A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
Routing protocols have
an important
role in any
Mobile Ad Hoc Network
(MANET).
Researchers
have
elaborated several routing protocols that possess different performance levels
. In this
p
aper
we
give a
performance evaluation of
AODV,
DSR,
DSDV
, OLSR and DYMO
routing protocol
s
in
Mobile Ad Hoc
Networks
(MANETS)
to
determine
the best
in different scenarios
. We
analyse
these
MANET
routing
protocols by
using
NS
-
2 simulator
. We specify how
the
Number of No
d
es
parameter influences
their
performance. In this study
,
performance is
calculated
in terms
of Packet Delivery Ratio,
Average
End to
End Delay, Normalised Routing Load and Average Throughput
Performance comparison of routing protocols in mobile ad hoc networksijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a simulation-based performance analysis of three routing protocols (CBRP, DSR, AODV) for mobile ad hoc networks (MANETs) under different node densities. The analysis varies the number of data sources and evaluates the protocols based on packet delivery ratio, average end-to-end delay, and normalized routing load. The simulation is conducted using the NS-2 network simulator for dense and sparse network topologies with 50 nodes each, varying node speeds and transmission ranges. Results show that CBRP performs better than DSR and AODV in terms of normalized routing load for more than 15 sources in both dense and sparse topologies, while AODV has lower delay than CBR
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
This document compares the performance of three routing protocols - AODV, DSDV, and OLSR - under the random waypoint mobility model using network simulation. Simulation results with 30 and 50 nodes found that OLSR performed better than AODV and DSDV in terms of packet receive rate and packets received with 30 nodes and a simulation time of 100 seconds. DSDV performed better than the other protocols with 50 nodes and a simulation time of 200 seconds. Overall, AODV showed the poorest performance in both scenarios. The document analyzes these routing protocols and the random waypoint mobility model to evaluate their performance under different parameters.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study that evaluates the performance of four routing protocols - FSR, STAR-LORA, DYMO, and DSR - in a mobile ad hoc network (MANET) simulation using QualNet. Two scenarios were tested: one with constant bit rate (CBR) client traffic and one with CBR server traffic. Performance metrics like throughput, average end-to-end delay, and average jitter were measured for 2, 4, 6, 8, and 12 nodes. The results showed that reactive protocols DYMO and DSR generally had lower delay but higher jitter than proactive protocols FSR and STAR-LORA. This study aims to help identify the most efficient routing
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
Routing protocols have
an important
role in any
Mobile Ad Hoc Network
(MANET).
Researchers
have
elaborated several routing protocols that possess different performance levels
. In this
p
aper
we
give a
performance evaluation of
AODV,
DSR,
DSDV
, OLSR and DYMO
routing protocol
s
in
Mobile Ad Hoc
Networks
(MANETS)
to
determine
the best
in different scenarios
. We
analyse
these
MANET
routing
protocols by
using
NS
-
2 simulator
. We specify how
the
Number of No
d
es
parameter influences
their
performance. In this study
,
performance is
calculated
in terms
of Packet Delivery Ratio,
Average
End to
End Delay, Normalised Routing Load and Average Throughput
Performance comparison of routing protocols in mobile ad hoc networksijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a simulation-based performance analysis of three routing protocols (CBRP, DSR, AODV) for mobile ad hoc networks (MANETs) under different node densities. The analysis varies the number of data sources and evaluates the protocols based on packet delivery ratio, average end-to-end delay, and normalized routing load. The simulation is conducted using the NS-2 network simulator for dense and sparse network topologies with 50 nodes each, varying node speeds and transmission ranges. Results show that CBRP performs better than DSR and AODV in terms of normalized routing load for more than 15 sources in both dense and sparse topologies, while AODV has lower delay than CBR
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
This document compares the performance of three routing protocols - AODV, DSDV, and OLSR - under the random waypoint mobility model using network simulation. Simulation results with 30 and 50 nodes found that OLSR performed better than AODV and DSDV in terms of packet receive rate and packets received with 30 nodes and a simulation time of 100 seconds. DSDV performed better than the other protocols with 50 nodes and a simulation time of 200 seconds. Overall, AODV showed the poorest performance in both scenarios. The document analyzes these routing protocols and the random waypoint mobility model to evaluate their performance under different parameters.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a study that evaluates the performance of four routing protocols - FSR, STAR-LORA, DYMO, and DSR - in a mobile ad hoc network (MANET) simulation using QualNet. Two scenarios were tested: one with constant bit rate (CBR) client traffic and one with CBR server traffic. Performance metrics like throughput, average end-to-end delay, and average jitter were measured for 2, 4, 6, 8, and 12 nodes. The results showed that reactive protocols DYMO and DSR generally had lower delay but higher jitter than proactive protocols FSR and STAR-LORA. This study aims to help identify the most efficient routing
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field free for the
nodes to move. The most important aspect of this kind of network turns into a great disadvantage when it
comes to commercial applications, take as an example: the automotive networks that allow communication
between a groups of vehicles. The ad hoc on-demand distance vector (AODV) routing protocol, designed
for mobile ad hoc networks, has two main functions. First, it enables route establishment between a source
and a destination node by initiating a route discovery process. Second, it maintains the active routes, which
means finding alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and accurately.
In this paper, we focused in the first point to enhance the local decision of each node in the network by the
quantification of the mobility of their neighbours. Quantification is made around RSSI algorithm a well
known distance estimation method.
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that evaluates the performance of two routing protocols (AODV and DSDV) under different traffic patterns (TCP and CBR) in a mobile ad hoc network (MANET) simulation. The paper describes MANET characteristics and challenges for routing. It provides an overview of reactive (AODV), proactive (DSDV), and hybrid routing protocols. It also defines TCP and CBR traffic patterns. The research aims to analyze and compare the packet delivery ratio and end-to-end delay of AODV and DSDV under different traffic loads using the NS-2 simulator. Preliminary results show that reactive protocols perform better in terms of these metrics.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
This document summarizes a research paper that proposes a reliable node-disjoint multipath routing protocol for mobile ad-hoc networks (MANETs). The protocol aims to determine all available reliable node-disjoint routes from the source to destination with minimum overhead during route discovery. It selects primary and backup routes based on link quality and route expiration time. If the primary path fails, it uses the next available backup route. The performance is evaluated using simulations in NS-2, which show it reduces packet drop and delay, increasing packet delivery ratio.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
This document compares the performance of four routing protocols (AODV, DSR, OLSR, GRP) under the security attack of node misbehavior in mobile ad hoc networks (MANETs). The document presents background information on MANETs and the four routing protocols. It then discusses two types of misbehaving nodes (partially selfish and fully selfish) that are modeled in simulations. The simulations vary the percentage of misbehaving nodes and measure performance metrics like packet delivery ratio, end-to-end delay, data dropped, and load. The results show that packet delivery ratio decreases and data dropped increases as the percentage of misbehaving nodes increases for all protocols. OLSR generally has the lowest delay while
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
The document evaluates the performance of 5 routing protocols (AODV, DSR, TORA, OLSR, GRP) in a mobile ad hoc network (MANET) using the OPNET simulator. Simulations were run with 30, 60, and 90 nodes using email and video conferencing applications. Performance was analyzed based on throughput, delay, load, and data dropped. In general, GRP and OLSR had the lowest delay, DSR and GRP had the lowest load, and OLSR and AODV had the highest throughput, while TORA often had the worst performance based on the metrics. The evaluation provides insights into the relative performance of the routing protocols under different conditions in a MANET
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
MANETs are composed of autonomous nodes that are self-managed without any existing of infrastructure and centralized administration. Therefore, each node operates not only as an end system but also as a router to forward packets for other nodes. For these reasons, the network has a dynamic topology, so nodes can easily join or leave the network at any time. Routing information differentiates these networks from other ad-hoc networks. The study of QoS issues in Mobile Ad-hoc Network is done by simulation in MATLAB that can help in better understanding of the behavior of various routing protocols. This paper is intended to compare QoS parameters of various routing protocols.
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
International Journal of Pharmaceutical Science Invention (IJPSI) is an international journal intended for professionals and researchers in all fields of Pahrmaceutical Science. IJPSI publishes research articles and reviews within the whole field Pharmacy and Pharmaceutical Science, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
This document summarizes a research paper that proposes a new hybrid multipath routing protocol for mobile ad hoc networks called Hybrid Multipath Progressive Routing Protocol (HMPRP). It improves upon existing routing protocols like AODV and OLSR by utilizing multiple paths based on received signal strength to increase packet delivery and reduce overhead. Simulation results showed the proposed protocol achieved better performance than AODV, OLSR and ZRP in terms of packet delivery ratio, throughput, energy consumption and delay.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Load aware and load balancing using aomdv routing in manetijctet
This document discusses load aware and load balancing techniques using multipath routing in mobile ad hoc networks (MANETs). It proposes using a location aided routing (LAR) protocol with the Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol to identify multiple routing backbones from the source to destination nodes based on the intermediate nodes' communication and processing capabilities. This helps distribute traffic loads evenly across multiple paths to improve load balancing, reduce congestion, and enhance quality of service in the MANET.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
This document proposes a new theoretical approach to location based power aware routing in mobile ad hoc networks (MANETs). It aims to extend the network lifetime by improving power utilization during routing. The approach uses nodes' location information, remaining battery power, and bandwidth status to assign link stability and select routes with lower "uptime values" and minimum bandwidth over time. This is hypothesized to better utilize nodes' power sources and bandwidth. The document outlines calculating a root up time factor for each node based on its power backup and required power, and only using nodes with maximum backup. It concludes future work will design and validate a new protocol based on this approach.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
This document presents a performance comparison of routing protocols in mobile ad hoc networks. It summarizes previous research evaluating AODV, DSR, DSDV, OLSR and DYMO protocols. The document then describes the routing protocols and simulation setup used to analyze the performance metrics of packet delivery ratio, average end-to-end delay, normalized routing load, and average throughput under varying numbers of nodes.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
A new parameter proposed for route selection in routing protocolIAEME Publication
This document proposes a new parameter called Route Selection Parameter (RSP) to improve quality of service in mobile ad hoc network routing. RSP is calculated for each node based on its packet forwarding ratio, mobility, bandwidth, and number of neighbors. The best route is selected as the one with the maximum total RSP value. Conventional routing protocols like AODV and DSR usually use hop count as the only metric, but RSP aims to provide a more comprehensive metric based on multiple node characteristics. The document outlines the RSP calculation and discusses how it could be used to select routes, then lists some quantitative performance metrics for evaluating routing protocols.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that evaluates the performance of two routing protocols (AODV and DSDV) under different traffic patterns (TCP and CBR) in a mobile ad hoc network (MANET) simulation. The paper describes MANET characteristics and challenges for routing. It provides an overview of reactive (AODV), proactive (DSDV), and hybrid routing protocols. It also defines TCP and CBR traffic patterns. The research aims to analyze and compare the packet delivery ratio and end-to-end delay of AODV and DSDV under different traffic loads using the NS-2 simulator. Preliminary results show that reactive protocols perform better in terms of these metrics.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
This document summarizes a research paper that proposes a reliable node-disjoint multipath routing protocol for mobile ad-hoc networks (MANETs). The protocol aims to determine all available reliable node-disjoint routes from the source to destination with minimum overhead during route discovery. It selects primary and backup routes based on link quality and route expiration time. If the primary path fails, it uses the next available backup route. The performance is evaluated using simulations in NS-2, which show it reduces packet drop and delay, increasing packet delivery ratio.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
This document compares the performance of four routing protocols (AODV, DSR, OLSR, GRP) under the security attack of node misbehavior in mobile ad hoc networks (MANETs). The document presents background information on MANETs and the four routing protocols. It then discusses two types of misbehaving nodes (partially selfish and fully selfish) that are modeled in simulations. The simulations vary the percentage of misbehaving nodes and measure performance metrics like packet delivery ratio, end-to-end delay, data dropped, and load. The results show that packet delivery ratio decreases and data dropped increases as the percentage of misbehaving nodes increases for all protocols. OLSR generally has the lowest delay while
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
The document evaluates the performance of 5 routing protocols (AODV, DSR, TORA, OLSR, GRP) in a mobile ad hoc network (MANET) using the OPNET simulator. Simulations were run with 30, 60, and 90 nodes using email and video conferencing applications. Performance was analyzed based on throughput, delay, load, and data dropped. In general, GRP and OLSR had the lowest delay, DSR and GRP had the lowest load, and OLSR and AODV had the highest throughput, while TORA often had the worst performance based on the metrics. The evaluation provides insights into the relative performance of the routing protocols under different conditions in a MANET
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
MANETs are composed of autonomous nodes that are self-managed without any existing of infrastructure and centralized administration. Therefore, each node operates not only as an end system but also as a router to forward packets for other nodes. For these reasons, the network has a dynamic topology, so nodes can easily join or leave the network at any time. Routing information differentiates these networks from other ad-hoc networks. The study of QoS issues in Mobile Ad-hoc Network is done by simulation in MATLAB that can help in better understanding of the behavior of various routing protocols. This paper is intended to compare QoS parameters of various routing protocols.
International Journal of Pharmaceutical Science Invention (IJPSI)inventionjournals
International Journal of Pharmaceutical Science Invention (IJPSI) is an international journal intended for professionals and researchers in all fields of Pahrmaceutical Science. IJPSI publishes research articles and reviews within the whole field Pharmacy and Pharmaceutical Science, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
This document summarizes a research paper that proposes a new hybrid multipath routing protocol for mobile ad hoc networks called Hybrid Multipath Progressive Routing Protocol (HMPRP). It improves upon existing routing protocols like AODV and OLSR by utilizing multiple paths based on received signal strength to increase packet delivery and reduce overhead. Simulation results showed the proposed protocol achieved better performance than AODV, OLSR and ZRP in terms of packet delivery ratio, throughput, energy consumption and delay.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Load aware and load balancing using aomdv routing in manetijctet
This document discusses load aware and load balancing techniques using multipath routing in mobile ad hoc networks (MANETs). It proposes using a location aided routing (LAR) protocol with the Ad-hoc On-demand Multipath Distance Vector (AOMDV) routing protocol to identify multiple routing backbones from the source to destination nodes based on the intermediate nodes' communication and processing capabilities. This helps distribute traffic loads evenly across multiple paths to improve load balancing, reduce congestion, and enhance quality of service in the MANET.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
This document proposes a new theoretical approach to location based power aware routing in mobile ad hoc networks (MANETs). It aims to extend the network lifetime by improving power utilization during routing. The approach uses nodes' location information, remaining battery power, and bandwidth status to assign link stability and select routes with lower "uptime values" and minimum bandwidth over time. This is hypothesized to better utilize nodes' power sources and bandwidth. The document outlines calculating a root up time factor for each node based on its power backup and required power, and only using nodes with maximum backup. It concludes future work will design and validate a new protocol based on this approach.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
This document presents a performance comparison of routing protocols in mobile ad hoc networks. It summarizes previous research evaluating AODV, DSR, DSDV, OLSR and DYMO protocols. The document then describes the routing protocols and simulation setup used to analyze the performance metrics of packet delivery ratio, average end-to-end delay, normalized routing load, and average throughput under varying numbers of nodes.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
A new parameter proposed for route selection in routing protocolIAEME Publication
This document proposes a new parameter called Route Selection Parameter (RSP) to improve quality of service in mobile ad hoc network routing. RSP is calculated for each node based on its packet forwarding ratio, mobility, bandwidth, and number of neighbors. The best route is selected as the one with the maximum total RSP value. Conventional routing protocols like AODV and DSR usually use hop count as the only metric, but RSP aims to provide a more comprehensive metric based on multiple node characteristics. The document outlines the RSP calculation and discusses how it could be used to select routes, then lists some quantitative performance metrics for evaluating routing protocols.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
This document summarizes and compares various routing protocols for mobile ad-hoc networks (MANETs). It first describes the characteristics and challenges of MANETs. It then classifies routing protocols for MANETs into three main categories: table-driven (proactive), on-demand (reactive), and hybrid protocols. Examples of protocols from each category are described in detail, including DSDV, AODV, DSR, and ZRP. Key features such as route discovery, table maintenance, and use of proactive and reactive approaches are discussed for each example protocol. Finally, the document compares different protocols based on parameters like scalability, latency, bandwidth overhead, and mobility impact.
This document summarizes a research paper on load balancing protocols in mobile ad hoc networks (MANETs). It begins with an abstract of the paper and introduces MANETs and the importance of load balancing in them given nodes' limited resources. It then discusses various load metrics and load balancing routing protocols. Specific protocols covered include Ad Hoc On-Demand Distance Vector (AODV), Ad hoc On-Demand Multipath Distance Vector (AOMDV), and Scalable Multipath On-Demand Routing (SMORT). AOMDV and SMORT aim to compute multiple loop-free paths during route discovery to help balance traffic load across multiple paths. The document concludes that load balanced routing protocols use different metrics to select routes
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
In this paper, we proposed a replacement hybrid multipath routing protocol for
MANET known as Hybrid Multipath Progressive Routing Protocol for MANET (HMPRP),
during this work we improve the performance of accepted MANET routing protocols,
namely, the Ad-hoc On-demand Distance Vector routing protocol and use of their most
popular properties to formulate a replacement Hybrid routing protocol using the received
signal strength. The proposed routing protocol optimizes the information measure usage of
MANETs by reducing the routing overload and overhead. This proposed routing protocol
additionally extends the battery lifetime of the mobile devices by reducing the specified
variety of operations for (i) Route determination (ii) for packet forwarding. Simulation
results are used to draw conclusions regarding the proposed routing algorithm and
compared it with the AODV, OLSR, and ZRP protocol. Experiments carried out based on
this proposed algorithm, shows that better performance are achieved with regard to AODV,
OLSR, and ZRP routing algorithm in terms of packet delivery ratio, throughput, energy
consumed and end-to-end packet delay.
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
An ad hoc network is a network created by wireless hosts that can be mobile. This means that no infrastructure such as a central station, router, roaming, or anything else used by other networks to help network structure or anything else that other networks use to help Network structure, is not used. Rather, they are just a few wireless nodes connecting to non neighboring nodes with the help of the neighboring nodes. Wireless ad hoc mobile network (MANET) and Wireless ad hoc inter-car network (VANET), are among wireless networks which have the most effective parameters in the ability of this type of networksto transfer multimedia from source to destination. In this research, we examine the challenges and solutions presented in DODV, DSR, and DSDV protocols.
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
An ad hoc network is a network created by wireless hosts that can be mobile. This means that no
infrastructure such as a central station, router, roaming, or anything else used by other networks to help
network structure or anything else that other networks use to help Network structure, is not used. Rather,
they are just a few wireless nodes connecting to non-neighboring nodes with the help of the neighboring
nodes. Wireless ad hoc mobile network (MANET) and Wireless ad hoc inter-car network (VANET), are
among wireless networks which have the most effective parameters in the ability of this type of networksto
transfer multimedia from source to destination. In this research, we examine the challenges and solutions
presented in DODV, DSR, and DSDV protocols
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
This document analyzes the performance of the AODV, DSR, and IERP routing protocols in a mobile ad hoc network (MANET) with varying constant bit rate (CBR) traffic loads. It conducts simulations in QualNet 6.1 and evaluates the protocols based on average end-to-end delay, throughput, average jitter, and packet delivery ratio under different CBR values. The results show that AODV generally performs best with low and stable delay, jitter and high throughput and delivery ratio. DSR has better performance than IERP for throughput and delivery ratio. IERP shows the worst performance for delay and jitter as CBR increases. The document concludes by stating AODV is best overall but
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a review article about energy efficient routing protocols in mobile ad hoc networks (MANETs). It discusses how MANETs use multi-hop wireless connections between mobile nodes without a fixed infrastructure. It then reviews several prominent routing protocols for MANETs, including reactive protocols like AODV and DSR, proactive protocols like DSDV and OLSR, and a hybrid protocol. Finally, it proposes a new energy-efficient clustering-based routing algorithm that selects cluster heads based on node mobility and battery power to improve path efficiency and stability in MANETs.
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
This document discusses using a genetic algorithm to improve routing in mobile ad hoc networks. It begins with background on mobile ad hoc networks and common routing protocols. It then introduces genetic algorithms and how they work by simulating natural evolution. The document proposes using a genetic algorithm with the AODV routing protocol to find optimal paths between source and destination nodes. It describes implementing this approach and comparing its performance to traditional AODV routing. The results showed the genetic algorithm approach performed better in terms of quality of service and throughput.
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
A Mobile Ad hoc NETwork (MANET), is a self-configuring infra structure less network of mobile devices
connected by wireless links. ad hoc is Latin and means "for this purpose". Each device in a MANET is free
to move independently in any direction, and will therefore change its links to other devices frequently. Each
must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building
a MANET is equipping each device to continuously maintain the information required to properly route
traffic. QOS is defined as a set of service requirements to be met by the network while transporting a
packet stream from source to destination. Intrinsic to the notion of QOS is an agreement or a guarantee by
the network to provide a set of measurable pre-specified service attributes to the user in terms of delay,
jitter, available bandwidth, packet loss, and so on. The analysis is mainly between proactive or table-driven
protocols like OLSR (Optimized Link State Routing) viz DSDV (Destination Sequenced Distance Vector) &
CGSR (Cluster Head Gateway Switch Routing) and reactive or source initiated routing protocols viz
AODV (Ad hoc on Demand distance Vector) & DSR (Dynamic Source Routing). The QoS analysis of the
above said protocols is simulated on NS2 and results are shown thereby.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
This document summarizes an article that proposes improvements to the Ad hoc On-Demand Distance Vector (AODV) routing protocol for use in Vehicular Ad hoc Networks (VANETs). It first provides background on VANETs and discusses different types of routing protocols used in VANETs, including topology-based, position-based, and hybrid protocols. It then focuses on improvements made to the reactive AODV routing protocol, including adding link layer security checks and a method to reduce packet delay called AODV_BD. The goal of these improvements is to create more stable routes and reduce packet delay for safety communications between vehicles.
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...IRJET Journal
This document provides an overview and comparison of four reactive routing protocols for mobile ad hoc networks (MANETs): Ad Hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), Temporary Ordered Routing Algorithm (TORA), and Dynamic MANET On-demand (DYMO). It describes the key mechanisms and operations of each protocol, including route discovery, route maintenance, and how they differ in approaches like maintaining source routes or next hop information. The document aims to identify which protocol is best suited under different circumstances.
Similar to COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS (20)
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESijcax
This document summarizes a research paper that proposes a new ontology-based method for automatic image retrieval and annotation using 5,000 images from the Corel dataset. The method combines global and regional visual features with contextual relationships defined in an ontology. It creates a new ontology based on WordNet to semantically relate tags and reduce gaps between low-level features and high-level concepts. Experimental results show the proposed method increases annotation accuracy compared to other methods.
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMijcax
Constrained Nonlinear programming problems are hard problems, and one of the most widely used and
common problems for production planning problem to optimize. In this study, one of the mathematical
models of production planning is survey and the problem solved by cuckoo algorithm. Cuckoo Algorithm is
efficient method to solve continues non linear problem. Moreover, mentioned models of production
planning solved with Genetic algorithm and Lingo software and the results will compared. The Cuckoo
Algorithm is suitable choice for optimization in convergence of solution
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
This document compares the performance of five routing protocols (AODV, DSR, DSDV, OLSR, DYMO) in mobile ad hoc networks through simulations. It summarizes each protocol and discusses the simulation setup. The protocols are categorized as reactive, proactive, or hybrid. Key performance metrics like packet delivery ratio, end-to-end delay, and routing load are evaluated under varying pause times using the NS-2 simulator. The analysis seeks to determine the best operational conditions for each protocol in mobile ad hoc networks.
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
In this study, which took place current year in the city of Maragheh in IRAN. Number of high school
students in the fields of study: mathematics, Experimental Sciences, humanities, vocational, business and
science were studied and compared. The purpose of this research is to predict the academic major of high
school students using Bayesian networks. The effective factors have been used in academic major selection
for the first time as an effective indicator of Bayesian networks. Evaluation of Impacts of indicators on
each other, discretization data and processing them was performed by GeNIe. The proper course would be
advised for students to continue their education.
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation ijcax
Automatic image annotation has emerged as an important research topic due to its potential application on
both image understanding and web image search. This paper presents a model, which integrates visual
topics and regional contexts to automatic image annotation. Regional contexts model the relationship
between the regions, while visual topics provide the global distribution of topics over an image. Previous
image annotation methods neglected the relationship between the regions in an image, while these regions
are exactly explanation of the image semantics, therefore considering the relationship between them are
helpful to annotate the images. Regional contexts and visual topics are learned by PLSA (Probability
Latent Semantic Analysis) from the training data. The proposed model incorporates these two types of
information by MCDM (Multi Criteria Decision Making) approach based on WSM (Weighted Sum
Method). Experiments conducted on the 5k Corel dataset demonstrate the effectiveness of the proposed
model.
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
Research on information and communication technologies have been developed rapidly since it can be
applied easily to several areas like computer science, medical science, economics, environments,
engineering, among other. Applications of soft set theory, especially in information systems have been
found paramount importance. Recently, Mukherjee and Das defined some new operations in fuzzy soft
multi set theory and show that the De-Morgan’s type of results hold in fuzzy soft multi set theory with
respect to these newly defined operations. In this paper, we extend their work and study some more basic
properties of their defined operations. Also, we define some basic supporting tools in information system
also application of fuzzy soft multi sets in information system are presented and discussed. Here we define
the notion of fuzzy multi-valued information system in fuzzy soft multi set theory and show that every fuzzy
soft multi set is a fuzzy multi valued information system.
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data
mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer
behaviour, evaluate a particular website based on the information which is stored in web log files. Web
mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library.
Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase
the complexity of dealing information from different web service providers. The collection of information
becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
The Pattern classification system classifies the pattern into feature space within a boundary. In case
adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS),
Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary
application in which data can be employed by humans to attenuate perspective operations. To appraise the
security issue related Spam Filtering voluminous machine learning systems. We presented a framework for
the experimental evaluation of the classifier security in an adversarial environments, that combines and
constructs on the arms race and security by design, Adversary modelling and Data distribution under
attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as
legitimate (ham) or spam emails on the basis of thee text samples.
Visually impaired people face many problems in their day to day lives. Among them, outdoor navigation is
one of the major concerns. The existing solutions based on Wireless Sensor Networks(WSN) and Global
Positioning System (GPS) track ZigBee units or RFID (Radio Frequency Identification) tags fixed on the
navigation system. The issues pertaining to these solutions are as follows: (1) It is suitable only when the
visually impaired person is commuting in a familiar environment; (2) The device provides only a one way
communication; (3) Most of these instruments are heavy and sometimes costly. Preferable solution would
be to make a system which is easy to carry and cheap.
The objective of this paper is to break down the technological barriers, and to propose a system by
developing an Android App which would help a visually impaired person while traveling via the public
transport system like Bus. The proposed system uses an inbuilt feature of smart phone such as GPS
location tracker to track the location of the user and Text to Speech converter. The system also integrates
Google Speech to Text converter for capturing the voice input and converts them to text. This system
recommends the requirement of installing a GPS module in buses for real time tracking. With minor
modification, this App can also help older people for independent navigation.
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...ijcax
The rapid growth of Internet has revolutionized online news reporting. Many users tend to use online news
websites to obtain news information. When considering Sri Lanka, there are numerous news websites,
which are subscribed on a daily basis. With the rise in this number of news websites, the Sri Lankan
authorities of media face the issue of lacking a proper methodology or a tool which is capable of tracking
and regulating publications made by different disseminators of news.
This paper proposes a News Agent toolbox which periodically extracts news articles and associated
comments with the aid of a concept called Mapping Rules; to classify them into Personalized Categories
defined in terms of keywords based Category Profiles. The proposed tool also analyzes comments made by
the readers with the aid of simple statistical techniques to discover the most popular news articles and
fluctuations in popularity of news stories.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
The design of silicon chips in every semiconductor industry involves the testing of these chips with other
components on the board. The platform developed acts as power on vehicle for the silicon chips. This
Printed Circuit Board design that serves as a validation platform is foundational to the semiconductor
industry.
The manual/repetitive design activities that accompany the development of this board must be minimized to
achieve high quality, improve design efficiency, and eliminate human-errors. One of the time consuming
tasks in the board design is the Trace Length matching. The paper aims to reduce the length matching time
by automating it using SKILL scripts.
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
The purpose of this research is the analysis using meta-analysis of studies in the field of Educational
Technology in Turkey and in the field is to demonstrate how to get to that trend. For this purpose, a total of
263 studies were analyzed including 98 theses and 165 articles published between 2010-2018. Purpose
sampling method was used when selecting publications. In the research, while selecting articles and theses;
Turkey addressed; YOK Tez Tarama Database, Journal of Hacettepe University Faculty of Education,
Educational Sciences : Theory & Practice Journal, Education and Science Journal, Elementary Education
Online Journal, The Turkish Online Journal of Education and The Turkish Online Journal of Educational
Technology used in journals. Publications have been reviewed under 11 criteria. Index, year of
publication, research scope, method, education level, sample, number of samples, data collection methods,
analysis techniques, and research tendency, research topics in Educational Technology Research in Turkey
has revealed. The data is interpreted based on percentage and frequency and the results are shown using
the table.
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
The purpose of this research is the analysis using meta-analysis of studies in the field of Educational
Technology in Turkey and in the field is to demonstrate how to get to that trend. For this purpose, a total of
263 studies were analyzed including 98 theses and 165 articles published between 2010-2018. Purpose
sampling method was used when selecting publications. In the research, while selecting articles and theses;
Turkey addressed; YOK Tez Tarama Database, Journal of Hacettepe University Faculty of Education,
Educational Sciences : Theory & Practice Journal, Education and Science Journal, Elementary Education
Online Journal, The Turkish Online Journal of Education and The Turkish Online Journal of Educational
Technology used in journals. Publications have been reviewed under 11 criteria. Index, year of
publication, research scope, method, education level, sample, number of samples, data collection methods,
analysis techniques, and research tendency, research topics in Educational Technology Research in Turkey
has revealed. The data is interpreted based on percentage and frequency and the results are shown using
the table
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...ijcax
This document summarizes a study on the impact of applying international quality standards on medical equipment in Saudi Arabia. A questionnaire was distributed to 300 healthcare professionals in public and private hospitals to collect data. The results showed that around 80% of respondents strongly agreed that international standards like ISO have significantly improved safety, testing and calibration of medical devices, use of consistent terminology, and compatibility/interoperability. Adopting global quality standards appears to have reduced risks associated with medical equipment and enhanced patient safety in Saudi Arabia according to the healthcare workers surveyed.
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
The Pattern classification system classifies the pattern into feature space within a boundary. In case adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS), Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary
application in which data can be employed by humans to attenuate perspective operations. To appraise the
security issue related Spam Filtering voluminous machine learning systems. We presented a framework for the experimental evaluation of the classifier security in an adversarial environments, that combines and constructs on the arms race and security by design, Adversary modelling and Data distribution under
attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as legitimate (ham) or spam emails on the basis of thee text samples
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...ijcax
Order placingis a crucial phase of lifecycle of a Mass-customizable product and seeks improvement in
Mechanical industry. ‘Product Configurator’ is a good solution to bring in data transparency and speed
up the process. Configuration tools arebeing used on a very small scale,reasons being lack of awareness
and dearer costs of existing tools. In this research work a product configurator is developedfor
Hydraulic Actuator (HA).This method uses Applicable Programing Interface (API) of a CAD tool coupled
with Visual Basics (VB) and MS Excel.Itis a standaloneapplication of VB and its integration into web
portal can be the future scope. The final aim was to reduce time delay at CRM phase,bring more
transparency in the ordering system and to establish a method which, small and medium scale enterprises
canafford. Trails on the tool developed generated Part-Assembly drawings, BOM and JT files in
moments.
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...ijcax
A large no. of automobile companies finding a convinient way to manage design changes with the use of
various PLM techniques. Change in any product is something that should occur on timely basis to match
up with customer requirement and cost reduction. The change made in the vehicle designs directly affects
various concerned agencies. Automobile Vehicle structures contains thousands of parts and if there is any
change is occurring in child parts then it becomes important to track that impacted part, propose a solution
on that part and release a new assembly structure with feasible changes such that all efforts need to be
done for cost reduction.
Visually impaired people face many problems in their day to day lives. Among them, outdoor navigation is
one of the major concerns. The existing solutions based on Wireless Sensor Networks(WSN) and Global
Positioning System (GPS) track ZigBee units or RFID (Radio Frequency Identification) tags fixed on the
navigation system. The issues pertaining to these solutions are as follows: (1) It is suitable only when the
visually impaired person is commuting in a familiar environment; (2) The device provides only a one way
communication; (3) Most of these instruments are heavy and sometimes costly. Preferable solution would
be to make a system which is easy to carry and cheap.
The objective of this paper is to break down the technological barriers, and to propose a system by
developing an Android App which would help a visually impaired person while traveling via the public
transport system like Bus. The proposed system uses an inbuilt feature of smart phone such as GPS
location tracker to track the location of the user and Text to Speech converter. The system also integrates
Google Speech to Text converter for capturing the voice input and converts them to text. This system
recommends the requirement of installing a GPS module in buses for real time tracking. With minor
modification, this App can also help older people for independent navigation.
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION ijcax
Today’s era is an era of modernization and globalization. Everything is happening at a very fast rate
whether it is politics, societal reforms, commercialization, transportation, or educational innovations. In
every few second, technology grows either in the form of arrival of the new devices/gadgets with millions of
apps and these latest technological objects may be in the form of hardware/software devices. We are the
educationists, teachers, students and stakeholders of present Indian educational system. These
gadgets/devices are partly being used by us or most of them are still unaware of these innovative
technologies due to the mass media or economical factor. So, there is a need to improvise ourselves
towards utilizing the future gadgets in order to explore the educational uses, barriers and preparatoryneeds of these available devices for educational purposes. This paper aims to study the opinion of the
teacher-educators about the usage of future gadgets in higher education. It will also contribute towards
establishing the list of latest technological devices, and how it can enhances the process of teachinglearning system.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Generative AI Use cases applications solutions and implementation.pdf
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
1. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
1
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS
IN MOBILE AD HOC NETWORKS
Mohamed Elboukhari1
, Mostafa Azizi1
and Abdelmalek Azizi2,3
1
Department of Applied Engineering, ESTO, Oujda, Morocco
2
Departement Mathematics & Computer Science, FSO, Oujda, Morocco
3
Academy Hassan II of Sciences & Technology, Rabat, Morocco
ABSTRACT
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any
pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as
a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV,
OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational
conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This
performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay,
Normalized Routing Load and Average Throughput.
KEYWORDS
Mobile Ad Hoc Network (MANET), Performance Parameters, AODV, DSR, DSDV, OLSR, DYMO.
1. Introduction
Wireless networks are organized in two basic types that are infrastructure based wireless
networks and ad hoc based wireless networks. In the infrastructure based wireless network, nodes
are mobile, base stations are fixed. As a consequence of this, nodes can leave the range of the
base stations and comes in range of other base stations. In ad hoc based wireless networks, nodes
are kept mobile but the base stations are not kept fixed and the entire nodes operate as routers.
Researchers have done huge work to develop routing protocols in different kinds of ad hoc
networks like MANETs (Mobile Ad Hoc Networks), WSNs (Wireless Sensor Networks), WMNs
(Wireless Mesh Networks), and VANETS (Vehicular Ad-Hoc Networks) etc. [1]. The main
objective of MANETs is to elaborate routing functionality at each of the mobile node is. For
designing MANETs routing protocols aspect approach, the information-theoretic approach, game-
theoretic approach or dynamic control approach has been applied [2].
In mobile ad hoc networks, a mobile node can communicate with other mobile stations whether
they lie within the same radio transmission range or not. Therefore, four important functions are
to be implemented by the routing protocols: maintaining network connectivity, network topology,
packet routing, scheduling and channel assignment. Routing protocols are designed in MANETs
with some basic goals that are minimum control overhead, minimum processing overhead, multi-
hop routing, dynamic topology maintenance and loop prevention [3].
2. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
2
The remainder of the paper is organized as follows. After describing the related works in section
2, MANETs routing protocols are presented in section 3. Section 4 describes simulation
environment. The results of our simulations are analysed in section 5. Finally, section 6 concludes
the paper.
2. Related Works
Many works have been elaborated related to the performance comparison of different routing
protocols in MANET. We focus on those works performed by network simulator NS-2.
Table 1. Performance analysis of MANET routing protocols.
Ref.
no
Protocols used Performance metrics Variable Parameters
[4] AODV, DSR,
DSDV
End to End Delay, Packet Delivery
Ratio, Normalized routing load,
Throughput
Mobility
[5] AODV, DSR,
DSDV
End to End Delay, Packet Delivery
Ratio, Throughput
Number of nodes
[6] AODV, DSR,
DSDV
Packet Delivery Ratio, End to End
Delay, Normalized Routing Load
Pause time, Mobility
and Sending rate
[7] AODV, DSR,
DSDV
Average End to End Delay,
Normalized Routing Load, Packet
Delivery Ratio,
Number of Nodes,
Speed, Pause time,
Transmission Power
[8] DSDV,
AODV, DSR,
TORA
Throughput, Routing Overhead, Path
Optimality, Packet Loss, Average
delay
Traffic Load,
Movement patterns
[9] AODV, DSR,
DSDV
Packet Delivery Ratio, Average End to
End Delay, Routing Overhead
Pause time
[10] AODV, DSR,
DSDV
Packet Delivery Ratio, Average End to
End Delay, Normalized Routing Load
Pause time, Number of
nodes and mobility
[11] DSDV,
AODV, DSR,
TORA
Average Delay,Jitter, Routing Load,
Loss Ratio, Throughput and
Connectivity
Network size
[12] DSDV,
AODV
Packet Delivery Fraction, Average End
to End Delay, Throughput
Number on nodes,
Speed, Time
[13] AODV,
DSDV
Packet Delivery Ratio, Average End to
End Delay
Mobility of nodes
Table 1 illustrate that comparative performance evaluation for all the parameters namely Packet
Delivery Ratio, Throughput, Average End to End Delay, Jitter, Routing Load, and Routing
Frequency among the routing protocols have not been elaborate in a single paper.
In our article, we will compare five MANET protocols (AODV, DSR, DSDV, OLSR, and
DYMO). In our knowledge, there is no work in the literature until now which compares these five
protocols under varying pause time parameter.
3. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
3
3. Routing Protocls in MANET
The MANETs routing protocols are divided into three categories depending on their
functionality: Reactive (On-demand) routing protocols, Proactive (Table-driven) routing
protocols and Hybrid routing protocols [14].
Proactive Routing Protocols: The routing data in these routing protocols is stored in the
organization of tables managed by each mobile node. The tables must be updated due to
continuous change in the network topology. These protocols are employed where the route
requirements are frequent. FSR, STAR, GSR, DSDV, OLSR, CGSR and WRP are the examples.
Reactive Routing Protocols: These routing protocols discover routes to other mobile nodes only
when they are needed. A route discovery process is invoked when a node wants to exchange a
few messages with another node for which it does not possess a route table access. AODV, DSR,
LAR, TORA, CBRP and ARA are the examples.
Hybrid Routing Protocols: These protocols combine intrinsic worth of both the proactive and
reactive approaches. For illustration, proactive protocols could be employed between networks
and reactive protocols inside the networks. DST, ZRP, DDR, ZHLS are the examples.
Figure 1. Classification of MANET Routing Protocols
3.1. Ad-hoc On-Demand distance Vector routing protocol (AODV)
AODV [15, 16] is a reactive routing protocol which employs an on-demand approach for finding
routes, so a route is elaborated only when it is requisite by a source node for sending information
packets. AODV uses sequence numbers to make certain freshness of routes. It employs route
request (RREQ) messages flooded through the network to discover the paths needed by a source
node. AODV aids nodes to locate out routes very fast for new destinations, and does not require
nodes to manage routes to destinations that are not in dynamic communication. AODV helps
nodes to operate in response to link breakages and changes in network topology in a timely
manner and the operation of AODV is loop-free [17]. If a route to a new destination is demanded,
the source node broadcasts a RREQ message to find a route to the requisite destination. An
intermediate node that receives a RREQ replies to it employing route reply message only if it
possess a route to the destination whose analogous destination sequence number is greater or
equal to the one used in the RREQ. Another important point to mention is that the RREQ also
contains the most recent sequence number for the destination of which the source node is
responsive. When a node receives the RREQ it may send a route reply (RREP) if it is either the
destination node or if it possesses a route to the destination with equivalent sequence number
greater than or equal to that included in the RREQ message. In this last case, it unicast a RREP
reverse message to the source node. Otherwise, it rebroadcasts the RREQ message. Nodes store
track of the RREQ’s source IP address and broadcast ID.
4. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
4
3.2. Dynamic Source Routing (DSR)
Dynamic Source Routing (DSR) [18] is a routing protocol for wireless mesh networks and is
elaborated according to the technique known as “source routingˮ. DSR makes the network
completely self-organizing and self-configuring, devoid of the need for any pre-existing network
infrastructure.
The Dynamic Source Routing protocol possesses two main mechanisms route discovery and route
maintenance. In the route discovery process a source node wishing to drive a packet to a
destination node, as certain a source route to the destination. In route maintenance mechanism a
node wishing to transmit a packet to a destination is able to perceive, while using a source route
to the destination, if the network topology has altered such that it can no longer make use of its
route to destination because a link along the route no longer works. And in case when Route
Maintenance indicates a source route is broken, source can try to bring into play any other route,
it happens to know to destination, or it can invoke route discovery again to find a new route for
subsequent packets to destination.
3.3. Dynamic MANET On-Demand Routing Protocol (DYMO)
DYMO [19] manages a large variety of mobility patterns by dynamically discovering routes on-
demand. It also manages a wide selection of traffic patterns. The fundamental functionalities of
DYMO are route discovery and route maintenance.
During route discovery process, a DYMO router lunches a flooding of a Route Request message
(RREQ) throughout the MANET to come across a route to a particular destination node. During
the hop-by-hop flooding process, each intermediate DYMO router receiving the RREQ message
stores a route to the originator node. When the target’s DYMO router receives the RREQ
message, it stores a route to the originator and responds with a Route Reply (RREP), unicasting
hop-by-hop through originating DYMO router. Each intermediate DYMO router that receives the
RREP message creates a route to the target, and then the RREP is unicasted hop-by-hop on the
way to the originator. When the originator’s DYMO router receives the RREP message, routes
have been elaborated between the originating DYMO router and the target DYMO router in both
directions.
Route maintenance is composed of two operations. To conserve routes in use, DYMO routers
expand route lifetimes upon successfully forwarding a packet. To act in response to changes in
the network topology, DYMO routers keep an eye on traffic being forwarded. If a data packet is
received to be forwarded and a route for the destination is not known (or the destination route is
broken down), then the DYMO router of the source node of the data packet is notified. A Route
Error (RERR) is sent to point out the route to one or more affected destination addresses is broken
or misplaced. When the source’s DYMO router receives the RERR message, it marks the route as
broken. Before the DYMO router can forward a data packet to the same destination, it has to
lunch the route discovery mechanism again for that destination.
3.4. Destination Sequenced Distance Vector (DSDV) Protocol
DSDV [20] is one of the examples of proactive protocol. The protocol adds a new attribute,
sequence number, to each route table entry at each node. Each node maintains a routing table at
its own and which aids in packet transmission.
5. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
5
For the transmission of packets each node stores routing table. The routing contains the
information for the connectivity to different stations in the network. These stations give all the
available destinations and the number of stations (hops) required to reach each destination in the
routing table. The routing entry is tagged with a sequence number which is originated by the
destination node. Each station sends and updates its routing table periodically. The packets being
broadcasted between nodes indicate a list of accessible stations and number of nodes required to
reach that particular station. Routing information is broadcast periodically by broadcasting or
multicasting the packets. In DSDV protocol each mobile node in the network must constantly
advertise its routing table to each of its neighboring stations. As the information in the table may
change frequently, the advertisement should be done on the continuous basis so that every station
can locate its neighbors in the network. It ensures the shortest number of nodes (hops) required
from source station to a destination station.
The data broadcasted by each mobile node will include its new sequence number and the
following data for each new route: the number of hops required to reach the destination, the
destination address and the new sequence number (originally stamped by the destination).
3.5. Opitmized Link State Routing (OLSR) Protocol
OLSR [21] is an optimization of a pure link state protocol. Whenever there is any modification in
the topology then information is flooded to all nodes. This causes overheads and such overheads
are decreased by Multipoint relays (MPR). Two types of control messages are employed in
OLSR; they are topology control and hello messages. There is also Multiple Interface Declaration
(MID) messages which are employed for announcing other host that the announcing host can
possess multiple OLSR interface addresses [22]. The MID message is broadcasted throughout the
network only by MPRs. Also there is a “Host and Network Association” (HNA) message which
gives the external routing information by giving the possibility for routing to the external
addresses.
4. Simulation Environment
4.1. Mobility Model
A model that describes the movement of mobile nodes, and changes in their velocity and
acceleration over time is called Mobility model. Basic parameters related to node movement are
mobility speed, number of nodes, sending rate, pause time, number of connections, simulation
duration. Mobility models can be categorized in to two types group and entity models. the motion
of mobile nodes in entity models are independent from each other, while in group models the
movements of mobile nodes are dependent on each other [23].
In our article we chose the Random Waypoint Mobility, generated by the software BonnMotion
[24]. It is an entity model, in which a node can choose any random destination and any random
velocity. The node starts moving towards the selected destination node. After reaching the
destination node, the node stops for a small duration defined by the “Pause Time” parameter and
it repeats the complete process again until the simulation process ends.
4.2. Simulation Parameters
We elaborate the experiments for the evaluation of the performance of Ad Hoc routing protocol
AODV, DSR, DSDV, OLSR and DYMO with varying the Pause Time parameter. We have
elaborated 30 simulation run in total out of which 30 trace files has been derived for Random
Waypoint Mobility each. We tested all performance metrics in our experiment under varying
6. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
6
Pause Time of node (0 to 50sec) and while other parameters are constant. Table 1 presents the
simulation parameters used in this evaluation.
Table 2. Simulations parapmeters
4.3. NS-2 simulator
The network simulations have been performed using network simulator NS-2 [25]. The NS-2
simulator is discrete event simulation software used for network simulations. It simulates events
such as sending, receiving, dropping and forwarding packets. The ns-allinone-2.34 [25] supports
simulation for some MANET routing protocols as AODV, DSR and DSDV. The simulation of
protocols OLSR and DYMO are based on the work presented in [26]. NS-2 is implemented in
C++ programming language with Object Tool Common Language.
Although NS-2. 34 can be implemented on different platforms, for this article, we choose a Linux
platform i.e. Ubuntu LTS 12.04, as Linux offers a number of programming development tools as
[27] that can be used with the simulations process. To run a NS-2.34 simulation, the user must
write the OTCL simulation script. Also NS-2 provides a visual representation of the simulated
network by tracing nodes events and movements and writing them in a file named as Network
Animator or NAM file [25]. The performance parameters are graphically visualized in MATLAB
[28].
4.4. Performance Metrics
RFC2501 [29] illustrates a number of quantitative metrics that can be used for evaluating the
performance of MANET routing protocols. To analyze routing protocols (AODV, DSR, DSDV,
OLSR and DYMO), we have focused on four performance metrics for evaluation which are
Packet Delivery Fraction, Average End-to-End Delay, Normalized, Routing Load and Average
Throughput.
4.4.1. Packet Delivery Fraction
The Packet Delivery Fraction is defined as the ratio of number of received packets successfully at
the destinations nodes over the number of packets sent by the sources nodes. Packet Loss Fraction
is defined as 1- Packet Delivery Fraction.
Parameters Value
Simulator NS-2.34
Data packet size 512 byte
Simulation duration 50 sec
Environnement size 500m × 500m
Number of Nodes 20
Pause Time 0 to 50 sec
MAC Layer Protocol IEEE 802.11
Traffic Type CBR
Number of connections 15
Maximum Mobility 20 m/s
Mobility Model Random Waypoint
Protocols AODV, DSR, DSDV, OLSR, DYMO
7. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
7
4.4.2. Average End to End Delay
The Average End to end delay is the average time from the transmission of a data packet at a
source node until data packet delivery to a destination node which contains all possible delays
generated by queuing at the interface queue, buffering during route discovery process,
propagation and transfer times of data packets and retransmission delays.
4.4.3. Normalized Routing Load
The Normalized Routing Load is described as the ratio of all control packets sent by all source
nodes to number of received data packets at the destination nodes.
4.4.4. Average Throughput
The Average Throughput is the average number of packets successfully delivered per unit time. It
can be calculated as the number of bits delivered per second.
5. Simulation Results and Analysis
The results after simulation are viewed in five figures. The performance of MANETs routing
protocols based on the varying the Pause Time is elaborated on parameters like Packet Delivery
Fraction, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
5.1. Packet Delivery Fraction (PDF)
Figure 2 shows that the PDR of AODV and DSR is greater than other protocols DYMO, OLSR
and DSDV. At the height mobility (Pause Time is equal to 0), the protocol DSR has a better PDF
when compared to other protocol. The protocol DSDV exhibits the lowest PDF in all scenarios.
With the decreasing of mobility (increase of Pause Time), the protocols AODV, DSR and DYMO
have a better value of PDF than the protocols OLSR and DSDV. It seems that on-demand
protocols perform well than table-driven protocols. Because table-driven approach of managing
routing information, it is not as adequate to the route changes which occur during high mobility.
The lazy approach in contrast used by the on-demand protocols to maitain the routing information
as and when they are created make them more adequate and result in better performance (high
PDF).
8. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
8
Figure 2: Packet Delivery Fraction versus Pause Time
5.2. Average End to End Delay (E2E)
From Figure 3, it can be observed that OLSR exhibits the lowest average E2E except on one
scenario when Pause Time equal to 10s. In this scenario, the other protocol of table-driven
protocol DSDV has the lowest E2E. With height mobility (Pause Time equal to 0s) and low
mobility (Pause Time equal to 50s), OLSR and DSDV have the lowest average E2E. OLSR and
DSDV as table-driven protocols have routing tables and they do not need to discover the route for
the same destination.
Figure 3: Average End to End Delay versus Pause Time
5.3. Routing Load
From Figure 4, we remark that DSR demonstrates the lowest and OLSR shows highest
Normalized Routing Load. In on-demand protocols (AODV, DSR and DYMO), the routes are
9. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
9
maintained only between the nodes which want to communicate as well as a single route
discovery may yield many routes to the destination, therefore, the routing overhead is less. In
comparing the two table-driven protocols (DSDV and OLSR), OLSR has more Normalized
Routing Load than DSDV.
Figure 4: Normalized Routing Load versus Pause Time
5.4. Average Throughput
The Figure 5 shows that the DSDV gives the lowest Average Throughput. We note also that the
DSDV Throughput increases with the increasing of Pause Time. The three protocols AODV,
DSR and DYMO have better Average Throughput when compared to two protocols OLSR and
DSDV. It seems as on-demand protocols outperform table-driven protocols in almost all the
scenarios we have taken into account.
Figure 5: Average Throughput versus Pause Time
10. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
10
6. Conclusions
In this article different MANETs routing protocols such as AODV, DSR, DSDV, OLSR and
DYMO is evaluated. With the help of NS-2 simulation we compared these protocols under
different network conditions. We measure the Packet Delivery Ratio, Average End to End,
Routing Load, and Average Throughput as performance matrices.
In terms of Packet Delivery Packet, AODV and DSR are better than other protocols (DSDV,
OLSR and DYMO). OLSR shows the lowest Average End to End Delay (good performance)
compared to other protocols. DSR demonstrates the lowest Normalized Routing Load than other
protocols. AODV, DSR and DYMO outperform other protocols (OLSR, DSDV) in terms of
Average Throughput.
In our future work, we will focus on extending the set of the experiments by taking into
consideration other simulations parameters (propagation models, MAC protocols, etc). Our future
simulations will be implemented in NS-3[30]
Acknowledgements
The authors would like to thank EL MALLOUKI NASRINE for its support and help to
finish this work.
References
[1] Rahman A, Islam S, Talevski A. 2009. Performance measurement of various routing protocols in
ad-hoc network”. In: Proceedings of the international multiconference of engineers and computer
scientists, vol. 1. Hong Kong: IMECS.
[2] Tyagi SS, Chauhan RK. 2010. Performance analysis of proactive and reactive routing protocols
for ad hoc networks. Int J Comput Appl 2010;1(14).
[3] Basagni S, Conti M, Giordano S, Stojmenovic I. 2004. Mobile ad hoc networking. A John wiley
and sons, Inc., Publication.
[4] AkshaiAggarwal,SavitaGandhi,NirbhayChaubey. 2011. Performance Analysis of AODV, DSDV
and DSR in MANETs. IJDPS, Vol.2, No.6.
[5] P. Manickam T. Guru Baskar , M.Girija, Dr.D.Manimegala. 2011. Performance Comparisons of
Routing Protocols in Mobile Ad- Hoc Networks. International Journal of Wireless & Mobile
Networks (IJWMN), pp. 98-106.
[6] Sabina Barakovic, Suad Kasapovic, and Jasmina Barakovic. 2010. Comparison of MANET
Routing Protocols in Different Traffic and Mobility Models”, Telfor Journal, Vol. 2, No. 1.
[7] Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare. 2008. Simulation Based Comparative
Performance Analysis of Adhoc Routing Protocols. Proceedings of TENCON 2008.
[8] Chenna Reddy, P.; ChandraSekhar Reddy, P. 2006. Performance Analysis of Adhoc Network
Routing Protocols. ISAUHC '06, International Symposium on Ad Hoc andUbiquitous Computing,
vol., no., pp.186-187, 20-23 Dec.
[9] Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar. 2011. Comparative Study of Adhoc
Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork. Indian Journal of
Computer Science and Engineering Vol. 1 No. 4 364-371.
[10] Ginni Tonk, Indu Kashyap, S.S. Tyagi. 2012. Performance Comparison of Ad-Hoc Network
Routing Protocols using NS-2. International Journal of Innovative Technology and Exploring
Engineering (IJITEE)ISSN: 2278-3075,Volume- 1, Issue-1.
[11] Li Layuan, Li Chunlin, Yaun Peiyan. 2007. Performance evaluation and simulation of routing
protocols in ad hocnetworks. Computer Communications 30 (2007) 1890- 1898.
11. International Journal of Computer-Aided Technologies (IJCAx) Vol.2,No.2,April 2015
11
[12] Vijayalaskhmi M. Avinash Patel, Linganagouda Kulkarni.2011. QoS Parameter Analysis on
AODV and DSDV Protocols in a Wireless Network. International Journal of Communication
Network and Security, Volume-1, Issue-1.
[13] Deepak Kumar, Ashutosh Srivastava, S C Gupta. 2012. Performance Comparison of DSDV and
AODV Routing Protocols in MANETS. International Journal of Electronics Communication and
Computer Technology (IJECCT) Volume 2 Issue 3.
[14] Jun-Zhao Sun.2001. Mobile Ad Hoc Networking: An Essential Technology for Pervasive
Computing. Proceedings of International conference on info-tech and info-net, Vol-3, pp. 316-321.
[15] C.E. Perkins and E.M. Royer.1999. Ad-hoc On-Demand Distance Vector Routing”, Proceeding of
2nd IEEE Workshop. Mobile Computing System Applications, pp:90-100.
[16] Perkins, E. Belding-Royer, and S. Das. 2003. Ad hoc On-Demand Distance Vector (AODV)
Routing. “draft-ietf-manet-aodv-13.txt.
[17] S. A. Ade1& P.A.Tijare. 2010. Performance Comparison of AODV, DSDV, OLSR and DSR
Routing Protocols in Mobile Ad Hoc Networks. International Journal of Information Technology
and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548.
[18] J. Broch, D. Jhonson, and D. Maltz.2007. The dynamic source routing protocol for mobile adhoc
networks for IPv4” IETF RFC 4728.
[19] I. Chakeres and C. Perkins.2012. Dynamic MANET On-Demand (DYMO) Routing. IETF
Internet-Draft, draft-ietf-manet-dymo-23.
[20] Charles E. Perkins and Pravin Bhagwat. 1994. Highly dynamic destination-sequenced distance-
vector routing (DSDV) for mobile computers. Technical report, IBM Research and University of
Maryland, USA.
[21] T. Clausen and P. Jacquet.2003. Optimized link State Routing protocol (OLSR). RFC-3626, IETF
Networking Group.
[22] Aleksandr Huhtonen.2004. Comparing AODV and OLSR routing protocols. Helsinki University
of Technology, Telecommunication software and multimedia laboratory.
[23] Valentina Timcenko, Mirjana Stojanovic, Slavica Bostjancic Rakas . 2009 .MANET Routing
Protocols vs. Mobility Models: Performance Analysis and Comparison. Proceedings of the 9th
WSEAS International Conference on Applied Informatics and Communications (AIC '09).
[24] BonnMotion: A mobility scenario generation and analysis tool. 2014. Available at
http://sys.cs.uos.de/bonnmotion/
[25] NS -2, the ns Manual. 2014. Available at http: //www. isi.edu/nsnam/ns/doc.
[26] Francisco J. Ros. 2014. Software development available at
http://masimum.inf.um.es/fjrm/development/
[27] Robins A.D. 2010. “GAWK: an effective AWK programming”, 3rd ed.
[28] MATLAB: The language of Technical Computing. 2014.Available at http://www.mathworks.com/
[29] S.Corson and J.Macker. 1999. Routing Protocol Performance Issues and Evaluation
considerations. RFC2501, IETF Network Working Group.
[30] The NS-3 reference manual. 2014. Available at http://www.nsnam.org/
Authors
Mohamed elboukhari received the DESA (diploma of high study) degree in numerical analysis, computer
science and treatment of signal in 2005 from the University of Science, Oujda, Morocco. He is currently an
assistant professor, department of Applied Engineering, ESTO, university Mohamed First, Oujda, Morocco.
His research interests include cryptography, quantum cryptography and
wireless network security, Mobile Ad Hoc Networks (MANETS).
Mostafa azizi received the diploma of engineer in automatic and computer industry in 1993 from school
Mohammadia of engineers, Rabat, Morocco and he received the Ph. D in computer science in 2001 from
the university Montreal, Canada. He is currently professor at university of Mohamed first, Oujda, Morocco.
His main interests include aspect of real time, embedded system, security and communication and
management of the computer systems in relation with process industry.
Abdelmalek azizi received the Ph. D in theory of numbers in 1993 from university Laval, Canada. He is
professor at department of mathematics in university Mohamed First, Oujda, Morocco. He is interesting in
history of mathematics in Morocco and in the application of the theory of number in cryptography.