Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routing (AODV) and Optimized Link State Routing (OLSR) Protocol for Mobile Ad-hoc Networks in NS-2
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networksijasuc
Wireless Mobile Ad-Hoc Networks is one of the attractive research field that growing exponentially in the
last decade. it surrounded by much challenges that should be solved the improve establishment of such
networks. Failure of wireless link is considered as one of popular challenges faced by Mobile Ad-Hoc
Networks (MANETs). As this type of networks does not require any pre-exist hardware. As well as, every
node have the ability of roaming where it can be connected to other nodes dynamically. Therefore, the
network internal structure will be unpredictably changed frequently according to continuous activities
between nodes that simultaneously update network topology in the basis of active ad-hoc nature. This
model puts the functionality of routing operation in crucial angle in the area of research under mobile adhoc
network field due to highly dynamic nature. Adapting such kernel makes MANET indigence new
routing techniques to settle these challenges. Thereafter, tremendous amount of routing protocols proposed
to argue with ad-hoc nature. Thus, it is quite difficult to specify which protocols operate efficiently under
different mobile ad-hoc scenarios. This paper examines some of the prominent routing protocols that are
designed for mobile ad-hoc networks by describing their structures, operations, features and then
comparing their various characteristics.
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
A Mobile Ad-hoc Network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions and do not adapt well with high mobility conditions. Therefore, considering mobility is a demanding task that should be performed efficiently and accurately. Here, we proposed novel mobility-aware routing protocol based on the well known Ad-hoc On Demand Distance Vector (AODV) routing protocol called: MA-AODV (Mobility Aware Ad-hoc On Demand Distance Vector) in an attempt to improve the handling of high mobility factor in ad-hoc networks. MA-AODV protocols perform periodic quantification of nodes mobility for the sake of establishing more stable paths between source/destination pairs, hence, avoiding the frequent link breakages associated with using unstable paths that contain high mobile nodes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...IJEEE
Vehicular ad hoc networks (VANETs) are an extension to the mobile ad hoc networks (MANETs) that have been designed with the goal of providing vehicular safety, traffic monitoring, assisting vehicular driving by providing critical information, utility services viz. automatic road taxes, finding hospitals, fuel stations, restaurants etc. The primary characteristics of VANETs include high node mobility, no specific network infrastructure, irregular network environments and unpredictable network density. Choosing a routing protocol for the VANET environment is a critical step in devising data sharing scheme for the VANET. This paper studies the existing routing protocols for VANET and presents a precise review of merits and demerits of the same.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
A wireless ad-hoc network is a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network.. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Each of the nodes has a wireless interface and communicates with each other over either radio or infrared. Laptop computers and personal digital assistants that communicate directly with each other are some examples of nodes in an ad-hoc network [4]. Nodes in the adhoc network are often mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodes can be used to deploy relay points in areas where relay points might be needed temporarily. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared two routing protocols i.e. IAODV and OLSR. Our simulation tool will be Network stimulator 2. The performance of these routing protocols is analyzed by three metrics: End to End delay, Packet delivery fraction and throughput.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
This paper to study, analyse the performance of multicast technology using the MAODV (Multicast On-demand Distance Vector Routing Protocol) in the VANETs (Vehicle Ad-Hoc Networks), this protocol using widely in MANETs (Mobile Ad-Hoc Network). The wireless nodes in the wireless vehicle networks are the same wireless devices, which are integrated with a sensor and designed specifically for the design of safety, privacy and security applications. Researchers are interested in developing and enhancing the number of service quality parameters (packets received, delay, productivity, node power consumption, etc.). The aim of this paper is to introduce and optimize VANETS multi-cast transmission technology to reduce delay, increase throughput and reduce packet loss. Although, presents an analytical study of the Enhanced Protocol (MAODV) Protocol (AODV) and compares it to AODV performance in VANETs.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
rnational Journal of Computational Engineering Resaerch 2014, Volume 4 ~ Issue 11 (November 2014)
Abstract
The paper discusses the voltage control of a critical load bus using dynamic voltage restorer (DVR) in a distribution system. The critical load requires a balanced sinusoidal waveform across its terminals preferably at system nominal frequency of 50Hz .It is assumed that the frequency of the supply voltage can be varied and it is different from the system nominal frequency. The DVR is operated such that it holds the voltage across critical load bus terminals constant at system nominal frequency irrespective of the frequency of the source voltage. In case of a frequency mismatch, the total real power requirement of the critical load bus has to be supplied by the DVR. Proposed method used to compensate for frequency variation, the DC link of the DVR is supplied through an uncontrolled rectifier that provides a path for the real power required by the critical load to flow .A simple frequency estimation technique is discussed which are Discrete Fourier transform (DFT), ANN controller. The present work study the compensation principle and different control strategies of DVR used here are based on DFT, and ANN Controller .Through detailed analysis and simulation studies using MATLAB. It is shown that the voltage is completely controlled across the critical load.
A Review Report on Existing Routing Protocols in Vehicular Ad Hoc Networks (V...IJEEE
Vehicular ad hoc networks (VANETs) are an extension to the mobile ad hoc networks (MANETs) that have been designed with the goal of providing vehicular safety, traffic monitoring, assisting vehicular driving by providing critical information, utility services viz. automatic road taxes, finding hospitals, fuel stations, restaurants etc. The primary characteristics of VANETs include high node mobility, no specific network infrastructure, irregular network environments and unpredictable network density. Choosing a routing protocol for the VANET environment is a critical step in devising data sharing scheme for the VANET. This paper studies the existing routing protocols for VANET and presents a precise review of merits and demerits of the same.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
A wireless ad-hoc network is a collection of mobile/semi-mobile nodes with no pre-established infrastructure, forming a temporary network.. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Each of the nodes has a wireless interface and communicates with each other over either radio or infrared. Laptop computers and personal digital assistants that communicate directly with each other are some examples of nodes in an ad-hoc network [4]. Nodes in the adhoc network are often mobile, but can also consist of stationary nodes, such as access points to the Internet. Semi mobile nodes can be used to deploy relay points in areas where relay points might be needed temporarily. Routing is a critical issue in MANET and hence the focus of this thesis along with the performance analysis of routing protocols. We compared two routing protocols i.e. IAODV and OLSR. Our simulation tool will be Network stimulator 2. The performance of these routing protocols is analyzed by three metrics: End to End delay, Packet delivery fraction and throughput.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Evaluation The Performance of MAODV and AODV Protocols In VANETs ModelsCSCJournals
This paper to study, analyse the performance of multicast technology using the MAODV (Multicast On-demand Distance Vector Routing Protocol) in the VANETs (Vehicle Ad-Hoc Networks), this protocol using widely in MANETs (Mobile Ad-Hoc Network). The wireless nodes in the wireless vehicle networks are the same wireless devices, which are integrated with a sensor and designed specifically for the design of safety, privacy and security applications. Researchers are interested in developing and enhancing the number of service quality parameters (packets received, delay, productivity, node power consumption, etc.). The aim of this paper is to introduce and optimize VANETS multi-cast transmission technology to reduce delay, increase throughput and reduce packet loss. Although, presents an analytical study of the Enhanced Protocol (MAODV) Protocol (AODV) and compares it to AODV performance in VANETs.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Manet review characteristics, routing protocols, attacks and performance metricsIJARIIT
The term “mobile” is termed as moving and “ad hoc” is termed as a temporary network without any centralized
administration or permanent infrastructure. Because of the dynamic MANET topology, this review is mainly concentrated on
diverse routing techniques that are considered as the main challenges these days. A variety of strategies has been given for the
effective routing for providing the enhanced performance. Different routing protocols have been presented for MANET that
makes it’s hard to decide which protocol is appropriate for different network conditions. This paper gives an overview of MANET
with its applications and characteristics, its routing protocols, attacks and its performance parameters.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Similar to Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routing (AODV) and Optimized Link State Routing (OLSR) Protocol for Mobile Ad-hoc Networks in NS-2
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the
aid of any centralized administration or standard support services. MANET can be defined using unstable
network infrastructure, self-organizing network topology and independent node mobility. This becomes
obtainable due to their routing techniques; in other terms, routing is a backbone for MANET. However, due to
network load routing performance of MANET is degraded thus, some optimization on network routing strategy
is required.
In this paper, we introduce a new technique by using the concept of Genetic algorithm (GA) with
AODV Protocol to make routing decision in computer network.
The goal of this paper is to find the optimal path between the source and destination nodes and increased the
QoS and Throughput. We implemented and compare this a new technique with the traditional AODV, and we
shows that the new technique is better performance than the traditional AODV.
Survey of Reactive Routing Protocols for MANETIOSR Journals
Abstract : A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. The main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides a scalable solution to relatively large network topologies. The design follows the idea that each node tries to reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is needed. The performance differentials are analyzed using varying performance metrics. These simulations are carried out using the ns-2 network simulator. Keywords – AODV, DSR, MANET, NS-2, Reactive routing protocols, Survey.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
Abstract: A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration. Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment. In this paper we have compared the energy consumption of reactive, proactive & hybrid routing protocol AODV,DSR,RIP & ZRP by using different mobility model. We have analyzed the Network lifetime of protocols by varying pay load, mobility, pause time and type of traffic (CBR). A detailed simulation has been carried out in qualnet. The metrics used for performance analysis are energy consumed & battery consumption. It has been observed that RIP has better network lifetime than other.
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with
each other without using any existing infrastructure, access point or centralized administration. Mobile ad-hoc
network have the attributes such as wireless connection, continuously changing topology, distributed operation
and ease of deployment. In this paper we have compared the energy consumption of reactive, proactive &
hybrid routing protocol AODV,DSR,RIP & ZRP by using different mobility model. We have analyzed the
Network lifetime of protocols by varying pay load, mobility, pause time and type of traffic (CBR). A detailed
simulation has been carried out in qualnet. The metrics used for performance analysis are energy consumed &
battery consumption. It has been observed that RIP has better network lifetime than other
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Multipath Fault Tolerant Routing Protocol in MANET pijans
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically
exchange data among themselves without the reliance on a fixed base station or a wired backbone network
and it the makes the routing a crucial issue to the design of the MANET. Multiple path routing protocols
are shown to be performance-effective alternatives over single-path routing for ad hoc networks and it
represents a promising routing method for wireless mobile ad hoc networks. Multi-path routing achieves
load balancing and is more resilient to route failures..In this paper we propose an energy efficient
multipath fault tolerant routing protocol to improve the reliability of data routing in Mobile ad hoc
networks. The proposed RFTA is a multi objective routing protocol that meets diverse application
requirements by considering the changing conditions of the network. The efficiency of the proposed
protocol has been evaluated on different scenarios and there has been a noticeable improvement in the
packet delivery ratio and also in the reduction of end-to-end delay comparing to SMR,SMS and MDSR.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis work consist a systematic comparative evaluation of a new multipath routing protocol for MANETS. The new protocol, called Multipath Destination Sequenced Distance Vector (MDSDV) is based on the well known single path Destination Sequenced Distance Vector (DSDV) is compared with known protocol DSDV. This work containing evaluates the protocols on a range of MANETS with between 50, 75 and 100 nodes, which are static nodes. The protocol comparison metrics are Throughput and Residual Energy.
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
A Mobile Ad-Hoc Network (MANET) is a temporary, infrastructure-less and distributed network
having mobile nodes. MANET has limited resources like bandwidth and energy. Due to limited
battery power nodes die out early and affect the network lifetime. To make network energy
efficient, we have modified position based Location Aided Routing (LAR1) for energy
conservation in MANET. The proposed protocol is known as Variable Range Energy aware
Location Aided Routing (ELAR1-VAR). The proposed scheme controls the transmission power
of a node according to the distance between the nodes. It also includes energy information on
route request packet and selects the energy efficient path to route data packets. The comparative
analysis of proposed scheme and LAR1 is done by using the QualNet simulator. ELAR1-VAR
protocol improves the network lifetime by reducing energy consumption by 20% for dense and
mobile network while maintaining the packet delivery ratio above 90%.
Similar to Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routing (AODV) and Optimized Link State Routing (OLSR) Protocol for Mobile Ad-hoc Networks in NS-2 (20)
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routing (AODV) and Optimized Link State Routing (OLSR) Protocol for Mobile Ad-hoc Networks in NS-2
1. ISSN (e): 2250 – 3005 || Volume, 05 || Issue, 04 || April – 2015 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 47
Comparative Performance Evaluation of Ad-hoc on Demand
Distance Vector Routing (AODV) and Optimized Link State
Routing (OLSR) Protocol for Mobile Ad-hoc Networks in NS-2
Bhushan Ramesh Ratnaparakhi1
, Prof. Ranjana R. Gite2
,
Prof. Dattatray S. Babe3
1
Student of Dept. of Electronics and Telecommunications, Vidyalankar Institute of Technology Mumbai
2
Assistant Professor Dept. of Electronics and Telecommunications, Vidyalankar Institute of Technology
Mumbai
3
Assistant Professor Dept. of Electronics and Telecommunications , Vidyalankar Institute of Technology
Mumbai
I. INTRODUCTION
Now a day wireless mobile networks is very popular in the networking system. Mobile Ad hoc
Networks are new generation of networks offering unrestricted mobility without any underlying infrastructure
[1-2]. MANET is a collection of available communication devices or nodes that wish to communicate without
any fixed infrastructure or pre define organization of available links. This MANETs research program has
mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource
constrained network [2]. A mobile ad hoc network is a dynamically self-organizing network without any central
administrator or infrastructure support. The nodes in MANETs themselves are responsible for dynamically
discovering other nodes to communicate each other [2]. It is composed of mobile terminals that communicate
one to the other through broadcast radio transmission.
ABSTRACT
Some years before Mobile Ad hoc Networks are not so popular. After some period of time
wireless mobile network are very popular due to its unique features. Mobile Ad hoc Network is
the one of the branch in wireless networks is shortly known as (MANETs). MANET is a
collection of available communication devices or nodes that wish to communicate without any
fixed infrastructure or pre define organization of available links. This MANETs research
program has mainly focused on developing an efficient routing mechanism in such a highly
dynamic and resource constrained network [2]. All routing protocols have assumed to be a
trusted and safe for environment. This comparative performance evaluation project work is
related to various Mobile Ad hoc Networks (MANETs) routing protocols such as Ad-hoc on
Demand Distance Vector Routing (AODV), Dynamic Source Routing (DSR) and Optimized Link
State Routing (OLSR). On the bases of different routing protocols as mention earlier we can
stimulate using network simulator software which generate different graph as result. And then
see comparative analysis effects on routing protocol parameters for Mobile Ad-hoc Networks
(MANETs) on the bases of various simulation environments such as area, number of node,
testing field, traffic load etc. Following parameters are considered for comparative performance
evaluations are Routing Overhead, End-to-End Delay, Scalability and Throughput. This
comparative performance study mainly performed between Ad-hoc on Demand Distance Vector
Routing (AODV) and Optimized Link State Routing (OLSR). This above mentioned work shows
that which routing protocols is best among them and study the graphs obtain in Network
stimulating software (NS-2) for Mobile Ad-hoc Networks (MANETs) on the bases of comparative
performance evaluation parameters. AODV and OLSR comparison gives the result, which
routing protocol is superior among them using NS-2 and this work concludes as a result.
Keywords: Area, AODV, End-to-End Delay, MANETs, Number of Node, Network Simulator 2
(NS-2), OLSR, Routing overhead, Routing Protocols.
2. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 48
In MANETs node plays very important role. Without node communication could not happened. Now in Mobile
Ad hoc Networks are new generation of networks offering unrestricted mobility without fail of any underlying
infrastructure. In ad hoc wireless networks, communicating data is vulnerable to lots of potential attacks due to
their unique characteristics of having dynamic topology, limited bandwidth and energy constraints in the
protocols [2-5].
Wireless network is so sensitive network as compare to other networks. In ad hoc wireless networks,
communicating data is vulnerable to lots of potential attacks due to their characteristics of having dynamic
topology, limited bandwidth and energy constraints this are the limitations in this network[1-3]. These negative
features in the Ad hoc wireless networks provide the opportunity to the net researchers to do research work in
this field. In addition to that MANET can be constructed quickly at a low cost, as it does not rely on existing
network infrastructure these are some positive points. Due to this flexibility, a MANET is attractive for
applications such as military service, disaster relief, robot networks, emergency operations, casual meetings,
vehicle networks, campus networks, maritime communications, and so on.
Basically routing protocols are mainly classified in reactive and proactive routing protocol. Proactive
are Table-Driven routing protocol and reactive are On-Demand routing protocols. In proactive routing protocols,
each node has one or more tables that contain the latest information of the routes to any node in network. These
routing protocols maintain different number of table. Proactive networks are not suitable for large networks
because table driven approach for different nodes. Optimized Link State Routing (OLSR) protocol is the
example of table driven. In reactive routing protocols, such as the Ad hoc On Demand Distance Vector (AODV)
protocol nodes find routes only when required these protocol takes lazy approach to routing and they do not
maintain or constantly update their route table with the latest route topology. The route discovery usually occurs
by flooding the route request packets through the network and Ad hoc On Demand Distance Vector (AODV)
routing protocol is the one of the example.
II. WHAT IS WIRELESS NETWORK?
The wireless network is the new emerging technology which allow user to asses information and
service electronically in there geographical position. This type of infrastructure network made up of networks
with wired and fixed gateways. A mobile host communication with a bridge in network primarily called base
station available within communication radius. This area of infrastructure network radius defined in program.
This wireless network differentiated on the bases of infrastructure based network and infrastructure less (Ad
hoc) networks. In infrastructure based network consist with wired medium and having node base station fixed.
In the infrastructure less (Ad hoc) networks nodes are connected without wired and base station is not fixed in
this situation. In Ad hoc networks mobile unit that is node can move random geographically while it is
communicating. In this ad hoc network all nodes are mobile and can be connected dynamically in random
manner. This is bigger advantage of MANETs. When mobile unit goes out of range of one base station then it
connects automatically with new base station and start communicating and information exchange happened in
between two nodes this information in the form of data packets. The nodes in network function like routers
which found and maintain routes to other node. The node in mobile ad hoc network can be cell phone, laptop,
PDA and any device to capable of do communication. In short wireless network system is portable system with
self-organizing infrastructure.
Figure 1. Wireless Ad hoc networks.
3. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 49
2.1 Types of Routing Protocols in MANETs
Basically routing protocols mainly classified in two types such as reactive and proactive routing
protocols. In reactive routing protocol, the Ad hoc On Demand Distance Vector (AODV) protocol nodes find
routes only when required and Dynamic Source Routing (DSR) is also an on-demand protocol and features
similar route discovery as AODV. A source route is appended to all packets and intermediate nodes, and it uses
this source route to forward data. In proactive routing protocols, each node has one or more tables that contain
the latest information of the routes to any node in network. These routing protocols maintain different number of
table. Proactive networks are not suitable for large networks because table driven approach for different nodes
and Optimized Link State Routing (OLSR) protocol is the example of table driven.
The routing protocols of MANETs can be classified in two main types. Reactive and Proactive are the main
types. Figure 2 shows diagrammatical classification of MANETs along with some relative examples routing
protocols.
Figure 2. Classification of MANETs Routing protocols [4].
3. Information about Ad hoc On Demand Distance Vector (AODV) routing protocol and Optimized Link
State Routing (OLSR) protocol.
3.1 Ad Hoc on Demand Distance Vector Routing (AODV)
AODV is the on demand routing is gives the better performance for the more number of nodes. Path or links are
created on demand bases. Reactive routing protocols not maintain the table for path discovery. Ad hoc mobile
wireless network is the one of the branch in wireless networks of mobile nodes. Basically routing protocols
mainly classified in two types such as reactive and proactive routing protocols. In reactive routing protocol, the
Ad hoc On Demand Distance Vector (AODV) protocol nodes find routes only when required and features
similar route discovery as AODV and DSR, TORA are some examples. A source route is appended to all
packets and intermediate nodes, and it uses this source route to forward data. It is the most important routing
protocol in mobile wireless networks. The Ad Hoc On-Demand Distance Vector routing protocol (AODV) is an
improvement of the Destination-Sequenced Distance Vector routing protocol (DSDV) [5]. This is the main
important functioning of Ad Hoc On-Demand Distance Vector routing protocol (AODV) in MANETs.
Ad Hoc on Demand Distance Vector routing protocol (AODV) mainly come under the reactive protocols.
Reactive protocols discover routes only when needed. When node wants to communicate with another node then
it checks its existing information with destination route node. If this checking is positive then communication
established between source and destination node and further data exchange is going to be happened. RREQ
request from source to destination show in diagram given in Figure 3 which forms discovers the path towards
destination. After sending RREQ packet request to destination then destination node send back the RREP packet
request send back to source this shown in Figure 4. These RREP packets decide the shortest routing path
between sources to destination. Figure 5 shows the whole scenario happened while RREQ and RREP packet
request move in network.
Figure 3. A RREQ Source to Destination path generation
4. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 50
Figure 4. A RREP Packet send back to Source.
Advantages:
On demand type give the supporting for large no of network.
Need lower delay for connection setup.
Table is not created for the path discovery in the network.
It creates the routes on-demand basis.
Shortest path can be found in ad hoc network.
Destination sequence numbers are used to find the latest route to the destination.
AODV tries to minimize the number of required broadcasts.
Disadvantages:
Periodic route formation creates unnecessary bandwidth consumption.
Does not follow the unidirectional links.
Figure 5. RREQ and RREP packet request.
3.2 Optimized Link State Routing (OLSR) protocol
Optimized Link State Routing Protocol popularly known as (OLSR) is come under proactive routing
protocol, so routes in network are always immediately available when needed. OLSR is an optimized version of
a pure link state protocol. Due to this proactive nature finding shortest path is very easy. So the topological
changes cause the flooding of the topological information to all available hosts in the network. OLSR uses two
kinds of control messages: Hello and Topology Control (TC). TC message are used for broadcasting
information about own advertised neighbors which include at least the MPR selector list. Hello message are
used for finding the information about the link status and the host neighbors. The proactive characteristic of the
protocol provides that the protocol has all the routing information to all participated hosts in the network. To
reduce the possible overhead in the network protocol uses Multipoint Relay (MPR). The idea of MPR is to
reduce flooding of broadcast by reducing the same broadcast in some region in network [8]. The drawback of
OLSR protocol requires each host periodically to send the updated topology information throughout the entire
network. This increases the protocols bandwidth usage.
Figure 6. OLSR path discovery route S1 source to S7 destination
5. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 51
Advantages:
This is useful for the large network due to its table proactive approach.
Throughput is high.
End-to-End delay is less.
Disadvantages:
OLSR protocol requires each host periodically to send the updated topology information throughout the
entire network.
Scalability is high.
Increase the protocols bandwidth usage.
IV. PROJECT SCENARIO IN NS-2
Our project work is done in the network simulating environment. For the simulation of the developed system
latest version 2.35 of NS-2 has been used in this project work. This setup is done on the windows operating
system, for doing this primarily we have to install Oracle VM virtual box on windows 7 computer. Then Oracle
VM virtual box give the platform of LINUX operating system to run Ubuntu 12.04 (32 bit) in this virtual system
to do actual simulation of project operation NS-2 network simulating software. Some project scenario is given
below.
4.1 Scenario
Antenna model used is Omni Antenna.
Radio propagation model used is Two-Ray Ground.
Nodes are moving at constant random speed.
Nodes are being generated randomly at random position.
Topology of 1000*1000 is taken for simulation.
Nodes are generated at random time as if few nodes are entering into the topology.
Movement is linear and node speed is constant for a simulation.
4.2 Node characteristics
Nodes in the network are random moving they are mobile in nature.
Channel type: wireless
MAC type: 802_11
Link Layer Type: Logical Link ( LL) type
Network Interface type: wireless
Queue type: Drop-Tail
4.3 Matrix
The following different performance matrices are evaluated the behavior of AODV, OLSR routing protocols
which came under wireless network of mobile ad hoc networks (MANETs). For this work below mentioned
parameters taken into consideration.
[1] Throughput.
[2] End-to-End Delay.
[3] Scalability.
[4] Routing Overhead.
Table 1. Simulation Parameters for NS-2
PARAMETERS VALUES
Simulator NS-2 (version- 2.35)
Routing protocols AODV and OLSR
Number of mobile node 60
6. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 52
Channel type Channel/ wireless channel
Network interface type Phy/ wireless phy
Mac type Mac/ 802_11
Antenna Antenna/ Omni antenna
Maximum pack in ifq 50
Area (M*M) 1000*1000
Source type UDP/ TCP
Mac 802_11 RTS Threshold 3000
Link layer type LL
Simulation time 80 sec.
4.4 Actual project environment
The Network simulator is a name for series of discrete event network simulators, specifically ns-1, ns-
2 and ns-3. All of them are discrete-event network simulator.it is tool in which wireless networks simulation can
be done due genuine limitations to high cost of implementation, area limitations, etc. In 1996-97, ns version 2
(ns-2) was initiated based on a refactoring by Steve McCanne. Use of Tcl was replaced by MIT's Object Tcl
(OTcl), an object-oriented dialect Tcl [2]. The core of ns-2 is also written in C++, but the C++ simulation
objects are linked to shadow objects in OTcl and variables can be linked between both language realms.
Simulation scripts are written in the OTcl language, an extension of the Tcl scripting language [2-4].
At presently, ns-2 consists of over 300,000 lines of source code, and there is probably a comparable amount of
contributed code that is not integrated directly into the main distribution (many forks of ns-2 exist, both
maintained and unmaintained). It runs on GNU/Linux, FreeBSD, Solaris, Mac OS X and Windows versions that
support Cygwin. It is licensed for use under version 2 of the GNU General Public License [6-7]. This is the
basic information related to NS-2.
There are some general processes of creating a simulation in ns-2 as per several steps. These steps are as
follows:
Topology definition: to ease the creation of basic facilities and define their interrelationships, ns-2 has a
system of containers and helpers that facilitates this process.
Model development: models are added to simulation (for example, UDP, IPv4, point to-point devices
and links, applications); most of the time this is done using helpers.
Node and link configuration: models set their default values (for example, the size of packets sent by an
application or MTU of a point-to-point link); most of the time this is done using the attribute system.
Execution: simulation facilities generate events, data requested by the user is logged.
Performance analysis: after the simulation is finished and data is available as a time stamped event
trace. This data can then be statistically analysed with tools like R to draw conclusions.
Graphical Visualization: raw or processed data collected in a simulation can be graphed using tools
like Gnuplot, matplotlib or XGRAPH [5].
4.5 Information to Nam file
NAM is a Tcl/TK based animation tool for viewing network simulation traces and real world packet
traces. A network animator that provides packet-level animation and protocol-specific graphs to aid the design
and debugging of new network protocols have been described. Taking data from network simulators (such as ns)
or live networks, NAM was one of the first tools to provide general purpose, packet-level, and network
animation, before starting to use NAM, a trace file needs to create [7]. This trace file is usually generated by NS.
Once the trace file is generated, NAM can be used to animate it. A snapshot of the simulation topology in NAM
for 60 mobile nodes is shown in figure 7. Which is visualized the traces of communication or packets
movements between mobile nodes.
7. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 53
Figure 7. Nam window snapshot for random mobile nodes.
V. INFORMATION TO SIMULATION MODEL
The objective of this project is to performance evaluation of two routing protocols for mobile ad hoc
networks by using an open source network simulation tool called NS-2. Two routing protocols: AODV and
OLSR have been considered for performance evaluation in this project work. The simulation environment has
been conducted with the LINUX operating system, because NS-2 works with Linux platform only. This gives
the diagrammatical flow related to project.
Figure 8. Simulation overview [5]
Whole simulation study is divided into two part one is create the node that may be cell phone, internet or any
other devices i.e. NS-2 output. It’s called NAM (Network Animator) file, which shows the nodes movement and
communication occurs between various nodes in various conditions or to allow the users to visually appreciate
the movement as well as the interactions of the mobile nodes and another one is graphical analysis of trace file
(.tr).
Figure 8 Simulation overview depicts the overall process of how a network simulation is conducted under NS-2.
Output files such as trace files have to be parsed to extract useful information. The parsing can be done using the
awk command (in UNIX and LINUX, it is necessary to use gwak for the windows environment) or Perl script.
Trace files contain the traces of event that can be further processed to understand the performance of the
network. The results have been analyzed using Excel or Matlab. A software program which can shorten the
process of parsing trace files (Xgraph and TraceGraph) has also been used in this project. However, it doesn’t
work well when the trace file is too large. To generate trace file and nam file, we call tcl script in CYGWIN
command shell. By varying the simulation parameter shown in table 1, we can see the graphical variation
between various performance metrics like Routing Overhead, End-to-End Delay, Throughput and Scalability.
5.1 Actual project NAM windows in project
Following various Nam windows are taken on actual run time of project with some time interval to
show the working of nodes on that time period. Nam window shows original view of run time project on screen
with node activity. This Nam window is user define, space is created accordingly in object program file. In this
project proj.tcl is program file. These images are gives the actual feel of simulation happened that time.
8. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 54
Below table give some indications related to color and diagrams available in simulation window.
Table 2. Indicative parameter for simulating nam window in NS-2
Sr.no Parameters Indication to images
1 Number in circle Node
2 Node in green circle Source node
3 Node in red circle Destination node
4 Black Square Packet loss
5 Black dotted lines Packet transmission between nodes
This figure 9 shows the initial image of NAM window at time of 0 sec.
Figure 9. Initial time nam window at (o sec.) time
This figure 10 shows the image of NAM window at time 11 sec.
Figure 10. Nam window with (11 sec.) time
This figure 11 image shows at time of 31 sec interval.
Figure 11. Nam window at (31 sec.) time
9. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 55
Figure 12 at interval of 80 sec. is the last window. This following NAM window which show all packet data
transmission and packet losses in the actual scenario.
Figure 12. Nam window at (80 sec.) time
IV. RESULT IN GRAPHICAL MANNER
That’s below graphs are plotted by collecting actual output data obtained in run time simulation. This output
data can be converted in various graphs for observation purpose by using Microsoft excel Tool in windows.
[1] Throughput- Throughput is the number of packets that is passing through the channel in a particular
time period. As per the observation when graph shows the high reading at the particular time period.
That shows the higher is the throughput better is the particular Routing Protocol. Unit of this
throughput is Kbps.
Throughput = Total received Bytes / Elapsed Time
Figure 13. Throughput Vs. Time (Sec.)
[2] End-to-End Delay- In which specific packet is transmitting from source node to destination node and
calculating the difference between send time and received time is called End-to-End Delay. In this case
if value in graph shows less value this is the better Routing Protocol among them. Many factors like
route discovery, queening propagation and transfer time gives the performance of delay.
End-to-End Delay = (Received time – Send time) / Data packets received
Figure 14. End-to-End delay Vs Time
10. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 56
[3] Scalability- Scalability is called as the ability of network to handle the node in network. It is just
handling the node in given network system. Higher the value of in scalability that protocol is superior
among the two.
Scalability = Ability to handle the node
Figure 15. Scalability Vs Time
[4] Routing Overhead- Routing Overhead is one of the performance parameter which gives the analytical
study of protocols by using such parameters we can able to tell which on is good. If value of the graph
is high that shows the better performance of routing protocol. Basically Routing Protocol is the
performance parameter to find the best shortest routing path in between two consecutive nodes.
Routing Overhead = find shortest path between the two consecutive node.
Figure 16. Routing Overhead Vs Time (Sec.)
VII. CONCLUSION
Finally we can make conclusion of this project on the observation, graph obtained in actual run time
simulation. Comparative performance evaluation work organized between AODV and OLSR routing protocols
in Network Simulator (NS-2) specifically in network simulator 2.35 versions. According to the throughput
definition Figure 13 shows OLSR routing protocol is good as compared to AODV. Based on End-to-End delay
concept Figure 14 give the clear indication that AODV has lesser value reading as compare to OLSR therefore
AODV is having good End-to-End delay. Observing scalability concept in Figure 15 OLSR has capability to
handle more number of nodes as compere to AODV protocol in this situation OLSR is the best. Figure 16 shows
the output graph of Routing Overhead as graph of higher value give the better routing protocol, according to this
concept AODV is the best among them. By observing all resultant graphs of AODV is good for some
parameters and OLSR less effective. Project in Network Simulator conclude that AODV routing protocol is best
as compare to OLSR routing protocol in this evaluation work.
VIII. ACKNOWLWDGEMENTS
We have to do special thanks to department of Electronics and Telecommunication Engineering,
Vidyalankar Institute of Technology, Mumbai University, India. This work is accomplished and is successfully
brought into existence due to the guidance and thorough attention of my guide Prof. Dattatray S. Bade sir. and
my co-guide Prof. Ranjana R. Gite (Assistant professor in Department of Electronics and Telecommunication,
Vidyalankar Institute of Technology) for giving me her valuable time and co-operation. I would like to give a
special thanks to my both guides to giving me a best opportunity to do a project work in area like Mobile Ad-
hoc Networking and provided me all related stuff which I needed to do my project. Kindly thanks to all staff
members of Electronics and Telecommunication Department, my classmates for giving me there time and
support for various problems and college authorities and related stuff of Vidyalankar Institute of Technology.
11. Comparative Performance Evaluation…
www.ijceronline.com Open Access Journal Page 57
REFERENCES
[1] S. A. Ade & P. A. Tijare, “Performance Comparison of AOVD, DSSV, OLSR and DSR Routing Protocols in Mobile Ad Hoc
networks”, IJITKM, vol 2, no. 2, July 2010.
[2] Zeyad M Alfawaer, Saleem Al zoubi, “A proposed security subsystem for Ad hoc Wireless Networks”, International forum on
Computer Science Technology and Application, June 2009.
[3] Yih-Chun Hu, David B. Johnson and Adrian Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad
hoc Networks", In Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), June 2002, pp. 3-13,
June 2002.
[4] Mr. V. Anji Reddy, Ms. M. Mercy Monica, Mr. S. Bhargav, ”Performance Evaluation for Routing Protocols in Mobile Ad hoc
Networks by using Networks Simulator” vol. 2, issue 4, April 2013.
[5] S.k. Gupta and R.k. saket, “Performance matric comparison of AODV AND DSDR routing protocols in MANETs using NS2”,
proceeding in volume 7, issue 3, IJRRAS, June 2011.
[6] Panagiotis, Papadimitratos and Zygmunt J. Haas, "Secure Routing for Mobile Ad hoc Networks", In Proc. SCS Communication
Networks and Distributed Systems Modeling and Simulation Conference(CNDS2002), San Antonio, TX, January 27-3 1, 2002.
[7] Yih-Chun Hu, Adrian Perrig and David B. Johnson, "Ariadne: A Secure on Demand Routing Protocol for Ad-hoc Networks", in
Proceedings of the 8th annual international conference on Mobile computing and networking (MobiCom) '02, September 23-26,
2002, Atlanta, Georgia, USA.
[8] S. Gowrishankar, T. G. Basavaraju, M. Sing, Subir Kumar Sarkar, “Scenario based Performance Analysis of AODV and OLSR
in Mobile Ad hoc Networks”, 24th
South East Asia regional computer conference, Nov 2007, Bangkok, Thailand.
[9] S. Ci et al., “Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks,” IEEE Trans. Vehic. Tech., vol. 55, no.
4, July 2006, pp. 1302–10.
[10] B. Wu et al, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security,
Springer, vol. 17, 2006.
[11] Nor Surayati Mohamad Usop, Azizol Abdullah,“Performance Evaluation of AODV, DSDV & DSR Routing protocol in Grid
Environment”, ILCSNS International Journal of Computer Science and Network Security. 9. NO. 7, July 2009.
[12] P. Yi et al., “A New Routing Attack in Mobile Ad Hoc Networks,” Int’l. J. Info. Tech., vol. 11, no. 2, 2005.
[13] L. Buttyan and J.P Hubaux, “Stimulating cooperation in self-organizing mobile ad hoc networks”, ACM/Kluwer Mobile
Networks and Applications, vol. 8, no. 5, pp. 579 – 592, Oct 2003.