SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1746
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc
Environment
Deepak Gupta1
S. S. Dhakad2
Umesh Barahdiya3
Manoj Jakheniya4
Bharat Raj Pandey5
1, 5
Research Student 2, 3, 4
Assistant Professor
1, 2, 3, 4, 5
NITM, Gwalior
Abstract—In Wireless Adhoc Network is a group of
wireless mobile nodes is an autonomous system of mobile
nodes connected by wireless links. Every node operates as
an end system and as a router to forward packets. In this
paper mainly focused on Mac layer because this layer is
most important for the data communication using control the
packet loss and we worked on the comparison based
performance of wimax802.16 and wireless802.11 networks
using Ad hoc on- demand Distance Vector Routing Protocol
and Dynamic Source Routing Protocol. In this paper we
used the different maximum speed for the network. And this
comparison based on unicast On-demand routing procedure
and our simulation for mobile ad hoc networks discover and
maintain only needed the design and follows the idea that
each node by sending routing packets whenever a
communication is requested and compared various
parameter packet delivery ratio, normalized routing load and
e-e delay. These simulations are carried out using the
Network simulator version-2. The results presented in this
work illustrate the importance in carefully evaluating and
implementing routing protocols in an ad hoc environment.
Key words: AODV, DSR, 802.11, 802.16, Adhoc
Environment, NS-2.31.
I. INTRODUCTION
Wireless communication between mobile users is becoming
more popular than ever before. This is due to recent
technological advances in laptop computers and wireless
data communication devices, like wireless LANs. This leads
to lower prices and higher data rates; these are two main
reasons why mobile computing continues to enjoy rapid
growth.
There are two distinct approaches for enabling
wireless communication between two hosts. First approach
is the existing cellular network infrastructures carry data as
carried as voice. The major problems include the problem of
handoff that tries to control the situation when a connection
should be smoothly handed over from one base station to
another base station without packet loss or noticeable delay.
Another problem is that networks based on the cellular
infrastructure are limited to places where there exists such a
cellular network infrastructure.
The second approach is to form an Ad hoc network
among all users wanting to communicate with each other.
This means that all users participating in the Ad hoc
network must be willing to forward data packets to make
sure that the packets are delivered from source to
destination. This form of networking is limited in range by
the individual nodes transmission ranges and is typically
smaller compared to the range of cellular systems [1, 4].
Ad-hoc networking is a concept in computer
communications, which means that user’s wants to
communicate with each other form a temporary based
network, without any form of centralized administration.
Each node participating in the network can acts both as host
and a router with willingness to forward packets for other
nodes. For this purpose, a routing protocol is needed [6]. In
this work Demand Distance Vector Routing have in used. A
simulation model feature based on MAC and physical layer
models is used to study interlayer interactions, their
performance and implications. The performance
differentials are analyzed using varying, mobility, network
size and network load [2]. These simulations are carried out
using the network simulator version 2, which is used to run
Ad hoc simulations. The results presented in this work
illustrate the importance in carefully evaluating and
implementing routing protocols when evaluating an Ad hoc
network protocol.
Wireless communication between mobile users is
becoming more popular than ever before. This is due to
recent technological advances in laptop computers and
wireless data communication devices, like wireless LANs
and wireless modems. This has led to higher data rates and
lower prices, which are the two main reasons why mobile
computing continues to enjoy rapid growth.
Unconstrained connectivity Ad hoc networks do
not rely on any pre established infrastructure and can
therefore be deployed in places with no infrastructure. This
is useful in disaster recovery situations and places with non-
existing or damaged communication infrastructure where
rapid deployment of a communication network is needed
[8]. Ad hoc networks can also be useful on conferences
where people participating in the conference can form a
temporary network without engaging the services of any pre
existing network. The WiMAX Forum is an industry body
formed to promote the IEEE 802.16 standard and perform
interoperability testing. The WiMAX Forum has adopted
certain profiles based on the 802.16 standards for
interoperability testing and “WiMAX certification” [2].
These operate in different frequency bands, which are
typically licensed by various government bodies. WiMAX,
is basically based on an RF technology called Orthogonal
Frequency Division Multiplexing (OFDM), which is a very
effective means of transferring data when carriers of width
of 5MHz or greater. Below 5MHz carrier width, current
CDMA based 3G systems are comparable to OFDM in
terms of performance.
WiMAX is a standard-based wireless technology
that provides high throughput broadband connections over
long distance. WiMAX could be used for a number of
applications, including “last mile” hotspots, broadband
connections and high-speed connectivity for commercial
purpose. It provides wireless metropolitan area network
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment
(IJSRD/Vol. 1/Issue 9/2013/0013)
All rights reserved by www.ijsrd.com 1747
(MAN) connectivity at speeds up to 70 Mbps and the
WiMAX base station on the average can cover between 5 to
10 km [1].
II. AODV
The Ad hoc On Demand Distance Vector (AODV) routing
protocol builds on the DSDV algorithm previously
described. AODV is an improvement on DSDV because it
typically minimizes the number of required broadcasts by
creating routes on a demand basis, opposed to maintain a
complete list of routes as in the DSDV algorithm [3].
AODV classified as a pure on-demand route acquisition
system, cause nodes that aren’t on a selected path do not
maintain routing information or participate in routing table
exchanges.
When a source node desires to send a message to
some destination node and does not already have a valid
route to that destination, it initiates a path discovery process
to locate the other node [9]. It broadcasts a route request
(RREQ) packet to its neighbors, which then forward the
request to neighbors, and so on, until either the destination
or an intermediate node with a fresh enough routes to the
destination is located. AODV used destination sequence
numbers to ensure all routes are loop free and contain the
most recent route information detail. Each node maintains
sequence number and broadcast ID. The broadcast ID is
incremented for the every RREQ the node initiates, and
together with node’s IP address, identifies an RREQ. Along
with its own sequence number and the broadcast ID, source
node includes the RREQ the most recent sequence number it
has for destination. Intermediate nodes reply to the RREQ
only if they have a route to the destination whose
corresponding destination sequence number is greater than
or equal to that contained in the RREQ [5, 7].
During the process of forwarding the RREQ,
intermediate nodes record in their route tables the address of
the neighbor from which the first copy of the broadcast
packet is received, i.e. establishing a reverse path. If
additional copies of the same RREQ are later received, these
packets are discarded [1, 4].
Once the RREQ reaches the destination or an
intermediate node with a fresh enough route, destination
intermediate node responds by unicasting a route reply
(RREP) packet back to the neighbor from which it first
received the RREQ. As the RREP is routed back along the
reverse path, nodes along with this path, set up forward
route entries in their route tables which point to the node
from which the RREP came. These forward route entries
indicate the active forward route [3]. With each route entry
is a route timer that will cause the deletion of the entry if it
is not used within the defined lifetime. Because RREP is
forwarded along the path established by the RREQ, AODV
only supports the use of symmetric links. If a source node
changes the position, it is able to reinitiate the route
discovery protocol to find a new route to the destination. If a
node along with the route moves, its upstream neighbor
notices the move and propagates a link failure message (an
RREP with infinite metric) to each of its active upstream
neighbors to inform them of the erasure of that part of the
route. These nodes propagate the link failure notification
message to their upstream neighbors, and continue the
process until the source node is reached. The source node
then choose to reinitiate route discovery for that destination
if a route is still desired [1, 2, 5]
An additional aspect of the protocol is the use of
hello messages, periodically broadcasts by a node to inform
each mobile node of other nodes in its neighborhood. Hello
messages can be used to maintain the local connectivity of a
node. Sometimes the use of hello messages is not required.
Nodes listen for retransmission of data packets to ensure that
the next hop is still within reach. If such a retransmission is
not heard, the node may be used available of another
technique, including the hello messages, to find out whether
the next hop is within communication range. The hello
messages may list the other nodes from which a mobile has
heard, thereby yielding greater knowledge of network
connectivity [4, 8].
III. DSR
DSR is a reactive routing protocol that is determines the
proper route only when packet needs to be forwarded. For
restricting the bandwidth, process to find a path is only
executed when a path is required by a node (On-Demand
Routing). In DSR the sender (source, initiator) determines
the whole path from the source to the destination node
(Source-Routing) and deposits the addresses of the
intermediate nodes of the route in the packets. DSR is
beacon-less which means that there are no hello-messages
used between the nodes to notify their neighbors about their
presence. DSR was developed for mobile Ad-hoc networks
with a small diameter between 5 and 10 hops and the nodes
should only move around at a moderate speed. DSR is based
on Link-State Algorithms which mean that each node is
capable to save the best way to a destination. Also when a
change appears in network topology, then the whole
network will get this information by flooding. DSR protocol
is composed the two main mechanisms that work together to
allow discovery and maintenance of source routes in
MANET [8, 9].
IV. SIMULATION
The simulations were performed using Network Simulator 2
(NS-2.31). Constant bit rate (CBR) traffic was used in
simulation. Simulation was done by varying Max speed
from 20, 25, 30, 35 and 40. The pause time was kept
constant at 1.0sec in a simulation and area of 400mX700m.
During the simulation, each node started its journey from a
random spot to a random chosen destination. Once the
destination was reached, the node took a rest period of time
in second and another random destination is chosen after
that pause time. This process was repeated throughout
simulation, due to continuous changes in the topology of the
underlying network. The following table gives the
simulation parameters used during the simulation [2].
V. SIMULATION PARAMETERS
Parameter Values
Routing protocol AODV,DSR
Simulator NS-2.31
MAC Protocol 802.11 & 802.16
No. of Mobile Nodes 60
Simulation Time 100 Seconds
Packet Size 512 byte
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment
(IJSRD/Vol. 1/Issue 9/2013/0013)
All rights reserved by www.ijsrd.com 1748
Traffic Sources CBR
Transmit Power 250 w
Network Area 400m X 700m
Maximum Connection 30
Max Speed 20m/s
Transmission Rate 2.0m/s
Table. 1: Parameters and their results
VI. PERFORMANCE METRICS
The main objective of this paper is comparing the
performance of MAC 802.11(wireless) and MAC 802.16
(WiMAX) using on demand routing strategy following
metrics.
A. Packet Delivery Fraction
The ratio of the data packets delivered to the destinations to
those generated by the CBR sources is known as packet
delivery fraction [3].
B. Routing overhead
It gives the total number of routing packets transmitted
during the simulation. It is the ratio of routing packets to the
total no. of packets generated by the source [3].
C. End-to-End Delay
Network delay is the total latency experienced by a packet
to traverse the network from the source to the destination. At
the network layer, the end-to-end packet latency is the sum
of propagation delay, processing delay, queuing delay and
packet, transmission delay. The end-to-end delay of a path is
the sum of the node delay at each node plus the link delay at
each link on the path [5].
D. Packet loss (%)
Packet loss is the failure of one or more transmitted packets
to arrive at their destination [5].
Fig. 1: Graph of PDR using On Demand Uncast Reactive
Routing Protocol
Fig. 2: Graph of PDR using On DSR Protocol
Fig 2-shows that the packet delivery ratio for MAC layer
control 802.11 and 802.16 using on DSR. The value of PDF
have better for 802.11.
Fig. 3: Network Load for MAC layer control 802.11 and
802.16 using AODV
Fig. 4: NRL for MAC layer control 802.11 and 802.16 using
DSR.
20 25 30 35 40
802.16 65.19 58.32 75.26 62.2 55.73
802.11 97.38 97.12 97.5 98.11 94.41
0
20
40
60
80
100
120
PDF
Maximum speed
PDF with varying maximum speed
802.16 802.11
20 25 30 35 40
802.16 68.29 61.81 62.02 51.59 38.98
802.11 98.68 98.18 98.36 98.57 98.03
0
20
40
60
80
100
120
PDF
Maximum speed
PDF with varying maximum speed
802.16 802.11
20 25 30 35 40
802.16 0.95 1.08 0.83 1.03 1.21
802.11 2.86 2.75 2.78 2.65 4.09
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
NRL
Maximum speed
NRL with varying maximum speed
802.16 802.11
20 25 30 35 40
802.16 0.34 0.43 0.25 0.57 0.59
802.11 1.1 0.89 0.99 1.17 1.49
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
NRL
Maximum speed
NRL with varying maximum speed
802.16 802.11
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment
(IJSRD/Vol. 1/Issue 9/2013/0013)
All rights reserved by www.ijsrd.com 1749
Fig. 5: E-E delay for MAC layer control 802.11 and 802.16
using AODV
Fig. 6: E-E delay for MAC layer control 802.11 and 802.16
using DSR
VII. CONCLUSION
In this paper we performed the simulation to compare the
performance of MAC 802.11 and MAC 802.16 using on-
demand AODV and DSR routing protocols on different
performance parameters i.e. packet delivery ratio, network
load and end to end delay with varying maximum speed.
The results show that the performance of wireless is better
than WiMAX for small area. The overall performance
802.11 AODV is better than 802.11DSR.
REFERENCES
[1] Charles Perkins, Elizabeth Royer “Ad hoc on demand
distance vector (AODV) routing,” WMCSA 2nd
IEEE
Workshop, ISBN: 0-7695-0025-0, pp. 90–100, 1999.
[2] Suresh Kumar, R K Rathy, DiwakarPandey, “Traffic
Pattern Based Performance Comparison of Two
Reactive Routing Protocols for Ad Hoc Networks
Using NS2,” ICCSIT 2nd IEEE International
Conference, pp. 369-373, 2009.
[3] Ms. Shilpa Jindal, Ms. Alka Jindal, Dr. (Mrs.) Neena
Gupta, “Grouping WI-MAX, 3G and Wi-Fi for
Wireless Broadband,” Internet First IEEE and IFIP
International Conference, 2005.
[4] Lioyi, Kai Miao, A. Liu, “A comparative study of
WiMAX and LTE as the next generation mobile
enterprise network,” ICACT 13th International
Conference, ISBN: 978-1-4244-8830-8, pp. 654-658,
2011.
[5] Naveen Bilandi, Harsh K Verma, “Comparative
Analysis of Reactive, Proactive and Hybrid Routing
Protocols in MANET,” IJECSE, Vol-1 Issue-3, ISSN:
2277-1956, pp. 1660-1667, 2009.
[6] RambirJoon, Sandeep and Manveen Singh Chadha,
“Analysis of WIMAX Handover,” IJSCE, Vol-2 Issue-
3, ISSN: 2231-2307, 2012.
[7] Telvis E. Calhoun Jr, Xiaojun Cao, Yingshu Li and
Raheem Beyah, “An 802.11 MAC layer covert
channel,” Wireless. Commun. And Mob. Computing,
Vol-12 Issue-5, pp. 393-405, 2012.
[8] Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma,
“Performance Analysis of MANET Routing Protocols
in different Mobility Models,” IJITCS, Vol-5 No-6, pp.
73-82, 2013.
[9] Harris Simaremare, RiriFitri Sari, “Performance
Evaluation of AODV variants on DDOS, Blackhole and
Malicious Attacks,” IJCSNS, Vol-11 No-6, pp. 277-
287, 2011.
20 25 30 35 40
802.16 0.11 0.09 0.09 0.11 0.11
802.11 58.2 117.54 54.67 106.46 180.93
0
20
40
60
80
100
120
140
160
180
200
E-EDelay
Maximum speed
E-E Delay with varying maximum speed
802.16 802.11
20 25 30 35 40
802.16 0.25 0.28 0.26 0.31 0.38
802.11 34.95 37.58 103.03 48.59 108.78
0
20
40
60
80
100
120
E-EDelay
Maximum speed
E-E Delay with varying maximum speed
802.16 802.11

More Related Content

What's hot

Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
ijwmn
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
IJCSIT Journal
 
E010322531
E010322531E010322531
E010322531
IOSR Journals
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
IJERA Editor
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
IOSRJECE
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
ijceronline
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
IJCNCJournal
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
ijsrd.com
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorialtritv
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
ijsrd.com
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
IJCNCJournal
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
IRJET Journal
 

What's hot (19)

Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
A02100108
A02100108A02100108
A02100108
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
E010322531
E010322531E010322531
E010322531
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorial
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 

Similar to Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment

A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
pijans
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
ijwmn
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
IJERA Editor
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
IJERA Editor
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
paperpublications3
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
ijsrd.com
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IOSR Journals
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
International Journal of Technical Research & Application
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
IJERA Editor
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
IJERA Editor
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
International Journal of Engineering Inventions www.ijeijournal.com
 
E1073644
E1073644E1073644
E1073644
IJERD Editor
 

Similar to Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment (20)

A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
 
J011137479
J011137479J011137479
J011137479
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
H01115155
H01115155H01115155
H01115155
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
E1073644
E1073644E1073644
E1073644
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 

Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1746 Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment Deepak Gupta1 S. S. Dhakad2 Umesh Barahdiya3 Manoj Jakheniya4 Bharat Raj Pandey5 1, 5 Research Student 2, 3, 4 Assistant Professor 1, 2, 3, 4, 5 NITM, Gwalior Abstract—In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment. Key words: AODV, DSR, 802.11, 802.16, Adhoc Environment, NS-2.31. I. INTRODUCTION Wireless communication between mobile users is becoming more popular than ever before. This is due to recent technological advances in laptop computers and wireless data communication devices, like wireless LANs. This leads to lower prices and higher data rates; these are two main reasons why mobile computing continues to enjoy rapid growth. There are two distinct approaches for enabling wireless communication between two hosts. First approach is the existing cellular network infrastructures carry data as carried as voice. The major problems include the problem of handoff that tries to control the situation when a connection should be smoothly handed over from one base station to another base station without packet loss or noticeable delay. Another problem is that networks based on the cellular infrastructure are limited to places where there exists such a cellular network infrastructure. The second approach is to form an Ad hoc network among all users wanting to communicate with each other. This means that all users participating in the Ad hoc network must be willing to forward data packets to make sure that the packets are delivered from source to destination. This form of networking is limited in range by the individual nodes transmission ranges and is typically smaller compared to the range of cellular systems [1, 4]. Ad-hoc networking is a concept in computer communications, which means that user’s wants to communicate with each other form a temporary based network, without any form of centralized administration. Each node participating in the network can acts both as host and a router with willingness to forward packets for other nodes. For this purpose, a routing protocol is needed [6]. In this work Demand Distance Vector Routing have in used. A simulation model feature based on MAC and physical layer models is used to study interlayer interactions, their performance and implications. The performance differentials are analyzed using varying, mobility, network size and network load [2]. These simulations are carried out using the network simulator version 2, which is used to run Ad hoc simulations. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols when evaluating an Ad hoc network protocol. Wireless communication between mobile users is becoming more popular than ever before. This is due to recent technological advances in laptop computers and wireless data communication devices, like wireless LANs and wireless modems. This has led to higher data rates and lower prices, which are the two main reasons why mobile computing continues to enjoy rapid growth. Unconstrained connectivity Ad hoc networks do not rely on any pre established infrastructure and can therefore be deployed in places with no infrastructure. This is useful in disaster recovery situations and places with non- existing or damaged communication infrastructure where rapid deployment of a communication network is needed [8]. Ad hoc networks can also be useful on conferences where people participating in the conference can form a temporary network without engaging the services of any pre existing network. The WiMAX Forum is an industry body formed to promote the IEEE 802.16 standard and perform interoperability testing. The WiMAX Forum has adopted certain profiles based on the 802.16 standards for interoperability testing and “WiMAX certification” [2]. These operate in different frequency bands, which are typically licensed by various government bodies. WiMAX, is basically based on an RF technology called Orthogonal Frequency Division Multiplexing (OFDM), which is a very effective means of transferring data when carriers of width of 5MHz or greater. Below 5MHz carrier width, current CDMA based 3G systems are comparable to OFDM in terms of performance. WiMAX is a standard-based wireless technology that provides high throughput broadband connections over long distance. WiMAX could be used for a number of applications, including “last mile” hotspots, broadband connections and high-speed connectivity for commercial purpose. It provides wireless metropolitan area network
  • 2. Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment (IJSRD/Vol. 1/Issue 9/2013/0013) All rights reserved by www.ijsrd.com 1747 (MAN) connectivity at speeds up to 70 Mbps and the WiMAX base station on the average can cover between 5 to 10 km [1]. II. AODV The Ad hoc On Demand Distance Vector (AODV) routing protocol builds on the DSDV algorithm previously described. AODV is an improvement on DSDV because it typically minimizes the number of required broadcasts by creating routes on a demand basis, opposed to maintain a complete list of routes as in the DSDV algorithm [3]. AODV classified as a pure on-demand route acquisition system, cause nodes that aren’t on a selected path do not maintain routing information or participate in routing table exchanges. When a source node desires to send a message to some destination node and does not already have a valid route to that destination, it initiates a path discovery process to locate the other node [9]. It broadcasts a route request (RREQ) packet to its neighbors, which then forward the request to neighbors, and so on, until either the destination or an intermediate node with a fresh enough routes to the destination is located. AODV used destination sequence numbers to ensure all routes are loop free and contain the most recent route information detail. Each node maintains sequence number and broadcast ID. The broadcast ID is incremented for the every RREQ the node initiates, and together with node’s IP address, identifies an RREQ. Along with its own sequence number and the broadcast ID, source node includes the RREQ the most recent sequence number it has for destination. Intermediate nodes reply to the RREQ only if they have a route to the destination whose corresponding destination sequence number is greater than or equal to that contained in the RREQ [5, 7]. During the process of forwarding the RREQ, intermediate nodes record in their route tables the address of the neighbor from which the first copy of the broadcast packet is received, i.e. establishing a reverse path. If additional copies of the same RREQ are later received, these packets are discarded [1, 4]. Once the RREQ reaches the destination or an intermediate node with a fresh enough route, destination intermediate node responds by unicasting a route reply (RREP) packet back to the neighbor from which it first received the RREQ. As the RREP is routed back along the reverse path, nodes along with this path, set up forward route entries in their route tables which point to the node from which the RREP came. These forward route entries indicate the active forward route [3]. With each route entry is a route timer that will cause the deletion of the entry if it is not used within the defined lifetime. Because RREP is forwarded along the path established by the RREQ, AODV only supports the use of symmetric links. If a source node changes the position, it is able to reinitiate the route discovery protocol to find a new route to the destination. If a node along with the route moves, its upstream neighbor notices the move and propagates a link failure message (an RREP with infinite metric) to each of its active upstream neighbors to inform them of the erasure of that part of the route. These nodes propagate the link failure notification message to their upstream neighbors, and continue the process until the source node is reached. The source node then choose to reinitiate route discovery for that destination if a route is still desired [1, 2, 5] An additional aspect of the protocol is the use of hello messages, periodically broadcasts by a node to inform each mobile node of other nodes in its neighborhood. Hello messages can be used to maintain the local connectivity of a node. Sometimes the use of hello messages is not required. Nodes listen for retransmission of data packets to ensure that the next hop is still within reach. If such a retransmission is not heard, the node may be used available of another technique, including the hello messages, to find out whether the next hop is within communication range. The hello messages may list the other nodes from which a mobile has heard, thereby yielding greater knowledge of network connectivity [4, 8]. III. DSR DSR is a reactive routing protocol that is determines the proper route only when packet needs to be forwarded. For restricting the bandwidth, process to find a path is only executed when a path is required by a node (On-Demand Routing). In DSR the sender (source, initiator) determines the whole path from the source to the destination node (Source-Routing) and deposits the addresses of the intermediate nodes of the route in the packets. DSR is beacon-less which means that there are no hello-messages used between the nodes to notify their neighbors about their presence. DSR was developed for mobile Ad-hoc networks with a small diameter between 5 and 10 hops and the nodes should only move around at a moderate speed. DSR is based on Link-State Algorithms which mean that each node is capable to save the best way to a destination. Also when a change appears in network topology, then the whole network will get this information by flooding. DSR protocol is composed the two main mechanisms that work together to allow discovery and maintenance of source routes in MANET [8, 9]. IV. SIMULATION The simulations were performed using Network Simulator 2 (NS-2.31). Constant bit rate (CBR) traffic was used in simulation. Simulation was done by varying Max speed from 20, 25, 30, 35 and 40. The pause time was kept constant at 1.0sec in a simulation and area of 400mX700m. During the simulation, each node started its journey from a random spot to a random chosen destination. Once the destination was reached, the node took a rest period of time in second and another random destination is chosen after that pause time. This process was repeated throughout simulation, due to continuous changes in the topology of the underlying network. The following table gives the simulation parameters used during the simulation [2]. V. SIMULATION PARAMETERS Parameter Values Routing protocol AODV,DSR Simulator NS-2.31 MAC Protocol 802.11 & 802.16 No. of Mobile Nodes 60 Simulation Time 100 Seconds Packet Size 512 byte
  • 3. Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment (IJSRD/Vol. 1/Issue 9/2013/0013) All rights reserved by www.ijsrd.com 1748 Traffic Sources CBR Transmit Power 250 w Network Area 400m X 700m Maximum Connection 30 Max Speed 20m/s Transmission Rate 2.0m/s Table. 1: Parameters and their results VI. PERFORMANCE METRICS The main objective of this paper is comparing the performance of MAC 802.11(wireless) and MAC 802.16 (WiMAX) using on demand routing strategy following metrics. A. Packet Delivery Fraction The ratio of the data packets delivered to the destinations to those generated by the CBR sources is known as packet delivery fraction [3]. B. Routing overhead It gives the total number of routing packets transmitted during the simulation. It is the ratio of routing packets to the total no. of packets generated by the source [3]. C. End-to-End Delay Network delay is the total latency experienced by a packet to traverse the network from the source to the destination. At the network layer, the end-to-end packet latency is the sum of propagation delay, processing delay, queuing delay and packet, transmission delay. The end-to-end delay of a path is the sum of the node delay at each node plus the link delay at each link on the path [5]. D. Packet loss (%) Packet loss is the failure of one or more transmitted packets to arrive at their destination [5]. Fig. 1: Graph of PDR using On Demand Uncast Reactive Routing Protocol Fig. 2: Graph of PDR using On DSR Protocol Fig 2-shows that the packet delivery ratio for MAC layer control 802.11 and 802.16 using on DSR. The value of PDF have better for 802.11. Fig. 3: Network Load for MAC layer control 802.11 and 802.16 using AODV Fig. 4: NRL for MAC layer control 802.11 and 802.16 using DSR. 20 25 30 35 40 802.16 65.19 58.32 75.26 62.2 55.73 802.11 97.38 97.12 97.5 98.11 94.41 0 20 40 60 80 100 120 PDF Maximum speed PDF with varying maximum speed 802.16 802.11 20 25 30 35 40 802.16 68.29 61.81 62.02 51.59 38.98 802.11 98.68 98.18 98.36 98.57 98.03 0 20 40 60 80 100 120 PDF Maximum speed PDF with varying maximum speed 802.16 802.11 20 25 30 35 40 802.16 0.95 1.08 0.83 1.03 1.21 802.11 2.86 2.75 2.78 2.65 4.09 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 NRL Maximum speed NRL with varying maximum speed 802.16 802.11 20 25 30 35 40 802.16 0.34 0.43 0.25 0.57 0.59 802.11 1.1 0.89 0.99 1.17 1.49 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 NRL Maximum speed NRL with varying maximum speed 802.16 802.11
  • 4. Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc environment (IJSRD/Vol. 1/Issue 9/2013/0013) All rights reserved by www.ijsrd.com 1749 Fig. 5: E-E delay for MAC layer control 802.11 and 802.16 using AODV Fig. 6: E-E delay for MAC layer control 802.11 and 802.16 using DSR VII. CONCLUSION In this paper we performed the simulation to compare the performance of MAC 802.11 and MAC 802.16 using on- demand AODV and DSR routing protocols on different performance parameters i.e. packet delivery ratio, network load and end to end delay with varying maximum speed. The results show that the performance of wireless is better than WiMAX for small area. The overall performance 802.11 AODV is better than 802.11DSR. REFERENCES [1] Charles Perkins, Elizabeth Royer “Ad hoc on demand distance vector (AODV) routing,” WMCSA 2nd IEEE Workshop, ISBN: 0-7695-0025-0, pp. 90–100, 1999. [2] Suresh Kumar, R K Rathy, DiwakarPandey, “Traffic Pattern Based Performance Comparison of Two Reactive Routing Protocols for Ad Hoc Networks Using NS2,” ICCSIT 2nd IEEE International Conference, pp. 369-373, 2009. [3] Ms. Shilpa Jindal, Ms. Alka Jindal, Dr. (Mrs.) Neena Gupta, “Grouping WI-MAX, 3G and Wi-Fi for Wireless Broadband,” Internet First IEEE and IFIP International Conference, 2005. [4] Lioyi, Kai Miao, A. Liu, “A comparative study of WiMAX and LTE as the next generation mobile enterprise network,” ICACT 13th International Conference, ISBN: 978-1-4244-8830-8, pp. 654-658, 2011. [5] Naveen Bilandi, Harsh K Verma, “Comparative Analysis of Reactive, Proactive and Hybrid Routing Protocols in MANET,” IJECSE, Vol-1 Issue-3, ISSN: 2277-1956, pp. 1660-1667, 2009. [6] RambirJoon, Sandeep and Manveen Singh Chadha, “Analysis of WIMAX Handover,” IJSCE, Vol-2 Issue- 3, ISSN: 2231-2307, 2012. [7] Telvis E. Calhoun Jr, Xiaojun Cao, Yingshu Li and Raheem Beyah, “An 802.11 MAC layer covert channel,” Wireless. Commun. And Mob. Computing, Vol-12 Issue-5, pp. 393-405, 2012. [8] Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma, “Performance Analysis of MANET Routing Protocols in different Mobility Models,” IJITCS, Vol-5 No-6, pp. 73-82, 2013. [9] Harris Simaremare, RiriFitri Sari, “Performance Evaluation of AODV variants on DDOS, Blackhole and Malicious Attacks,” IJCSNS, Vol-11 No-6, pp. 277- 287, 2011. 20 25 30 35 40 802.16 0.11 0.09 0.09 0.11 0.11 802.11 58.2 117.54 54.67 106.46 180.93 0 20 40 60 80 100 120 140 160 180 200 E-EDelay Maximum speed E-E Delay with varying maximum speed 802.16 802.11 20 25 30 35 40 802.16 0.25 0.28 0.26 0.31 0.38 802.11 34.95 37.58 103.03 48.59 108.78 0 20 40 60 80 100 120 E-EDelay Maximum speed E-E Delay with varying maximum speed 802.16 802.11