International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
A Performance Comparison of Routing Protocols for Ad Hoc NetworksIJERA Editor
Mobile Ad hoc Network (MANET) is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many routing protocols have been proposed like OLSR, AODV so far to improve the routing performance and reliability. In this paper, we describe the Optimized Link State Routing Protocol (OLSR) and the Ad hoc On-Demand Distance Vector (AODV). We evaluate their performance through exhaustive simulations using the Network Simulator 2 (ns2) by varying conditions (node mobility, network density).
Performance analysis of routing protocols and tcp variants under http and ftp...IJCNCJournal
MANET stands for mobile ad-hoc network that has multi-hop and dynamic nature, where each station changes its location frequently and automatically configures itself. In this paper, four routing protocols
that areOLSR,GRP,DSR, and AODV are discussed along with three TCP variants that are SACK, New Reno and Reno. The main focus of this paper is to study the impact
scalability, mobility and traffic loads on routing protocols and TCP variants. Thepaper results shows that the proactive protocols OLSR and GRP outperform the reactive protocols AODV and DSR with the same nodes size, nodes speed, and traffic load. On the other hand, the TCP variants research reveal the superiority of the TCP SACK variant over the other two variants in case of adapting to varying network size, while the TCP Reno variant acts more
robustly in varying mobility speeds and traffic loads.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
In VANET high speed is the real characteristics which leads to frequent breakdown,
interference etc. Therefore Performance of adhoc routing protocols is helpful to improve the
Quality of Service (QOS). In this paper we studied various adhoc routing protocols, Reactive,
Proactive & Hybrid, taking in to consideration parameters like speed, altitude, mobility etc in
real VANET scenario. The AODV and DYMO (Reactive), OLSR (Proactive) and ZRP (hybrid)
protocols are compared for IEEE 802.11(MAC) and IEEE 802.11(DCF) standard using
Qualnet as a Simulation tool. Since IEEE 802.11, covers both physical and data link layer.
Hence performance of the protocols in these layers helps to make a right selection of Protocol
for high speed mobility. Varying parameters of VANET shows that in the real traffic scenarios
proactive protocol performs more efficiently for IEEE 802.11 (MAC) and IEEE 802.11(DCF)
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such
Networks are frequently limited by the network split due to either energy depletion or node mobility of the
mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths
becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path
breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric
system of measurement used to select the paths takes into account the stability of the nodes and the
equivalent links.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
A Performance Comparison of Routing Protocols for Ad Hoc NetworksIJERA Editor
Mobile Ad hoc Network (MANET) is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. Many routing protocols have been proposed like OLSR, AODV so far to improve the routing performance and reliability. In this paper, we describe the Optimized Link State Routing Protocol (OLSR) and the Ad hoc On-Demand Distance Vector (AODV). We evaluate their performance through exhaustive simulations using the Network Simulator 2 (ns2) by varying conditions (node mobility, network density).
Performance analysis of routing protocols and tcp variants under http and ftp...IJCNCJournal
MANET stands for mobile ad-hoc network that has multi-hop and dynamic nature, where each station changes its location frequently and automatically configures itself. In this paper, four routing protocols
that areOLSR,GRP,DSR, and AODV are discussed along with three TCP variants that are SACK, New Reno and Reno. The main focus of this paper is to study the impact
scalability, mobility and traffic loads on routing protocols and TCP variants. Thepaper results shows that the proactive protocols OLSR and GRP outperform the reactive protocols AODV and DSR with the same nodes size, nodes speed, and traffic load. On the other hand, the TCP variants research reveal the superiority of the TCP SACK variant over the other two variants in case of adapting to varying network size, while the TCP Reno variant acts more
robustly in varying mobility speeds and traffic loads.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
The continuous increase in the complexity of data networks has motivated the development of more effective Multistage Interconnection Networks (MINs) as important factors in providing higher data transfer rates in various switching divisions. In this paper, semi-layer omega-class networks operating with a cut-through forwarding technique are chosen as test-bed subjects for detailed evaluation, and this network architecture is modelled, inspected, and simulated. The results are examined for relevant singlelayer omega networks operating with cut-through or ‘store and forward’ forwarding techniques. Two series of experiments are carried out: one concerns the case of uniform traffic, while the other is related to hotspot traffic. The results quantify the way in which this network outperforms the corresponding singlelayer network architectures for the same network size and buffer size. Furthermore, the effects of the dimensions of the switch elements and their corresponding reliability on the overall interconnection system are investigated, and the complexity and the relevant cost are examined. The data yielded by this investigation can be valuable to MIN engineers and can allow them to achieve more productive networks with lower overall implementation costs.
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
In VANET high speed is the real characteristics which leads to frequent breakdown,
interference etc. Therefore Performance of adhoc routing protocols is helpful to improve the
Quality of Service (QOS). In this paper we studied various adhoc routing protocols, Reactive,
Proactive & Hybrid, taking in to consideration parameters like speed, altitude, mobility etc in
real VANET scenario. The AODV and DYMO (Reactive), OLSR (Proactive) and ZRP (hybrid)
protocols are compared for IEEE 802.11(MAC) and IEEE 802.11(DCF) standard using
Qualnet as a Simulation tool. Since IEEE 802.11, covers both physical and data link layer.
Hence performance of the protocols in these layers helps to make a right selection of Protocol
for high speed mobility. Varying parameters of VANET shows that in the real traffic scenarios
proactive protocol performs more efficiently for IEEE 802.11 (MAC) and IEEE 802.11(DCF)
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...IJNSA Journal
Exceptionally dynamic networks are Mobile Ad hoc Networks. Quality of Service (QoS) routing in such
Networks are frequently limited by the network split due to either energy depletion or node mobility of the
mobile nodes. In addition, to fulfill specific quality parameters, existence of multiple node-disjoint paths
becomes essential. Such paths assist in the optimal traffic distribution and consistency in case of path
breakages. Thus, to accommodate such problem, we present a node-disjoint multipath protocol. The metric
system of measurement used to select the paths takes into account the stability of the nodes and the
equivalent links.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
Mobile Ad-hoc networks are a key in the evolution of wireless networks. In mobile
ad hoc networks, there is no centralized infrastructure to monitor or allocate the resources
used by the mobile nodes. The absence of any central coordinator makes the routing a
complex one compared to cellular networks. The Ad hoc On Demand Distance Vector
(AODV) routing algorithm is a routing protocol designed for ad hoc mobile devices. AODV
uses an on demand approach for finding routes .A class of routing protocols called ondemand protocols has recently found attention because of their low routing overhead. The ondemand protocols depend on query floods to discover routes whenever a new route is needed.
Such floods take up a substantial portion of network bandwidth. The routing in Mobile ad hoc
network is difficult and number of reactive routing protocols like AODV, DSR, and DSDV
has been implemented. In this paper, an attempt has been made to thoroughly study all
AODVs and a new AODV is proposed called AR-AODV
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
An efficient and secured routing protocol design is the vital concern for mobile ad hoc networks in view of major problems raising on security issues and loss of the network resources is due to changes within the connections of the network like Node failures, link breakages in the network. Our proposed scheme enhances the secured and reliable transmission of data, which also improves the network constancy, efficient packet delivery ratio and network life time by integrating through the AODV Routing protocol. It unites the authentication, stable routes and signal strength of the nodes to attain the secure and reliable transmission of data through nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multipath protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...ijwmn
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths aid in the optimal traffic distribution and reliability in case of path breakages. Thus, to cater such problem, we present a node-disjoint multi path protocol. The metric used to select the paths takes into account the stability of the nodes and the corresponding links. The proposed technique is also illustrated with an example.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
Performance comparison of routing protocols in mobile ad hoc networksijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
Routing protocols have
an important
role in any
Mobile Ad Hoc Network
(MANET).
Researchers
have
elaborated several routing protocols that possess different performance levels
. In this
p
aper
we
give a
performance evaluation of
AODV,
DSR,
DSDV
, OLSR and DYMO
routing protocol
s
in
Mobile Ad Hoc
Networks
(MANETS)
to
determine
the best
in different scenarios
. We
analyse
these
MANET
routing
protocols by
using
NS
-
2 simulator
. We specify how
the
Number of No
d
es
parameter influences
their
performance. In this study
,
performance is
calculated
in terms
of Packet Delivery Ratio,
Average
End to
End Delay, Normalised Routing Load and Average Throughput
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
Wireless operations allow services, such as long-range communications, that are impossible or
impractical to implement with the use of wires. It is supported by well-liked technique known as Adhoc Protocol
[1]. The term is commonly used in the telecommunications industry to refer to telecommunications systems e.g.
radio transmitters and receivers, remote controls etc. which use some form of energy e.g. radio waves, acoustic
energy, etc. to transfer information without the use of wires.[1] Information is transferred in this manner over
both short and long distances.In this, routes may be detached due to lively movement of nodes. So route
assortment and topology grouping is not easy and demanding issue. This type of networks is more vulnerable to
both internal and external attacks due to presence of wicked neighbour nodes[1][2s. Paper see the sights new
method using AODV protocol to find out good neighbour node and finding reliable path according to their
signal strength, flow capacity relative position of node in network.
PERFORMANCES OF AD HOC NETWORKS UNDER DETERMINISTIC AND PROBABILISTIC CHANNEL...IJCNCJournal
Deterministic channel models have been widely used in simulation and modeling of ad hoc network for a long time. But, deterministic channel models are too simple to represent a real-world ad hoc network scenario. Recently, random channel models have drawn considerable attention of the researchers in this field. The results presented in the literature show that random channel models have a grave impact on the
performance of an ad hoc network. A comprehensive investigation on this issue is yet to be available in the
literature. In this investigation, we consider both deterministic and random channel models to investigate their effects on ad hoc networks. We consider two different types of routing protocols namely single path and multipath routing protocols. We choose Destination Sequence Distance Vector (DSDV), Dynamic Source Routing Protocol (DSR), and Ad-hoc On-Demand Distance Vector (AODV) as the single path routing protocols. On the other hand, we choose Ad-hoc On-Demand Multiple Path Distance Vector (AOMDV) as the multipath routing protocol. The results show that some single path routing protocol can outperform multipath routing protocol under both deterministic and random channel conditions. These results surprisingly contradict the popular claim that multipath routing protocol always outperforms single path routing protocol. A guideline for choosing an appropriate routing protocol for adhoc network has also been provided in this work.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Bh4103368374
1. Vinay. P.Viradia Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.368-374
RESEARCH ARTICLE
www.ijera.com
OPEN ACCESS
Improved AODV Routing Protocol for MANET
Vinay. P.Viradia
Charotar University of Science and Technology, Gujarat, India
Abstract- Efficient protocols are used to forward data packets without much packet loss. Ad hoc on
Demand Distance Vector Routing Protocol (AODV) is one among the effective Reactive Routing
Protocol in MANET. The main causes for link break are mobility between nodes such as node failure
and node power off. Quality of Service (QoS) is one of the main issues for any network and due to
bandwidth constraint and dynamic topology of mobile ad hoc networks, supporting Quality of Service
(QoS) is extremely a challenging task. The objective of this paper is to enhance the network
performance of AODV, when frequent link failure in network due to mobility of the nodes in the
network.
This paper proposed a new protocol Enhanced AODV (E-AODV) which is a modified version of
AODV with enhanced packet delivery ratio and minimized end to end delay.
Index Terms- Ad Hoc Network, Routing Protocol, AODV, Packet delivery ratio, end to end delay.
I.
INTRODUCTION
Mobile Ad hoc Network (MANET)
[1,2] is a wireless i.e., access control and security.
Routing in MANET means the directed flow of data
from source to destination maximizing the network
performance.
The characteristics of these networks are summarized
as follows:
• Communication via wireless Network.
• No centralized controller and infrastructure.
• Dynamic network topology.
• Frequent routing updates.
• Nodes can perform the roles of both hosts and
routers.
• Intrinsic mutual trust.
• Some of the applications of MANETs are
• Disaster relief operations.
• Defense Development.
• Urgent Business meetings.
• Mine site operations.
Network Simulator (NS-2) is an event driven,
object oriented network simulating tool, very
much used by the researchers,
professors
and
students. Simulation is the process of creating a
model with its behavior. There are numerous
network simulating tools available such as NS-2,
GloMoSim, OPNET, QualNet, etc. NS-2 is the
outperforms among all the other tools. The Routing
protocols of MANET such as DSDV, DSR, AODV is
implemented using NS-2 and it’s available as free
open source programs. In this paper, AODV protocol
www.ijera.com
is considered and its network performance is
enhanced by E-AODV.
The rest of the paper is organized as follows: Section
II gives an overview of Routing Protocols of
MANET and Section III describes the Reactive
Routing Protocol AODV, Section IV discusses
the proposed topology used for E-AODV, Section
V describes NS-2 implementation of EAODV, section VI discusses about simulation
results and analysis and final network of collection of
independent mobile nodes that Section VII discusses
about
conclusion
derived
from
the can
communicate to each other via radio waves. The
mobile nodes that are in radio range of each
other can directly communicate, whereas others
needs the aid of intermediate nodes to route their
packets. These networks are fully distributed, and can
work at any place without the help of any
infrastructure. This property makes these networks
highly flexible and robust. The dynamic change in
MANET topology [3, 4] makes routing as a
challenging task, as the existing path is rendered
inefficient and infeasible. The major issues for
mobile ad hoc networks are medium access control
(MAC), routing, security and quality of service
provisioning. The paper addresses the routing
problem in a mobile ad hoc network without
considering the other issues, Implemented results.
368 | P a g e
2. Vinay. P.Viradia Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.368-374
II.
ROUTING PROTOCOLS FOR
MANET
Routing protocols in ad hoc networks vary
depending on the type of the network [3, 4, 5].
Typically, ad hoc network routing protocols are
classified into three major categories based on the
routing information updated mechanism. They are
proactive (table driven routing Protocols), reactive
(on-demand routing protocols) and hybrid routing
protocols. In addition, protocols can also be classified
according to the utilization of specific resources,
such as power aware routing protocol and load
aware routing protocols and so on.
A. Proactive Routing Protocols
Routes to all destinations are maintained
by sending periodical control messages. There is
unnecessary bandwidth wastage for sending control
packets. Proactive routing protocols are not suitable
for larger networks, as it needs to maintain route
Information every node’s routing table. This
causes more overhead leads to consumption of
more bandwidth. Ex: DSDV [10, 11].
B. Reactive Routing Protocols
Routes are found when there is a need (on
demand). Hence, it reduces the routing overhead. It
does not need to search for and maintain the routes
on which there is no route request. Reactive routing
protocols are very pleasing in the resourcelimited environment. However the source node
should wait until a route to the destination is
discovered. This approach is best suitable when the
network is static and traffic is very light. Ex: DSR,
AODV. [15, 16].
C. Hybrid Routing
The Ad Hoc network can use the hybrid
routing protocols that have the advantage of both
proactive and reactive routing protocols to balance
the delay and control overhead (in terms of control
packages). The difficulty of all hybrid routing
protocols is the complexity of organizing the
network according to network parameters. The
common disadvantage of hybrid routing protocols is
that the nodes that have high level topological
information maintains more routing information,
which leads to more memory and power
consumption.
D. ANALYSIS
There are two approaches to evaluate
routing protocols:
• Network Environment Parameters like
network size, connectivity, mobility, link
www.ijera.com
www.ijera.com
capacity etc.
General Performance Metrics of Routing
Protocols like
message delivery ratio, control overhead, hop count,
end to end delay, etc. [13,14]
In this paper packet delivery ratio and average end
to end delay performance parameters are
considered.
•
III.
AODV PROTOCOL
AODV protocol allows mobile nodes to
quickly obtain routes for new destinations, and it
does not require nodes to maintain routes to
destinations
that
are
not
in
active
communication. Also, AODV routing permits
mobile nodes to respond link breakages and
changes in network topology in a timely manner.
The main objectives of the protocol is quickly and
dynamically adapt to changes of conditions on the
network links, for example, due to mobility of
nodes the AODV protocol works as a pure ondemand route acquisition system. Control messages
[8, 9] used in
AODV are:
• Route Request Message (RREQ)
• Route Reply Message (RREP)
• Route Error Message (RERR)
• Route Reply Acknowledgment (RREP-ACK)
Message
• HELLO Messages
A) Route discovery:
When a source node desires to send a
message to some destination node, and doesn’t
have a valid route to the destination, it initiates a
path discovery process to locate the other node. It
broadcasts a route request (RREQ) control packet to
its neighbors, which then forward the request to
their neighbors, and so on, either the destination or an
intermediate node with a new
route to the
destination is located. The AODV protocol utilizes
destination sequence numbers to ensure that all routes
contain the most recent route information. Each node
maintains its own sequence number. During the
forwarding process the RREQ intermediate nodes
record the address of the neighbor from which the
first copy of the broadcast packet is received in their
route tables, thereby establishing a reverse path. Once
the RREQ reaches the destination or an intermediate
node with a fresh enough route, the destination or the
intermediate node responds by unicasting a route
reply (RREP) control packet back to the neighbor
from which first received the RREQ [6,7].
B) Route Maintenance
A route discovered between a source node
and destination node is maintained as long as needed
369 | P a g e
3. Vinay. P.Viradia Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.368-374
by the source node. The destination node or some
intermediate node moves, the node upstream of the
break initiates Route Error (RERR) message to the
affected
active
upstream
neighbors/nodes.
Consequently, these nodes propagate the RERR to
their predecessor nodes. This process continues until
the source node is reached. When RERR is received
by the source node, it can either stop sending the data
or reinitiate the route discovery mechanism by
sending a new RREQ message if the route is still
required[9,10].
IV.
PROPOSED METHODOLOGY
In this section new methodology is
described to show the difference between the EAODV and the AODV routing protocols during
transmission with the following simple topology.
There are four nodes in this network, and the initial
topology is a grid and the method shown in Table-1.
According to the scenario, at the beginning of the
transmission of nodes, the two pairs are not
interference with each other. At 10s, Node 2 moves
towards the direction of Node 0 with a speed of 10
m/s. The distance between Node 0 and Node 2
becomes smaller and smaller, and at time 15 s, these
two nodes begin to be in each others carrier sensing
range, which means that these two nodes begin to
share the same channel. The maximum bandwidth of
the channel is around 3.64 Mbps. In AODV, where
there is no QoS requirement, when Node 2 is in the
interference range of Node 0,
traffics are kept on and some packets are lost
during the transmission, whereas, in E-AODV, the
QoS is ensured. When the promised data rate cannot
www.ijera.com
Table 1: Scenario descriptions for proposed
topology
In the topology there were 30 nodes and the
simulation environment was as described in Table1.
The area size is 870 m * 870 m, and 30 nodes are
in this area. 50 s is added at the beginning of
each simulation to stabilize the mobility model.
Every simulation runs 500 s in total. Each data
point in the results represents an average of ten runs
with same traffic models but different randomly
generated mobility scenarios. For fair comparisons,
same mobility and traffic scenarios are used in both
the AODV and the E-AODV routing protocols.
V.
SIMULATION TRAFFIC
PATTERN
The Random Waypoint model provided by
NS2 is used as the mobility model [12]. The traffic
type in the application layer is CBR with packet size
of 512 bytes and in transport layer User Datagram
Protocol (UDP) is used. The traffic pattern that used
in the simulation is shown in Table 2. It is the
same as what the Reference [4] uses.
Table 2: Simulation traffic pattern
Setting the traffic flow in such a manner aims at
greater interference impact when sessions overlap.
The source node and the destination node of each
traffic flow are chosen by using function cbrgen.tcl
randomly.
VI.
SIMULATION RESULTS AND
ANALYSIS
For comparing various routing protocols
using UDP transport layer protocol,
two
performance metrics Average End to End delay and
Packet Delivery Ratio are used to evaluate the
performance of the AODV and the E-AODV
routing protocols.
be satisfied any more, traffic of Node 2 is stopped at
once. From this case, we could see that the E-AODV
achieved the function of ensuring the QoS not only at
the route discovery stage, but also during the
transmission. Once the QoS is not satisfied, the
traffic is stopped [8, 9].
www.ijera.com
6.1 Data Rate
In this set of simulations, a group of data
rates ranging from 50 kbps to 1800 kbps is applied.
The mobility scenario is with a pause time of 30
seconds and the maximum node speed is 10 m/s.
Three parameters defined above are calculated. The
370 | P a g e
4. Vinay. P.Viradia Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.368-374
www.ijera.com
results are shown in the following figures (figure. 1
and figure.2).
6.1.1 Packet Delivery Ratio
From figure.1 we see that, either we use
the E-AODV routing protocol or the AODV
routing protocol, the packet delivery ratio
decreases with the increase of the data rate of
traffic flows.
Fig. 1: Packet delivery ratio with different data rates
Fig. 2: Average End to End delays with different
data rates
That is because the increasing data rate of
flows increases traffic in the network. When the
maximum throughput of nodes cannot satisfy the ongoing traffic, queues at nodes begin to be
full; the packets in the end of queues of nodes are
dropped both at source nodes and at intermediate
nodes.
The packet delivery ratio with the Ewww.ijera.com
371 | P a g e
5. Vinay. P.Viradia Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.368-374
AODV always lower than the AODV because the
source node takes ore time to find a suitable route in
E-AODV and during this period of time, the source
which keeps on sending packets from the
application layer of the node, it cause drops of
packets at the end of the queue when the queue is
full. Also, the traffic session can be paused anytime
when the local available data rate of nodes in the
path is not satisfied during the transmission in the
E-AODV routing protocol. There are strict
requirements
in
terms
of
data
rate for traffic flow with access admission control.
When data rate increases from 1500 kbps to 1800
kbps, only paths with hop count 1 or 2 can be
admitted. As a result, there is more decrease
in PDR with the E-AODV than in AODV when
the data rate increases from 1500 kbps to 1800 kbps.
It is hard to explain why the PDR increase in AODV
when data rate increases from 1500 kbps to 1800
kbps .
For the above reason, the packet delivery ratio
with the E-AODV routing protocol is lower than
the one with the AODV routing protocol is that EAODV routing protocol has more restrictions to
the route for transmission. Actually, the packets
which are not delivered and dropped at the source
node because of the delay for searching for a more
suitable route in the E-AODV routing protocol
should be dropped. The reason is that if
these packets are sent, and the route chosen is not
satisfying the requirements, packets have more
probability to be dropped at the intermediate node or
packets may arrives at the destination node
late because of the long duration of wait at the
intermediate node. In other words, the E-AODV
routing protocol also helps to prohibit the packets,
which have more probability to be dropped during
the transmission or that, arrived the destination node
late, to be transmitted on the network. It helps to
save the data rate as well.
6.1.2 Average end to end delay
From figure.2, it can be seen that AODV
routing protocol performs better than E-AODV
routing protocol when data rate is low (below 600
kbps). The E-AODV routing protocol got higher
average end to end delay at the low data rate than
the AODV because intermediate nodes are not
allowed to perform local route repairs in case of
link failures with the E-AODV routing protocol,
thus, there is higher route recovery latency which
results in higher end-to-end delay compared with
the AODV routing protocol at low data rate.
Another reason could be that, with the EAODV routing protocol, the number of transmitted
routing packets is larger than the number of routing
packets transmitted in the AODV routing protocol.
www.ijera.com
www.ijera.com
In the E-AODV routing protocol, routing packets
including Hello messages which have higher
priority always transmitted firstly and data packets
are queued nodes. With the AODV routing protocol,
when the traffic is low in the network, no matter
which route the traffic flow chose, the route chosen
can provide enough data rate at most of the time. As
a result, the end to end delay with the AODV routing
protocol is not high and can be lower than the EAODV routing protocol at low data rate. If
we can take more time for simulation for each
data rate comparatively accurate results can be
found. For these above reasons, end to end delay in
E-AODV is higher than the AODV at low data rate.
The average end to end delay of the E-AODV is
always below 240ms ,whereas, the end to end
delay of the AODV increases badly when the data
rate of each traffic flow increases from 600 kbps to
1200 kbps. It shows that networks with the EAODV routing protocol can provide lower end to
end delay for traffic flows than the AODV since the
E-AODV always choose to find a route with
satisfying data rate. During the transmission, the
QoS of the traffic is monitored in the E-AODV
routing protocol. Once the QoS is not satisfied as it
promised, the traffic stopped. All in all, with the EAODV routing protocol, the average end to end
delay is low even the load on the network
increases to very high which is not true for the
AODV routing protocol. This performance is very
significant for real time traffic transmissions.
6.2 Maximum Node Moving Speed
In the following simulations, the data rate
is fixed at 1200 kbps. The maximum node moving
speed is increased to see the behaviors of the
AODV and the E-AODV in a fairly high
mobility mode. Maximum node moving speed is
changing in the range 1 m/s to 20 m/s. The results
are shown in terms of average end to end delay,
packet delivery ratio and normalized routing load
shown in figure:3 and figure:4.
6.2.1 Packet Delivery Ratio
In figure. 3 with low max moving speed the
packet delivery ratio in E-AODV is higher than the
AODV but with the increase of mobility speed the
performance is lower than AODV. When the
maximum moving speed is up to 20 m/s, almost half
of the packets are dropped in E-AODV. The
reason that why more packets are dropped in EAODV and how they are dropped has been explained
in the previous part of this section.
372 | P a g e
6. Vinay. P.Viradia Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.368-374
www.ijera.com
To sum up, the E-AODV routing protocol does
decrease end to end delay significantly when the data
rate of traffic flows is high.
VII.
Fig. 3: Packet delivery ratio with different Max.
moving speeds.
CONCLUSION
In this paper, the description is given about
the importance of QoS( in terms of packet delivery
ratio and average end to end delay) routing in
Mobile Ad-Hoc networks, challenges came
across, and the approach taken. After observing the
simulation and analyzing the data, it is found that
packets could get less end to end delay with a QoS
based routing protocol when the traffic
on the network is high. This low end to end delay is
meaningful for real time transmissions. When the
traffic is relatively high on the network, not all the
routes that are found by the AODV
routing protocol have enough free data rate for
sending packets ensuring the low end to end delay of
each packet. As a result, the E-AODV protocol
works well and shows its effects when the
traffic on the network is relatively high. People who
work on the area of ad hoc networks with the aim of
improving QOS in terms of reduced the average end
to
end
delay
and
enhanced
packet
delivery ratio for ad hoc networks can get benefit
from this E-AODV protocol.
In the further work other additional network
parameters will be considered.
REFERENCES
[1]
[2]
Fig. 4: Average end to end delay with different
Max. moving speeds
6.2.2 Average end to end delay
As shown in figure:4, with the increase of
the maximum moving speed, the average end to
end delay does not increase much in E-AODV as
compared with the AODV routing protocol, it means
that, this protocol is quite suitable for scenarios
with different moving speeds.
In comparison, with the AODV routing
protocol, the end to end delay varies a lot with the
increase of the maximum moving speed. It can be
obviously seen that, the end to end delay in EAODV is always much lower than the one in the
AODV routing protocol. The low end to end delay
of packets ensures the on time transmissions
required by real time traffic transmissions.
www.ijera.com
[3]
[4]
[5]
C. E. Perkins, “Ad hoc Networking”,
Addison Wesley, 2001.
Gu, D; Zhang, J., "QoS Enhancement in
IEEE802.11
Wireless
Local
Area
Networks",
IEEE
Communications
Magazine, ISSN: 0163-6804, Vol. 41, Issue
6, pp. 120-124, June 2003
L. Hanzo (II.) and R. Tafazolli, “Quality of
Service Routing and Admission Control for
Mobile
Ad-hoc
Networks
with a
Contention-based MAC Layer”, Centre for
Communication Systems
Research
(CCSR), University of Surrey, UK.-2005.
Ronan de Renesse, Mona Ghassemian,
Vasilis Friderikos, A. Hamid Aghvami,
"Adaptive Admission Control for Ad Hoc
and Sensor Networks Providing Quality
of
Service"
Technical
Report,
Center for Telecommunications Research,
King.s College London, UK, May 2005.
H. Badis and K. Al Agha, “Quality of
Service for Ad hoc Optimized Link State
Routing Protocol (QOLSR)”, IETF-63
Meeting, Internet Engineering Task Force,
draftbadismanet- qolsr-02.txt, Vancouver,
373 | P a g e