SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 2, April 2023, pp. 1795~1802
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i2.pp1795-1802  1795
Journal homepage: http://ijece.iaescore.com
Performance evaluation of dynamic source routing protocol
with variation in transmission power and speed
Saad Elsayed1
, Mohamed Ibrahim Youssef2
1
Departement of Electronics and Communications Engineering, High Institute for Engineering and Technology, Al-Obour, Egypt
2
Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt
Article Info ABSTRACT
Article history:
Received Mar 12, 2022
Revised Jul 2, 2022
Accepted Jul 5, 2022
Mobile ad-hoc network (MANET) is a set of mobile wireless nodes
(devices) which is not rely on a fixed infrastructure. In MANETs, each
device is responsible for routing its data according to a specific routing
protocol. The three most common MANET routing protocols are: dynamic
source routing protocol (DSR), optimized link state routing protocol
(OLSR), and ad-hoc on-demand distance vector (AODV). This paper
proposes an efficient evaluation of DSR protocol by testing the MANETs
routing protocol with variation in transmission power at different speeds.
The performance analysis has been given using optimized network
engineering tools (OPNET) modeler simulations and evaluated using metrics
of average end to end delay and throughput. The results show that the
throughput increases as the transmission power increases up to a certain
value after which the throughput decreases, also the network work optimally
at a certain transmission power which varied at different speed.
Keywords:
Dynamic source routing
protocol
End to end delay
Mobile ad-hoc network
Optimized network engineering
tools
Random mobility
Throughput This is an open access article under the CC BY-SA license.
Corresponding Author:
Saad Elsayed
Department of Electronics and Communications Engineering, High Institute for Engineering and
Technology
Al-Obour, Kilo 21 Cairo/Belbies Rd. High Institute for Engineering and Technology, Egypt-P.O. Box 27-
Obour City, Egypt
Email: s.elsayed8585@gmail.com
1. INTRODUCTION
Mobile ad-hoc network (MANET) devices are spread in a wide range of applications such as
military, smart cities, healthcare and other applications [1]. Currently, in addition to hierarchical networks,
wireless MANETs have become prevalent networks [2]. In the near future, with the rapid development of the
internet of things (IoT) networks, the most of devices connected in the network are wireless mobile devices;
use machine-to-machine communication. Therefore MANET will continue to be an important research
topics, especially, routing protocols improvement to maximize the network lifetime [3]–[5]. MANET
supported by several wireless communication technologies such as WiMAX, ZigBee, and Wi-Fi [6].
The routing protocols of MANET can be classified into three categories as shown in Figure 1:
− Proactive routing protocols: A route table about the position of each node is built frequently and routing is
based on it. Examples of proactive routing protocols (also named table driven routing) are global state
routing (GSR), destination-sequenced distance vector (DSDV), and optimized link state routing (OLSR).
− Reactive routing protocols: This category have no predefined routes. So, the on-demand route is
generated dynamically with the request packets. Based on the response, the next node is identified and
this process goes on until a fixed path is established and the data packets reach the destination. Examples
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1795-1802
1796
of the reactive routing (also named on demand routing) dynamic source routing (DSR), ad-hoc
on-demand distance vector (AODV), and temporally ordered routing algorithm (TORA).
− Hybrid routing protocols: It is a mix of both proactive and reactive routing protocols such as distributed
dynamic routing (DDR), distributed spanning trees based (DST), and zone routing protocol (ZRP).
Figure 1. MANET routing protocols classifications
DSR is a most widely used protocol that depends on source routing mechanism. DSR protocol
transmits the routing traffic only in the occurrence of data that has ready to transmit is the main reason of
acquiring low overhead [7]–[10]. This removes the desire to transmit unwanted routing traffic. Due to much
route reply to a single request, AODV has high routing overhead as compared to DSR. This in turn eliminates
the need to send unnecessary routing traffic. AODV and DSR use distinct mechanism for route discovery but
with same table-driven method. AODV originates maximum overhead than DSR [11].
Three multicast routing strategies for MANET has been presented in [12]. Three routing protocols
proposed are a reactive multicast routing protocol for cluster-based MANET by using software defined
network, proactive multicast routing protocol for cluster-based MANET by using SDN (PMCMS) and
modification called M-PMCMS. Different mobility models have been analyzed [13]–[16]. To enhance the
traffic safety, misbehavior detection using machine learning has been studied in [17]. Security issue in
MANET has been discussed in many papers such as [18], [19]. The impact of retransmissions of packet lost
and energy consumption in order to choose the appropriate routing protocol that can be enhance quality of
service (QoS) of MANET are minimized and examined using NS-3 simulator [20].
A scheme called AODV-velocity and dynamic for effective broadcast control packets is proposed
[21]. The routing protocol for the ad-hoc on-demand distance vector (AODV) is used to implement the
proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets
and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed
AODV-VD scheme to the AODV routing protocol in terms of end -to-end latency, average throughput,
packet transmission ratio and overhead ratio.
Different mobility models for OLSR protocol was examined. Four mobility models was considered;
random direction, random walk, way-point mobility, and steady state random way-point. The simulation
results show that the steady state random way-point presents better results from the delay point of view but
random way point performs better from the throughput point of view [22]. From the previous discussion,
most of papers did not take into account the effect of a change in speed and transmitted power together on the
performance metrics such as throughput and delay. The related works parameters summarized in Table 1.
As shown in Table 1, the papers [20]–[27] do not take into account the effect of transmitted power
variation. A study of the effect of varying transmitted power at fixed speed (10 m/sec) is given in [28]. It is
important to note that, most of related works have been simulated the network for short time.
In this paper the analysis of the performance of the DSR protocol using OPNET is given. Also, an
efficient analysis method to evaluate the routing protocol is proposed. The rest of this paper is organized as:
in section 2, the research method has been introduced. The simulation results of the proposed model have
been discussed in section 3. Finally, section 4 presents the conclusion of the proposed model.
Int J Elec & Comp Eng ISSN: 2088-8708 
Performance evaluation of dynamic source routing protocol with variation in … (Saad Elsayed)
1797
Table 1. The related works summary
Paper Protocol Speed
(m/sec)
Simulator Transmitted
power
Data
Traffic
No. of
Nodes
Simulation Area
(m2
)
Simulation
Time (sec)
[20] AODV
OLSR
DSDV
10 to 50 NS-3 1.65 w CBR 50 1,000×1,000 300
[21] AODV 5 to 50 NS-2 N.A CBR 20-100 1,000×1,000 300
[22] OLSR 20 NS-3 N.A CBR 20-100 500×1,500 1,000
[23] OLSR 10 NS-2 N.A CBR 10-100 1,000×1,000 1,200
[24] AODV
OLSR
DSDV
DSR
0 to 30 NS-3 7.5 dBm CBR 50 500, 750, 1,000 200
[25] AODV
DSDV
10 to 80 NS-3 N. A CBR 50-250 300×1500 300
[26] M-
AODV
DSR
10 NS-3 N. A CBR 50-250 1,000×1,000 100
[27] DSR,
AODV
DSDV
5 NS-2 N. A CBR 20 1,859×550 150
[28] AODV 10 QualNet 1 - 4 dBm CBR 40, 80,
120
1,500×1,500 300
Simulated Network DSR 10 to 40 OPNET 1 – 4mW FTP 40, 80 1,500×1,500 3,600
2. PROPOSED METHOD
In this section, a research method based on simulation analysis has been presented. There are several
network simulators such as OPNET [29], OMNeT++ [30], QualNet [31], NS-2 [32], NS-3 [33] and J-Sim
[34]. OPNET modeler was chosen due to its accuracy and to its sophisticated graphical user interface. To
perform simulations, a MANET scenario has been designed with the number of nodes of 40 and 80 nodes
randomly placed over 1,500*1,500 meters area size using OPNET simulator as shown in Figure 2.
Figure 2. The simulated network using OPNET
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1795-1802
1798
The performance of DSR protocol is evaluated for the performance metrics, throughput and end to
end delay. The performance of the designed network scenario has been examined with variation of
transmitted power. The mobility model used in the designed scenario is random waypoint mobility model
(RWMM). Also, the performance of the designed network scenario has been evaluated with variation in node
speed. The list of simulation parameters and the values used in the simulated network scenario has been
illustrated in Table 2.
Table 2. The simulation parameters
Parameters Values
Routing Protocol DSR
Number of Nodes 40 and 80 Nodes
Mobility Model RWMM
Node Speed (m/sec) 10 – 40 m/sec
Transmitted Power (mW) 1 - 4
Application Protocol FTP
Simulation Area (m2
) 1500×1500
Simulation Time 3600 sec
As shown in Table 2, the simulation time is 3,600 sec and the transmitted power will be vary from
1 to 4 mW. Two network sizes will be examined 40 and 80 nodes. The node speed will be vary from
10 to 40 m/sec and the simulation area is 2.25 km2
.
3. SIMULATION RESULTS AND ANALYSIS
This section evaluates the proposed model using OPNET. Results have been carried out by varying
the transmitted power and node speed. The proposed model has been evaluated by two metrics namely,
average throughput, and average end to end delay.
3.1. Performance evaluation of the simulated network at different transmitted power and speeds
In this simulation, the transmitted power may vary between 1-4 mW. Also, the speed varies between
10-40 m/sec. The network size is 40 nodes. The performance in terms of throughput is shown in Figure 3. As
shown in Figure 3, it can be observed that, the average of throughput at 3 mW transmitted power is the
highest. Results show that, at the speed=10 m/sec, PT=1, 2, 3, and 4 mW; the average throughput is 114.186,
118.861, 122.175, and 59.038 Kb/sec respectively. It is important to note that, the average of throughput is
increases as the transmitted power increases up to 3 mW after which the throughput decreases. At the
speed=20 m/sec; average of throughput at 2 mW transmitted power is the highest. The average throughput
for different transmitted power (PT=1, 2, 3, and 4 mW) is 117.099, 121.892, 116.100, and 63.779 Kb/sec
respectively.
Figure 3. Transmission power impact on the average throughput
Int J Elec & Comp Eng ISSN: 2088-8708 
Performance evaluation of dynamic source routing protocol with variation in … (Saad Elsayed)
1799
As shown in Figure 3, the average throughput for different transmitted power (PT=1, 2, 3, and
4 mW) is 116.446, 120.021, 115.981, and 48.985 Kb/sec respectively at the speed=30 m/sec. It is also
showing that, the average of throughput at 2 mW transmitted power is the highest. PT=1, 2, 3, and 4 mW; the
average throughput is 112.868, 116.436, 113.838, and 44.543 Kb/sec respectively at 40 m/sec node speed.
The performance in terms of average delay is depicted in Figure 4. It can be observed that, the
average of delay at 3 mW transmitted power is the lowest. Results show that, at the speed=10 m/sec, PT=1, 2,
3, and 4 mW; the average delay is 1.83745, 1.826676, 1.791556, and 4.363661 msec respectively as shown in
Figure 4.
It is important to note that, the average of delay is increases as the transmitted power increases up to
3 mW after which the delay decreases. Figure 4 shows that, at the speed=20 m/sec; average of delay at 2 mW
transmitted power is the lowest. The average delay for different transmitted power (PT=1, 2, 3, and 4 mW) is
1.834889, 1.734518, 1.804406, and 4.432615 msec respectively. The average delay for different transmitted
power (PT=1, 2, 3, and 4mW) is 1.836479, 1.745199, 1.816238, and 6.0222 msec respectively at the
speed=30 m/sec. It is also depicted that, the average of delay at 2 mW transmitted power is the lowest. PT=1,
2, 3, and 4 mW; the average delay is 1.940127, 1.841685, 1.898932, and 6,234 msec respectively at 40 m/sec
node speed.
Figure 4. Transmission power impact on the average delay
3.2. Three-dimension performance evaluation of the simulated model
Figure 5 depicts the effect of changing speed and transmitted power on the throughput and delay for
a network size of 40 nodes and 80 nodes. The average throughput and the average delay for a network size of
40 nodes have been shown in Figures 5(a) and 5(b) respectively. The results are illustrated in three
dimensions form to determine the optimal working point from the viewpoints of the speed and the
transmitted power together to obtain the highest throughput and the least delay.
Figure 5(a) shows that the highest value of throughput ranges between 120 and 140 Kb/sec and is
achieved at speeds from 10 to 25 m/sec. It also shows that at lower speeds there are more values of the
transmitted power at which it can be worked to obtain the highest value of the throughput. By increasing the
speeds, the highest values of throughput are achieved at more specific values of the transmitted power. As
shown in Figure 5(b), the delay increases with increasing node speed, while it decreases with increasing
transmitted power until a certain value and then increases after that. The delay ranges between 1 and 2 msec
when the transmitted power is from 1 to 3 mW, while the delay increases dramatically when the transmitted
power is 4 mW.
The average throughput and the average delay for a network size of 80 nodes have been shown in
Figures 5(c) and 5(d) respectively. Figure 5(c) shows that the highest value of throughput ranges between
600 and 800 Kb/sec and is achieved at transmitted powers from 1 to 3 mW. It also shows that, the maximum
throughput is 671.533 Kb/sec which achieved at speed of 30 m/sec and transmitted power is 2 mW. These
results show that the maximum throughput of 80 nodes is more than five times that of 40 nodes. Figure 5(d)
shows that the delay increases slightly at the beginning and then decreases until it reaches the lowest value at
a speed of 30 m/s and a transmitting power of 3 mW. It also shows that the effect of changing the speed on
the delay is small. It is possible to benefit from this method in presenting the results by defining the
constraints of the system under study or the design, such that the speed has a specific range, so choose the
optimal work point from the point of view of the transmitted power, and so on.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1795-1802
1800
(a) (b)
(c) (d)
Figure 5. Effect of transmitted power and speed on performance of DSR protocol (a) throughput of 40 nodes,
(b) delay 40 of nodes, (c) throughput of 80 nodes, and (d) delay of 80 nodes
4. CONCLUSION
In this paper, the throughput and average end to end delay performance metrics have been analyzed
to DSR protocol. The designed scenario is carried out with variation in node speed and transmission power
over 40 and 80 nodes. The results show that the throughput increases as the transmitted power increases up to
a certain value after which the throughput decreases due to increasing interference. It can be concluded that
the designed DSR routing protocol for 40 nodes MANET network performs optimally at a transmission
power of 3 mWat speeds 10 m/sec. The results also show that the maximum throughput can be achieved at
2 mW at speeds of 30 m/s for 80 node network size. The results also show that the network performance
changes dramatically when the transmitted power increases to 4mW for all simulated speeds, so it is
recommended according to the selected parameter that it is suitable for networks where the transmitted power
is less than 4 mW. This work can be extended to evaluate routing protocols such as AODV, DSDV, and
OLSR.
REFERENCES
[1] L. N. Hung and V. K. Quy, “A review: performance improvement routing protocols for MANETs,” Journal of Communications,
vol. 15, no. 5, pp. 439–446, 2020, doi: 10.12720/jcm.15.5.439-446.
[2] V. K. Quy, V. H. Nam, and D. M. Linh, “A survey of state-of-the-art energy efficiency routing protocols for MANET,”
International Journal of Interactive Mobile Technologies, vol. 14, no. 9, pp. 215–226, Jun. 2020, doi: 10.3991/ijim.v14i09.13939.
[3] Z. Nurlan, T. Zhukabayeva, and M. Othman, “Mesh network dynamic routing protocols,” in IEEE 9th
International Conference on
System Engineering and Technology (ICSET), Oct. 2019, pp. 364–369, doi: 10.1109/ICSEngT.2019.8906314.
[4] Z. Niu, Q. Li, C. Ma, H. Li, H. Shan, and F. Yang, “Identification of critical nodes for enhanced network defense in MANET-IoT
networks,” IEEE Access, vol. 8, pp. 183571–183582, 2020, doi: 10.1109/ACCESS.2020.3029736.
[5] N. Akhtar, M. A. Khan, A. Ullah, and M. Y. Javed, “Congestion avoidance for smart devices by caching information in MANETS
and IoT,” IEEE Access, vol. 7, pp. 71459–71471, 2019, doi: 10.1109/ACCESS.2019.2918990.
Int J Elec & Comp Eng ISSN: 2088-8708 
Performance evaluation of dynamic source routing protocol with variation in … (Saad Elsayed)
1801
[6] H. Zemrane, Y. Baddi, and A. Hasbi, “Mobile adhoc networks for intelligent transportation system: comparative analysis of the
routing protocols,” Procedia Computer Science, vol. 160, pp. 758–765, 2019, doi: 10.1016/j.procs.2019.11.014.
[7] C. V. Nanda Kishore and S. Bhaskar, “A priority based dynamic DSQ protocol for avoiding congestion-based issues for attaining
QoS in MANETs,” in International Conference on Intelligent Technologies (CONIT), Jun. 2021, pp. 1–5, doi:
10.1109/CONIT51480.2021.9498557.
[8] R. Menaka, J. M. Mathana, R. Dhanagopal, and B. Sundarambal, “Performance evaluation of DSR protocol in MANET
untrustworthy environment,” in 6th
International Conference on Advanced Computing and Communication Systems (ICACCS),
Mar. 2020, pp. 1049–1052, doi: 10.1109/ICACCS48705.2020.9074268.
[9] A. R. Zarzoor, “Enhancing dynamic source routing (DSR) protocol performance based on link quality metrics,” in International
Seminar on Application for Technology of Information and Communication (iSemantic), Sep. 2021, pp. 17–21, doi:
10.1109/iSemantic52711.2021.9573233.
[10] P. Satyanarayana, J. Ravi, T. Mahalakshmi, V. V. S. Kona, and V. Gokula Krishnan, “Performance analysis of DSR and cache
customized DSR steering protocols in wireless mobile ADHOC networks,” in Fifth International Conference on I-SMAC (IoT in
Social, Mobile, Analytics and Cloud) (I-SMAC), Nov. 2021, pp. 1348–1356, doi: 10.1109/I-SMAC52330.2021.9641042.
[11] A. Bali, M. Ashok, and M. Mahajan, “Performance analysis of routing protocols under security issues through use of NS2
simulator,” International Journal of Computer Applications, vol. 180, no. 20, pp. 38–44, Feb. 2018, doi: 10.5120/ijca2018916478.
[12] J. I. Naser and A. J. Kadhim, “Multicast routing strategy for SDN-cluster based MANET,” International Journal of Electrical and
Computer Engineering (IJECE), vol. 10, no. 5, pp. 4447–4457, Oct. 2020, doi: 10.11591/ijece.v10i5.pp4447-4457.
[13] K. C. K. Naik, C. Balaswamy, and P. R. Reddy, “Performance analysis of OLSR protocol for MANETs under realistic mobility
model,” in IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Feb. 2019,
pp. 1–5, doi: 10.1109/ICECCT.2019.8869406.
[14] S. Patel and H. Pathak, “Characterising the performance of AODV for various mobility scenarios,” in 2nd
International
Conference on Range Technology (ICORT), Aug. 2021, pp. 1–5, doi: 10.1109/ICORT52730.2021.9581895.
[15] S. Mostafavi, V. Hakami, and F. Paydar, “A QoS-assured and mobility-aware routing protocol for MANETs,” International
Journal on Informatics Visualization, vol. 4, no. 1, pp. 1–9, Feb. 2020, doi: 10.30630/joiv.4.1.343.
[16] B. K. Panda, U. Bhanja, and P. K. Pattnaik, “Some routing schemes and mobility models for real terrain MANET,” in Advances
in Intelligent Systems and Computing, vol. 1101, Springer Singapore, 2020, pp. 523–534.
[17] A. Sonker and R. K. Gupta, “A new procedure for misbehavior detection in vehicular ad-hoc networks using machine learning,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 3, pp. 2535–2547, Jun. 2021, doi:
10.11591/ijece.v11i3.pp2535-2547.
[18] S. J. Ahmad, I. Unissa, M. S. Ali, and A. Kumar, “Enhanced security to MANETs using digital codes,” Journal of Information
Security and Applications, vol. 66, May 2022, doi: 10.1016/j.jisa.2022.103147.
[19] L. E. Jim, N. Islam, and M. A. Gregory, “Enhanced MANET security using artificial immune system based danger theory to
detect selfish nodes,” Computers and Security, vol. 113, Feb. 2022, doi: 10.1016/j.cose.2021.102538.
[20] M. H. Hanin, M. Amnai, and Y. Fakhri, “New adaptation method based on cross layer and TCP over protocols to improve QoS in
mobile ad hoc network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 3, pp. 2134–2142,
Jun. 2021, doi: 10.11591/ijece.v11i3.pp2134-2142.
[21] H. Alani, M. Abdelhaq, and R. Alsaqour, “Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless
networks,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 3702–3714, Aug. 2020,
doi: 10.11591/ijece.v10i4.pp3702-3714.
[22] S. Laqtib, K. El Yassini, and M. L. Hasnaoui, “Link-state QoS routing protocol under various mobility models,” Indonesian
Journal of Electrical Engineering and Computer Science (IJEECS), vol. 16, no. 2, pp. 906–916, Nov. 2019, doi:
10.11591/ijeecs.v16.i2.pp906-916.
[23] Y. Hamzaoui, M. Amnai, A. Choukri, and Y. Fakhri, “Enhancing OLSR routing protocol using K-means clustering in MANETs,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 3715–3724, Aug. 2020, doi:
10.11591/ijece.v10i4.pp3715-3724.
[24] R. Skaggs-Schellenberg, N. Wang, and D. Wright, “Performance evaluation and analysis of proactive and reactive MANET
protocols at varied speeds,” in 10th Annual Computing and Communication Workshop and Conference (CCWC), Jan. 2020, pp.
981–985, doi: 10.1109/CCWC47524.2020.9031233.
[25] S. S. Mohamed, A.-F. I. Abdel-Fatah, and M. A. Mohamed, “Performance evaluation of MANET routing protocols based on QoS
and energy parameters,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 3635–3642,
Aug. 2020, doi: 10.11591/ijece.v10i4.pp3635-3642.
[26] S. S. V and S. M. Joshi, “The performance evaluation and analysis of QoS metrics on routing protocols using multimedia traffic
in mobile adhoc network,” in International Conference for Advancement in Technology (ICONAT), Jan. 2022, pp. 1–6, doi:
10.1109/ICONAT53423.2022.9726050.
[27] S. Singh, S. B. Bajaj, K. Tripathi, and N. Aneja, “An inspection of MANET’S scenario using AODV, DSDV and DSR routing
protocols,” in 2nd
International Conference on Innovative Practices in Technology and Management (ICIPTM), Feb. 2022, pp.
707–712, doi: 10.1109/ICIPTM54933.2022.9753951.
[28] D. Sharma, S. Kumar, and Payal, “Performance evaluation of MANETs with variation in transmission power using ad-hoc on-
demand multipath distance vector routing protocol,” in 5th
International Conference on Communication and Electronics Systems
(ICCES), Jun. 2020, pp. 363–368, doi: 10.1109/ICCES48766.2020.9137954.
[29] Riverbed, “OPNET modeler,” OPNET Technologies Inc, 2022. https://support.riverbed.com/content/support/software/opnet-
model/modeler.html (accessed Mar. 10, 2022).
[30] OMNeT++ “Discrete event simulator,” OMNeT++. http://www.omnetpp.org/ (accessed Mar. 10, 2022).
[31] NCS, “QualNet network simulator software,” NCS Company. https://www.ncs-in.com/product/qualnet-network-simulator-
software/ (accessed Mar. 10, 2022).
[32] NS2, “NS2 simulator projects - guidance to implement NS2 simulator projects,” NS-2 Simulator. https://ns2simulator.com/
(accessed Mar. 10, 2022).
[33] NS-3 Simulator. https://www.nsnam.org/ (accessed Mar. 10, 2022).
[34] “General information about J-Sim,” J-Sim Simulator. https://www.kiv.zcu.cz/j-sim/ (accessed Mar. 10, 2022).
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1795-1802
1802
BIOGRAPHIES OF AUTHORS
Saad Elsayed is a lecturer in the High Institute for Engineering and Technology,
Al-Obour, Cairo, Egypt. He received his B.Sc., M.Sc. and Ph.D. in Electronics and
Communication Engineering from the Faculty of Engineering, Al-Azhar University, Cairo,
Egypt, in 2008, 2015, and 2019 respectively. His research activities are within wireless
communications and communication networks. He can be contacted by email:
s.elsayed8585@gmail.com.
Mohamed Ibrahim Youssef is a professor in Electronics and Communications
Engineering department, Faculty of Engineering, Al-Azhar University, Egypt since 2002. His
research activities are within digital communications, mobile communications and digital
signal processing. He can be contacted by email: mohiyosof@gmail.com.

More Related Content

Similar to Performance evaluation of dynamic source routing protocol with variation in transmission power and speed

Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...eeiej
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
 
Performance Evaluation of Personal Ad-hoc Area Network Based on Different Mob...
Performance Evaluation of Personal Ad-hoc Area Network Based on Different Mob...Performance Evaluation of Personal Ad-hoc Area Network Based on Different Mob...
Performance Evaluation of Personal Ad-hoc Area Network Based on Different Mob...IRJET Journal
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
Abstract + Poster (MSc Thesis)
Abstract + Poster (MSc Thesis)Abstract + Poster (MSc Thesis)
Abstract + Poster (MSc Thesis)Louis Abalu
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETIOSR Journals
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingIAEME Publication
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...IRJET Journal
 

Similar to Performance evaluation of dynamic source routing protocol with variation in transmission power and speed (20)

Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
 
Performance Evaluation of Personal Ad-hoc Area Network Based on Different Mob...
Performance Evaluation of Personal Ad-hoc Area Network Based on Different Mob...Performance Evaluation of Personal Ad-hoc Area Network Based on Different Mob...
Performance Evaluation of Personal Ad-hoc Area Network Based on Different Mob...
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
Abstract + Poster (MSc Thesis)
Abstract + Poster (MSc Thesis)Abstract + Poster (MSc Thesis)
Abstract + Poster (MSc Thesis)
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
Ijcet 06 09_004
Ijcet 06 09_004Ijcet 06 09_004
Ijcet 06 09_004
 
A study on “link
A study on “linkA study on “link
A study on “link
 
K017426872
K017426872K017426872
K017426872
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANET
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Performance evaluation of dynamic source routing protocol with variation in transmission power and speed

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 13, No. 2, April 2023, pp. 1795~1802 ISSN: 2088-8708, DOI: 10.11591/ijece.v13i2.pp1795-1802  1795 Journal homepage: http://ijece.iaescore.com Performance evaluation of dynamic source routing protocol with variation in transmission power and speed Saad Elsayed1 , Mohamed Ibrahim Youssef2 1 Departement of Electronics and Communications Engineering, High Institute for Engineering and Technology, Al-Obour, Egypt 2 Electrical Engineering Department, Faculty of Engineering, Al-Azhar University, Cairo, Egypt Article Info ABSTRACT Article history: Received Mar 12, 2022 Revised Jul 2, 2022 Accepted Jul 5, 2022 Mobile ad-hoc network (MANET) is a set of mobile wireless nodes (devices) which is not rely on a fixed infrastructure. In MANETs, each device is responsible for routing its data according to a specific routing protocol. The three most common MANET routing protocols are: dynamic source routing protocol (DSR), optimized link state routing protocol (OLSR), and ad-hoc on-demand distance vector (AODV). This paper proposes an efficient evaluation of DSR protocol by testing the MANETs routing protocol with variation in transmission power at different speeds. The performance analysis has been given using optimized network engineering tools (OPNET) modeler simulations and evaluated using metrics of average end to end delay and throughput. The results show that the throughput increases as the transmission power increases up to a certain value after which the throughput decreases, also the network work optimally at a certain transmission power which varied at different speed. Keywords: Dynamic source routing protocol End to end delay Mobile ad-hoc network Optimized network engineering tools Random mobility Throughput This is an open access article under the CC BY-SA license. Corresponding Author: Saad Elsayed Department of Electronics and Communications Engineering, High Institute for Engineering and Technology Al-Obour, Kilo 21 Cairo/Belbies Rd. High Institute for Engineering and Technology, Egypt-P.O. Box 27- Obour City, Egypt Email: s.elsayed8585@gmail.com 1. INTRODUCTION Mobile ad-hoc network (MANET) devices are spread in a wide range of applications such as military, smart cities, healthcare and other applications [1]. Currently, in addition to hierarchical networks, wireless MANETs have become prevalent networks [2]. In the near future, with the rapid development of the internet of things (IoT) networks, the most of devices connected in the network are wireless mobile devices; use machine-to-machine communication. Therefore MANET will continue to be an important research topics, especially, routing protocols improvement to maximize the network lifetime [3]–[5]. MANET supported by several wireless communication technologies such as WiMAX, ZigBee, and Wi-Fi [6]. The routing protocols of MANET can be classified into three categories as shown in Figure 1: − Proactive routing protocols: A route table about the position of each node is built frequently and routing is based on it. Examples of proactive routing protocols (also named table driven routing) are global state routing (GSR), destination-sequenced distance vector (DSDV), and optimized link state routing (OLSR). − Reactive routing protocols: This category have no predefined routes. So, the on-demand route is generated dynamically with the request packets. Based on the response, the next node is identified and this process goes on until a fixed path is established and the data packets reach the destination. Examples
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1795-1802 1796 of the reactive routing (also named on demand routing) dynamic source routing (DSR), ad-hoc on-demand distance vector (AODV), and temporally ordered routing algorithm (TORA). − Hybrid routing protocols: It is a mix of both proactive and reactive routing protocols such as distributed dynamic routing (DDR), distributed spanning trees based (DST), and zone routing protocol (ZRP). Figure 1. MANET routing protocols classifications DSR is a most widely used protocol that depends on source routing mechanism. DSR protocol transmits the routing traffic only in the occurrence of data that has ready to transmit is the main reason of acquiring low overhead [7]–[10]. This removes the desire to transmit unwanted routing traffic. Due to much route reply to a single request, AODV has high routing overhead as compared to DSR. This in turn eliminates the need to send unnecessary routing traffic. AODV and DSR use distinct mechanism for route discovery but with same table-driven method. AODV originates maximum overhead than DSR [11]. Three multicast routing strategies for MANET has been presented in [12]. Three routing protocols proposed are a reactive multicast routing protocol for cluster-based MANET by using software defined network, proactive multicast routing protocol for cluster-based MANET by using SDN (PMCMS) and modification called M-PMCMS. Different mobility models have been analyzed [13]–[16]. To enhance the traffic safety, misbehavior detection using machine learning has been studied in [17]. Security issue in MANET has been discussed in many papers such as [18], [19]. The impact of retransmissions of packet lost and energy consumption in order to choose the appropriate routing protocol that can be enhance quality of service (QoS) of MANET are minimized and examined using NS-3 simulator [20]. A scheme called AODV-velocity and dynamic for effective broadcast control packets is proposed [21]. The routing protocol for the ad-hoc on-demand distance vector (AODV) is used to implement the proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed AODV-VD scheme to the AODV routing protocol in terms of end -to-end latency, average throughput, packet transmission ratio and overhead ratio. Different mobility models for OLSR protocol was examined. Four mobility models was considered; random direction, random walk, way-point mobility, and steady state random way-point. The simulation results show that the steady state random way-point presents better results from the delay point of view but random way point performs better from the throughput point of view [22]. From the previous discussion, most of papers did not take into account the effect of a change in speed and transmitted power together on the performance metrics such as throughput and delay. The related works parameters summarized in Table 1. As shown in Table 1, the papers [20]–[27] do not take into account the effect of transmitted power variation. A study of the effect of varying transmitted power at fixed speed (10 m/sec) is given in [28]. It is important to note that, most of related works have been simulated the network for short time. In this paper the analysis of the performance of the DSR protocol using OPNET is given. Also, an efficient analysis method to evaluate the routing protocol is proposed. The rest of this paper is organized as: in section 2, the research method has been introduced. The simulation results of the proposed model have been discussed in section 3. Finally, section 4 presents the conclusion of the proposed model.
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Performance evaluation of dynamic source routing protocol with variation in … (Saad Elsayed) 1797 Table 1. The related works summary Paper Protocol Speed (m/sec) Simulator Transmitted power Data Traffic No. of Nodes Simulation Area (m2 ) Simulation Time (sec) [20] AODV OLSR DSDV 10 to 50 NS-3 1.65 w CBR 50 1,000×1,000 300 [21] AODV 5 to 50 NS-2 N.A CBR 20-100 1,000×1,000 300 [22] OLSR 20 NS-3 N.A CBR 20-100 500×1,500 1,000 [23] OLSR 10 NS-2 N.A CBR 10-100 1,000×1,000 1,200 [24] AODV OLSR DSDV DSR 0 to 30 NS-3 7.5 dBm CBR 50 500, 750, 1,000 200 [25] AODV DSDV 10 to 80 NS-3 N. A CBR 50-250 300×1500 300 [26] M- AODV DSR 10 NS-3 N. A CBR 50-250 1,000×1,000 100 [27] DSR, AODV DSDV 5 NS-2 N. A CBR 20 1,859×550 150 [28] AODV 10 QualNet 1 - 4 dBm CBR 40, 80, 120 1,500×1,500 300 Simulated Network DSR 10 to 40 OPNET 1 – 4mW FTP 40, 80 1,500×1,500 3,600 2. PROPOSED METHOD In this section, a research method based on simulation analysis has been presented. There are several network simulators such as OPNET [29], OMNeT++ [30], QualNet [31], NS-2 [32], NS-3 [33] and J-Sim [34]. OPNET modeler was chosen due to its accuracy and to its sophisticated graphical user interface. To perform simulations, a MANET scenario has been designed with the number of nodes of 40 and 80 nodes randomly placed over 1,500*1,500 meters area size using OPNET simulator as shown in Figure 2. Figure 2. The simulated network using OPNET
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1795-1802 1798 The performance of DSR protocol is evaluated for the performance metrics, throughput and end to end delay. The performance of the designed network scenario has been examined with variation of transmitted power. The mobility model used in the designed scenario is random waypoint mobility model (RWMM). Also, the performance of the designed network scenario has been evaluated with variation in node speed. The list of simulation parameters and the values used in the simulated network scenario has been illustrated in Table 2. Table 2. The simulation parameters Parameters Values Routing Protocol DSR Number of Nodes 40 and 80 Nodes Mobility Model RWMM Node Speed (m/sec) 10 – 40 m/sec Transmitted Power (mW) 1 - 4 Application Protocol FTP Simulation Area (m2 ) 1500×1500 Simulation Time 3600 sec As shown in Table 2, the simulation time is 3,600 sec and the transmitted power will be vary from 1 to 4 mW. Two network sizes will be examined 40 and 80 nodes. The node speed will be vary from 10 to 40 m/sec and the simulation area is 2.25 km2 . 3. SIMULATION RESULTS AND ANALYSIS This section evaluates the proposed model using OPNET. Results have been carried out by varying the transmitted power and node speed. The proposed model has been evaluated by two metrics namely, average throughput, and average end to end delay. 3.1. Performance evaluation of the simulated network at different transmitted power and speeds In this simulation, the transmitted power may vary between 1-4 mW. Also, the speed varies between 10-40 m/sec. The network size is 40 nodes. The performance in terms of throughput is shown in Figure 3. As shown in Figure 3, it can be observed that, the average of throughput at 3 mW transmitted power is the highest. Results show that, at the speed=10 m/sec, PT=1, 2, 3, and 4 mW; the average throughput is 114.186, 118.861, 122.175, and 59.038 Kb/sec respectively. It is important to note that, the average of throughput is increases as the transmitted power increases up to 3 mW after which the throughput decreases. At the speed=20 m/sec; average of throughput at 2 mW transmitted power is the highest. The average throughput for different transmitted power (PT=1, 2, 3, and 4 mW) is 117.099, 121.892, 116.100, and 63.779 Kb/sec respectively. Figure 3. Transmission power impact on the average throughput
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Performance evaluation of dynamic source routing protocol with variation in … (Saad Elsayed) 1799 As shown in Figure 3, the average throughput for different transmitted power (PT=1, 2, 3, and 4 mW) is 116.446, 120.021, 115.981, and 48.985 Kb/sec respectively at the speed=30 m/sec. It is also showing that, the average of throughput at 2 mW transmitted power is the highest. PT=1, 2, 3, and 4 mW; the average throughput is 112.868, 116.436, 113.838, and 44.543 Kb/sec respectively at 40 m/sec node speed. The performance in terms of average delay is depicted in Figure 4. It can be observed that, the average of delay at 3 mW transmitted power is the lowest. Results show that, at the speed=10 m/sec, PT=1, 2, 3, and 4 mW; the average delay is 1.83745, 1.826676, 1.791556, and 4.363661 msec respectively as shown in Figure 4. It is important to note that, the average of delay is increases as the transmitted power increases up to 3 mW after which the delay decreases. Figure 4 shows that, at the speed=20 m/sec; average of delay at 2 mW transmitted power is the lowest. The average delay for different transmitted power (PT=1, 2, 3, and 4 mW) is 1.834889, 1.734518, 1.804406, and 4.432615 msec respectively. The average delay for different transmitted power (PT=1, 2, 3, and 4mW) is 1.836479, 1.745199, 1.816238, and 6.0222 msec respectively at the speed=30 m/sec. It is also depicted that, the average of delay at 2 mW transmitted power is the lowest. PT=1, 2, 3, and 4 mW; the average delay is 1.940127, 1.841685, 1.898932, and 6,234 msec respectively at 40 m/sec node speed. Figure 4. Transmission power impact on the average delay 3.2. Three-dimension performance evaluation of the simulated model Figure 5 depicts the effect of changing speed and transmitted power on the throughput and delay for a network size of 40 nodes and 80 nodes. The average throughput and the average delay for a network size of 40 nodes have been shown in Figures 5(a) and 5(b) respectively. The results are illustrated in three dimensions form to determine the optimal working point from the viewpoints of the speed and the transmitted power together to obtain the highest throughput and the least delay. Figure 5(a) shows that the highest value of throughput ranges between 120 and 140 Kb/sec and is achieved at speeds from 10 to 25 m/sec. It also shows that at lower speeds there are more values of the transmitted power at which it can be worked to obtain the highest value of the throughput. By increasing the speeds, the highest values of throughput are achieved at more specific values of the transmitted power. As shown in Figure 5(b), the delay increases with increasing node speed, while it decreases with increasing transmitted power until a certain value and then increases after that. The delay ranges between 1 and 2 msec when the transmitted power is from 1 to 3 mW, while the delay increases dramatically when the transmitted power is 4 mW. The average throughput and the average delay for a network size of 80 nodes have been shown in Figures 5(c) and 5(d) respectively. Figure 5(c) shows that the highest value of throughput ranges between 600 and 800 Kb/sec and is achieved at transmitted powers from 1 to 3 mW. It also shows that, the maximum throughput is 671.533 Kb/sec which achieved at speed of 30 m/sec and transmitted power is 2 mW. These results show that the maximum throughput of 80 nodes is more than five times that of 40 nodes. Figure 5(d) shows that the delay increases slightly at the beginning and then decreases until it reaches the lowest value at a speed of 30 m/s and a transmitting power of 3 mW. It also shows that the effect of changing the speed on the delay is small. It is possible to benefit from this method in presenting the results by defining the constraints of the system under study or the design, such that the speed has a specific range, so choose the optimal work point from the point of view of the transmitted power, and so on.
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1795-1802 1800 (a) (b) (c) (d) Figure 5. Effect of transmitted power and speed on performance of DSR protocol (a) throughput of 40 nodes, (b) delay 40 of nodes, (c) throughput of 80 nodes, and (d) delay of 80 nodes 4. CONCLUSION In this paper, the throughput and average end to end delay performance metrics have been analyzed to DSR protocol. The designed scenario is carried out with variation in node speed and transmission power over 40 and 80 nodes. The results show that the throughput increases as the transmitted power increases up to a certain value after which the throughput decreases due to increasing interference. It can be concluded that the designed DSR routing protocol for 40 nodes MANET network performs optimally at a transmission power of 3 mWat speeds 10 m/sec. The results also show that the maximum throughput can be achieved at 2 mW at speeds of 30 m/s for 80 node network size. The results also show that the network performance changes dramatically when the transmitted power increases to 4mW for all simulated speeds, so it is recommended according to the selected parameter that it is suitable for networks where the transmitted power is less than 4 mW. This work can be extended to evaluate routing protocols such as AODV, DSDV, and OLSR. REFERENCES [1] L. N. Hung and V. K. Quy, “A review: performance improvement routing protocols for MANETs,” Journal of Communications, vol. 15, no. 5, pp. 439–446, 2020, doi: 10.12720/jcm.15.5.439-446. [2] V. K. Quy, V. H. Nam, and D. M. Linh, “A survey of state-of-the-art energy efficiency routing protocols for MANET,” International Journal of Interactive Mobile Technologies, vol. 14, no. 9, pp. 215–226, Jun. 2020, doi: 10.3991/ijim.v14i09.13939. [3] Z. Nurlan, T. Zhukabayeva, and M. Othman, “Mesh network dynamic routing protocols,” in IEEE 9th International Conference on System Engineering and Technology (ICSET), Oct. 2019, pp. 364–369, doi: 10.1109/ICSEngT.2019.8906314. [4] Z. Niu, Q. Li, C. Ma, H. Li, H. Shan, and F. Yang, “Identification of critical nodes for enhanced network defense in MANET-IoT networks,” IEEE Access, vol. 8, pp. 183571–183582, 2020, doi: 10.1109/ACCESS.2020.3029736. [5] N. Akhtar, M. A. Khan, A. Ullah, and M. Y. Javed, “Congestion avoidance for smart devices by caching information in MANETS and IoT,” IEEE Access, vol. 7, pp. 71459–71471, 2019, doi: 10.1109/ACCESS.2019.2918990.
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Performance evaluation of dynamic source routing protocol with variation in … (Saad Elsayed) 1801 [6] H. Zemrane, Y. Baddi, and A. Hasbi, “Mobile adhoc networks for intelligent transportation system: comparative analysis of the routing protocols,” Procedia Computer Science, vol. 160, pp. 758–765, 2019, doi: 10.1016/j.procs.2019.11.014. [7] C. V. Nanda Kishore and S. Bhaskar, “A priority based dynamic DSQ protocol for avoiding congestion-based issues for attaining QoS in MANETs,” in International Conference on Intelligent Technologies (CONIT), Jun. 2021, pp. 1–5, doi: 10.1109/CONIT51480.2021.9498557. [8] R. Menaka, J. M. Mathana, R. Dhanagopal, and B. Sundarambal, “Performance evaluation of DSR protocol in MANET untrustworthy environment,” in 6th International Conference on Advanced Computing and Communication Systems (ICACCS), Mar. 2020, pp. 1049–1052, doi: 10.1109/ICACCS48705.2020.9074268. [9] A. R. Zarzoor, “Enhancing dynamic source routing (DSR) protocol performance based on link quality metrics,” in International Seminar on Application for Technology of Information and Communication (iSemantic), Sep. 2021, pp. 17–21, doi: 10.1109/iSemantic52711.2021.9573233. [10] P. Satyanarayana, J. Ravi, T. Mahalakshmi, V. V. S. Kona, and V. Gokula Krishnan, “Performance analysis of DSR and cache customized DSR steering protocols in wireless mobile ADHOC networks,” in Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Nov. 2021, pp. 1348–1356, doi: 10.1109/I-SMAC52330.2021.9641042. [11] A. Bali, M. Ashok, and M. Mahajan, “Performance analysis of routing protocols under security issues through use of NS2 simulator,” International Journal of Computer Applications, vol. 180, no. 20, pp. 38–44, Feb. 2018, doi: 10.5120/ijca2018916478. [12] J. I. Naser and A. J. Kadhim, “Multicast routing strategy for SDN-cluster based MANET,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 5, pp. 4447–4457, Oct. 2020, doi: 10.11591/ijece.v10i5.pp4447-4457. [13] K. C. K. Naik, C. Balaswamy, and P. R. Reddy, “Performance analysis of OLSR protocol for MANETs under realistic mobility model,” in IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), Feb. 2019, pp. 1–5, doi: 10.1109/ICECCT.2019.8869406. [14] S. Patel and H. Pathak, “Characterising the performance of AODV for various mobility scenarios,” in 2nd International Conference on Range Technology (ICORT), Aug. 2021, pp. 1–5, doi: 10.1109/ICORT52730.2021.9581895. [15] S. Mostafavi, V. Hakami, and F. Paydar, “A QoS-assured and mobility-aware routing protocol for MANETs,” International Journal on Informatics Visualization, vol. 4, no. 1, pp. 1–9, Feb. 2020, doi: 10.30630/joiv.4.1.343. [16] B. K. Panda, U. Bhanja, and P. K. Pattnaik, “Some routing schemes and mobility models for real terrain MANET,” in Advances in Intelligent Systems and Computing, vol. 1101, Springer Singapore, 2020, pp. 523–534. [17] A. Sonker and R. K. Gupta, “A new procedure for misbehavior detection in vehicular ad-hoc networks using machine learning,” International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 3, pp. 2535–2547, Jun. 2021, doi: 10.11591/ijece.v11i3.pp2535-2547. [18] S. J. Ahmad, I. Unissa, M. S. Ali, and A. Kumar, “Enhanced security to MANETs using digital codes,” Journal of Information Security and Applications, vol. 66, May 2022, doi: 10.1016/j.jisa.2022.103147. [19] L. E. Jim, N. Islam, and M. A. Gregory, “Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes,” Computers and Security, vol. 113, Feb. 2022, doi: 10.1016/j.cose.2021.102538. [20] M. H. Hanin, M. Amnai, and Y. Fakhri, “New adaptation method based on cross layer and TCP over protocols to improve QoS in mobile ad hoc network,” International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 3, pp. 2134–2142, Jun. 2021, doi: 10.11591/ijece.v11i3.pp2134-2142. [21] H. Alani, M. Abdelhaq, and R. Alsaqour, “Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless networks,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 3702–3714, Aug. 2020, doi: 10.11591/ijece.v10i4.pp3702-3714. [22] S. Laqtib, K. El Yassini, and M. L. Hasnaoui, “Link-state QoS routing protocol under various mobility models,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 16, no. 2, pp. 906–916, Nov. 2019, doi: 10.11591/ijeecs.v16.i2.pp906-916. [23] Y. Hamzaoui, M. Amnai, A. Choukri, and Y. Fakhri, “Enhancing OLSR routing protocol using K-means clustering in MANETs,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 3715–3724, Aug. 2020, doi: 10.11591/ijece.v10i4.pp3715-3724. [24] R. Skaggs-Schellenberg, N. Wang, and D. Wright, “Performance evaluation and analysis of proactive and reactive MANET protocols at varied speeds,” in 10th Annual Computing and Communication Workshop and Conference (CCWC), Jan. 2020, pp. 981–985, doi: 10.1109/CCWC47524.2020.9031233. [25] S. S. Mohamed, A.-F. I. Abdel-Fatah, and M. A. Mohamed, “Performance evaluation of MANET routing protocols based on QoS and energy parameters,” International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 4, pp. 3635–3642, Aug. 2020, doi: 10.11591/ijece.v10i4.pp3635-3642. [26] S. S. V and S. M. Joshi, “The performance evaluation and analysis of QoS metrics on routing protocols using multimedia traffic in mobile adhoc network,” in International Conference for Advancement in Technology (ICONAT), Jan. 2022, pp. 1–6, doi: 10.1109/ICONAT53423.2022.9726050. [27] S. Singh, S. B. Bajaj, K. Tripathi, and N. Aneja, “An inspection of MANET’S scenario using AODV, DSDV and DSR routing protocols,” in 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), Feb. 2022, pp. 707–712, doi: 10.1109/ICIPTM54933.2022.9753951. [28] D. Sharma, S. Kumar, and Payal, “Performance evaluation of MANETs with variation in transmission power using ad-hoc on- demand multipath distance vector routing protocol,” in 5th International Conference on Communication and Electronics Systems (ICCES), Jun. 2020, pp. 363–368, doi: 10.1109/ICCES48766.2020.9137954. [29] Riverbed, “OPNET modeler,” OPNET Technologies Inc, 2022. https://support.riverbed.com/content/support/software/opnet- model/modeler.html (accessed Mar. 10, 2022). [30] OMNeT++ “Discrete event simulator,” OMNeT++. http://www.omnetpp.org/ (accessed Mar. 10, 2022). [31] NCS, “QualNet network simulator software,” NCS Company. https://www.ncs-in.com/product/qualnet-network-simulator- software/ (accessed Mar. 10, 2022). [32] NS2, “NS2 simulator projects - guidance to implement NS2 simulator projects,” NS-2 Simulator. https://ns2simulator.com/ (accessed Mar. 10, 2022). [33] NS-3 Simulator. https://www.nsnam.org/ (accessed Mar. 10, 2022). [34] “General information about J-Sim,” J-Sim Simulator. https://www.kiv.zcu.cz/j-sim/ (accessed Mar. 10, 2022).
  • 8.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1795-1802 1802 BIOGRAPHIES OF AUTHORS Saad Elsayed is a lecturer in the High Institute for Engineering and Technology, Al-Obour, Cairo, Egypt. He received his B.Sc., M.Sc. and Ph.D. in Electronics and Communication Engineering from the Faculty of Engineering, Al-Azhar University, Cairo, Egypt, in 2008, 2015, and 2019 respectively. His research activities are within wireless communications and communication networks. He can be contacted by email: s.elsayed8585@gmail.com. Mohamed Ibrahim Youssef is a professor in Electronics and Communications Engineering department, Faculty of Engineering, Al-Azhar University, Egypt since 2002. His research activities are within digital communications, mobile communications and digital signal processing. He can be contacted by email: mohiyosof@gmail.com.