SlideShare a Scribd company logo
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
23
COMPARATIVE ANALYSIS OF MANET REACTIVE PROTOCOLS
Nisha kumari,
CS Department, Manav Rachna College of Engineering
Faridabad, Haryana
Ritu Saluja
Associate Professor, Deptt of CS
Manav Rachna College of Engg, Faridabad, Haryana
ABSTRACT
An Ad-hoc network is a group of mobile nodes. In an ad-hoc network a mobile node can
directly communicate with the other node that lies in its transmission range or it can forward
its information to the other node that will act as an intermediate node and forwards the
information to the desired node using multi-hop links. In such a network there is no need of
any infrastructure. Ad-hoc networks routing protocols are classified into two categories:
Proactive/table-driven and reactive/on-demand. Reactive routing protocol is used whenever a
communication is requested. There are two types of reactive protocols: AODV (Ad hoc on-
demand distance vector protocol) and DSR (Dynamic source routing protocol). In one type of
scenario one protocol may perform best while another may perform worst, so there is a need
to determine an optimal one out of these in a more dynamic environment. The differences in
the working of these protocols lead to significant performance differentials for both of these
protocols.
Keywords: MANET, AODV, DSR, RREQ, RREP
INTRODUCTION
With the development in technologies there is a rapid increase in the use of devices like
mobile phones and computers. These devices provide access to network through wireless
interfaces. Ad-hoc networks are the wireless networks without any fixed infrastructure. An
Ad-hoc network is a collection of nodes that are mobile in nature therefore they are also
known as MANETS (mobile ad hoc networks).
A MANET (mobile ad hoc network) is an independent collection of mobile users that
communicate with each other via wireless links that is through radio waves. In an ad-hoc
network a mobile node can directly communicate with the other node that lies in its
IJCSERD
© PRJ PUBLICATION
International Journal of Computer Science Engineering Research
and Development (IJCSERD), ISSN 2248 – 9363(Print)
ISSN 2248 – 9371(Online), Volume 3, Number 1
Jan- March (2013), pp: 23-29
© PRJ Publication, http://www.prjpublication.com/IJCSERD.asp
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
24
transmission range or it can forward its information to the other node that will act as an
intermediate node. The network is decentralized as all the network activities for example
discovering the topologies and delivering messages must be executed by the nodes
themselves. Therefore routing is necessary for the mobile nodes. Such type of networks can
be used in the environments where there is no infrastructure or setting of an infrastructure is
very expensive or the existing wired infrastructure has been destroyed by the natural calamity
,for example earthquakes, floods.
Characteristics of MANETS are:
• Nodes can act like both hosts and routers (intermediate nodes).
• Communication via radio waves.
• Limited Bandwidth.
• Less Security.
• Dynamic network topology.
Applications of MANET are:
• Emergency situations or disaster areas, where a hurricane or earthquake has destroyed
the communication infrastructure.
• Coverage area expansion of cellular networks.
• Commercial and Industrial areas where associates can share information during a
meeting and participants in a conference can exchange documents or presentations.
• Inter-vehicle communication.
• Sensor Networks represent a special kind of ad hoc networks that consist of nodes
having sensing communication and processing abilities.
Properties of MANET Routing protocols are:
• The routing protocols should be capable of using not only the bi-directional links but
also the unidirectional links that will improve the performance of routing protocols.
• The nodes in the ad-hoc network can be laptops or cell phones that are limited in
battery power so it is very important that the routing protocol has support for sleep
modes.
• The protocol should be reactive in nature that the protocol should react only when
needed and should not periodically broadcast information This minimize the control
overhead in the network and prevent misuse of the network resources.
• The protocol should be distributed that is it should not be dependent on any
centralized controlling system. The nodes in an ad-hoc network are mobile in nature
so they can enter or leave the network any time causing partitions.
• The radio environment is especially vulnerable to attacks so some sort of security
measures should be followed like Authentication and encryption.
• The routes used for communication should be loop free. This avoids any misuse of
bandwidth and improves the overall performance.
• Multiple routes can be used to reduce the number of reactions to topological changes
and congestion. If one route becomes invalid, it is possible that another route can be
used.
• The routing protocols should incorporate Quality of service that helps to find where
these networks can be used for example for real time traffic support.
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
25
II ROUTING PROTOCOLS
Ad-hoc networks have routing protocols that can be classified into two categories:
Proactive/table-driven
Reactive/on-demand.
Fig 2: Type of Routing Protocols
A. Proactive Protocol
Proactive protocols are also known as table-driven protocols. These protocols always
maintain routes between every host that means there is a regular exchange of network
topology packets between the nodes of the network. So there is a minimal delay in
determining which route should to be taken. These protocols consume bandwidth to keep
routes up-to-date and also maintain routes which may never be used. The increased mobility
in the network causes traffic overhead. If the nodes transmit packets infrequently then the
routing information is considered redundant.
Proactive protocols are most suitable in the networks that have low node mobility and where
the nodes transmit data frequently. Examples of Proactive Protocols are: Optimized Link
State Routing (OLSR), Fish-eye State Routing (FSR), Destination-Sequenced Distance
Vector (DSDV), and Cluster-head Gateway Switch Routing Protocol (CGSR).
B. Reactive Protocol
Reactive routing protocols are also known as on-demand routing protocols as they are
used whenever a communication is requested. Firstly, Source node checks its route cache if
there is a route available from source to destination and if the route is not available then it
initiates route discovery process.
The reactive routing protocols perform two functions:
Route discovery: In this the source node initiates a route discovery process on demand basis.
A source node then sees its route cache for the available route and if the route from source to
destination is not present then it initiates a route discovery process. The packet includes the
destination address of the node as well as address of the intermediate nodes to the destination.
Route maintenance: Due to dynamic topology of the ad hoc networks, route failures
between the nodes are more frequent that arises due to link breakage between the nodes.
Route maintenance is done to avoid this problem by using an acknowledgement mechanism.
Examples of Reactive protocols are Dynamic Source Routing (DSR) and Ad-hoc on- demand
distance vector (AODV).
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
26
III.AD HOC ON-DEMAND DISTANCE VECTOR (AODV)
Ad hoc On-Demand Distance Vector (AODV) routing is a reactive routing protocol for
mobile ad hoc networks. It is an on-demand and distance-vector routing protocol that is a
route is established by AODV from a destination only on demand. AODV routing protocol is
capable of both unicast and multicast routing. It keeps the routes in the routing table as long
as they are needed by the source nodes. AODV generates a tree or trees are composed of the
group members and the nodes that are needed to connect their members. AODV uses
destination sequence numbers to ensure the freshness of routes. Its operations are loop-free.
AODV can also scales to large numbers of mobile nodes.
Each mobile node in the network maintains a route table entry for each destination in its route
table.
• Number of hops (Hop count)
• Destination sequence number
• Destination IP address
• Active neighbors for this route
• Lifetime (Expiration time of the route)
• Next hop
When a node suppose S wants to communicate with another node suppose D, then it initiates
route discovery process by broadcasting a Route Request packet (RREQ) to its neighbors. If
the neighbor node has a route to the destination then it replies with a route reply packet,
otherwise it broadcast the route request packet to all its neighbors and some packets reach to
the destination D.
When the Route Reply (RREP) is generated, it reaches back to the source node, based
on the reverse path. Each node along this path sets a forward pointer to the node and records
the latest destination sequence number.
The RREQ has the following fields:
• Source address
• Source sequence number used to maintain freshness info about the route to the source.
• Destination address
• Destination sequence number
• Hop-count
•
Route Request (RREQ) Message Format
Type J R G D U Reserved
Hop
Count
RREQ ID
Destination IP Address
Destination Sequence Number
Source IP Address
Source Sequence Number
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
27
The Route Request message includes the following fields:
Type 1
J Join flag, reserved for multicast
R Repair flag, reserved for multicast
G Gratuitous RREP flag
D Destination only flag, idicates that destination can respond to this RREQ.
U Unknown sequence number indicates that destination sequence number is
unknown.
Reserved Sent as 0.
Hop Count Number of hops from Source to the node handling the request.
A. Advantages and Disadvantages
The main advantage of AODV protocol is that AODV established routes on demand
basis and uses destination sequence numbers to find the latest route to the destination. The
connection setup delay is also less in AODV. The HELLO messages used in AODV that
supports the routes maintenance are range-limited so they do not cause unnecessary overhead
in the network. AODV are well suited for large networks.
A disadvantage of this protocol is that intermediate nodes can lead to inconsistent routes
if the sequence number is very old and the intermediate nodes have a higher but not the latest
destination sequence number. Multiple Route Reply messages in response to a single Route
Request packet can lead to heavy control overhead. The periodic HELLO message leads to
gratuitous bandwidth consumption.
IV Dynamic Source Routing (DSR)
Dynamic Source Routing (DSR) is also a reactive routing protocol for ad hoc networks.
It is similar to AODV as it establishes a route on-demand. It uses source routing instead of
relying on the routing table at each intermediate node. Dynamic source routing protocol is an
on-demand, source routing protocol, where all the routing information is maintained at
mobile nodes. Every node contains a route cache. Each entry in route cache specifies the
intermediate nodes to a destination. The route cache is used to respond to RREQs even if it is
not the destination. The route cache is always updated when it learns a new route. The entries
from the route cache are removed only when a node receives an RERR.
DSR allows the network to be self-organizing and self-configuring without the need for
any existing infrastructure. The protocol is based on two main mechanisms: Route Discovery
and Route Maintenance.
In Route discovery the source node floods the network with RREQ packets. The RREQ
contain the source and destination address and also the unique identity of the request. When a
node receives an RREQ and if it is the destination then it responds back with an RREP
containing the route from the source to the destination required, if not the node appends its
own address to the RREQ header and rebroadcasts the RREQ to all its neighbour nodes. But
a node that is not the destination receives the RREQ and contains a route to the destination
may send an RREP. Upon receiving the RREP packet the source node records the route
indicated in RREP in its route cache.
A shortest path for the communication between a source node and destination node is
determined by Route Discovery process. Route Maintenance mechanism ensures that the
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
28
communication path remains loop-free according the change in network conditions. Route
Reply is generated only in the case if the message has reached the destination node.
A. Advantages and Disadvantages
DSR uses a reactive approach which eliminates the need to periodically flooding the
network with update messages which are required in a table-driven approach. The
intermediate node utilizes the route cache information efficiently to reduce the control
overhead. DSR has information of multiple routes.
The disadvantage of DSR is that it is not suitable for large networks and the route
maintenance mechanism does not repair a broken link. The performance of DSR degrades
rapidly with increasing mobility. Routing overhead is involved due to the source-routing
mechanism used in DSR.
V.COMPARISON BETWEEN AODV AND DSR
TABLE I
Sr.
No.
AODV DSR
1. It uses table-driven routing. It uses source routing.
2. It delivers virtually all
packets at low mobility.
It is very good at all mobility rates.
3. It has low end to end delay.
4. AODV uses one route per
destination.
DSR uses routing cache aggressively,
and maintains multiple routes per
destination.
5. For real time traffic AODV
is preferred.
6. It is more conservative as
the fresher route is always
chosen.
DSR does not have any explicit
mechanism to expire stale routes in the
cache.
7. It outperforms DSR in more
stress situations (more load,
higher mobility.
It outperforms AODV in less stressful
situations (smaller # of nodes and
lower load and/or mobility).
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013)
29
CONCLUSION
In this paper an effort has been made on the theoretical study of mobile ad hoc network
routing protocols. There are mainly two types of routing protocols: Proactive and Reactive
routing protocols. Various advantages and disadvantages of these protocols are also included
in this. There are various shortcomings in different routing protocols and it is very difficult to
choose a right routing protocol for a particular situation as there are tradeoffs between various
protocols.
ACKNOWLEDGMENT
I WOULD LIKE TO THANK MRS. RITU SALUJA AND MANAV RACHNA COLLEGE OF ENGG. FOR
THEIR SUPPORT AND GUIDANCE
REFERENCES
[1] S .Taneja, A.Kush, A.Makkar, “Experimental analysis of DSR and AODV using
speed and pause time”, International Journal of Innovation, Management and
Technology, Vol. 1, No. 5, December 2010.
[2] C.E, E.M. Royer and S.R. Das, “Performance comparison of two on-demand routing
protocols for Ad hoc networks”, IEEE Personal Communications Magazine, 8: 16-28,
2001.
[3] G.Kaur, “Performance Analysis of AODV routing protocol in Manets”,
International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.08
August 2012.
[4] T.Singh, S.Dua, V.Das, “Energy-Efficient Routing Protocols In Mobile Ad-Hoc
Networks”, International Journal of Advanced Research in Computer Science and
Software Engineering, Volume 2, Issue 1, January 2012.
[5] D.Maltz, J.Broch, J.Jetcheva, D.Johnson. The effects of on-demand behavior in
routing protocols for multihop wireless ad hoc networks IEEE Journal on Selected
Areas in Communication, 1999
[6] Poonam Thakur, M.Vijaya Raju, “survey on routing techniques for Manets and
Wireless sensor networks: a comparison” international journal of computer
engineering & technology (ijcet) Volume 4, Issue 1, January -February2013.
[7] Sunita Kushwaha, Bhavna Narain, Deepti Verma, Sanjay kumar, “effect of scenario
environment on the performance of Manets routing protocol: aodv” international
journal of computer engineering & technology (ijcet) Volume 2, Issue 1, January-
April 2011.
[8] Shah Vrutik, Dr.Nilesh Modi, Patani Ashwin, “aodvgap-an acknowledgment based
approach to mitigate selective forwarding attacks in Manet” international journal of
computer engineering& technology (ijcet) Volume 3, Issue 2, July-September
2010.

More Related Content

What's hot

Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
IJTET Journal
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
IRJET Journal
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
paperpublications3
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
rahulmonikasharma
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
IOSR Journals
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
eSAT Journals
 
A340105
A340105A340105
A340105
IJERA Editor
 
Q045058791
Q045058791Q045058791
Q045058791
IJERA Editor
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
csandit
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
IJERA Editor
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
IOSR Journals
 
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
IJECEIAES
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
Fransiskeran
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
ijtsrd
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
Editor IJCATR
 

What's hot (20)

Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
A340105
A340105A340105
A340105
 
Q045058791
Q045058791Q045058791
Q045058791
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Mobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility ModelMobility Contrast Effect on Environment in Manet as Mobility Model
Mobility Contrast Effect on Environment in Manet as Mobility Model
 
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
A Performance Review of Intra and Inter-Group MANET Routing Protocols under V...
 
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETSA NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
A NOVEL INTRUSION DETECTION SYSTEM FOR DETECTING BLACK-HOLE NODES IN MANETS
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 

Viewers also liked

Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online_chimes_
 
Exposicion diapositivas
Exposicion diapositivasExposicion diapositivas
Exposicion diapositivas
Fotografía/Dpto Ccion/FACSO/ UNSJ
 
Leadership
LeadershipLeadership
Leadership
Humna Amjad
 
Suspense y terror
Suspense y terrorSuspense y terror
Suspense y terror
Paula Iglesias
 
Welcome to criteo factory: 72k jobs per day
Welcome to criteo factory:   72k jobs per dayWelcome to criteo factory:   72k jobs per day
Welcome to criteo factory: 72k jobs per day
Data2B
 
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
Fujitsu Central Europe
 
Simple and compound interest
Simple and compound interestSimple and compound interest
Simple and compound interest
Jaspreet Kaur Kalsi
 
Fuentes de luz
Fuentes de luzFuentes de luz
Fuentes de luz
gonzalezjuank
 
06 ténicas básicas de fotografía
06 ténicas básicas de fotografía06 ténicas básicas de fotografía
06 ténicas básicas de fotografía
salvadordc0001
 
George Hoyningen-Huene
George Hoyningen-HueneGeorge Hoyningen-Huene
George Hoyningen-Huene
Camila Barbosa
 
Iguales en dignidad 2016
Iguales en dignidad 2016Iguales en dignidad 2016
Iguales en dignidad 2016
Carlos Casanueva
 
Biografi harun ar rasyid
Biografi harun ar rasyidBiografi harun ar rasyid
Biografi harun ar rasyid
Alyaraisa Alpasha
 
El Ojo y la Visión.
El Ojo y la Visión.El Ojo y la Visión.

Viewers also liked (13)

Keep your Kids Safe Online
Keep your Kids Safe OnlineKeep your Kids Safe Online
Keep your Kids Safe Online
 
Exposicion diapositivas
Exposicion diapositivasExposicion diapositivas
Exposicion diapositivas
 
Leadership
LeadershipLeadership
Leadership
 
Suspense y terror
Suspense y terrorSuspense y terror
Suspense y terror
 
Welcome to criteo factory: 72k jobs per day
Welcome to criteo factory:   72k jobs per dayWelcome to criteo factory:   72k jobs per day
Welcome to criteo factory: 72k jobs per day
 
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
Fujitsu Storage Days 2017 - Reimar Engelhardt & David H. James: "Stiftung Hos...
 
Simple and compound interest
Simple and compound interestSimple and compound interest
Simple and compound interest
 
Fuentes de luz
Fuentes de luzFuentes de luz
Fuentes de luz
 
06 ténicas básicas de fotografía
06 ténicas básicas de fotografía06 ténicas básicas de fotografía
06 ténicas básicas de fotografía
 
George Hoyningen-Huene
George Hoyningen-HueneGeorge Hoyningen-Huene
George Hoyningen-Huene
 
Iguales en dignidad 2016
Iguales en dignidad 2016Iguales en dignidad 2016
Iguales en dignidad 2016
 
Biografi harun ar rasyid
Biografi harun ar rasyidBiografi harun ar rasyid
Biografi harun ar rasyid
 
El Ojo y la Visión.
El Ojo y la Visión.El Ojo y la Visión.
El Ojo y la Visión.
 

Similar to Comparative analysis of manet reactive protocols

A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
pijans
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
IJERA Editor
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
شيماء شقيرة
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Editor IJMTER
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
eSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
eSAT Journals
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
A Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSA Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETS
Sabrina Ball
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
IJTET Journal
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
IJERA Editor
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
ijcses
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
IJERA Editor
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
ijceronline
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
eSAT Publishing House
 

Similar to Comparative analysis of manet reactive protocols (20)

A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
A Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETSA Survey On Hybrid Routing Protocols In MANETS
A Survey On Hybrid Routing Protocols In MANETS
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 

More from prj_publication

International library management systems
International library management systemsInternational library management systems
International library management systems
prj_publication
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
prj_publication
 
Diabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aDiabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – a
prj_publication
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
prj_publication
 
Connecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersConnecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and users
prj_publication
 
The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...
prj_publication
 
Awareness of digital library among library professional
Awareness of digital library among library professionalAwareness of digital library among library professional
Awareness of digital library among library professional
prj_publication
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspects
prj_publication
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
prj_publication
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
prj_publication
 
Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...
prj_publication
 
Impact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyImpact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichy
prj_publication
 
Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...
prj_publication
 
Service gap analysis of footwear retail outlets a study 2
Service gap analysis of footwear retail outlets  a study 2Service gap analysis of footwear retail outlets  a study 2
Service gap analysis of footwear retail outlets a study 2
prj_publication
 
Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...
prj_publication
 
‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system
prj_publication
 
An appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour inAn appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour in
prj_publication
 
Akce international journal of graphs and
Akce international journal of graphs andAkce international journal of graphs and
Akce international journal of graphs and
prj_publication
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 n
prj_publication
 
A scientometric analysis of research productivity
A scientometric analysis of research productivityA scientometric analysis of research productivity
A scientometric analysis of research productivity
prj_publication
 

More from prj_publication (20)

International library management systems
International library management systemsInternational library management systems
International library management systems
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Diabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aDiabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – a
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Connecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersConnecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and users
 
The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...
 
Awareness of digital library among library professional
Awareness of digital library among library professionalAwareness of digital library among library professional
Awareness of digital library among library professional
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspects
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...
 
Impact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyImpact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichy
 
Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...
 
Service gap analysis of footwear retail outlets a study 2
Service gap analysis of footwear retail outlets  a study 2Service gap analysis of footwear retail outlets  a study 2
Service gap analysis of footwear retail outlets a study 2
 
Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...
 
‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system
 
An appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour inAn appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour in
 
Akce international journal of graphs and
Akce international journal of graphs andAkce international journal of graphs and
Akce international journal of graphs and
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 n
 
A scientometric analysis of research productivity
A scientometric analysis of research productivityA scientometric analysis of research productivity
A scientometric analysis of research productivity
 

Recently uploaded

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
benykoy2024
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 

Recently uploaded (20)

在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx01-GPON Fundamental fttx ftth basic .pptx
01-GPON Fundamental fttx ftth basic .pptx
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 

Comparative analysis of manet reactive protocols

  • 1. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 23 COMPARATIVE ANALYSIS OF MANET REACTIVE PROTOCOLS Nisha kumari, CS Department, Manav Rachna College of Engineering Faridabad, Haryana Ritu Saluja Associate Professor, Deptt of CS Manav Rachna College of Engg, Faridabad, Haryana ABSTRACT An Ad-hoc network is a group of mobile nodes. In an ad-hoc network a mobile node can directly communicate with the other node that lies in its transmission range or it can forward its information to the other node that will act as an intermediate node and forwards the information to the desired node using multi-hop links. In such a network there is no need of any infrastructure. Ad-hoc networks routing protocols are classified into two categories: Proactive/table-driven and reactive/on-demand. Reactive routing protocol is used whenever a communication is requested. There are two types of reactive protocols: AODV (Ad hoc on- demand distance vector protocol) and DSR (Dynamic source routing protocol). In one type of scenario one protocol may perform best while another may perform worst, so there is a need to determine an optimal one out of these in a more dynamic environment. The differences in the working of these protocols lead to significant performance differentials for both of these protocols. Keywords: MANET, AODV, DSR, RREQ, RREP INTRODUCTION With the development in technologies there is a rapid increase in the use of devices like mobile phones and computers. These devices provide access to network through wireless interfaces. Ad-hoc networks are the wireless networks without any fixed infrastructure. An Ad-hoc network is a collection of nodes that are mobile in nature therefore they are also known as MANETS (mobile ad hoc networks). A MANET (mobile ad hoc network) is an independent collection of mobile users that communicate with each other via wireless links that is through radio waves. In an ad-hoc network a mobile node can directly communicate with the other node that lies in its IJCSERD © PRJ PUBLICATION International Journal of Computer Science Engineering Research and Development (IJCSERD), ISSN 2248 – 9363(Print) ISSN 2248 – 9371(Online), Volume 3, Number 1 Jan- March (2013), pp: 23-29 © PRJ Publication, http://www.prjpublication.com/IJCSERD.asp
  • 2. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 24 transmission range or it can forward its information to the other node that will act as an intermediate node. The network is decentralized as all the network activities for example discovering the topologies and delivering messages must be executed by the nodes themselves. Therefore routing is necessary for the mobile nodes. Such type of networks can be used in the environments where there is no infrastructure or setting of an infrastructure is very expensive or the existing wired infrastructure has been destroyed by the natural calamity ,for example earthquakes, floods. Characteristics of MANETS are: • Nodes can act like both hosts and routers (intermediate nodes). • Communication via radio waves. • Limited Bandwidth. • Less Security. • Dynamic network topology. Applications of MANET are: • Emergency situations or disaster areas, where a hurricane or earthquake has destroyed the communication infrastructure. • Coverage area expansion of cellular networks. • Commercial and Industrial areas where associates can share information during a meeting and participants in a conference can exchange documents or presentations. • Inter-vehicle communication. • Sensor Networks represent a special kind of ad hoc networks that consist of nodes having sensing communication and processing abilities. Properties of MANET Routing protocols are: • The routing protocols should be capable of using not only the bi-directional links but also the unidirectional links that will improve the performance of routing protocols. • The nodes in the ad-hoc network can be laptops or cell phones that are limited in battery power so it is very important that the routing protocol has support for sleep modes. • The protocol should be reactive in nature that the protocol should react only when needed and should not periodically broadcast information This minimize the control overhead in the network and prevent misuse of the network resources. • The protocol should be distributed that is it should not be dependent on any centralized controlling system. The nodes in an ad-hoc network are mobile in nature so they can enter or leave the network any time causing partitions. • The radio environment is especially vulnerable to attacks so some sort of security measures should be followed like Authentication and encryption. • The routes used for communication should be loop free. This avoids any misuse of bandwidth and improves the overall performance. • Multiple routes can be used to reduce the number of reactions to topological changes and congestion. If one route becomes invalid, it is possible that another route can be used. • The routing protocols should incorporate Quality of service that helps to find where these networks can be used for example for real time traffic support.
  • 3. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 25 II ROUTING PROTOCOLS Ad-hoc networks have routing protocols that can be classified into two categories: Proactive/table-driven Reactive/on-demand. Fig 2: Type of Routing Protocols A. Proactive Protocol Proactive protocols are also known as table-driven protocols. These protocols always maintain routes between every host that means there is a regular exchange of network topology packets between the nodes of the network. So there is a minimal delay in determining which route should to be taken. These protocols consume bandwidth to keep routes up-to-date and also maintain routes which may never be used. The increased mobility in the network causes traffic overhead. If the nodes transmit packets infrequently then the routing information is considered redundant. Proactive protocols are most suitable in the networks that have low node mobility and where the nodes transmit data frequently. Examples of Proactive Protocols are: Optimized Link State Routing (OLSR), Fish-eye State Routing (FSR), Destination-Sequenced Distance Vector (DSDV), and Cluster-head Gateway Switch Routing Protocol (CGSR). B. Reactive Protocol Reactive routing protocols are also known as on-demand routing protocols as they are used whenever a communication is requested. Firstly, Source node checks its route cache if there is a route available from source to destination and if the route is not available then it initiates route discovery process. The reactive routing protocols perform two functions: Route discovery: In this the source node initiates a route discovery process on demand basis. A source node then sees its route cache for the available route and if the route from source to destination is not present then it initiates a route discovery process. The packet includes the destination address of the node as well as address of the intermediate nodes to the destination. Route maintenance: Due to dynamic topology of the ad hoc networks, route failures between the nodes are more frequent that arises due to link breakage between the nodes. Route maintenance is done to avoid this problem by using an acknowledgement mechanism. Examples of Reactive protocols are Dynamic Source Routing (DSR) and Ad-hoc on- demand distance vector (AODV).
  • 4. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 26 III.AD HOC ON-DEMAND DISTANCE VECTOR (AODV) Ad hoc On-Demand Distance Vector (AODV) routing is a reactive routing protocol for mobile ad hoc networks. It is an on-demand and distance-vector routing protocol that is a route is established by AODV from a destination only on demand. AODV routing protocol is capable of both unicast and multicast routing. It keeps the routes in the routing table as long as they are needed by the source nodes. AODV generates a tree or trees are composed of the group members and the nodes that are needed to connect their members. AODV uses destination sequence numbers to ensure the freshness of routes. Its operations are loop-free. AODV can also scales to large numbers of mobile nodes. Each mobile node in the network maintains a route table entry for each destination in its route table. • Number of hops (Hop count) • Destination sequence number • Destination IP address • Active neighbors for this route • Lifetime (Expiration time of the route) • Next hop When a node suppose S wants to communicate with another node suppose D, then it initiates route discovery process by broadcasting a Route Request packet (RREQ) to its neighbors. If the neighbor node has a route to the destination then it replies with a route reply packet, otherwise it broadcast the route request packet to all its neighbors and some packets reach to the destination D. When the Route Reply (RREP) is generated, it reaches back to the source node, based on the reverse path. Each node along this path sets a forward pointer to the node and records the latest destination sequence number. The RREQ has the following fields: • Source address • Source sequence number used to maintain freshness info about the route to the source. • Destination address • Destination sequence number • Hop-count • Route Request (RREQ) Message Format Type J R G D U Reserved Hop Count RREQ ID Destination IP Address Destination Sequence Number Source IP Address Source Sequence Number
  • 5. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 27 The Route Request message includes the following fields: Type 1 J Join flag, reserved for multicast R Repair flag, reserved for multicast G Gratuitous RREP flag D Destination only flag, idicates that destination can respond to this RREQ. U Unknown sequence number indicates that destination sequence number is unknown. Reserved Sent as 0. Hop Count Number of hops from Source to the node handling the request. A. Advantages and Disadvantages The main advantage of AODV protocol is that AODV established routes on demand basis and uses destination sequence numbers to find the latest route to the destination. The connection setup delay is also less in AODV. The HELLO messages used in AODV that supports the routes maintenance are range-limited so they do not cause unnecessary overhead in the network. AODV are well suited for large networks. A disadvantage of this protocol is that intermediate nodes can lead to inconsistent routes if the sequence number is very old and the intermediate nodes have a higher but not the latest destination sequence number. Multiple Route Reply messages in response to a single Route Request packet can lead to heavy control overhead. The periodic HELLO message leads to gratuitous bandwidth consumption. IV Dynamic Source Routing (DSR) Dynamic Source Routing (DSR) is also a reactive routing protocol for ad hoc networks. It is similar to AODV as it establishes a route on-demand. It uses source routing instead of relying on the routing table at each intermediate node. Dynamic source routing protocol is an on-demand, source routing protocol, where all the routing information is maintained at mobile nodes. Every node contains a route cache. Each entry in route cache specifies the intermediate nodes to a destination. The route cache is used to respond to RREQs even if it is not the destination. The route cache is always updated when it learns a new route. The entries from the route cache are removed only when a node receives an RERR. DSR allows the network to be self-organizing and self-configuring without the need for any existing infrastructure. The protocol is based on two main mechanisms: Route Discovery and Route Maintenance. In Route discovery the source node floods the network with RREQ packets. The RREQ contain the source and destination address and also the unique identity of the request. When a node receives an RREQ and if it is the destination then it responds back with an RREP containing the route from the source to the destination required, if not the node appends its own address to the RREQ header and rebroadcasts the RREQ to all its neighbour nodes. But a node that is not the destination receives the RREQ and contains a route to the destination may send an RREP. Upon receiving the RREP packet the source node records the route indicated in RREP in its route cache. A shortest path for the communication between a source node and destination node is determined by Route Discovery process. Route Maintenance mechanism ensures that the
  • 6. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 28 communication path remains loop-free according the change in network conditions. Route Reply is generated only in the case if the message has reached the destination node. A. Advantages and Disadvantages DSR uses a reactive approach which eliminates the need to periodically flooding the network with update messages which are required in a table-driven approach. The intermediate node utilizes the route cache information efficiently to reduce the control overhead. DSR has information of multiple routes. The disadvantage of DSR is that it is not suitable for large networks and the route maintenance mechanism does not repair a broken link. The performance of DSR degrades rapidly with increasing mobility. Routing overhead is involved due to the source-routing mechanism used in DSR. V.COMPARISON BETWEEN AODV AND DSR TABLE I Sr. No. AODV DSR 1. It uses table-driven routing. It uses source routing. 2. It delivers virtually all packets at low mobility. It is very good at all mobility rates. 3. It has low end to end delay. 4. AODV uses one route per destination. DSR uses routing cache aggressively, and maintains multiple routes per destination. 5. For real time traffic AODV is preferred. 6. It is more conservative as the fresher route is always chosen. DSR does not have any explicit mechanism to expire stale routes in the cache. 7. It outperforms DSR in more stress situations (more load, higher mobility. It outperforms AODV in less stressful situations (smaller # of nodes and lower load and/or mobility).
  • 7. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 1, Jan-March (2013) 29 CONCLUSION In this paper an effort has been made on the theoretical study of mobile ad hoc network routing protocols. There are mainly two types of routing protocols: Proactive and Reactive routing protocols. Various advantages and disadvantages of these protocols are also included in this. There are various shortcomings in different routing protocols and it is very difficult to choose a right routing protocol for a particular situation as there are tradeoffs between various protocols. ACKNOWLEDGMENT I WOULD LIKE TO THANK MRS. RITU SALUJA AND MANAV RACHNA COLLEGE OF ENGG. FOR THEIR SUPPORT AND GUIDANCE REFERENCES [1] S .Taneja, A.Kush, A.Makkar, “Experimental analysis of DSR and AODV using speed and pause time”, International Journal of Innovation, Management and Technology, Vol. 1, No. 5, December 2010. [2] C.E, E.M. Royer and S.R. Das, “Performance comparison of two on-demand routing protocols for Ad hoc networks”, IEEE Personal Communications Magazine, 8: 16-28, 2001. [3] G.Kaur, “Performance Analysis of AODV routing protocol in Manets”, International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.08 August 2012. [4] T.Singh, S.Dua, V.Das, “Energy-Efficient Routing Protocols In Mobile Ad-Hoc Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012. [5] D.Maltz, J.Broch, J.Jetcheva, D.Johnson. The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks IEEE Journal on Selected Areas in Communication, 1999 [6] Poonam Thakur, M.Vijaya Raju, “survey on routing techniques for Manets and Wireless sensor networks: a comparison” international journal of computer engineering & technology (ijcet) Volume 4, Issue 1, January -February2013. [7] Sunita Kushwaha, Bhavna Narain, Deepti Verma, Sanjay kumar, “effect of scenario environment on the performance of Manets routing protocol: aodv” international journal of computer engineering & technology (ijcet) Volume 2, Issue 1, January- April 2011. [8] Shah Vrutik, Dr.Nilesh Modi, Patani Ashwin, “aodvgap-an acknowledgment based approach to mitigate selective forwarding attacks in Manet” international journal of computer engineering& technology (ijcet) Volume 3, Issue 2, July-September 2010.