SlideShare a Scribd company logo
1 of 3
Download to read offline
ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011




    Mobility and Node Density Based Performance
    Analysis of AODV Protocol for Adhoc Network
                     using ns-2
                               Parma Nand1*, S.C. Sharma2, Rani Astya3, Santosh Kumar1
      1
        Doctoral Candidate, Wireless Computing Research Lab., DPT, Indian Institute of Technology, Roorkee, India.
           {astya2005@gmail.com, astyadpt@iitr.ernet.ac.in, * Corresponding Author},amu.santosh@gmail.com
      2
        Associate Professor, Wireless Computing Research Lab., DPT, Indian Institute of Technology, Roorkee, India.
                                                   {scs60fpt@iitr.ernet.in}
                                   3
                                     Assistant Professor. IILM-CET Greater Noida, India.
                                                   {astyarani@gmail.com}


Abstract- A mobile ad-hoc network (MANET) is a collection of             been reported, but so far no routing algorithm has been
mobile nodes, which communicate over radio. These networks               suitable for all situations. Other aspects of mobile ad-hoc
have an important advantage; they do not require any                     networks are also subject to current research, especially the
existing infrastructure or central administration. Therefore,            dynamic address configuration of nodes.
mobile ad-hoc networks are suitable for temporary
communication links. This flexibility, however, comes at a
                                                                         In this paper an approach is proposed for an on-demand ad-
price: communication is difficult to organize due to frequent            hoc routing algorithm, which is based on swarm
topology changes. In this paper we propose on-demand                     intelligence and parametric analysis has been proposed. At
routing algorithm for mobile, multi-hop ad-hoc networks. The             the end, algorithm is tested for mobile multi-hop adhoc
algorithm is based on ant algorithms, which are a class of               networks in ns-2 environment for its performance.
swarm intelligence. The main goal in the design of the
algorithm is to reduce the overhead for routing. Furthermore,                    II. ROUTING PROTOCOLS IN MANET
in this paper the performance of AODV protocol is analyzed
by varying mobility and node density parameters through                     The Ad-Hoc On-demand Distance Vector (AODV) [1]
simulation of results ns2 simulator.                                     routing protocol is one of several published routing
                                                                         protocols e.g. Dynamic Source Routing (DSR) [3][4],
Keywords-Adhoc networks, AODV, routing protocols, route                  Destination-Sequenced Distance Vector (DSDV)[5] etc. for
maintenance, simulation, performance evaluation, swarm                   mobile ad-hoc networking. Wireless ad-hoc routing
intelligence.
                                                                         protocols such as AODV are currently an area of much
                                                                         research among the networking community
                    I. INTRODUCTION
                                                                         A. Ad Hoc On-Demand Distance-Vector Protocol (AODV)
   A mobile multi-hop ad-hoc network (MANET) is a set
of mobile nodes which communicate over radio and do not                  The Ad Hoc On-Demand Distance-Vector Protocol
need any infrastructure. These networks are very flexible                (AODV) is a distance vector routing for mobile ad-hoc
and suitable for several types of applications, as they allow            networks. AODV is an on-demand routing approach, i.e.
the establishment of temporary communication without any                 there are no periodical exchanges of routing information.
pre installed infrastructure. Due to the limited transmission            The protocol consists of two phases
range of wireless interfaces, in most cases communication                     i)        Route Discovery
has to be relayed over intermediate nodes. Thus, in mobile                    ii)       Route Maintenance.
multi-hop ad-hoc networks each node also has to be a                     A node wishing to communicate with another node first
router. Beside the disaster and military application domain              seeks for a route in its routing table. If it finds path, the
the deployment of mobile ad-hoc networks for multimedia                  communication starts immediately, otherwise the node
applications is another interesting domain. With newly                   initiates a route discovery phase. The route discovery
emerging radio technologies, e.g. IEEE 802.11a and                       process consists of a route-request message (RREQ) which
Bluetooth, the realization of multimedia applications over               is broadcasted. If a node has a valid route to the
mobile ad-hoc networks becomes more realistic. To find a                 destination, it replies to the route-request with a route-reply
route between the communication end-points is a major                    (RREP) message. Additionally, the replying node creates a
problem in mobile multi hop ad-hoc networks. The                         so called reverse route entry in its routing table, which
problem is further aggravated through the node mobility.                 contains the address of the source node, the number of hops
Many different approaches to handle this problem have                    to the source, and the next hop's address,
i.e. the address of the node from which the message was                  route maintenance. It is performed by the source node and
received. A lifetime is associated with each reverse route               can be subdivided into: i) source node moves: source node
entry, i.e. if the route entry is not used within the lifetime it        initiates a new route discovery process, ii) destination or an
will be removed. The second phase of the protocol is called              intermediate node moves: a route error message (RERR) is
                                                                    19
© 2011 ACEEE
DOI: 01.IJNS.02.01.111
ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011



sent to the source node. Intermediate nodes receiving a                       and is incremented just before broadcasting a
RERR update their routing table by setting the distance of                    RREQ message.
the destination to infinity. If the source node receives a                •   RouteTableEntry – This class represents the route
RERR it will initiate a new route discovery. To prevent                       information for some destination. It includes: a
global broadcast messages AODV introduces a local                             next hop address (MacAddress), a         destination
connectivity management. This is done by periodical                           sequence number, and a hop count.
exchanges of so called HELLO messages, which are small                    •      rreqList (LinkedList) – This structure contains a
RREP packets containing a node's address and additional                       list of pending route requests (of type
information                                                                   RouteRequest) originated by the node. Routes
B. The Basic Protocol                                                         requests (represented as RouteRequest objects) are
                                                                              added to this list
Each AODV router is essentially a state machine that                      •   RreqBufferEntry – This class contains the RREQ
processes incoming requests from the SWANS network                            ID and address of the node that originated the
entity. When the network entity needs to send a message to                    RREQ. It also contains the time (simulation time)
another node, it calls upon AODV to determine the next-                       that the message was sent.
hop.
                                                                          •   outgoingSet(OutgoingSet)–This stores a list of
Whenever an AODV router receives a request to send a
                                                                              outgoing nodes, along with a helloWaitCount for
message, it checks its routing table to see if a route exists.
                                                                              each outgoing node. helloWaitCount keeps track
Each routing table entry consists of the following fields:
                                                                              of the number of HELLO_INTERVALs that have
     • Destination address                                                    passed since the last message was received from
     •      Next hop address                                                  outgoing node.
     •      Destination sequence number                                   •      rreqIdSeqNum (int) – The sequence number for
     •      Hop count                                                         RREQ ID’s. When sending a RREQ message, it
If a route exists, the router simply forwards the message to                  assigns rreqIdSeqNum to the message’s rreqId
the next hop. Otherwise, it saves the message in a message                    field, and then increments rreqIdSeqNum.
queue, and then it initiates a route request to determine a
route. The flow chart as shown in fig. 1 illustrates this             D. Related Core Methods with brief description
process:                                                              send(NetMessage() – This method, called by the network
Upon receipt of the routing information, it updates its               entity, attempts to send a message over the network. If
routing table and sends the queued message(s). AODV                   routing information is available, it simply forwards the
nodes use four types of messages to communicate among                 message to the appropriate next hop. Otherwise, the
each other. Route Request (RREQ) and Route Reply                      message is saved in the messageQueue and a route request
(RREP) messages are used for route discovery. Route Error             is originated.
(RERR) messages and HELLO messages are used for route                 receive(…) – This method, called by the network entity,
maintenance.                                                          processes incoming AODV messages. It checks the type of
                                                                      the message object and passes the message to the
                                                                      appropriate method e.g.
                                                                      receiveRouteReplyMessage() – Processes an incoming
                                                                      RREP message. Updates routing tables and outgoing lists.
                                                                      Then, if the node is the RREQ originator, it removes the
                                                                      pending route request, and sends the queued messages
                                                                      along the new route. If the node is not the RREQ
                                                                      originator, it forwards the RREP to the next hop.
                                                                      receiveRouteErrorMessage() – Processes an incoming
                                                                      RERR message. Removes all affected routes. If even one
                                                                      route is removed, it calls precursorSet.sendRERR() to
                                                                      forward the RERR to all precursors.
                                                                      receiveHelloMessage() – Processes an incoming HELLO
                                                                      message. The peek() method takes care of the processing of
                                                                      HELLO messages.
                                                                      E. AODV Message Classes
              Fig. 1. Flow chart for Route discovery
                                                                      Following four classes represent the different AODV
                                                                      messages. Each implements.Message interface.
C. Related Code                                                           • RouteRequestMessage
Some main Variable and Data Structures with description                   • RouteReplyMessage
    • seqNum (int)–The node’s sequence number. It is                      • RouteErrorMessage
        initialized to SEQUENCE_NUMBER_START                              • HelloMessage

                                                                 20
© 2011 ACEEE
DOI: 01.IJNS.02.01.111
ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011



                                                        III. RESULTS                                                                 Normalized Routing Overhead Vs.
                                                                                                                                                 Mobility
The important performance metrics which were evaluated                                                                                     1.35
in this paper are:




                                                                                                           n rm liz d


                                                                                                                                 oe ed
                                                                                                            o a e
                                                                                                                          u g
                                                                                                                                  v rh a
                                                                                                                                            1.3




                                                                                                                        ro tin
                                                                                                                                           1.25                                     aodv
Packet delivery ratio: The ratio of data packets deliver to                                                                                 1.2

the destination to those generated by cbr sources.                                                                                         1.15
                                                                                                                                                  0       10              20   30

Normalized Routing Load: The number of routing packets                                                                                                         mobility

transmitted per data packet delivered at the destination.
                                                                                                                          Fig 6. Normalized Routing Overhead Vs Mobility
Each hop wise transmission of a routing packet is counted
as one transmission.
These parameters are evaluated the on the basis of varying                                                                                            IV. CONCLUSION
mobility and varying node density.                                                                  Figures shown above display the parametric analysis of
Effect of Varying Node Density: In the proposed algorithm                                           AODV routing protocol over the varying mobility and node
the simulation is carried out by varying the number of                                              density.
nodes from 10 to 50 and results are evaluated by comparing                                                AODV perform better under low mobility and high
with the standard result for that variation. In case of packet                                      node density. As we have seen in the fig.2-6, the effects of
delivery ratio as the number of nodes increases the packet                                          different parameters with the variation of node density and
delivery ratio increases (fig.2).                                                                   mobility.
Effect of Varying Mobility: In our simulation we have                                               Variation of node density: As the number of nodes
varied the speed of nodes from 0 to 20(m/sec) with keeping                                          increases the nodes behaving as intermediate nodes also
number of nodes constant.                                                                           increase and so the neighbor discovering time minimizes.
  In the presence of high mobility, link failure can happen                                         This results in quicker path finding. So we obtain the better
very frequently. It triggers new route discoveries as it has                                        packet delivery ratio from source to destination (fig.2). As
almost one route per destination in its routing table and so                                        node density increases the normalized routing load also
the occurrences of route discoveries in AODV are directly                                           decreases (fig 5). With time packet delivery stabilizes as
proportional to the number of route breaks.                                                         mostly routes are discovered and less route discoveries are
       So on varying the speed of nodes the packet delivery                                         required (fig. 4)
ratio will decreases (fig 3) because on increasing the speed                                        Variation of node mobility: As the speed of nodes
the link between source and destination will break                                                  increases, the link failure between the source and
frequently. The normalized routing overhead also increases                                          destination occurs frequently. This will result in low packet
as the mobility becomes more than 10 (fig. 6).                                                      delivery ratio (fig 3), high normalized routing load (fig 6).
                               Packet Delivery Ratio Vs. Node Density

                             1                                                                                                                         REFERENCES
                            0.8
           PR




                                                                                                    [1] Charles Perkins, Elizabeth Royer, and Samir Das. “Ad hoc on
                            0.6
           D




                                                                                      AODV
                            0.4
                            0.2
                             0                                                                           demand distance vector (AODV) routing”. IETF RFC No.
                                      0                 20
                                                        No. of Nodes
                                                                    40      60
                                                                                                         3561, July 2003.
                                                                                                    [2] ns-2 http://www.isi.edu/nsnam/ns
                            Fig. 2 Packet Delivery Ratio Vs Node Density
                                                                                                    [3] Josh Broch, David Johnson, and David Maltz. “The dynamic
                            packet delivery ratio vs mobility
                                                                                                         source routing protocol for mobile adhoc networks for IPv4
                      0.85                                                                               IETF RFC 4728, Feb 2007.
                       0.8
                                                                                                    [4] D. Johnson and D. Maltz. “Dynamic source routing in ad hoc
        pr
         d




                      0.75                                                             aodv
                       0.7                                                                               wireless networks”. In T. Imielinski and H. Korth, editors,
                      0.65
                                          0              10           20         30                      Mobile computing, chapter 5. Kluwer Academic, 1996.
                                                        speed(m/sec)                                [5] Perkins C,Bhagwat P, ” Highly Dynamic Destination-
                                      Fig.3 Packet Delivery Ratio Vs Mobility                            Sequenced           Distance-Vector        Routing(DSDV)
                                       Packet Delivery Ratio Vs. Time                                    Routing”,SIGCOMM’94 Computer Communication Rewiev,
                    1.2
                                                                                                         vol 24, no. 4,p 234-244, October 1994.
                      1
                    0.8                                                               10Node
                                                                                                    [6] C. K. Toh, “Ad-hoc Mobile Wireless Networks Protocol and
       PR




                                                                                                         System”, Prentice Hall PTR2002:55-77.
       D




                    0.6                                                               20Node
                    0.4                                                               30Node
                    0.2
                                                                                      40Node
                      0
                                                                                      50Node
                                      0             5         10      15    20
                                                             Time


                                          Fig 4. Packet Delivery Ratio Vs Time
                                 Normalized Routing Overhead Vs.
                                          node density

                                            2
         omlz d



                              vr ed
        N r ai e

                   R ui g

                             Oeh a




                                          1.5
                    o tn




                                            1                                         AODV
                                          0.5
                                            0
                                                0            20       40    60
                                                             No. of nodes



         Fig5. Normalized Routing Overhead Vs Node Density

                                                                                               21
© 2011 ACEEE
DOI: 01.IJNS.02.01.111

More Related Content

What's hot

Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrIAEME Publication
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLZac Darcy
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
 

What's hot (19)

Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Az26337342
Az26337342Az26337342
Az26337342
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
Ac24204209
Ac24204209Ac24204209
Ac24204209
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
 
Ip2515381543
Ip2515381543Ip2515381543
Ip2515381543
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
B03406010
B03406010B03406010
B03406010
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 

Viewers also liked (16)

Matric Certificate
Matric CertificateMatric Certificate
Matric Certificate
 
20150525 apresentação defesa final
20150525 apresentação defesa   final20150525 apresentação defesa   final
20150525 apresentação defesa final
 
Sustain Our Africa
Sustain Our AfricaSustain Our Africa
Sustain Our Africa
 
ระบบสารสนเทศ
ระบบสารสนเทศระบบสารสนเทศ
ระบบสารสนเทศ
 
Obres carrer major
Obres carrer majorObres carrer major
Obres carrer major
 
Aa0011
Aa0011Aa0011
Aa0011
 
C lab5 2
C lab5 2C lab5 2
C lab5 2
 
Shivakumar_Pat on Back
Shivakumar_Pat on BackShivakumar_Pat on Back
Shivakumar_Pat on Back
 
GWLASER5F 052815 094540.PDF
GWLASER5F 052815 094540.PDFGWLASER5F 052815 094540.PDF
GWLASER5F 052815 094540.PDF
 
Apostila informática básica
Apostila informática básicaApostila informática básica
Apostila informática básica
 
Ejercicios anaeróbicos y aeróbicos
Ejercicios anaeróbicos y aeróbicosEjercicios anaeróbicos y aeróbicos
Ejercicios anaeróbicos y aeróbicos
 
C chap2
C chap2C chap2
C chap2
 
Curso Operador de Caixa
Curso Operador de CaixaCurso Operador de Caixa
Curso Operador de Caixa
 
Los poligonos
Los poligonosLos poligonos
Los poligonos
 
Contraste Hidrosoluble Oral Para El Tratamiento De La
Contraste Hidrosoluble Oral Para El Tratamiento De LaContraste Hidrosoluble Oral Para El Tratamiento De La
Contraste Hidrosoluble Oral Para El Tratamiento De La
 
20161108 datadog and_sushi
20161108 datadog and_sushi20161108 datadog and_sushi
20161108 datadog and_sushi
 

Similar to Mobility and Node Density Based Performance Analysis of AODV Protocol for Adhoc Network using ns-2

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...IJERA Editor
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodvjournal ijrtem
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
 
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...pijans
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 

Similar to Mobility and Node Density Based Performance Analysis of AODV Protocol for Adhoc Network using ns-2 (20)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A41040105
A41040105A41040105
A41040105
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
J0935461
J0935461J0935461
J0935461
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
Performance Evaluation AODV, DYMO, OLSR and ZRPAD Hoc Routing Protocol for IE...
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Mobility and Node Density Based Performance Analysis of AODV Protocol for Adhoc Network using ns-2

  • 1. ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011 Mobility and Node Density Based Performance Analysis of AODV Protocol for Adhoc Network using ns-2 Parma Nand1*, S.C. Sharma2, Rani Astya3, Santosh Kumar1 1 Doctoral Candidate, Wireless Computing Research Lab., DPT, Indian Institute of Technology, Roorkee, India. {astya2005@gmail.com, astyadpt@iitr.ernet.ac.in, * Corresponding Author},amu.santosh@gmail.com 2 Associate Professor, Wireless Computing Research Lab., DPT, Indian Institute of Technology, Roorkee, India. {scs60fpt@iitr.ernet.in} 3 Assistant Professor. IILM-CET Greater Noida, India. {astyarani@gmail.com} Abstract- A mobile ad-hoc network (MANET) is a collection of been reported, but so far no routing algorithm has been mobile nodes, which communicate over radio. These networks suitable for all situations. Other aspects of mobile ad-hoc have an important advantage; they do not require any networks are also subject to current research, especially the existing infrastructure or central administration. Therefore, dynamic address configuration of nodes. mobile ad-hoc networks are suitable for temporary communication links. This flexibility, however, comes at a In this paper an approach is proposed for an on-demand ad- price: communication is difficult to organize due to frequent hoc routing algorithm, which is based on swarm topology changes. In this paper we propose on-demand intelligence and parametric analysis has been proposed. At routing algorithm for mobile, multi-hop ad-hoc networks. The the end, algorithm is tested for mobile multi-hop adhoc algorithm is based on ant algorithms, which are a class of networks in ns-2 environment for its performance. swarm intelligence. The main goal in the design of the algorithm is to reduce the overhead for routing. Furthermore, II. ROUTING PROTOCOLS IN MANET in this paper the performance of AODV protocol is analyzed by varying mobility and node density parameters through The Ad-Hoc On-demand Distance Vector (AODV) [1] simulation of results ns2 simulator. routing protocol is one of several published routing protocols e.g. Dynamic Source Routing (DSR) [3][4], Keywords-Adhoc networks, AODV, routing protocols, route Destination-Sequenced Distance Vector (DSDV)[5] etc. for maintenance, simulation, performance evaluation, swarm mobile ad-hoc networking. Wireless ad-hoc routing intelligence. protocols such as AODV are currently an area of much research among the networking community I. INTRODUCTION A. Ad Hoc On-Demand Distance-Vector Protocol (AODV) A mobile multi-hop ad-hoc network (MANET) is a set of mobile nodes which communicate over radio and do not The Ad Hoc On-Demand Distance-Vector Protocol need any infrastructure. These networks are very flexible (AODV) is a distance vector routing for mobile ad-hoc and suitable for several types of applications, as they allow networks. AODV is an on-demand routing approach, i.e. the establishment of temporary communication without any there are no periodical exchanges of routing information. pre installed infrastructure. Due to the limited transmission The protocol consists of two phases range of wireless interfaces, in most cases communication i) Route Discovery has to be relayed over intermediate nodes. Thus, in mobile ii) Route Maintenance. multi-hop ad-hoc networks each node also has to be a A node wishing to communicate with another node first router. Beside the disaster and military application domain seeks for a route in its routing table. If it finds path, the the deployment of mobile ad-hoc networks for multimedia communication starts immediately, otherwise the node applications is another interesting domain. With newly initiates a route discovery phase. The route discovery emerging radio technologies, e.g. IEEE 802.11a and process consists of a route-request message (RREQ) which Bluetooth, the realization of multimedia applications over is broadcasted. If a node has a valid route to the mobile ad-hoc networks becomes more realistic. To find a destination, it replies to the route-request with a route-reply route between the communication end-points is a major (RREP) message. Additionally, the replying node creates a problem in mobile multi hop ad-hoc networks. The so called reverse route entry in its routing table, which problem is further aggravated through the node mobility. contains the address of the source node, the number of hops Many different approaches to handle this problem have to the source, and the next hop's address, i.e. the address of the node from which the message was route maintenance. It is performed by the source node and received. A lifetime is associated with each reverse route can be subdivided into: i) source node moves: source node entry, i.e. if the route entry is not used within the lifetime it initiates a new route discovery process, ii) destination or an will be removed. The second phase of the protocol is called intermediate node moves: a route error message (RERR) is 19 © 2011 ACEEE DOI: 01.IJNS.02.01.111
  • 2. ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011 sent to the source node. Intermediate nodes receiving a and is incremented just before broadcasting a RERR update their routing table by setting the distance of RREQ message. the destination to infinity. If the source node receives a • RouteTableEntry – This class represents the route RERR it will initiate a new route discovery. To prevent information for some destination. It includes: a global broadcast messages AODV introduces a local next hop address (MacAddress), a destination connectivity management. This is done by periodical sequence number, and a hop count. exchanges of so called HELLO messages, which are small • rreqList (LinkedList) – This structure contains a RREP packets containing a node's address and additional list of pending route requests (of type information RouteRequest) originated by the node. Routes B. The Basic Protocol requests (represented as RouteRequest objects) are added to this list Each AODV router is essentially a state machine that • RreqBufferEntry – This class contains the RREQ processes incoming requests from the SWANS network ID and address of the node that originated the entity. When the network entity needs to send a message to RREQ. It also contains the time (simulation time) another node, it calls upon AODV to determine the next- that the message was sent. hop. • outgoingSet(OutgoingSet)–This stores a list of Whenever an AODV router receives a request to send a outgoing nodes, along with a helloWaitCount for message, it checks its routing table to see if a route exists. each outgoing node. helloWaitCount keeps track Each routing table entry consists of the following fields: of the number of HELLO_INTERVALs that have • Destination address passed since the last message was received from • Next hop address outgoing node. • Destination sequence number • rreqIdSeqNum (int) – The sequence number for • Hop count RREQ ID’s. When sending a RREQ message, it If a route exists, the router simply forwards the message to assigns rreqIdSeqNum to the message’s rreqId the next hop. Otherwise, it saves the message in a message field, and then increments rreqIdSeqNum. queue, and then it initiates a route request to determine a route. The flow chart as shown in fig. 1 illustrates this D. Related Core Methods with brief description process: send(NetMessage() – This method, called by the network Upon receipt of the routing information, it updates its entity, attempts to send a message over the network. If routing table and sends the queued message(s). AODV routing information is available, it simply forwards the nodes use four types of messages to communicate among message to the appropriate next hop. Otherwise, the each other. Route Request (RREQ) and Route Reply message is saved in the messageQueue and a route request (RREP) messages are used for route discovery. Route Error is originated. (RERR) messages and HELLO messages are used for route receive(…) – This method, called by the network entity, maintenance. processes incoming AODV messages. It checks the type of the message object and passes the message to the appropriate method e.g. receiveRouteReplyMessage() – Processes an incoming RREP message. Updates routing tables and outgoing lists. Then, if the node is the RREQ originator, it removes the pending route request, and sends the queued messages along the new route. If the node is not the RREQ originator, it forwards the RREP to the next hop. receiveRouteErrorMessage() – Processes an incoming RERR message. Removes all affected routes. If even one route is removed, it calls precursorSet.sendRERR() to forward the RERR to all precursors. receiveHelloMessage() – Processes an incoming HELLO message. The peek() method takes care of the processing of HELLO messages. E. AODV Message Classes Fig. 1. Flow chart for Route discovery Following four classes represent the different AODV messages. Each implements.Message interface. C. Related Code • RouteRequestMessage Some main Variable and Data Structures with description • RouteReplyMessage • seqNum (int)–The node’s sequence number. It is • RouteErrorMessage initialized to SEQUENCE_NUMBER_START • HelloMessage 20 © 2011 ACEEE DOI: 01.IJNS.02.01.111
  • 3. ACEEE Int. J. on Network Security, Vol. 02, No. 01, Jan 2011 III. RESULTS Normalized Routing Overhead Vs. Mobility The important performance metrics which were evaluated 1.35 in this paper are: n rm liz d oe ed o a e u g v rh a 1.3 ro tin 1.25 aodv Packet delivery ratio: The ratio of data packets deliver to 1.2 the destination to those generated by cbr sources. 1.15 0 10 20 30 Normalized Routing Load: The number of routing packets mobility transmitted per data packet delivered at the destination. Fig 6. Normalized Routing Overhead Vs Mobility Each hop wise transmission of a routing packet is counted as one transmission. These parameters are evaluated the on the basis of varying IV. CONCLUSION mobility and varying node density. Figures shown above display the parametric analysis of Effect of Varying Node Density: In the proposed algorithm AODV routing protocol over the varying mobility and node the simulation is carried out by varying the number of density. nodes from 10 to 50 and results are evaluated by comparing AODV perform better under low mobility and high with the standard result for that variation. In case of packet node density. As we have seen in the fig.2-6, the effects of delivery ratio as the number of nodes increases the packet different parameters with the variation of node density and delivery ratio increases (fig.2). mobility. Effect of Varying Mobility: In our simulation we have Variation of node density: As the number of nodes varied the speed of nodes from 0 to 20(m/sec) with keeping increases the nodes behaving as intermediate nodes also number of nodes constant. increase and so the neighbor discovering time minimizes. In the presence of high mobility, link failure can happen This results in quicker path finding. So we obtain the better very frequently. It triggers new route discoveries as it has packet delivery ratio from source to destination (fig.2). As almost one route per destination in its routing table and so node density increases the normalized routing load also the occurrences of route discoveries in AODV are directly decreases (fig 5). With time packet delivery stabilizes as proportional to the number of route breaks. mostly routes are discovered and less route discoveries are So on varying the speed of nodes the packet delivery required (fig. 4) ratio will decreases (fig 3) because on increasing the speed Variation of node mobility: As the speed of nodes the link between source and destination will break increases, the link failure between the source and frequently. The normalized routing overhead also increases destination occurs frequently. This will result in low packet as the mobility becomes more than 10 (fig. 6). delivery ratio (fig 3), high normalized routing load (fig 6). Packet Delivery Ratio Vs. Node Density 1 REFERENCES 0.8 PR [1] Charles Perkins, Elizabeth Royer, and Samir Das. “Ad hoc on 0.6 D AODV 0.4 0.2 0 demand distance vector (AODV) routing”. IETF RFC No. 0 20 No. of Nodes 40 60 3561, July 2003. [2] ns-2 http://www.isi.edu/nsnam/ns Fig. 2 Packet Delivery Ratio Vs Node Density [3] Josh Broch, David Johnson, and David Maltz. “The dynamic packet delivery ratio vs mobility source routing protocol for mobile adhoc networks for IPv4 0.85 IETF RFC 4728, Feb 2007. 0.8 [4] D. Johnson and D. Maltz. “Dynamic source routing in ad hoc pr d 0.75 aodv 0.7 wireless networks”. In T. Imielinski and H. Korth, editors, 0.65 0 10 20 30 Mobile computing, chapter 5. Kluwer Academic, 1996. speed(m/sec) [5] Perkins C,Bhagwat P, ” Highly Dynamic Destination- Fig.3 Packet Delivery Ratio Vs Mobility Sequenced Distance-Vector Routing(DSDV) Packet Delivery Ratio Vs. Time Routing”,SIGCOMM’94 Computer Communication Rewiev, 1.2 vol 24, no. 4,p 234-244, October 1994. 1 0.8 10Node [6] C. K. Toh, “Ad-hoc Mobile Wireless Networks Protocol and PR System”, Prentice Hall PTR2002:55-77. D 0.6 20Node 0.4 30Node 0.2 40Node 0 50Node 0 5 10 15 20 Time Fig 4. Packet Delivery Ratio Vs Time Normalized Routing Overhead Vs. node density 2 omlz d vr ed N r ai e R ui g Oeh a 1.5 o tn 1 AODV 0.5 0 0 20 40 60 No. of nodes Fig5. Normalized Routing Overhead Vs Node Density 21 © 2011 ACEEE DOI: 01.IJNS.02.01.111