodes. DSR allows the network to be completely self-
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 340 organizing and self-configuring, without the need of any predefined infrastructure. This protocol is composed of the two main mechanisms of a) Route discovery and b) Route maintenance. These two work together to allow nodes to discover and maintain routes to arbitrarily destination in the ad hoc network [1]. 1.2.1 Route Discovery Route Discovery is used to discover a route from source to particular destination using two stages; Route request (RREQ) and Route Reply(RREP). This method also includes some optimization measures; during route request process, and intermediate node can be authorized to issue a complete route reply if it contains a valid route to the destination in its route cache memory. Whenever a source wants to communicate with destination and if it does not have a route in its Route Cache, it broadcasts a RREQ message to find a particular route. Each neighbour receives the RREQ and appends its own address to the address list in the RREQ (if it has not already processed the same request earlier) and re-broadcasts the packet. This process will continue until either the maximum hop counter is incremented (or RREQ is rejected) or the destination is reached. The destination receives the RREQ, appends its address and generates a route reply packet (RREP) back towards the source using the reverse of the accumulated route in latter case. When the source finally receives RREP, it will store the route in its Route Cache [2]. Fig-2: DSR Route Discovery During the process of discovery, there's a problem that should be noticed. In the Figure1 above, node D may receive the router requests both from node C and node E at the same time, this will lead to the message collision, and the correct requests cannot be accepted. Therefore, the broadcast in Ad hoc network isn't reliable. This kind of problem can be avoided by random delay transmission, authentication and so on. However, random delay transmission cannot guarantee to choose the best suitable router item, while the authentication has to send more router control messages, thus results in more resource wasted and load aggravation. There comes up a new algorithm to solve this problem, i.e. ANT Algorithm 1.2.2 Route Maintenance Route Maintenance is used to manage (cache, expire, switch among) previously discovered routes. Once some nodes find the neighbouring link that data is to be sent by is disconnected, they immediately send a route error message RERR to source node. When the source node receives the error packet, it deletes all the routes that use the invalid link from the buffer, and starts a new route discovery process if necessary. The nodes that forward the error packet along the way delete all the route in the broken link from their own routing table. The route discovery procedure of DSR protocol often discovers many routes from source node to destination node. And route with minimal hop is more possible chosen for data transmission than others, the nodes frequently chosen are more likely to consume more energy, which results in short usage of battery. 1.3 Architecture of Mobile communication system based on DSR DSR is used to replace the former routing protocol in BS. In the same time the backbone network of mobile communication system becomes an entire IP network. Every BS has assigned a unique IP address and the data transmitted between the BSs results into the IP formation of the same data. The Fig- 2. Shows BS of Mobile communication network after the improvement. The basic elements of BS are- a) Wireless link control layer- This layer defines reliable data transmission between MS and BS in circuit mode and it can be expanded like as link layer. b) Wireless resource management layer- It both builds and removes the wireless link between MS and BS for the MS where it moves in network when the link state transmission is being maintained. c) Mobility management layer- It realizes some functions of MS such as user's register and authorization in the service area of different BSs. d) Communication management layer- It realizes the functions of management to wireless users such as routing management and routing management. e) Switching- It realizes the IP's disposal of data. It can be discovered and maintained the route between BSs of source MS and destination MS according to DSR protocol. f) Wireless channels (Uu) interface- It defines the wireless interface between BS and Ms. g). Wireless channels (lu) interface- It defines the wireless interface between BSs. The Fig-3 shows the data flow from one BS to another BS with two wireless hops in mobile communication with the entire mobility of data and also shows how the inclusion of more intermediate BSs would behave. The MS originates a typical data packet and is arriving at the BS A through Uu
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 341 interface. At BS A the packet must transverse the entire protocol stacks, from the Uu interface down to the lu interface. At the intermediate BS, the packet must brought up to DSR sub layer and will be examined and is sent out again. Hence , packets do not go beyond the DSR sub layer in the route. All the packets are originated from and is terminated at the sub layer of DSR. The relaying of control packets is same as that of the data packets. Fig-3: BS of Mobile Communication Network 2. ANT ALGORITHM ANT algorithm is an algorithm that is similar as the behavior of ant colonies, known as ant system. Ant can find the shortest route between the nest and the food source by footprints or pheromones on the path that has been traversed. Ants are practically blind but they still manage to find their way to and from food. These observations inspired a new type of algorithm called ant algorithms (or ant systems)[3][4][5][6]. In order to determine the shortest route, Ant algorithm is being used and the steps of determining are as follows:- a). Initialization parameters value algorithm. The intensity of inter-node ant trail and changes (τij), many of nodes (n) includes the coordinates (x, y) or the distance between nodes (dij), Origin node and destination node, constant cycle of ants (Q), constant intensity controller ant trail (α), the value of α ≥ 0, constant control visibility (β), the value of β ≥ 0, visibility between nodes = 1/dij (ηij), the number of ants (m), evaporation constant trail of ants (ρ), ρ values must be > 0 and <1 to prevent infinite pheromone trail, and the maximum number of cycles (NCmax) is fixed during the algorithm run, while costs (τij) will be updated at each cycle algorithm from the first cycle (NC = 1) to reach the maximum number of cycles (NC = NCmax) or until there is convergence. After we initialization parameters, further we Initialize the first node each ant. First performed initialization (τij), then (m) ants are placed on certain first node randomly. This ant called forward ant packet, it will trace the route to the destination node. When it was discovered the destination node, the ants would go back through the same route. In this condition the ant called backward ant. b). Charging the first node in the tabu list. Tabu list is a table containing the visibility of information between nodes.The results of the first node initialization every ant in first step should be filled as the first element of the table list. The result of this step is to fill its first element table list each ant with a particular node index, which means that every tabuk (1) can contain node index between 1and n as the initialization in step (a). c). Composition of each ant route to all node. Ant colonies that have been distributed to some or each node will start to travel from each first node as the origin node and one other node as the destination node. Then from the second node, respectively, ant colonies will continue the trip by choosing one of the nodes that are not on tabuk as the next destination node. Journey ant colony continues until all the nodes one by one visited or have occupied tabuk.If s expressed sequence index visit, expressed as tabuk origin node (s) and other node is expressed as {Ntabuk}, then the destination node is used to determine the probability of the node equations to visit [3][4][5][6]: = (1) for j , for other j with I as the index of the origin node and J as index destination node. d). Calculation of route length of every ant. Calculation of closed route length (length closed tour) or Lk any ants performed after one cycle completed by all ants. This calculation is done based each tabuk with the following equation with dij is the distance between node i to node j [3][4][5][6] : (2) (3)
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 342 to search the shortest route. After every ant Lk is calculated, will get a minimum length of each cycle routes closed or Lmin NC and minimum values on the whole length of the route is closed or Lmin. Calculation of changes in the value of the intensity of inter-node ant footprints. Ant colonies will leave footprints on the path between the nodes in its path. The existence of evaporation and the difference in the number of ants making the possibility of a change in the value of the intensity of inter-node ant footprints. The equation this changes is [3][4][5][6] : (4) Changes in intensity values between nodes and footprints every ant is calculated based on the equation: , for (i,j) origin node and destination node in tabuk (5) = 0, for other (i,j) e). The calculation of the value of the intensity of internodes ant footprints for the next cycle. Ant footprints intensity values between nodes on all paths between nodes is likely to change due to evaporation and the difference in the number of ants that passed. For the next cycle, the ant will pass the track intensity prices have changed. Ant footprints intensity values between nodes for the next cycle is calculated by the equation [3][4][5][6]: = P* (6) further Reset the value of the intensity changes between nodes ant footprints. For the next cycle of price changes ant trail intensity between the nodes need to be rearranged in order to have a value equal to zero. f). Emptying of tabu list, and repeat step b if necessary. Tabu list needs to be emptied to be filled again with the new order of nodes in the next cycle, if the maximum number of cycles has not been achieved or has not convergence. Algorithm is repeated from step b with prices intensity parameter ant footprints among nodes that have been updated. 3. SIMULATION 3.1. Simulation Parameter In this paper we simulate the transmission of packet data in mobile Ad Hoc network using DSR protocol that has been optimized using Ant algorithm ( DSR-Ant). For simulation we have used Qualnet 5.2 Software. In our simulation we have taken simulation area 500X500 meters, radio propagation model Rayleigh and Rician and simulation time 100ms. The performance will be measured in terms of Qos parameters of delay and throughput. For analyzing routing scenario, we have considered routing overhead and hop count. Above mentioned parameters plays very important roles in analyzing the network. Delay and throughput parameter gives performance at receiver side and routing overhead and hop count parameter used to analyze routing performance based on algorithm used. 3.2. Scenario Analysis We have analyzed three scenarios to evaluate DSR performance in velocity of node movement. This is to evaluate the routing protocol performance in velocity variation and environment. • In first scenario, we have fixed nodes and increasing the velocity of node and data is being transmitted between the nodes. In this we used 9 values between 2m/s to 18m/s. • In second scenario, we implement various pause time to evaluate routing protocol performance in dynamic network. We have used pause time values between 10s to 100s. • In third scenario, we have implemented constant velocity with increasing traffic connection between the node. We have used ten different traffic connection and the number of node between 2 to 20. When there is more traffic then queuing is higher and produces congestion in network. 4. RESULT AND ANALYSIS 4.1. For velocity scenario The result shows higher throughput and smaller end -to-end delay as shown in Fig-4.1(a) and Fig-4.1(b)[7]. DSR-ant searches the best path needs more routing overhead in a manner such that protocol find shortest path with smaller hop change in velocity will effect the shape and configuration of network data transmission path. In this scenario, we have analyzed that DSR-ant performance is better than standard DSR in throughput, smaller end-to-end delay and number of hop to send the message but DSR-ant has larger routing overhead.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 343 Fig-4.1: (a) Throughput Fig-4.1: (b) End-to-end delay 4.2. Result and Analysis Pause Time Scenario The Fig-4.2(a) and Fig-4.2(b)[7] shows the pause time scenario of end-to-end delay and Throughput. We have analyzed that DSR-ant has smaller end-to-end delay because this algorithm can search most efficient path with higher throughput than standard DSR. Fig-4.2: (a) End-to-end delay Fig-4.2: (b) Throughput 4.3. Result and Analysis Traffic Connection Scenario The traffic connection scenario is shown in Fig-4.3 (a), (b), (c) and (d)[7]. When we are increasing traffic connection in the network between the user or node will create congestion, larger number of packets will wait in queue in the system and lesser bandwidth. The routing protocol that has been optimized with Ant algorithm can improved the performance with smaller end-to-end delay and lesser number of hop. DSR- ant have higher throughput in comparison to standard DSR but due to complex calculation in DSR-ant to find the shortest path, we have higher value of routing overhead. Fig-4.3: (a) End-to-end delay Fig-4.3: (b) Throughput
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 344 Fig-4.3: (c) Routing overhead Fig-4.3: (d) Average hop count CONCLUSIONS Ant algorithm is a very good tool to be implemented in optimization of mobile ad hoc network. we have implemented it using Qualnet 5.2 in reference to three different scenario and compared our result with a standard DSR. Our result shows that DSR-ant can improve the performance of MANET in respect to end-to-end delay, throughput and number of hop to transfer the message from sender to receiver. We can reduce time needed to search for the shortest path using the Ant algorithm. This will makes our mobile Ad hoc network faster REFERENCES [1]. Istikmal, Meylanie Olivya, "Performance Analysis of Routing Protocol on Data Forwarding Effectiveness in Mobile Ad hoc Network", Proceedings of The 5th International Conference on Telematics System, Services and Applications. Institute Technology of Bandung, November 19-21, 2009. [2]. Zhaohua Long, Zheng He."Optimization and Implementation of DSR Route Protocol based on Ad hoc network". [3]. Gianni Di Caro and Marco Dorigo. “AntNet: Distributed Stigmergetic Control for Communications Networks”. Journal of Artificial Intelligence Research, 9:317–365, 1998. [4]. Gianni Di Caro."Ant Colony Optimization and Its Application to Adaptive Routing in Telecommunication Network" [5]. Vincensius LR, Indrarini Dyah I, Istikmal . "Performance Analysis DSDV and ZRP based Ant algorithm at Mobile Ad hoc network". Telecommunications Journal of Research and Development, december 2010 volume 15-number 2,pp-109 [6]. Leksono, Agus.“Ant Colony Optimization (ACO) Algorithm to Completed Travelling Salesman Problem (TSP). Faculty of Mathematics and natural Sciences, University of Dipengoro,2009. [7]. Istikmal."Analysis And Evaluation Optimization Dynamic Source Routing ( DSR ) Protocol in Mobile Adhoc Network Based on Ant Algorithm". International Conference of information and communication technology (ICoICT),2013. BIOGRAPHIES Thiyam Romila Devi:- Has received B.E in Electronics and communication Engineering from KNSIT, Bangalore under Visvesvaraya Technological University (VTU),Belgaum, India. She is presently pursuing M. Tech from KIIT- University, Bhubaneswar, Odisha, India with specialization in Communication System Engineering (ETC). Rameswari Biswal: Has received B.Tech in Electronics and Communication Engineering from BCET, Balasore under Biju Patnayak University of Technology (BPUT), India. She is presently pursuing M. Tech from KIIT-University, Bhubaneswar, Odisha, with specialization in Communication System Engineering (ETC). Vikram Kumar:- Has received B.E. in Electronics and communication Engineering from LNCT, Bhopal under Rajiv Gandhi Proudyogiki vishwavidyalaya (RGTU), India. He is presently pursuing M. Tech from KIIT-University, Bhubaneswar, Odisha, with specialization in Communication System Engineering (ETC).
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 345 Abhishek Jena:- Has received B. Tech in Electronics and communication Engineering from SRM College of Engineering ,Chennai under SRM University, India. He is presently pursuing M. Tech from KIIT-University, Bhubaneswar, Odisha, with specialization in Communication System Engineering (ETC)