Mobile Ad-hoc network (MANET) is type of wireless network in which group of mobile nodes co-operate to forward the data packets to their neighbours without using centralized authority or any physical medium like cables or base station.
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
Abstract Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops, wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load. Keywords: MANET, Peak Value, Protocol, Trajectory.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
Abstract Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops, wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load. Keywords: MANET, Peak Value, Protocol, Trajectory.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
WiMAX (IEEE 802.16) technology empowers ubiquitous delivery of wireless broadband facility for fixed and mobile users. WiMAX standard describes numerous physical and MAC layer characteristics. Here, an attempt is made to implement some of these physical and MAC layer structures including the mobility extension 802.16e. NS2 (Network Simulator-2) is chosen as the simulator to implement these features as NS2 provides suitable library to simulate network scenario. The performance of the simulated module is analyzed by running AODV, DSDV and AOMDV routing protocols on a wired-cum-wireless WiMAX scenario. The throughput for each routing protocol is calculated for varying number of mobile nodes or subscriber stations.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
WiMAX (IEEE 802.16) technology empowers ubiquitous delivery of wireless broadband facility for fixed and mobile users. WiMAX standard describes numerous physical and MAC layer characteristics. Here, an attempt is made to implement some of these physical and MAC layer structures including the mobility extension 802.16e. NS2 (Network Simulator-2) is chosen as the simulator to implement these features as NS2 provides suitable library to simulate network scenario. The performance of the simulated module is analyzed by running AODV, DSDV and AOMDV routing protocols on a wired-cum-wireless WiMAX scenario. The throughput for each routing protocol is calculated for varying number of mobile nodes or subscriber stations.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
An ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple “hops” may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. This paper presents performance comparison of the three routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and pause time. Simulation revealed that although DSDV perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
MANETS are working in distributed environment and dynamically changing the network topology. MANET protocols can be table driven or on demand as per requirement. DSDV (Destination Sequenced Distance Vector) and OLSR (Optimized Link State Routing protocol) both are table driven (proactive) protocol. Performances of both proactive protocols are evaluated using NS-2 simulator under various metrics and no. of mobile nodes is 10 in the network.
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
A Mobile Ad hoc NETwork (MANET), is a self-configuring infra structure less network of mobile devices
connected by wireless links. ad hoc is Latin and means "for this purpose". Each device in a MANET is free
to move independently in any direction, and will therefore change its links to other devices frequently. Each
must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building
a MANET is equipping each device to continuously maintain the information required to properly route
traffic. QOS is defined as a set of service requirements to be met by the network while transporting a
packet stream from source to destination. Intrinsic to the notion of QOS is an agreement or a guarantee by
the network to provide a set of measurable pre-specified service attributes to the user in terms of delay,
jitter, available bandwidth, packet loss, and so on. The analysis is mainly between proactive or table-driven
protocols like OLSR (Optimized Link State Routing) viz DSDV (Destination Sequenced Distance Vector) &
CGSR (Cluster Head Gateway Switch Routing) and reactive or source initiated routing protocols viz
AODV (Ad hoc on Demand distance Vector) & DSR (Dynamic Source Routing). The QoS analysis of the
above said protocols is simulated on NS2 and results are shown thereby.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2IJERA Editor
Mobile ad hoc network (MANETS) consists of wireless nodes communicating without any centralized administration .thus each node acts as a host and a router. There are many routing protocols designed for MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed specifically for use in multi-hop wireless mobile nodes. This paper describes the design the implementation of DSR protocol in NS-2 simulator environment. We also analyze the performance of the DSR for various performance matrixes such as average end to- end delay, throughput and packet delivery ratio. The analysis was made for different number of nodes using the NS-2 simulator.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any
pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as
a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV,
OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational
conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This
performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay,
Normalized Routing Load and Average Throughput.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
An ad hoc network is a network created by wireless hosts that can be mobile. This means that no infrastructure such as a central station, router, roaming, or anything else used by other networks to help network structure or anything else that other networks use to help Network structure, is not used. Rather, they are just a few wireless nodes connecting to non neighboring nodes with the help of the neighboring nodes. Wireless ad hoc mobile network (MANET) and Wireless ad hoc inter-car network (VANET), are among wireless networks which have the most effective parameters in the ability of this type of networksto transfer multimedia from source to destination. In this research, we examine the challenges and solutions presented in DODV, DSR, and DSDV protocols.
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
An ad hoc network is a network created by wireless hosts that can be mobile. This means that no
infrastructure such as a central station, router, roaming, or anything else used by other networks to help
network structure or anything else that other networks use to help Network structure, is not used. Rather,
they are just a few wireless nodes connecting to non-neighboring nodes with the help of the neighboring
nodes. Wireless ad hoc mobile network (MANET) and Wireless ad hoc inter-car network (VANET), are
among wireless networks which have the most effective parameters in the ability of this type of networksto
transfer multimedia from source to destination. In this research, we examine the challenges and solutions
presented in DODV, DSR, and DSDV protocols
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric.
Similar to Performance Observation of Proactive and Reactive Routing Protocols with Increasing the Connections (20)
IJACT–International Journal of engineering science, computer science is indexed by major Indexing sites which are DOAJ, Index Copernicus,Google Scholar. For more: http://ijact.in
Compusoft publishes journals which fulfills the requirement of all professionals , students, researchers by publishing quality journals of computer science, engineering journals, network and information security issues.
The subject of this study is to show the application of fuzzy logic in image processing with a brief introduction to fuzzy logic and digital image processing.
This research paper addresses the issue of secure data sharing for distributed data storage in Wireless Sensor Networks (WSNs). In WSNs, storing data at local sensor nodes or at designated in-network nodes greatly saves the network-wide communi¬cation load and has a lot of benefits such as energy-efficiency.
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...Computer Science Journals
With the increased number of web databases, major part of deep web is one of the bases of database. In several search engines, encoded data in the returned resultant pages from the web often comes from structured databases which are referred as Web databases (WDB).
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.Sérgio Sacani
The return of a sample of near-surface atmosphere from Mars would facilitate answers to several first-order science questions surrounding the formation and evolution of the planet. One of the important aspects of terrestrial planet formation in general is the role that primary atmospheres played in influencing the chemistry and structure of the planets and their antecedents. Studies of the martian atmosphere can be used to investigate the role of a primary atmosphere in its history. Atmosphere samples would also inform our understanding of the near-surface chemistry of the planet, and ultimately the prospects for life. High-precision isotopic analyses of constituent gases are needed to address these questions, requiring that the analyses are made on returned samples rather than in situ.
The increased availability of biomedical data, particularly in the public domain, offers the opportunity to better understand human health and to develop effective therapeutics for a wide range of unmet medical needs. However, data scientists remain stymied by the fact that data remain hard to find and to productively reuse because data and their metadata i) are wholly inaccessible, ii) are in non-standard or incompatible representations, iii) do not conform to community standards, and iv) have unclear or highly restricted terms and conditions that preclude legitimate reuse. These limitations require a rethink on data can be made machine and AI-ready - the key motivation behind the FAIR Guiding Principles. Concurrently, while recent efforts have explored the use of deep learning to fuse disparate data into predictive models for a wide range of biomedical applications, these models often fail even when the correct answer is already known, and fail to explain individual predictions in terms that data scientists can appreciate. These limitations suggest that new methods to produce practical artificial intelligence are still needed.
In this talk, I will discuss our work in (1) building an integrative knowledge infrastructure to prepare FAIR and "AI-ready" data and services along with (2) neurosymbolic AI methods to improve the quality of predictions and to generate plausible explanations. Attention is given to standards, platforms, and methods to wrangle knowledge into simple, but effective semantic and latent representations, and to make these available into standards-compliant and discoverable interfaces that can be used in model building, validation, and explanation. Our work, and those of others in the field, creates a baseline for building trustworthy and easy to deploy AI models in biomedicine.
Bio
Dr. Michel Dumontier is the Distinguished Professor of Data Science at Maastricht University, founder and executive director of the Institute of Data Science, and co-founder of the FAIR (Findable, Accessible, Interoperable and Reusable) data principles. His research explores socio-technological approaches for responsible discovery science, which includes collaborative multi-modal knowledge graphs, privacy-preserving distributed data mining, and AI methods for drug discovery and personalized medicine. His work is supported through the Dutch National Research Agenda, the Netherlands Organisation for Scientific Research, Horizon Europe, the European Open Science Cloud, the US National Institutes of Health, and a Marie-Curie Innovative Training Network. He is the editor-in-chief for the journal Data Science and is internationally recognized for his contributions in bioinformatics, biomedical informatics, and semantic technologies including ontologies and linked data.
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
Richard's entangled aventures in wonderlandRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Cancer cell metabolism: special Reference to Lactate PathwayAADYARAJPANDEY1
Normal Cell Metabolism:
Cellular respiration describes the series of steps that cells use to break down sugar and other chemicals to get the energy we need to function.
Energy is stored in the bonds of glucose and when glucose is broken down, much of that energy is released.
Cell utilize energy in the form of ATP.
The first step of respiration is called glycolysis. In a series of steps, glycolysis breaks glucose into two smaller molecules - a chemical called pyruvate. A small amount of ATP is formed during this process.
Most healthy cells continue the breakdown in a second process, called the Kreb's cycle. The Kreb's cycle allows cells to “burn” the pyruvates made in glycolysis to get more ATP.
The last step in the breakdown of glucose is called oxidative phosphorylation (Ox-Phos).
It takes place in specialized cell structures called mitochondria. This process produces a large amount of ATP. Importantly, cells need oxygen to complete oxidative phosphorylation.
If a cell completes only glycolysis, only 2 molecules of ATP are made per glucose. However, if the cell completes the entire respiration process (glycolysis - Kreb's - oxidative phosphorylation), about 36 molecules of ATP are created, giving it much more energy to use.
IN CANCER CELL:
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
introduction to WARBERG PHENOMENA:
WARBURG EFFECT Usually, cancer cells are highly glycolytic (glucose addiction) and take up more glucose than do normal cells from outside.
Otto Heinrich Warburg (; 8 October 1883 – 1 August 1970) In 1931 was awarded the Nobel Prize in Physiology for his "discovery of the nature and mode of action of the respiratory enzyme.
WARNBURG EFFECT : cancer cells under aerobic (well-oxygenated) conditions to metabolize glucose to lactate (aerobic glycolysis) is known as the Warburg effect. Warburg made the observation that tumor slices consume glucose and secrete lactate at a higher rate than normal tissues.
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Sérgio Sacani
Since volcanic activity was first discovered on Io from Voyager images in 1979, changes
on Io’s surface have been monitored from both spacecraft and ground-based telescopes.
Here, we present the highest spatial resolution images of Io ever obtained from a groundbased telescope. These images, acquired by the SHARK-VIS instrument on the Large
Binocular Telescope, show evidence of a major resurfacing event on Io’s trailing hemisphere. When compared to the most recent spacecraft images, the SHARK-VIS images
show that a plume deposit from a powerful eruption at Pillan Patera has covered part
of the long-lived Pele plume deposit. Although this type of resurfacing event may be common on Io, few have been detected due to the rarity of spacecraft visits and the previously low spatial resolution available from Earth-based telescopes. The SHARK-VIS instrument ushers in a new era of high resolution imaging of Io’s surface using adaptive
optics at visible wavelengths.
Performance Observation of Proactive and Reactive Routing Protocols with Increasing the Connections
1. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1543
ISSN:2320-0790
Performance Observation of Proactive and Reactive Routing
Protocols with Increasing the Connections
Ravi Sharma1
, Megha Singh2
Research Scholar1
, Assistant Professor2
CIIT, Indore (M.P.)
Abstract: - Mobile Ad-hoc network (MANET) is type of wireless network in which group of mobile nodes co-
operate to forward the data packets to their neighbours without using centralized authority or any physical medium
like cables or base station. It is fully wireless network. The MANET follows the different type of routing protocols,
which can be categories mainly into two forms are reactive routing protocol and proactive routing protocols. In this
paper, we have taken two different routing protocols one is reactive (AODV) and another one is proactive (DSDV).
Performance evaluated of these on the basis of different matrices such as Throughput, Normalized routing load and
packet delivery ratio. The simulation has been successful done on network simulator-2 and awk script is used for
calculation the value different parameters.
Keywords: AODV, DSDV, MANET, SANET and Ns-2
1. Introduction
A wireless network is a type of network, whose
communicating devices are connected to each other
with the wireless links. All the devices must be in
communication range of each other. We have
chooses the wireless network because it does not
depends on wires or cable, can install easily, and
mostly useful for hilly areas where wired connection
not possible [1]. Wireless network can be divided in
to two following forms which are:
1. Wired-cum-wireless network
2. Ad-hoc Network
Wired-cum-wireless networks are the type of
network, which is based on central co-ordinating
network where all wireless devices are controlled by
a central administration. Ad-hoc network is another
type of wireless network which is completely
infrastructure-less network.
Ad-hoc network can also be dividing into two
categories such as:
1. Static Ad-hoc Network
2. Mobile ad-hoc Network
Static Ad-hoc Network (SANET):- A network
where geographical locations of nodes are fixed
means it does not show the mobility called SANET.
Mobile Ad-hoc Network (MANET):- A mobile ad-
hoc network is an infrastructure less self configuring
network, which has frequently changing topology and
no dependency of any control module [2]. In the
MANET nodes location are not fixed so this network
is called mobile ad-hoc network. Due to frequently
variation of topology, routing maintenance is more
difficult than static ad-hoc network. We are showing
simple block diagram of MANET is below.
Fig1.1:- Mobile Ad-hoc Network
2. Routing in MANET
Routing provides robustness and efficient data
transmission in the network. MANET uses the
different routing protocols, which can be further
divided into two basic types which are reactive
routing protocols and proactive routing protocols [3]:
Fig 2.1:- Routing Protocols in MANET
Reactive Routing Protocol: - The entire on-demand
routing protocols are reactive routing protocols where
route discovery can be processed is on-demand. In
the other words all the nodes provides route the when
someone request for it.
Proactive Routing Protocols: - In this type of
routing protocols, all the communicating devices
periodically maintain their routing tables. For an
ISSN:2320-0790
2. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1544
ISSN:2320-0790
example, whenever a node wants to communicate to
other nodes, it will check their routing table and
sends the data toward the destination.
3. Purpose of Routing
The main purpose of routing is to handle the data
flow into the network. Routing protocols is also
specifies the how routers can share the data into the
networks. The basic functions of routing protocols
are as follows:
1. It is used to find the route to the destination.
2. Another is to provide the reliability of
delivering the message to the correct destination.
We have taken two routing protocol from the
proposed routing protocol are AODV as a reactive
and DSDV as a proactive routing protocol.
3.1 Ad-hoc On Demand Distance Vector
Routing (AODV)
AODV is reactive routing protocol which is
expanded version of DSDV and DSR where route
calculation is on demand whenever entries of
destination node are not available in the routing table.
Due to on demand routing the traffic on the network
will be minimum. It does not allow the other extra
useless routing. For creation of multiple routes,
AODV enable those nodes which want to establish
the connection to each other. It uses the sequence
numbers for avoiding the problem of count-to-
infinity. Whenever a node sends the route request to
the destination nodes, it will reply with a sequence
number [2][4]. According to the sequence number
source can choose the right route to the destination
node. AODV works on mostly three messages route
request (RReq), route reply (RRep) and the route
error (RErr). This also uses the user datagram
protocol used for discovery and maintenance of
route. In the AODV running protocol nodes keeps
only the information of next node towards the
destination.
In the AODV, a node wish to sends the data packets
to the destination node, it will check the routing table
and search the correct route to the destination. If
searched entry is available, then nodes follow the
available path but if the correct information is
missing in their routing table, it will be generates and
broadcast the route request (RReq) type control
message to their neighbours. This control message
must be transmitted by those nodes which has
requirement of shortest path to destination. This
control message contains the following information:
Table 1.1
Route Request
Source IP Destination
IP
Known
Sequence no.
to
Destination
Hop Count
Route request is also contains the Route request ID,
which is attached together with the source IP address.
This ID is used to universally identify a required
route. It is also used for search the duplicates. In the
AODV each node maintains the sequence number
whether routing tables is updated or not. All the
nodes have to create backward path before
forwarding the RReq. The path is useful for replying
to previous nodes. After rebroadcasting the RReq
nodes will update the value of hop count. If the valid
route does not exist in the path, intermediate nodes
having a legal route [5]. These nodes reply with a
unicast message. All the nodes frequently broadcast
the HELLO messages to their neighbours. Links
between the sender and receiver considered as failed
link if the HELLO messages does not received by
destination node. Link failure is type of local repair
mechanism which is used for inform this failure
information to all the about failure link by sending
RErr (Route error) message. Sender may reinitiate
the route discovery process by broadcasting RReq.
3.2 Destination Sequence Distance Vector
Routing
DSDV is a type of routing protocol which is
proactive in nature. In the DSDV each and every
node maintains the local information of network
topology. It is based on bellman ford algorithm. In
DSDV running network each node use the control
message and maintains their routing information in
the form of tables. The routing information contains
the information about next hop address, cost matrix
and the sequence number. The sequence number is
decided by the destination node. The cost matrix is
used to determine the hop count which shows how
many hops travelled by a packet.
In the DSDV nodes use the two types of
mechanism like periodic update mechanism and
trigger update mechanism [6]. These mechanisms are
used to forward the updated routing information by
the nodes to their all neighbours. Because of the
periodic updates, loops are created in the network.
For eliminating the loops DSDV uses the sequence
numbers which is randomly selected by the nodes.
Nodes don’t have the permission to change the
sequence number of other nodes [7]. These sequence
number must be incremented by periodically updates
3. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1545
ISSN:2320-0790
of a node. There are two types of update mechanism
are normal updates and expiry route updates. In the
normal update an even sequence number is selected
by a node when it transmits a message.
Route expiry updates are used
when the route is expires. In the condition of route
expiry, node(s) increments the sequence number by
an odd value 1[8]. So the corresponding entry will be
deleted from the routing table by a node which found
that odd sequence number.
3.3 Optimized Link State Routing Protocol
(OLSR)
It is one of a proactive routing protocol, expansion of
classical link state routing. As the working of
classical link state routing, it has message overhead
problem where each node retransmits the first
received message. It is also required more control,
and communicating links. As these drawbacks of
classical link state routing, an optimized protocol has
been provided called optimized link state routing
protocol where three optimizations has been done.
The optimizations are following[9]:
1. Election of MPRs
2. Minimum use of control messages
3. Minimum use of connecting links
OLSR protocol uses the MPRs (multipoint relays) as
a matrix to finding the shortest path where only
MPRs have permission to forward the data towards
the destination nodes. Rule for selection of MPR
nodes is, each 2-hop neighbour must be covered by a
node. That node has been selected as the MPR node.
MPR shows the greater willingness to carry the
traffic in to whole network during the flooding
process. Due to the selected node it minimizes the
control messages and MPRs also select those links
which are connected to itself and its selectors for
giving their MPR selectors information by the use of
topology control messages. We are showing OLSR
flooding process by following figure:
Fig:-3.1 OLSR Flooding
We are showing a scenario in which a node S selects
subset of neighbours (A, C, G, and E) as MPRS from
their neighbour set (A, B, C, D, E, F, G, and H). This
subset of neighbour will be covered all the two hop
neighbours. This process is called flooding process.
So this way limited numbers of nodes participates in
the routing process. Each node maintains following
repository to perform routing:
Link Set - It stores the information about links.
Neighbour Set and 2-hop Neighbour Sets - It keeps
the information about neighbour and 2-hop neighbour
set.
MPR and its Selector Sets - It keeps the information
of set of selected node and their selector’s node.
Topological Information Base- It keeps the whole
topological information.
Routing Table- Routing table stores the information
about the shortest route to any destination.
Protocol Functioning:
Overall functioning of OLSR is mostly depends on
following steps:
Link Sensing: In this link sensing all the nodes
broadcast and exchanges the HELLO messages and
performs the link sensing and maintains Local Link
Set. The discovered links may be symmetric or
asymmetric.
Neighbour Detection: In the OLSR, HELLO
messages is also used to maintain the information of
Neighbours and 2-hop neighbour set, MPR and its
selector set.
MPR Computation: This is performed to find out a
subset from neighbour nodes which has willing to
forward routing packets. These MPR nodes choose as
they cover all 2-hop neighbour of any node.
Topology Discovery: In the topology discovery
Topology Control (TC) messages are used. Each
selected node called MPRs advertise to its MPR
selectors using TC message.
Routing Table Computation: The information
which is diffused in the network by these TC
messages will help to compute routing table.
Simulation parameters
We have taken three performance matrices, such as
packet delivery ratio, Normalized routing load and
the Throughput. These are very helpful to us to know
which protocol’s performance is good or poor.
4. Simulation Experiments
Packet Delivery Rate: It is shows the number of
successfully delivered packets at the destination to the
whole data packets generated by sender or source.
Throughput: It is the main parameter which shows
the speed of transfer of data. It is the rate of
successfully transmitted data packets in a unit time in
the network during the simulation.
4. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1546
ISSN:2320-0790
Normalized Routing Load: It is defined as the total
number of routed packets required for per data packet
delivered at the destination.
We have created scenario 39 numbers of wireless
nodes in the area taken in 1106x602m2
. All the
simulation parameters and their values are shown in
following table.
Table 3.1
Parameter Value
Routing Protocol DSDV, AODV and OLSR
Mac protocol IEEE 802.11
Terrain Size 1101×602M2
Number of Nodes 39
Propagation Model Two Ray Ground Model
Simulation Time 250s
Antenna Type Omni Antenna
Statistical Analysis
Simulation Results:
We have successfully done our simulation on
network simulator-2.35. Main aim of this study to
know the performance of table driven and on-demand
routing protocols. Different types of performance
metrics are taken to evaluate and compare the
performance routing protocols of mobile ad-hoc
network. We are showing the results for DSDV,
AODV and OLSR routing protocol on the basis of
PDR, Throughput and Normalized Routing Load in
the low and high traffic environment are shown in the
graphical form and tabular forms:
Table 4.1
Table 4.2
Where L, H and A is Low, High and Average
respectively.
Packet Delivery Ratio
Fig:-4.1
Instantaneous Throughput
Fig:-4.2
Normalized Routing Load
5. Conclusion
In this paper we have described the performance of
three routing protocols with increasing the number of
connections to know how low and high traffic will
affects the performance of the network. So we have
taken the two proactive routing protocols such as
DSDV and OLSR and AODV as a reactive routing
protocol. All the results shows that DSDV and OLSR
have less throughput and high packet delivery ratio in
high traffic connection as than a AODV. Whereas
Performance in Less Traffic
PROTOCOL PDR NRL Throughput
AODV L A L
DSDV H L H
OLSR A H A
Performance in High Traffic
PROTOCOL PDR NRL Throughput
AODV L H L
DSDV A A H
OLSR H L A
5. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1547
ISSN:2320-0790
these proactive routing protocols have high
throughput and high packet delivery ratio as
compared to AODV in the low traffic networks. All
results are presented in this paper is obtained with 40
nodes AODV DSDV and OLSR running scenario
with 5,10,15,20 and 25 FTP connections.
References
1. A. Boukerche, “Performance Evaluation of
Routing Protocols for Ad-Hoc Wireless
Networks,” Mobile Networks and Applications,
pp. 9,333-342, Kluwer Academic Publishers,
2004.
2. Jorjeta G.Jetcheva and David B. Johson, “A
Performance Comparison of On-Demand
Multicast Routing Protocols for Ad Hoc
Networks,”school of computer science,
computer science department, Pittsburgh,
December 15, 2004
3. Hong Jiang, “Performance Comparison of Three
Routing Protocols for Ad Hoc Networks,”
Communications of the ACM, vol. 37, August
1994.
4. Charles E.Perkins,Elizabeth M. Royer,Samir
R.Das, “Performance Comparison of two On-
demand Routing Protocols for Ad-hoc
Networks,” IEEE Personal Communications,
pp.16-28,February 2001.
5. C.Perkins, E.B.Royer,S.Das, “Ad hoc On
Demand Distance Vector(AODV) Routing
,Internet Draft, ” RFC 3561,IETF Network
Working Group,July 2003.
6. Iftikhar Ahamad and Mata ur Rahman,
“Efficient AODV routing based on traffic load
and mobility of node in MANET, ICET-2010,
pp. 370-375.
7. Rahman Khan K, Reddy A V, Zaman R U,
Reddy K A, Harsha T S ,” AN efficient DSDV
routing protocol for MANET and its usefulness
for providing Internet access to Ad Hoc Hosts”,
TENCON 2008 IEEE Region 10 Conference,
pp. 1-6, 2008.
8. Sayem Patni B.G. Hogade “Advent and
Importance of Handoff under Wireless
Communication Evaluation” IJCSN Vol. Issue 4
Aug. 2012
9. T. Clausen and P. Jacquet,“Optimized link state
routing protocol (OLSR)”.RFC 3626, October
2003.
10 Z.Huawei and Z.Yun,“Comparison and
Analysis AODV and OLSR Routing Protocols
in Ad Hoc Network”, in the IEEE 2008
proceedings.
11. Gandhi S. Et al, “Performance Evaluation of
DSR, OLSR and ZRP Protocols in MANETs”,
International Conference on Computer
Communication and Informatics (ICCCI -2012),
Jan.10 – 12, 2012, Coimbatore, INDIA
12. C.Liu and J.kaiser“A Survey of Mobile Ad-hoc
Network Routing Protocols”, University of ulm
Tech.Report Series,Nr. 2003-08
13. F.Maan, N. Mazhar, “MANET Routing
Protocols Vs Mobility Models: A Performance
Evaluation” in the IEEE 2011 proceedings.
14. The network simulator-ns 2.35
http://www.isi.edu/nsnam/ns/
6. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1548
ISSN:2320-0790