SlideShare a Scribd company logo
1 of 4
Download to read offline
25
International Conference on Advanced Communication Systems, January 10 - 12, 2007, GCT, Coimbatore. ICACS - 2007
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc
Wireless Networks
1
Narendra Singh Yadav 2
Dr. R.P.Yadav
1 Department of ECE, The Malaviya National Institute of Technology, Jaipur
Email: narensinghyadav@yahoo.com
2 Department of ECE, The Malaviya National Institute of Technology, Jaipur
Email : rpyadav@mnit.ac.in
ABSTRACT
An ad hoc network is a collection of mobile nodes
communicating through wireless channels without any existing
network infrastructure or centralized administration. Because of
the limited transmission range of wireless network interfaces,
multiple “hops” may be needed to exchange data across the
network. Consequently, many routing algorithms have come into
existence to satisfy the needs of communications in such networks.
This paper presents performance comparison of the three routing
protocols AODV and DSDV. Protocols were simulated using the
ns-2 and were compared in terms of packet delivery fraction,
normalized routing load and average delay, while varying number
of nodes, and pause time. Simulation revealed that although DSDV
perfectly scales to small networks with low node speeds, AODV is
preferred due to its more efficient use of bandwidth.
Keywords:
Ad-Hoc Wireless Networks, AODV, DSDV, Ns-2
I.INTRODUCTION
Advances in computer and telecommunication
industries have made wireless networks increasingly popular.
Basically, there are two types of systems for wireless networks.
One is the base-station (BS) oriented that is cellular (one hop)
networks [1]. In BS- oriented wireless networks the mobile hosts
communicate with base station. The presence of BS simplifies
routing and resource management as the routing decisions are made
in a centralized manner with more information about the destination
node. The BS- oriented wireless network has better performance
and is more reliable
The other is the ad hoc (multihop) wireless networks
[2]. Ad hoc wireless networks (formerly called packet radio
networks) are defined as mobile distributed multihop wireless
networks. In ad hoc wireless networks there is no predetermined
topology (pre existing fixed infrastructure) and no central control.
The nodes in ad hoc communicate without wired connections
among themselves by creating a network “on the fly”. The absence
of any central control makes the routing a complex.Ad hoc wireless
network topology is more desirable because of its low cost, ease
and speed of deployment and flexibility.
Routing is a core problem in networks for delivering
data from one node to another. Ad hoc wireless networks have
special limitations and properties [3]. Therefore, routing protocols
for wired networks cannot be directly used in ad hoc wireless
networks; routing protocols for ad hoc wireless networks need to
be designed and implemented separately.
Routing protocols for ad hoc wireless networks can be
classified into two main categories: Proactive or table driven routing
protocols and Reactive or on-demand routing protocols.
To judge the merit of a routing protocol, one needs
metrics- both quantitative and qualitative- with which to measure
its suitability and performance [3]. These metrics should be
independent of any given routing protocol.
Dozens of routing protocols have been introduced [4],
all of which typically perform well in some situations while having
significant weaknesses in other cases. So the open problem lies in
that no one single routing algorithm/ protocol is suitable for
heterogeneity of ad hoc networks [3]. And this limitation could
not be solved without advanced computer and wireless
communication technology development specially hardware
evolution.
The paper is organized as follows: in Section II, a brief
description of routing protocols discussed in this work are
presented, in Section III the parameters of simulation and the
scenario are shown, in Section IV the simulation results are plotted
and argued, in Section V some conclusions are discussed.
II.DESCRIPTIONOFPROTOCOLS
Destination Sequenced Distance Vector (DSDV)
DSDV, an enhanced version of the distributed ellman-
Ford algorithm, belongs to the proactive or table driven family
where a correct route to any node in the network is always
maintained and updated [5].
In DSDV, each node maintains a routing table that
contains the shortest distance and the first node on the shortest
path to every other node in the network. A sequence number
created by the destination node tags each entry to prevent loops,
to counter the count –to-infinity problem and for faster
convergence.Thetablesareexchangedbetweenneighborsatregular
intervals to keep an up to date view of the network topology. The
tables are also forwarded if a node finds a significant change in
local topology. This exchange of table imposes a large overhead on
the whole network. To reduce this potential traffic, routing updates
are classified into two categories. The first is known as “full dump”
which includes all available routing information. This type of
updates should be used as infrequently as possible and only in the
26
International Conference on Advanced Communication Systems, January 10 - 12, 2007, GCT, Coimbatore. ICACS - 2007
cases of complete topology change. In the cases of occasional
movements, smaller “incremental” updates are sent carrying only
information about changes since the last full dump. Each of these
updates should fit in a single Network Protocol Data Unit (NPDU),
and thus significantly decreasing the amount of traffic. Table
updates are initiated by a destination with a new sequence number
which is always greater than the previous one. Upon receiving an
updated table a node either updates its tables based on the received
information or holds it for some time to select the best metric
received from multiple versions of the same update from different
neighbors.
Ad hoc On-demand Distance Vector Routing (AODV)
AODV [6][7] is an improvement on the DSDV.AODV
uses an on- demand approach for finding routes. Since it is an on
- demand algorithm, a route is established only when it is required
by a source node for transmitting data packets and it maintains
these routes as long as they are needed by the sources.
AODV uses a destination sequence number, created by
the destination, to determine an up to date path to the destination.
A node updates its route information only if the destination
sequence number of the current received packet is greater than the
destination sequence number stored at the node. It indicates the
freshness of the route accepted by the source. To prevent multiple
broadcast of the same packet AODV uses broadcast identifier
number that ensure loop freedom since the intermediate nodes
only forward the first copy of the same packet and discard the
duplicate copies.
To find a path to the destination, the source broadcasts
a Route Request (RREQ) packet across the network. This RREQ
contains the source identifier, the destination identifier, the source
sequence number, the destination sequence number, the broadcast
identifier and the time to live field. Nodes that receives RREQ
either if they are the destination or if they have a fresh route to the
destination, can respond to the RREQ by unicasting a Route Reply
(RREP) back to the source node. Otherwise, the node rebroadcasts
the RREQ.
When a node forwards a RREQ packet to its neighbors,
it also records in its tables the node from which the first copy of
the request came. This information is used to construct the reverse
path for the RREP packet. AODV uses only symmetric links
because the route reply packet follows the reverse path of route
request packet. When a node receives a RREP packet, information
about the previous node from which the packet was received is
also stored in order to forward the data packets to this next node
as the next hop toward the destination. Once the source node
receives a RREP it can begin using the route to send data packets.
The source node rebroadcasts the RREQ if it does not
receive a RREP before the timer expires. It attempts discovery up
to some maximum number of attempts. If it does not discover a
route after this maximum number of attempts, the session is
aborted.
If the source moves then it can reinitiate route discovery
to the destination. If one of the intermediate nodes move then the
moved nodes neighbor realizes the link failure and sends a link
failure notification to its upstream neighbors and so on till it reaches
the source upon which the source can reinitiate route discovery if
needed.
III.SIMULATIONMODEL
For the purpose of a performance comparison detailed
performance simulations are performed for three main ad hoc
routing protocols i.e.AODV and DSDV. The simulations are done
using ns-2 [8].
The Distributed Coordination Function (DCF) of IEEE
802.11 for wireless LANs is used as the MAC layer protocol. An
unslotted carrier sense multiple access (CSMA) technique with
collision avoidance (CSMA/CA) is used to transmit the data
packets. The radio model uses characteristics similar to a
commercial radio interface, Lucent’s WaveLAN. WaveLAN is
modeled as a shared media radio with a nominal bit rate of 2 Mb/
s and a nominal radio range of 250m.
The protocols maintain a send buffer of 64 packets. It
contains all data packets waiting for a route, such as packets for
which route discovery has started, but no reply has arrived yet.
To prevent buffering of packets indefinitely, packets are dropped
if they wait in the send buffer for more than 30s.All packets (both
data and routing) sent by the routing layer are queued at the interface
queue until the MAC layer can transmit them. The interface queue
has a maximum size of 50 packets and is maintained as a priority
queue with two priori-ties each served in FIFO order. Routing
packets get higher priority than data packets.
Traffic Pattern
Continuous bit rate (CBR) traffic sources are used.
Only 512-byte data packets are used.All communication patterns
were peer-to-peer, and connections were started at times
uniformly distributed between 0 and 100 seconds. TCP sources
was avoided because TCP offers a conforming load to the
network, meaning that it changes the times at which it sends
packets based on its perception of the networks ability to carry
packets.
Traffic is generated using the following parameters:
Traffic Type : CBR
No of nodes : 50
No of sources: 15, 30, 45 sources
Rate: 4 packets per second for 15 and 30 sources, 3 packets per
sec for 45 sources
Movement Model
The node movement generator of ns-2 is used to
generate node movement scenarios. The parameters this
movement generator takes as input are number of nodes, pause
time, maximum speed, field configuration and simulation time.
The parameter, which is of primary importance, is pause time.
Pause time basically determines the mobility rate of the model,
as pause time increases the mobility rate decreases.
At the start of the simulations nodes are assigned some
random position within the specified field configuration, for pause
27
International Conference on Advanced Communication Systems, January 10 - 12, 2007, GCT, Coimbatore. ICACS - 2007
time seconds nodes stay at that position and after that they make
a random movement to some other position. The movement speed
is uniformly distributed between 0 and maximum speed.
The following parameter values are used forgenerating
various mobility models:
Number of nodes: 50 nodes
Pause times: 0, 20, 40, 60, 80, 100 seconds
Maximum speed: 20 m/s
Field configuration: 500 X 500
Simulation time: 100 seconds.
Performance Metrics
The following performance metrics are evaluated:
•Packet delivery ratio The ratio of the data packets delivered to
the destinations to those generated by the CBR sources.
•Averageend-to-enddelay Thisincludesallpossibledelayscaused
by buffering during route discovery latency, queuing at the interface
queue, retransmission delays at the MAC, and propagation and
transfer times.
•Normalized routing load the number of routing packets
“transmitted” per data packet “delivered” at the destination
IV.PERFORMANCERESULTS
The simulation results are shown in the following
section in the form of line graphs. Graphs show comparison
between the two protocols by varying different numbers of
sources on the basis of the above-mentioned metrics as a function
of pause time.
Packet Delivery Fraction
Figure 1 show a comparison between both the routing protocols
on the basis of packet delivery fraction using a different number of
traffic sources.
Packet delivery fraction of protocols for 15 sources
Packet delivery fraction of protocols for 30 sources
Packet delivery fraction of protocols for 45 sources
Fig. 1. Packet delivery fraction for the 50-node model with
various numbers of sources.
Both of the protocols deliver a greater percentage of the
originateddatapacketswhenthereislittlenodemobility,converging
to 100% delivery ration when there is no node motion.
The On-demand protocol, AODV performed
particularly well, delivering almost 100% of the data packets
regardless of the mobility rate. The packet delivery of AODV is
almost independent of the number of sources that is varying number
of sources does not effect AODV that much.
DSDV performance is worst when mobility is high.
This poor performance is because of the reason that DSDV is not
a On demand protocol and it keeps only one route per destination,
therefore lack of alternate routes and presence of stale routes in
the routing table when nodes are moving at higher rate leads to
packet drops. The packet delivery of DSDV protocol depends on
the number of sources, as it is obvious from figure 1.
Average end to end delay of protocols for 15 sources
Average end to end delay of protocols for 30 sources
28
International Conference on Advanced Communication Systems, January 10 - 12, 2007, GCT, Coimbatore. ICACS - 2007
Average end to end delay of protocols for 45 sources
Fig. 2. Average End to End Delay for the 50-node model with
various numbers of sources
DSDV performed pretty stable and the delay kept
about 0.04 seconds when pause time increased from 0 seconds
to 100 second. The reason is that it is a table driven protocol, so
a node does not need to find a route before transmitting packets.
So the delay is quite stable.
For AODV the delay is much more then the DSDV. As
AODV is On-demand protocol, with an increased number of
sources and high mobility there are more link failures therefore
there are more route discoveries.AODV takes more time duringthe
route discovery process as first it finds the route hop by hop and
then it gets back to the source by back tracking that route.All this
leads to delays in the delivery of data packets.
Normalized Routing Load
Figure 3 show a comparison between both the routing
protocols on the basis of normalized routing load using a different
number of sources.
Normalized routing load of protocols for 15 sources
Normalized routing load of protocols for 30 sources
Normalized routing load of protocols for 45 sources
Fig 3. Normalized routing load for the 50-node model with
various numbers of sources
As DSDV is a table driven routing protocol its overhead
is almost the same with respect to node mobility.
In cases of AODV, as the pause time increases, route
stability increases, resulting in a decreased number of routing packet
routing packet transmissions, and therefore a decrease in the routing
overhead.Arelatively stable normalized routing load is a desirable
property for scalability of the protocols,
V.CONCLUSION
This paper compared the two ad hoc routing protocols.
AODV a On – Demand routing protocol, and DSDV a table driven
protocol.
Simulation results show that both of the protocols deliver
a greater percentage of the originated data packets when there is
little node mobility, converging to 100% delivery ration when
there is no node motion. The packet delivery of AODV almost
independent of the number of sources. DSDV generates less routing
load then AODV. AODV suffers from end to end delays. DSDV
packet delivery fraction is very low for high mobility scenarios.
REFERENCES
[1] T.S.Rappaport, “wireless communications- principles and
practice”, Second Edition, Pearson Education.
[2] C.Siva Ram and B.S.Manoj, “Ad hoc wireless networks:
Architectures and protocols”, second edition, Pearson education.
[3] S.Corson and J.Macher, “Mobile ad hoc networking
(MANET): Routing Protocol Performance issues and evaluation
considerations” Internet RFC 2501.
[4] E.M.Royer and C.K.Toh, “A review of current routing
protocols for ad hoc mobile wireless networks”, IEEE Personal
Communications Magazine, pp. 46-55, April 1999.
[5] C.E. Perkins & P. Bhagwat, Highly Dynamic Destination-
Sequenced Distance Vector Routing (DSDV) for Mobile
Computers, Proceedings of ACM SIGCOMM’94, London, UK,
Sep. 1994, pp. 234-244.
[6] C.E. Perkins, E.M. Royer & S. Das, Ad Hoc On Demand
Distance Vector (AODV) Routing, IETF Internet draft, draft-ietf-
manet-aodv-08.txt, March 2001.
[7] C.E. Perkins & E.M. Royer, Ad-hoc On-Demand Distance
Vector Routing, Proceedings of the 2nd IEEEWorkshop on Mobile
Computing Systems andApplications, New Orleans, LA, February
1999, pp. 90- 100.
[8] K. Fall & K. Vardhan, The Network Simulator (ns-2)Available
Online: http://www.isi.edu/nsnam/ns

More Related Content

What's hot

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksIJCNCJournal
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase theyasinalimohammed
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 

What's hot (20)

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection BreaksPrediction Algorithm for Mobile Ad Hoc Network Connection Breaks
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
O26087092
O26087092O26087092
O26087092
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
E010322531
E010322531E010322531
E010322531
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
A41040105
A41040105A41040105
A41040105
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 

Similar to Comparing AODV and DSDV Routing Protocols for Wireless Networks

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)IAESIJEECS
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)IAESIJEECS
 

Similar to Comparing AODV and DSDV Routing Protocols for Wireless Networks (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
B03406010
B03406010B03406010
B03406010
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
 

More from Narendra Singh Yadav

On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...Narendra Singh Yadav
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Narendra Singh Yadav
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 

More from Narendra Singh Yadav (6)

On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
Performance Comparison and Analysis of Table-Driven and On-Demand Routing Pro...
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

Comparing AODV and DSDV Routing Protocols for Wireless Networks

  • 1. 25 International Conference on Advanced Communication Systems, January 10 - 12, 2007, GCT, Coimbatore. ICACS - 2007 Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless Networks 1 Narendra Singh Yadav 2 Dr. R.P.Yadav 1 Department of ECE, The Malaviya National Institute of Technology, Jaipur Email: narensinghyadav@yahoo.com 2 Department of ECE, The Malaviya National Institute of Technology, Jaipur Email : rpyadav@mnit.ac.in ABSTRACT An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth. Keywords: Ad-Hoc Wireless Networks, AODV, DSDV, Ns-2 I.INTRODUCTION Advances in computer and telecommunication industries have made wireless networks increasingly popular. Basically, there are two types of systems for wireless networks. One is the base-station (BS) oriented that is cellular (one hop) networks [1]. In BS- oriented wireless networks the mobile hosts communicate with base station. The presence of BS simplifies routing and resource management as the routing decisions are made in a centralized manner with more information about the destination node. The BS- oriented wireless network has better performance and is more reliable The other is the ad hoc (multihop) wireless networks [2]. Ad hoc wireless networks (formerly called packet radio networks) are defined as mobile distributed multihop wireless networks. In ad hoc wireless networks there is no predetermined topology (pre existing fixed infrastructure) and no central control. The nodes in ad hoc communicate without wired connections among themselves by creating a network “on the fly”. The absence of any central control makes the routing a complex.Ad hoc wireless network topology is more desirable because of its low cost, ease and speed of deployment and flexibility. Routing is a core problem in networks for delivering data from one node to another. Ad hoc wireless networks have special limitations and properties [3]. Therefore, routing protocols for wired networks cannot be directly used in ad hoc wireless networks; routing protocols for ad hoc wireless networks need to be designed and implemented separately. Routing protocols for ad hoc wireless networks can be classified into two main categories: Proactive or table driven routing protocols and Reactive or on-demand routing protocols. To judge the merit of a routing protocol, one needs metrics- both quantitative and qualitative- with which to measure its suitability and performance [3]. These metrics should be independent of any given routing protocol. Dozens of routing protocols have been introduced [4], all of which typically perform well in some situations while having significant weaknesses in other cases. So the open problem lies in that no one single routing algorithm/ protocol is suitable for heterogeneity of ad hoc networks [3]. And this limitation could not be solved without advanced computer and wireless communication technology development specially hardware evolution. The paper is organized as follows: in Section II, a brief description of routing protocols discussed in this work are presented, in Section III the parameters of simulation and the scenario are shown, in Section IV the simulation results are plotted and argued, in Section V some conclusions are discussed. II.DESCRIPTIONOFPROTOCOLS Destination Sequenced Distance Vector (DSDV) DSDV, an enhanced version of the distributed ellman- Ford algorithm, belongs to the proactive or table driven family where a correct route to any node in the network is always maintained and updated [5]. In DSDV, each node maintains a routing table that contains the shortest distance and the first node on the shortest path to every other node in the network. A sequence number created by the destination node tags each entry to prevent loops, to counter the count –to-infinity problem and for faster convergence.Thetablesareexchangedbetweenneighborsatregular intervals to keep an up to date view of the network topology. The tables are also forwarded if a node finds a significant change in local topology. This exchange of table imposes a large overhead on the whole network. To reduce this potential traffic, routing updates are classified into two categories. The first is known as “full dump” which includes all available routing information. This type of updates should be used as infrequently as possible and only in the
  • 2. 26 International Conference on Advanced Communication Systems, January 10 - 12, 2007, GCT, Coimbatore. ICACS - 2007 cases of complete topology change. In the cases of occasional movements, smaller “incremental” updates are sent carrying only information about changes since the last full dump. Each of these updates should fit in a single Network Protocol Data Unit (NPDU), and thus significantly decreasing the amount of traffic. Table updates are initiated by a destination with a new sequence number which is always greater than the previous one. Upon receiving an updated table a node either updates its tables based on the received information or holds it for some time to select the best metric received from multiple versions of the same update from different neighbors. Ad hoc On-demand Distance Vector Routing (AODV) AODV [6][7] is an improvement on the DSDV.AODV uses an on- demand approach for finding routes. Since it is an on - demand algorithm, a route is established only when it is required by a source node for transmitting data packets and it maintains these routes as long as they are needed by the sources. AODV uses a destination sequence number, created by the destination, to determine an up to date path to the destination. A node updates its route information only if the destination sequence number of the current received packet is greater than the destination sequence number stored at the node. It indicates the freshness of the route accepted by the source. To prevent multiple broadcast of the same packet AODV uses broadcast identifier number that ensure loop freedom since the intermediate nodes only forward the first copy of the same packet and discard the duplicate copies. To find a path to the destination, the source broadcasts a Route Request (RREQ) packet across the network. This RREQ contains the source identifier, the destination identifier, the source sequence number, the destination sequence number, the broadcast identifier and the time to live field. Nodes that receives RREQ either if they are the destination or if they have a fresh route to the destination, can respond to the RREQ by unicasting a Route Reply (RREP) back to the source node. Otherwise, the node rebroadcasts the RREQ. When a node forwards a RREQ packet to its neighbors, it also records in its tables the node from which the first copy of the request came. This information is used to construct the reverse path for the RREP packet. AODV uses only symmetric links because the route reply packet follows the reverse path of route request packet. When a node receives a RREP packet, information about the previous node from which the packet was received is also stored in order to forward the data packets to this next node as the next hop toward the destination. Once the source node receives a RREP it can begin using the route to send data packets. The source node rebroadcasts the RREQ if it does not receive a RREP before the timer expires. It attempts discovery up to some maximum number of attempts. If it does not discover a route after this maximum number of attempts, the session is aborted. If the source moves then it can reinitiate route discovery to the destination. If one of the intermediate nodes move then the moved nodes neighbor realizes the link failure and sends a link failure notification to its upstream neighbors and so on till it reaches the source upon which the source can reinitiate route discovery if needed. III.SIMULATIONMODEL For the purpose of a performance comparison detailed performance simulations are performed for three main ad hoc routing protocols i.e.AODV and DSDV. The simulations are done using ns-2 [8]. The Distributed Coordination Function (DCF) of IEEE 802.11 for wireless LANs is used as the MAC layer protocol. An unslotted carrier sense multiple access (CSMA) technique with collision avoidance (CSMA/CA) is used to transmit the data packets. The radio model uses characteristics similar to a commercial radio interface, Lucent’s WaveLAN. WaveLAN is modeled as a shared media radio with a nominal bit rate of 2 Mb/ s and a nominal radio range of 250m. The protocols maintain a send buffer of 64 packets. It contains all data packets waiting for a route, such as packets for which route discovery has started, but no reply has arrived yet. To prevent buffering of packets indefinitely, packets are dropped if they wait in the send buffer for more than 30s.All packets (both data and routing) sent by the routing layer are queued at the interface queue until the MAC layer can transmit them. The interface queue has a maximum size of 50 packets and is maintained as a priority queue with two priori-ties each served in FIFO order. Routing packets get higher priority than data packets. Traffic Pattern Continuous bit rate (CBR) traffic sources are used. Only 512-byte data packets are used.All communication patterns were peer-to-peer, and connections were started at times uniformly distributed between 0 and 100 seconds. TCP sources was avoided because TCP offers a conforming load to the network, meaning that it changes the times at which it sends packets based on its perception of the networks ability to carry packets. Traffic is generated using the following parameters: Traffic Type : CBR No of nodes : 50 No of sources: 15, 30, 45 sources Rate: 4 packets per second for 15 and 30 sources, 3 packets per sec for 45 sources Movement Model The node movement generator of ns-2 is used to generate node movement scenarios. The parameters this movement generator takes as input are number of nodes, pause time, maximum speed, field configuration and simulation time. The parameter, which is of primary importance, is pause time. Pause time basically determines the mobility rate of the model, as pause time increases the mobility rate decreases. At the start of the simulations nodes are assigned some random position within the specified field configuration, for pause
  • 3. 27 International Conference on Advanced Communication Systems, January 10 - 12, 2007, GCT, Coimbatore. ICACS - 2007 time seconds nodes stay at that position and after that they make a random movement to some other position. The movement speed is uniformly distributed between 0 and maximum speed. The following parameter values are used forgenerating various mobility models: Number of nodes: 50 nodes Pause times: 0, 20, 40, 60, 80, 100 seconds Maximum speed: 20 m/s Field configuration: 500 X 500 Simulation time: 100 seconds. Performance Metrics The following performance metrics are evaluated: •Packet delivery ratio The ratio of the data packets delivered to the destinations to those generated by the CBR sources. •Averageend-to-enddelay Thisincludesallpossibledelayscaused by buffering during route discovery latency, queuing at the interface queue, retransmission delays at the MAC, and propagation and transfer times. •Normalized routing load the number of routing packets “transmitted” per data packet “delivered” at the destination IV.PERFORMANCERESULTS The simulation results are shown in the following section in the form of line graphs. Graphs show comparison between the two protocols by varying different numbers of sources on the basis of the above-mentioned metrics as a function of pause time. Packet Delivery Fraction Figure 1 show a comparison between both the routing protocols on the basis of packet delivery fraction using a different number of traffic sources. Packet delivery fraction of protocols for 15 sources Packet delivery fraction of protocols for 30 sources Packet delivery fraction of protocols for 45 sources Fig. 1. Packet delivery fraction for the 50-node model with various numbers of sources. Both of the protocols deliver a greater percentage of the originateddatapacketswhenthereislittlenodemobility,converging to 100% delivery ration when there is no node motion. The On-demand protocol, AODV performed particularly well, delivering almost 100% of the data packets regardless of the mobility rate. The packet delivery of AODV is almost independent of the number of sources that is varying number of sources does not effect AODV that much. DSDV performance is worst when mobility is high. This poor performance is because of the reason that DSDV is not a On demand protocol and it keeps only one route per destination, therefore lack of alternate routes and presence of stale routes in the routing table when nodes are moving at higher rate leads to packet drops. The packet delivery of DSDV protocol depends on the number of sources, as it is obvious from figure 1. Average end to end delay of protocols for 15 sources Average end to end delay of protocols for 30 sources
  • 4. 28 International Conference on Advanced Communication Systems, January 10 - 12, 2007, GCT, Coimbatore. ICACS - 2007 Average end to end delay of protocols for 45 sources Fig. 2. Average End to End Delay for the 50-node model with various numbers of sources DSDV performed pretty stable and the delay kept about 0.04 seconds when pause time increased from 0 seconds to 100 second. The reason is that it is a table driven protocol, so a node does not need to find a route before transmitting packets. So the delay is quite stable. For AODV the delay is much more then the DSDV. As AODV is On-demand protocol, with an increased number of sources and high mobility there are more link failures therefore there are more route discoveries.AODV takes more time duringthe route discovery process as first it finds the route hop by hop and then it gets back to the source by back tracking that route.All this leads to delays in the delivery of data packets. Normalized Routing Load Figure 3 show a comparison between both the routing protocols on the basis of normalized routing load using a different number of sources. Normalized routing load of protocols for 15 sources Normalized routing load of protocols for 30 sources Normalized routing load of protocols for 45 sources Fig 3. Normalized routing load for the 50-node model with various numbers of sources As DSDV is a table driven routing protocol its overhead is almost the same with respect to node mobility. In cases of AODV, as the pause time increases, route stability increases, resulting in a decreased number of routing packet routing packet transmissions, and therefore a decrease in the routing overhead.Arelatively stable normalized routing load is a desirable property for scalability of the protocols, V.CONCLUSION This paper compared the two ad hoc routing protocols. AODV a On – Demand routing protocol, and DSDV a table driven protocol. Simulation results show that both of the protocols deliver a greater percentage of the originated data packets when there is little node mobility, converging to 100% delivery ration when there is no node motion. The packet delivery of AODV almost independent of the number of sources. DSDV generates less routing load then AODV. AODV suffers from end to end delays. DSDV packet delivery fraction is very low for high mobility scenarios. REFERENCES [1] T.S.Rappaport, “wireless communications- principles and practice”, Second Edition, Pearson Education. [2] C.Siva Ram and B.S.Manoj, “Ad hoc wireless networks: Architectures and protocols”, second edition, Pearson education. [3] S.Corson and J.Macher, “Mobile ad hoc networking (MANET): Routing Protocol Performance issues and evaluation considerations” Internet RFC 2501. [4] E.M.Royer and C.K.Toh, “A review of current routing protocols for ad hoc mobile wireless networks”, IEEE Personal Communications Magazine, pp. 46-55, April 1999. [5] C.E. Perkins & P. Bhagwat, Highly Dynamic Destination- Sequenced Distance Vector Routing (DSDV) for Mobile Computers, Proceedings of ACM SIGCOMM’94, London, UK, Sep. 1994, pp. 234-244. [6] C.E. Perkins, E.M. Royer & S. Das, Ad Hoc On Demand Distance Vector (AODV) Routing, IETF Internet draft, draft-ietf- manet-aodv-08.txt, March 2001. [7] C.E. Perkins & E.M. Royer, Ad-hoc On-Demand Distance Vector Routing, Proceedings of the 2nd IEEEWorkshop on Mobile Computing Systems andApplications, New Orleans, LA, February 1999, pp. 90- 100. [8] K. Fall & K. Vardhan, The Network Simulator (ns-2)Available Online: http://www.isi.edu/nsnam/ns