SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
23
COMPARATIVE ANALYSIS OF MANET REACTIVE PROTOCOLS
Nisha kumari,
CS Department, Manav Rachna College of Engineering
Faridabad, Haryana
Ritu Saluja
Associate Professor, Deptt of CS
Manav Rachna College of Engg, Faridabad, Haryana
ABSTRACT
An Ad-hoc network is a group of mobile nodes. In an ad-hoc network a mobile node can
directly communicate with the other node that lies in its transmission range or it can forward
its information to the other node that will act as an intermediate node and forwards the
information to the desired node using multi-hop links. In such a network there is no need of
any infrastructure. Ad-hoc networks routing protocols are classified into two categories:
Proactive/table-driven and reactive/on-demand. Reactive routing protocol is used whenever a
communication is requested. There are two types of reactive protocols: AODV (Ad hoc on-
demand distance vector protocol) and DSR (Dynamic source routing protocol). In one type of
scenario one protocol may perform best while another may perform worst, so there is a need
to determine an optimal one out of these in a more dynamic environment. The differences in
the working of these protocols lead to significant performance differentials for both of these
protocols.
Keywords: MANET, AODV, DSR, RREQ, RREP
INTRODUCTION
With the development in technologies there is a rapid increase in the use of devices like
mobile phones and computers. These devices provide access to network through wireless
interfaces. Ad-hoc networks are the wireless networks without any fixed infrastructure. An
Ad-hoc network is a collection of nodes that are mobile in nature therefore they are also
known as MANETS (mobile ad hoc networks).
A MANET (mobile ad hoc network) is an independent collection of mobile users that
communicate with each other via wireless links that is through radio waves. In an ad-hoc
network a mobile node can directly communicate with the other node that lies in its
IJCSERD
© PRJ PUBLICATION
International Journal of Computer Science Engineering Research
and Development (IJCSERD), ISSN 2248 – 9363(Print)
ISSN 2248 – 9371(Online), Volume 3, Number 1
Jan- March (2013), pp: 23-29
© PRJ Publication, http://www.prjpublication.com/IJCSERD.asp
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
24
transmission range or it can forward its information to the other node that will act as an
intermediate node. The network is decentralized as all the network activities for example
discovering the topologies and delivering messages must be executed by the nodes
themselves. Therefore routing is necessary for the mobile nodes. Such type of networks can
be used in the environments where there is no infrastructure or setting of an infrastructure is
very expensive or the existing wired infrastructure has been destroyed by the natural calamity
,for example earthquakes, floods.
Characteristics of MANETS are:
• Nodes can act like both hosts and routers (intermediate nodes).
• Communication via radio waves.
• Limited Bandwidth.
• Less Security.
• Dynamic network topology.
Applications of MANET are:
• Emergency situations or disaster areas, where a hurricane or earthquake has destroyed
the communication infrastructure.
• Coverage area expansion of cellular networks.
• Commercial and Industrial areas where associates can share information during a
meeting and participants in a conference can exchange documents or presentations.
• Inter-vehicle communication.
• Sensor Networks represent a special kind of ad hoc networks that consist of nodes
having sensing communication and processing abilities.
Properties of MANET Routing protocols are:
• The routing protocols should be capable of using not only the bi-directional links but
also the unidirectional links that will improve the performance of routing protocols.
• The nodes in the ad-hoc network can be laptops or cell phones that are limited in
battery power so it is very important that the routing protocol has support for sleep
modes.
• The protocol should be reactive in nature that the protocol should react only when
needed and should not periodically broadcast information This minimize the control
overhead in the network and prevent misuse of the network resources.
• The protocol should be distributed that is it should not be dependent on any
centralized controlling system. The nodes in an ad-hoc network are mobile in nature
so they can enter or leave the network any time causing partitions.
• The radio environment is especially vulnerable to attacks so some sort of security
measures should be followed like Authentication and encryption.
• The routes used for communication should be loop free. This avoids any misuse of
bandwidth and improves the overall performance.
• Multiple routes can be used to reduce the number of reactions to topological changes
and congestion. If one route becomes invalid, it is possible that another route can be
used.
• The routing protocols should incorporate Quality of service that helps to find where
these networks can be used for example for real time traffic support.
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
25
II ROUTING PROTOCOLS
Ad-hoc networks have routing protocols that can be classified into two categories:
Proactive/table-driven
Reactive/on-demand.
Fig 2: Type of Routing Protocols
A. Proactive Protocol
Proactive protocols are also known as table-driven protocols. These protocols always
maintain routes between every host that means there is a regular exchange of network
topology packets between the nodes of the network. So there is a minimal delay in
determining which route should to be taken. These protocols consume bandwidth to keep
routes up-to-date and also maintain routes which may never be used. The increased mobility
in the network causes traffic overhead. If the nodes transmit packets infrequently then the
routing information is considered redundant.
Proactive protocols are most suitable in the networks that have low node mobility and where
the nodes transmit data frequently. Examples of Proactive Protocols are: Optimized Link
State Routing (OLSR), Fish-eye State Routing (FSR), Destination-Sequenced Distance
Vector (DSDV), and Cluster-head Gateway Switch Routing Protocol (CGSR).
B. Reactive Protocol
Reactive routing protocols are also known as on-demand routing protocols as they are
used whenever a communication is requested. Firstly, Source node checks its route cache if
there is a route available from source to destination and if the route is not available then it
initiates route discovery process.
The reactive routing protocols perform two functions:
Route discovery: In this the source node initiates a route discovery process on demand basis.
A source node then sees its route cache for the available route and if the route from source to
destination is not present then it initiates a route discovery process. The packet includes the
destination address of the node as well as address of the intermediate nodes to the destination.
Route maintenance: Due to dynamic topology of the ad hoc networks, route failures
between the nodes are more frequent that arises due to link breakage between the nodes.
Route maintenance is done to avoid this problem by using an acknowledgement mechanism.
Examples of Reactive protocols are Dynamic Source Routing (DSR) and Ad-hoc on- demand
distance vector (AODV).
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
26
III.AD HOC ON-DEMAND DISTANCE VECTOR (AODV)
Ad hoc On-Demand Distance Vector (AODV) routing is a reactive routing protocol for
mobile ad hoc networks. It is an on-demand and distance-vector routing protocol that is a
route is established by AODV from a destination only on demand. AODV routing protocol is
capable of both unicast and multicast routing. It keeps the routes in the routing table as long
as they are needed by the source nodes. AODV generates a tree or trees are composed of the
group members and the nodes that are needed to connect their members. AODV uses
destination sequence numbers to ensure the freshness of routes. Its operations are loop-free.
AODV can also scales to large numbers of mobile nodes.
Each mobile node in the network maintains a route table entry for each destination in its route
table.
• Number of hops (Hop count)
• Destination sequence number
• Destination IP address
• Active neighbors for this route
• Lifetime (Expiration time of the route)
• Next hop
When a node suppose S wants to communicate with another node suppose D, then it initiates
route discovery process by broadcasting a Route Request packet (RREQ) to its neighbors. If
the neighbor node has a route to the destination then it replies with a route reply packet,
otherwise it broadcast the route request packet to all its neighbors and some packets reach to
the destination D.
When the Route Reply (RREP) is generated, it reaches back to the source node, based
on the reverse path. Each node along this path sets a forward pointer to the node and records
the latest destination sequence number.
The RREQ has the following fields:
• Source address
• Source sequence number used to maintain freshness info about the route to the source.
• Destination address
• Destination sequence number
• Hop-count
•
Route Request (RREQ) Message Format
Type J R G D U Reserved
Hop
Count
RREQ ID
Destination IP Address
Destination Sequence Number
Source IP Address
Source Sequence Number
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
27
The Route Request message includes the following fields:
Type 1
J Join flag, reserved for multicast
R Repair flag, reserved for multicast
G Gratuitous RREP flag
D Destination only flag, idicates that destination can respond to this RREQ.
U Unknown sequence number indicates that destination sequence number is
unknown.
Reserved Sent as 0.
Hop Count Number of hops from Source to the node handling the request.
A. Advantages and Disadvantages
The main advantage of AODV protocol is that AODV established routes on demand
basis and uses destination sequence numbers to find the latest route to the destination. The
connection setup delay is also less in AODV. The HELLO messages used in AODV that
supports the routes maintenance are range-limited so they do not cause unnecessary overhead
in the network. AODV are well suited for large networks.
A disadvantage of this protocol is that intermediate nodes can lead to inconsistent routes
if the sequence number is very old and the intermediate nodes have a higher but not the latest
destination sequence number. Multiple Route Reply messages in response to a single Route
Request packet can lead to heavy control overhead. The periodic HELLO message leads to
gratuitous bandwidth consumption.
IV Dynamic Source Routing (DSR)
Dynamic Source Routing (DSR) is also a reactive routing protocol for ad hoc networks.
It is similar to AODV as it establishes a route on-demand. It uses source routing instead of
relying on the routing table at each intermediate node. Dynamic source routing protocol is an
on-demand, source routing protocol, where all the routing information is maintained at
mobile nodes. Every node contains a route cache. Each entry in route cache specifies the
intermediate nodes to a destination. The route cache is used to respond to RREQs even if it is
not the destination. The route cache is always updated when it learns a new route. The entries
from the route cache are removed only when a node receives an RERR.
DSR allows the network to be self-organizing and self-configuring without the need for
any existing infrastructure. The protocol is based on two main mechanisms: Route Discovery
and Route Maintenance.
In Route discovery the source node floods the network with RREQ packets. The RREQ
contain the source and destination address and also the unique identity of the request. When a
node receives an RREQ and if it is the destination then it responds back with an RREP
containing the route from the source to the destination required, if not the node appends its
own address to the RREQ header and rebroadcasts the RREQ to all its neighbour nodes. But
a node that is not the destination receives the RREQ and contains a route to the destination
may send an RREP. Upon receiving the RREP packet the source node records the route
indicated in RREP in its route cache.
A shortest path for the communication between a source node and destination node is
determined by Route Discovery process. Route Maintenance mechanism ensures that the
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
28
communication path remains loop-free according the change in network conditions. Route
Reply is generated only in the case if the message has reached the destination node.
A. Advantages and Disadvantages
DSR uses a reactive approach which eliminates the need to periodically flooding the
network with update messages which are required in a table-driven approach. The
intermediate node utilizes the route cache information efficiently to reduce the control
overhead. DSR has information of multiple routes.
The disadvantage of DSR is that it is not suitable for large networks and the route
maintenance mechanism does not repair a broken link. The performance of DSR degrades
rapidly with increasing mobility. Routing overhead is involved due to the source-routing
mechanism used in DSR.
V.COMPARISON BETWEEN AODV AND DSR
TABLE I
Sr.
No.
AODV DSR
1. It uses table-driven routing. It uses source routing.
2. It delivers virtually all
packets at low mobility.
It is very good at all mobility rates.
3. It has low end to end delay.
4. AODV uses one route per
destination.
DSR uses routing cache aggressively,
and maintains multiple routes per
destination.
5. For real time traffic AODV
is preferred.
6. It is more conservative as
the fresher route is always
chosen.
DSR does not have any explicit
mechanism to expire stale routes in the
cache.
7. It outperforms DSR in more
stress situations (more load,
higher mobility.
It outperforms AODV in less stressful
situations (smaller # of nodes and
lower load and/or mobility).
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
29
CONCLUSION
In this paper an effort has been made on the theoretical study of mobile ad hoc network
routing protocols. There are mainly two types of routing protocols: Proactive and Reactive
routing protocols. Various advantages and disadvantages of these protocols are also included
in this. There are various shortcomings in different routing protocols and it is very difficult to
choose a right routing protocol for a particular situation as there are tradeoffs between various
protocols.
ACKNOWLEDGMENT
I WOULD LIKE TO THANK MRS. RITU SALUJA AND MANAV RACHNA COLLEGE OF ENGG. FOR
THEIR SUPPORT AND GUIDANCE
REFERENCES
[1] S .Taneja, A.Kush, A.Makkar, “Experimental analysis of DSR and AODV using
speed and pause time”, International Journal of Innovation, Management and
Technology, Vol. 1, No. 5, December 2010.
[2] C.E, E.M. Royer and S.R. Das, “Performance comparison of two on-demand routing
protocols for Ad hoc networks”, IEEE Personal Communications Magazine, 8: 16-28,
2001.
[3] G.Kaur, “Performance Analysis of AODV routing protocol in Manets”,
International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.08
August 2012.
[4] T.Singh, S.Dua, V.Das, “Energy-Efficient Routing Protocols In Mobile Ad-Hoc
Networks”, International Journal of Advanced Research in Computer Science and
Software Engineering, Volume 2, Issue 1, January 2012.
[5] D.Maltz, J.Broch, J.Jetcheva, D.Johnson. The effects of on-demand behavior in
routing protocols for multihop wireless ad hoc networks IEEE Journal on Selected
Areas in Communication, 1999
[6] Poonam Thakur, M.Vijaya Raju, “survey on routing techniques for Manets and
Wireless sensor networks: a comparison” international journal of computer
engineering & technology (ijcet) Volume 4, Issue 1, January -February2013.
[7] Sunita Kushwaha, Bhavna Narain, Deepti Verma, Sanjay kumar, “effect of scenario
environment on the performance of Manets routing protocol: aodv” international
journal of computer engineering & technology (ijcet) Volume 2, Issue 1, January-
April 2011.
[8] Shah Vrutik, Dr.Nilesh Modi, Patani Ashwin, “aodvgap-an acknowledgment based
approach to mitigate selective forwarding attacks in Manet” international journal of
computer engineering& technology (ijcet) Volume 3, Issue 2, July-September
2010.

More Related Content

What's hot

Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelIOSR Journals
 
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...IJECEIAES
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSFransiskeran
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
 

What's hot (20)

Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
A340105
A340105A340105
A340105
 
Q045058791
Q045058791Q045058791
Q045058791
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 

Viewers also liked

Viewers also liked (13)

Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
Exposicion diapositivas
Exposicion diapositivasExposicion diapositivas
Exposicion diapositivas
 
Leadership
LeadershipLeadership
Leadership
 
Suspense y terror
Suspense y terrorSuspense y terror
Suspense y terror
 
Welcome to criteo factory: 72k jobs per day
Welcome to criteo factory:   72k jobs per dayWelcome to criteo factory:   72k jobs per day
Welcome to criteo factory: 72k jobs per day
 
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
 
Simple and compound interest
Simple and compound interestSimple and compound interest
Simple and compound interest
 
Fuentes de luz
Fuentes de luzFuentes de luz
Fuentes de luz
 
06 ténicas básicas de fotografía
06 ténicas básicas de fotografía06 ténicas básicas de fotografía
06 ténicas básicas de fotografía
 
George Hoyningen-Huene
George Hoyningen-HueneGeorge Hoyningen-Huene
George Hoyningen-Huene
 
Iguales en dignidad 2016
Iguales en dignidad 2016Iguales en dignidad 2016
Iguales en dignidad 2016
 
Biografi harun ar rasyid
Biografi harun ar rasyidBiografi harun ar rasyid
Biografi harun ar rasyid
 
El Ojo y la Visión.
El Ojo y la Visión.El Ojo y la Visión.
El Ojo y la Visión.
 

Similar to Comparative analysis of manet reactive protocols

Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingeSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
A Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSA Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSSabrina Ball
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksijcses
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodveSAT Journals
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodveSAT Publishing House
 

Similar to Comparative analysis of manet reactive protocols (20)

Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
A Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSA Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETS
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 

More from prj_publication

International library management systems
International library management systemsInternational library management systems
International library management systemsprj_publication
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...prj_publication
 
Diabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aDiabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aprj_publication
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumersprj_publication
 
Connecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersConnecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersprj_publication
 
The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...prj_publication
 
Awareness of digital library among library professional
Awareness of digital library among library professionalAwareness of digital library among library professional
Awareness of digital library among library professionalprj_publication
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsprj_publication
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...prj_publication
 
Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...prj_publication
 
Impact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyImpact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyprj_publication
 
Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...prj_publication
 
Service gap analysis of footwear retail outlets a study 2
Service gap analysis of footwear retail outlets  a study 2Service gap analysis of footwear retail outlets  a study 2
Service gap analysis of footwear retail outlets a study 2prj_publication
 
Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...prj_publication
 
‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management systemprj_publication
 
An appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour inAn appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour inprj_publication
 
Akce international journal of graphs and
Akce international journal of graphs andAkce international journal of graphs and
Akce international journal of graphs andprj_publication
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 nprj_publication
 
A scientometric analysis of research productivity
A scientometric analysis of research productivityA scientometric analysis of research productivity
A scientometric analysis of research productivityprj_publication
 

More from prj_publication (20)

International library management systems
International library management systemsInternational library management systems
International library management systems
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Diabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aDiabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – a
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Connecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersConnecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and users
 
The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...
 
Awareness of digital library among library professional
Awareness of digital library among library professionalAwareness of digital library among library professional
Awareness of digital library among library professional
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspects
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...
 
Impact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyImpact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichy
 
Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...
 
Service gap analysis of footwear retail outlets a study 2
Service gap analysis of footwear retail outlets  a study 2Service gap analysis of footwear retail outlets  a study 2
Service gap analysis of footwear retail outlets a study 2
 
Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...
 
‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system
 
An appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour inAn appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour in
 
Akce international journal of graphs and
Akce international journal of graphs andAkce international journal of graphs and
Akce international journal of graphs and
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 n
 
A scientometric analysis of research productivity
A scientometric analysis of research productivityA scientometric analysis of research productivity
A scientometric analysis of research productivity
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Comparative analysis of manet reactive protocols

  • 1. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 23 COMPARATIVE ANALYSIS OF MANET REACTIVE PROTOCOLS Nisha kumari, CS Department, Manav Rachna College of Engineering Faridabad, Haryana Ritu Saluja Associate Professor, Deptt of CS Manav Rachna College of Engg, Faridabad, Haryana ABSTRACT An Ad-hoc network is a group of mobile nodes. In an ad-hoc network a mobile node can directly communicate with the other node that lies in its transmission range or it can forward its information to the other node that will act as an intermediate node and forwards the information to the desired node using multi-hop links. In such a network there is no need of any infrastructure. Ad-hoc networks routing protocols are classified into two categories: Proactive/table-driven and reactive/on-demand. Reactive routing protocol is used whenever a communication is requested. There are two types of reactive protocols: AODV (Ad hoc on- demand distance vector protocol) and DSR (Dynamic source routing protocol). In one type of scenario one protocol may perform best while another may perform worst, so there is a need to determine an optimal one out of these in a more dynamic environment. The differences in the working of these protocols lead to significant performance differentials for both of these protocols. Keywords: MANET, AODV, DSR, RREQ, RREP INTRODUCTION With the development in technologies there is a rapid increase in the use of devices like mobile phones and computers. These devices provide access to network through wireless interfaces. Ad-hoc networks are the wireless networks without any fixed infrastructure. An Ad-hoc network is a collection of nodes that are mobile in nature therefore they are also known as MANETS (mobile ad hoc networks). A MANET (mobile ad hoc network) is an independent collection of mobile users that communicate with each other via wireless links that is through radio waves. In an ad-hoc network a mobile node can directly communicate with the other node that lies in its IJCSERD © PRJ PUBLICATION International Journal of Computer Science Engineering Research and Development (IJCSERD), ISSN 2248 – 9363(Print) ISSN 2248 – 9371(Online), Volume 3, Number 1 Jan- March (2013), pp: 23-29 © PRJ Publication, http://www.prjpublication.com/IJCSERD.asp
  • 2. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 24 transmission range or it can forward its information to the other node that will act as an intermediate node. The network is decentralized as all the network activities for example discovering the topologies and delivering messages must be executed by the nodes themselves. Therefore routing is necessary for the mobile nodes. Such type of networks can be used in the environments where there is no infrastructure or setting of an infrastructure is very expensive or the existing wired infrastructure has been destroyed by the natural calamity ,for example earthquakes, floods. Characteristics of MANETS are: • Nodes can act like both hosts and routers (intermediate nodes). • Communication via radio waves. • Limited Bandwidth. • Less Security. • Dynamic network topology. Applications of MANET are: • Emergency situations or disaster areas, where a hurricane or earthquake has destroyed the communication infrastructure. • Coverage area expansion of cellular networks. • Commercial and Industrial areas where associates can share information during a meeting and participants in a conference can exchange documents or presentations. • Inter-vehicle communication. • Sensor Networks represent a special kind of ad hoc networks that consist of nodes having sensing communication and processing abilities. Properties of MANET Routing protocols are: • The routing protocols should be capable of using not only the bi-directional links but also the unidirectional links that will improve the performance of routing protocols. • The nodes in the ad-hoc network can be laptops or cell phones that are limited in battery power so it is very important that the routing protocol has support for sleep modes. • The protocol should be reactive in nature that the protocol should react only when needed and should not periodically broadcast information This minimize the control overhead in the network and prevent misuse of the network resources. • The protocol should be distributed that is it should not be dependent on any centralized controlling system. The nodes in an ad-hoc network are mobile in nature so they can enter or leave the network any time causing partitions. • The radio environment is especially vulnerable to attacks so some sort of security measures should be followed like Authentication and encryption. • The routes used for communication should be loop free. This avoids any misuse of bandwidth and improves the overall performance. • Multiple routes can be used to reduce the number of reactions to topological changes and congestion. If one route becomes invalid, it is possible that another route can be used. • The routing protocols should incorporate Quality of service that helps to find where these networks can be used for example for real time traffic support.
  • 3. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 25 II ROUTING PROTOCOLS Ad-hoc networks have routing protocols that can be classified into two categories: Proactive/table-driven Reactive/on-demand. Fig 2: Type of Routing Protocols A. Proactive Protocol Proactive protocols are also known as table-driven protocols. These protocols always maintain routes between every host that means there is a regular exchange of network topology packets between the nodes of the network. So there is a minimal delay in determining which route should to be taken. These protocols consume bandwidth to keep routes up-to-date and also maintain routes which may never be used. The increased mobility in the network causes traffic overhead. If the nodes transmit packets infrequently then the routing information is considered redundant. Proactive protocols are most suitable in the networks that have low node mobility and where the nodes transmit data frequently. Examples of Proactive Protocols are: Optimized Link State Routing (OLSR), Fish-eye State Routing (FSR), Destination-Sequenced Distance Vector (DSDV), and Cluster-head Gateway Switch Routing Protocol (CGSR). B. Reactive Protocol Reactive routing protocols are also known as on-demand routing protocols as they are used whenever a communication is requested. Firstly, Source node checks its route cache if there is a route available from source to destination and if the route is not available then it initiates route discovery process. The reactive routing protocols perform two functions: Route discovery: In this the source node initiates a route discovery process on demand basis. A source node then sees its route cache for the available route and if the route from source to destination is not present then it initiates a route discovery process. The packet includes the destination address of the node as well as address of the intermediate nodes to the destination. Route maintenance: Due to dynamic topology of the ad hoc networks, route failures between the nodes are more frequent that arises due to link breakage between the nodes. Route maintenance is done to avoid this problem by using an acknowledgement mechanism. Examples of Reactive protocols are Dynamic Source Routing (DSR) and Ad-hoc on- demand distance vector (AODV).
  • 4. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 26 III.AD HOC ON-DEMAND DISTANCE VECTOR (AODV) Ad hoc On-Demand Distance Vector (AODV) routing is a reactive routing protocol for mobile ad hoc networks. It is an on-demand and distance-vector routing protocol that is a route is established by AODV from a destination only on demand. AODV routing protocol is capable of both unicast and multicast routing. It keeps the routes in the routing table as long as they are needed by the source nodes. AODV generates a tree or trees are composed of the group members and the nodes that are needed to connect their members. AODV uses destination sequence numbers to ensure the freshness of routes. Its operations are loop-free. AODV can also scales to large numbers of mobile nodes. Each mobile node in the network maintains a route table entry for each destination in its route table. • Number of hops (Hop count) • Destination sequence number • Destination IP address • Active neighbors for this route • Lifetime (Expiration time of the route) • Next hop When a node suppose S wants to communicate with another node suppose D, then it initiates route discovery process by broadcasting a Route Request packet (RREQ) to its neighbors. If the neighbor node has a route to the destination then it replies with a route reply packet, otherwise it broadcast the route request packet to all its neighbors and some packets reach to the destination D. When the Route Reply (RREP) is generated, it reaches back to the source node, based on the reverse path. Each node along this path sets a forward pointer to the node and records the latest destination sequence number. The RREQ has the following fields: • Source address • Source sequence number used to maintain freshness info about the route to the source. • Destination address • Destination sequence number • Hop-count • Route Request (RREQ) Message Format Type J R G D U Reserved Hop Count RREQ ID Destination IP Address Destination Sequence Number Source IP Address Source Sequence Number
  • 5. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 27 The Route Request message includes the following fields: Type 1 J Join flag, reserved for multicast R Repair flag, reserved for multicast G Gratuitous RREP flag D Destination only flag, idicates that destination can respond to this RREQ. U Unknown sequence number indicates that destination sequence number is unknown. Reserved Sent as 0. Hop Count Number of hops from Source to the node handling the request. A. Advantages and Disadvantages The main advantage of AODV protocol is that AODV established routes on demand basis and uses destination sequence numbers to find the latest route to the destination. The connection setup delay is also less in AODV. The HELLO messages used in AODV that supports the routes maintenance are range-limited so they do not cause unnecessary overhead in the network. AODV are well suited for large networks. A disadvantage of this protocol is that intermediate nodes can lead to inconsistent routes if the sequence number is very old and the intermediate nodes have a higher but not the latest destination sequence number. Multiple Route Reply messages in response to a single Route Request packet can lead to heavy control overhead. The periodic HELLO message leads to gratuitous bandwidth consumption. IV Dynamic Source Routing (DSR) Dynamic Source Routing (DSR) is also a reactive routing protocol for ad hoc networks. It is similar to AODV as it establishes a route on-demand. It uses source routing instead of relying on the routing table at each intermediate node. Dynamic source routing protocol is an on-demand, source routing protocol, where all the routing information is maintained at mobile nodes. Every node contains a route cache. Each entry in route cache specifies the intermediate nodes to a destination. The route cache is used to respond to RREQs even if it is not the destination. The route cache is always updated when it learns a new route. The entries from the route cache are removed only when a node receives an RERR. DSR allows the network to be self-organizing and self-configuring without the need for any existing infrastructure. The protocol is based on two main mechanisms: Route Discovery and Route Maintenance. In Route discovery the source node floods the network with RREQ packets. The RREQ contain the source and destination address and also the unique identity of the request. When a node receives an RREQ and if it is the destination then it responds back with an RREP containing the route from the source to the destination required, if not the node appends its own address to the RREQ header and rebroadcasts the RREQ to all its neighbour nodes. But a node that is not the destination receives the RREQ and contains a route to the destination may send an RREP. Upon receiving the RREP packet the source node records the route indicated in RREP in its route cache. A shortest path for the communication between a source node and destination node is determined by Route Discovery process. Route Maintenance mechanism ensures that the
  • 6. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 28 communication path remains loop-free according the change in network conditions. Route Reply is generated only in the case if the message has reached the destination node. A. Advantages and Disadvantages DSR uses a reactive approach which eliminates the need to periodically flooding the network with update messages which are required in a table-driven approach. The intermediate node utilizes the route cache information efficiently to reduce the control overhead. DSR has information of multiple routes. The disadvantage of DSR is that it is not suitable for large networks and the route maintenance mechanism does not repair a broken link. The performance of DSR degrades rapidly with increasing mobility. Routing overhead is involved due to the source-routing mechanism used in DSR. V.COMPARISON BETWEEN AODV AND DSR TABLE I Sr. No. AODV DSR 1. It uses table-driven routing. It uses source routing. 2. It delivers virtually all packets at low mobility. It is very good at all mobility rates. 3. It has low end to end delay. 4. AODV uses one route per destination. DSR uses routing cache aggressively, and maintains multiple routes per destination. 5. For real time traffic AODV is preferred. 6. It is more conservative as the fresher route is always chosen. DSR does not have any explicit mechanism to expire stale routes in the cache. 7. It outperforms DSR in more stress situations (more load, higher mobility. It outperforms AODV in less stressful situations (smaller # of nodes and lower load and/or mobility).
  • 7. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 29 CONCLUSION In this paper an effort has been made on the theoretical study of mobile ad hoc network routing protocols. There are mainly two types of routing protocols: Proactive and Reactive routing protocols. Various advantages and disadvantages of these protocols are also included in this. There are various shortcomings in different routing protocols and it is very difficult to choose a right routing protocol for a particular situation as there are tradeoffs between various protocols. ACKNOWLEDGMENT I WOULD LIKE TO THANK MRS. RITU SALUJA AND MANAV RACHNA COLLEGE OF ENGG. FOR THEIR SUPPORT AND GUIDANCE REFERENCES [1] S .Taneja, A.Kush, A.Makkar, “Experimental analysis of DSR and AODV using speed and pause time”, International Journal of Innovation, Management and Technology, Vol. 1, No. 5, December 2010. [2] C.E, E.M. Royer and S.R. Das, “Performance comparison of two on-demand routing protocols for Ad hoc networks”, IEEE Personal Communications Magazine, 8: 16-28, 2001. [3] G.Kaur, “Performance Analysis of AODV routing protocol in Manets”, International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.08 August 2012. [4] T.Singh, S.Dua, V.Das, “Energy-Efficient Routing Protocols In Mobile Ad-Hoc Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012. [5] D.Maltz, J.Broch, J.Jetcheva, D.Johnson. The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks IEEE Journal on Selected Areas in Communication, 1999 [6] Poonam Thakur, M.Vijaya Raju, “survey on routing techniques for Manets and Wireless sensor networks: a comparison” international journal of computer engineering & technology (ijcet) Volume 4, Issue 1, January -February2013. [7] Sunita Kushwaha, Bhavna Narain, Deepti Verma, Sanjay kumar, “effect of scenario environment on the performance of Manets routing protocol: aodv” international journal of computer engineering & technology (ijcet) Volume 2, Issue 1, January- April 2011. [8] Shah Vrutik, Dr.Nilesh Modi, Patani Ashwin, “aodvgap-an acknowledgment based approach to mitigate selective forwarding attacks in Manet” international journal of computer engineering& technology (ijcet) Volume 3, Issue 2, July-September 2010.