Mobile ad hoc network (MANETS) consists of wireless nodes communicating without any centralized administration .thus each node acts as a host and a router. There are many routing protocols designed for MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed specifically for use in multi-hop wireless mobile nodes. This paper describes the design the implementation of DSR protocol in NS-2 simulator environment. We also analyze the performance of the DSR for various performance matrixes such as average end to- end delay, throughput and packet delivery ratio. The analysis was made for different number of nodes using the NS-2 simulator.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract- Delay Tolerant Network (DTN) in routing concerns itself with the ability to route data from source to destination which is the fundamental ability all communication network must have. During the transmission of packets it has the fixed landmark so that only one path can be chosen. It cannot choose the alternative path, that path is considered to be as the best path. To solve this problem, an optimized inter – landmark data routing algorithm, namely DTN – FLOW which chooses the alternative path that is considered to be as the shortest and best path. The DTN – FLOW algorithm not only transmit packet with the use of landmark and inter – landmark. The information message will be performed in all the nodes so the performance of each and every node decreases by means of traffic. In order to increase the high throughput, node to node communication can be done effectively in DTN network.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract- Delay Tolerant Network (DTN) in routing concerns itself with the ability to route data from source to destination which is the fundamental ability all communication network must have. During the transmission of packets it has the fixed landmark so that only one path can be chosen. It cannot choose the alternative path, that path is considered to be as the best path. To solve this problem, an optimized inter – landmark data routing algorithm, namely DTN – FLOW which chooses the alternative path that is considered to be as the shortest and best path. The DTN – FLOW algorithm not only transmit packet with the use of landmark and inter – landmark. The information message will be performed in all the nodes so the performance of each and every node decreases by means of traffic. In order to increase the high throughput, node to node communication can be done effectively in DTN network.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Performance analysis of routing protocols and tcp variants under http and ftp...IJCNCJournal
MANET stands for mobile ad-hoc network that has multi-hop and dynamic nature, where each station changes its location frequently and automatically configures itself. In this paper, four routing protocols
that areOLSR,GRP,DSR, and AODV are discussed along with three TCP variants that are SACK, New Reno and Reno. The main focus of this paper is to study the impact
scalability, mobility and traffic loads on routing protocols and TCP variants. Thepaper results shows that the proactive protocols OLSR and GRP outperform the reactive protocols AODV and DSR with the same nodes size, nodes speed, and traffic load. On the other hand, the TCP variants research reveal the superiority of the TCP SACK variant over the other two variants in case of adapting to varying network size, while the TCP Reno variant acts more
robustly in varying mobility speeds and traffic loads.
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive network routing is investigated. Shortest Path routing is always not suitable for any wireless mobile network as in high traffic conditions, shortest path will always select the shortest path which is in terms of number of hops, between source and destination thus generating more congestion. In prioritized sweeping reinforcement learning method, optimization is carried out over confidence based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the destination. Analysis is done on 50 Nodes Mobile ad hoc networks with random mobility. Various performance parameters such as Interval and number of nodes are used for judging the network. Packet delivery ratio, dropping ratio and delay shows optimum results using the prioritized sweeping reinforcement learning method.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerAM Publications
The delay sensitive packet scheduling and routing algorithm to effectively deliver delay sensitive data’s over a multihop
networks. First packet urgency, node urgency, route urgency are calculated on the basis of end-to-end delay requirements.
Based on these urgency metrics, the proposed packet scheduling algorithm determines the transmission order of each packet to
minimize the node urgency without unnecessary packet drop, and the proposed routing algorithm establishes a route to minimize
the derivatives of route urgency in order to maximize the number of packets delivered within the required end-to-end delay.
Finally experimental results are presented to evaluate the performance of the proposed joint working algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
In today’s computerized world, cyber crime has increased. The web network of www also increases day by day. So the protection of software and data in our computers has become very important. For this purpose we are developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP, SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a random string & then Shutting-Down the computer remotely. By using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from this software so this will definitely helpful to make them fool.
A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...IJERA Editor
Nickel based super alloy, Inconel 718 is a very hard material (46 HRC). Because of its hardness, work hardening and low thermal conductivity, its machining is very difficult. End milling is an effective method for machining, drilling, slotting, and making key ways of Inconel 718. Tensile residual stress takes place during machining of Inconel 718. It is a critical problem, which is minimized to obtain better quality. Residual stress becomes more in the presence of rough machined surface. In this paper we optimize the surface roughness of Inconel 718 in end milling under dry condition. The surface roughness is optimized using four parameter nose radius, depth of cut, feed rate and cutting speed by using a cemented carbide tool. L27 orthogonal array of Taguchi method uses to analyse the result. 27 experimental runs based on L27 orthogonal array of Taguchi method.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Performance analysis of routing protocols and tcp variants under http and ftp...IJCNCJournal
MANET stands for mobile ad-hoc network that has multi-hop and dynamic nature, where each station changes its location frequently and automatically configures itself. In this paper, four routing protocols
that areOLSR,GRP,DSR, and AODV are discussed along with three TCP variants that are SACK, New Reno and Reno. The main focus of this paper is to study the impact
scalability, mobility and traffic loads on routing protocols and TCP variants. Thepaper results shows that the proactive protocols OLSR and GRP outperform the reactive protocols AODV and DSR with the same nodes size, nodes speed, and traffic load. On the other hand, the TCP variants research reveal the superiority of the TCP SACK variant over the other two variants in case of adapting to varying network size, while the TCP Reno variant acts more
robustly in varying mobility speeds and traffic loads.
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive network routing is investigated. Shortest Path routing is always not suitable for any wireless mobile network as in high traffic conditions, shortest path will always select the shortest path which is in terms of number of hops, between source and destination thus generating more congestion. In prioritized sweeping reinforcement learning method, optimization is carried out over confidence based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the destination. Analysis is done on 50 Nodes Mobile ad hoc networks with random mobility. Various performance parameters such as Interval and number of nodes are used for judging the network. Packet delivery ratio, dropping ratio and delay shows optimum results using the prioritized sweeping reinforcement learning method.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerAM Publications
The delay sensitive packet scheduling and routing algorithm to effectively deliver delay sensitive data’s over a multihop
networks. First packet urgency, node urgency, route urgency are calculated on the basis of end-to-end delay requirements.
Based on these urgency metrics, the proposed packet scheduling algorithm determines the transmission order of each packet to
minimize the node urgency without unnecessary packet drop, and the proposed routing algorithm establishes a route to minimize
the derivatives of route urgency in order to maximize the number of packets delivered within the required end-to-end delay.
Finally experimental results are presented to evaluate the performance of the proposed joint working algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
Abstract
Wireless Technology has an enormous use these days and is still becoming popular from times immemorial. It is at its peak when we
talk about research. This is because of the latest technological demands now days arising from Laptops, Wireless devices such as
Wireless local area networks (WLANs) etc. Because of its fast growing popularity day by day, it has led wireless technology data rates
higher and it has made its price cheaper, which is why wireless Technology is growing so fast. In this paper we have presented some
most commonly used routing protocols in MANET and compared the performance of AODV, OLSR, GRP and DSR routing protocol
by using OPNET simulator 14.5. The performance is evaluated under different parameters like Delay, Load, and Media access delay,
Network Load, Retransmission and Throughput for Database load.
Keywords— MANET, Peak Value, Protocol, Drop value
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
In today’s computerized world, cyber crime has increased. The web network of www also increases day by day. So the protection of software and data in our computers has become very important. For this purpose we are developing the “Server Security System” with the help of some technologies such as GPRS, TCP-IP, SMTP, and MIME. In our project we are developing a system such that we get the image of an unauthorized person or user. To do this we are using a webcam. We send a mail to the authorized person's GPRS phone. For this purpose we use a mobile it can be any mobile. In parallel we are changing the password by generating a random string & then Shutting-Down the computer remotely. By using java programming we can create such applications which will help us to stop the cyber crime. It is not visible to new user so that he is unaware from this software so this will definitely helpful to make them fool.
A Review of Optimization of Surface Roughness of Inconel 718 in End Milling u...IJERA Editor
Nickel based super alloy, Inconel 718 is a very hard material (46 HRC). Because of its hardness, work hardening and low thermal conductivity, its machining is very difficult. End milling is an effective method for machining, drilling, slotting, and making key ways of Inconel 718. Tensile residual stress takes place during machining of Inconel 718. It is a critical problem, which is minimized to obtain better quality. Residual stress becomes more in the presence of rough machined surface. In this paper we optimize the surface roughness of Inconel 718 in end milling under dry condition. The surface roughness is optimized using four parameter nose radius, depth of cut, feed rate and cutting speed by using a cemented carbide tool. L27 orthogonal array of Taguchi method uses to analyse the result. 27 experimental runs based on L27 orthogonal array of Taguchi method.
High Speed Area Efficient 8-point FFT using Vedic MultiplierIJERA Editor
A high speed fast fourier transform (FFT) design by using three algorithm is presented in this paper. In algorithm 3, 4-bit Vedic multiplier based technique are used in FFT. In this technique used in three 4-bit ripple carry adder and four 2*2 Vedic multiplier. The main parameter of this paper is number of slice, 4-input LUTS and maximum combinational path delay were calculate.
Random Lead Time of the acute ghrelin response to a psychological stressIJERA Editor
Ghrelin is a growth hormone and cortisol secretagogue that plays an important role in appetite and weight regulation. It is not known whether ghrelin is involved in the eating response to stress in humans. In the present study we examined the effects of psychologically induced stress on plasma ghrelin levels in patients with binge-eating disorder (BED) and in healthy subjects of normal or increased body mass index (BMI). Volunteers were subjected to the standardized trier social stress test (TSST). Basal ghrelin levels in patients were at an intermediate level between thin and healthy obese subjects, but this difference did not attain statistical significance. There were no differences in ghrelin levels throughout the test among the groups after correction for BMI, age and gender. A significant difference in the trend time of ghrelin was revealed when the three groups were analyzed according to their cortisol response to stress. Ghrelin levels increased in cortisol responders whereas no change or a decrease in ghrelin levels occurred in cortisol non-responders. We also found Optimal time T*, Minimal Repair δ and Random Lead Time g to minimize the ghrelin level.
Planning and Selection of Heavy Construction Equipment in Civil EngineeringIJERA Editor
Construction equipment planning and selection plays crucial role for the success of construction firms.Inadequate manual processes of equipmentplanning and selection and the subjective decisions of equipment managers usually result in major losses in construction firms. An indispensable item of resources, it produces output at accelerated speed, enables completion of task in limited time. Equipment saves manpower, which is becoming costly and more demanding day by day. Equipment improves quality, productivity and safety. Construction equipment planning aims at identifying construction equipment for executing project tasks, assessing equipment performance capability, forecasting date wise requirement of number and type of equipment and finally participating in the selection of equipment to be acquired. To derive full benefits from the equipment, there should be proper selection and good planning of its operations. This paper deals with the planning and selection procedure for equipment adopted by a company to achieve its objective of timely project completion.
Messages addressed to specific users can be decrypted by Key Generation Centre (KGC) by generating their private keys. Data owner wants the data to be delivered only to specified user and not to unauthorized person that is the data owner makes their private data accessible only to authorized person. We propose attribute based encryption and escrow problem which means written agreement delivered to a third party to overcome this problem. Attribute based Encryption (ABE) is a type of public-key encryption in which the private key of a user and the cipher text are dependent upon attributes. It is a promising cryptographic approach.
While completing the FAFSA correctly can open the door to federal, state, college and other forms of financial aid, many parents and students face this task with great trepidation. They worry that a mistake will cause them to miss out on some form of financial aid, which will lead to a decrease in the student’s chances of being able to attend their first-choice college. Here are a few tips that will help you get through FAFSA time without
Tender and Bidding in Construction ProjectsIJERA Editor
Construction Industry plays a key role in the process of economic transformation and growth. Export of projects and services indicate a country's progress in technology and export performance. Most of the companies are versed only with engineering and technology. The decision to bid is a major financial decision because of two reasons. First, the contractor assumes substantial costs for the preparations of the estimates and the tender at the risk of not recovering them if he is not awarded the job. Second, andmost importantly, thecontractor commits himself to investment in the construction of the project if he wins the bid.
Numerical Study Of Flue Gas Flow In A Multi Cyclone SeparatorIJERA Editor
The removal of harmful particulate matter from power plant flue gas is of critical importance to the environment and its inhabitants. The present work illustrates the use of multi-cyclone separators to remove the particulate matter from the bulk of the gas exhausted to the atmosphere. The method has potential to replace conventional systems like electrostatic precipitator due to inherent low power requirement and low maintenance. A parametric model may be employed to design the system based on the requirement of the power station. The present work describes the simulation of flue gas flow through a cyclonic separator. A Finite volume approach has been used and the pressure-velocity coupling is resolved using the SIMPLE algorithm. Discrete phase model is used to inject solid particles from inlet. In this numerical analysis a cluster of four cyclonic separators are considered. Comparisons are made between the available experimental results and the computational work for validation of the numerical models and schemes employed in the work. The separation efficiency and particle trajectories are shown and found comparable to similar cases from literature. The experimental results correlate well for the model under consideration.
Computational Fluid Dynamics (CFD) Analysis of Natural Convection of Converge...IJERA Editor
Computational Fluid Dynamics (CFD) analysis was carried out for the convergent-divergent fins arranged inline and staggered on the base plate as per the experimental setup provided in the technical paper [1]. This paper reports on the validation of results of modeling and simulation in CFD. The simulation was carried out using the ANSYS 12.0 as the CFD modeling software. The main objective of the CFD analysis was to calculate the temperature distribution on the surface of the base plate and surface of the convergent-divergent fins for the given inline and staggered arrangement of fins due to the effect of natural convection heat transfer for different heat power inputs, and also to compare the CFD results with the experimental results.
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...IJERA Editor
Cloud storage systems to protect data from corruptions, redundant data to tolerate failures of storage and lost data should be repaired when storage fails. Regenerating codes provide fault tolerance by striping data across multiple servers, while using less repair traffic than traditional erasure codes during failure recovery. In previous research implemented practical Data Integrity Protection (DIP) scheme for regenerating-coding based cloud storage. Functional Minimum-Storage Regenerating (FMSR) codes and it construct FMSR-DIP codes, which allow clients to remotely verify the integrity of random subsets of long-term archival data under a multi server setting. The problem is to optimize bandwidth consumption when repairing multiple failures. The cooperative repair of multiple failures can help to further save bandwidth consumption when multiple failures are being repaired.
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
Mobile Ad-hoc network (MANET) is type of wireless network in which group of mobile nodes co-operate to forward the data packets to their neighbours without using centralized authority or any physical medium like cables or base station.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any
pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as
a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV,
OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational
conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This
performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay,
Normalized Routing Load and Average Throughput.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing Load and Average Throughput.
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
A mobile adhoc network is a collection of wireless mobile nodes dynamically creating a temporary network without usage of any prevailing network infrastructure or consolidated management. Several routing protocols like Dynamic Source Routing (DSR), Adhoc On-Demand Distance Vector Routing (AODV) and Destination Sequenced Distance-Vector (DSDV) have been implemented. In this paper, an attempt has been made to compare the performance of two prominent on-demand reactive routing protocols for mobile ad hoc networks: DSR and AODV, along with the traditional proactive DSDV protocol. A simulation model with MAC and physical layer models is used to study interlayer interactions and their performance inferences. The On-demand protocols, AODV and DSR perform better than the table-driven DSDV protocol. Although DSR and AODV share similar on-demand performance, the differences in the protocol mechanics can lead to significant performance differentials. A variation of workload and scenarios, as characterized by mobility, load and size of the ad hoc network were simulated. The performance analysis is evaluated by means of varying network load, mobility, and network size. These simulations are conceded out based on the Rice Monarch Project that has made considerable additions to the NS-2 network simulator to track adhoc simulations
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
A mobile adhoc network is a collection of wireless mobile nodes dynamically creating a temporary network without usage of any prevailing network infrastructure or consolidated management. Several routing protocols like Dynamic Source Routing (DSR), Adhoc On-Demand Distance Vector Routing (AODV) and Destination Sequenced Distance-Vector (DSDV) have been implemented. In this paper, an attempt has been made to compare the performance of two prominent on-demand reactive routing protocols for mobile ad hoc networks: DSR and AODV, along with the traditional proactive DSDV protocol. A simulation model with MAC and physical layer models is used to study interlayer interactions and their performance inferences. The On-demand protocols, AODV and DSR perform better than the table-driven DSDV protocol. Although DSR and AODV share similar on-demand performance, the differences in the protocol mechanics can lead to significant performance differentials. A variation of workload and scenarios, as characterized by mobility, load and size of the ad hoc network were simulated. The performance analysis is evaluated by means of varying network load, mobility, and network size. These simulations are conceded out based on the Rice Monarch Project that has made considerable additions to the NS-2 network simulator to track adhoc simulations
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
MANET is a cooperative wireless network in which mobile nodes are responsible for routing and
forwarding packets from and to other nodes. Noncooperation is a challenge that definitely degrades the
performance of MANET. A misbehaving or selfish node may make use of other nodes in the network, but
decline to share its own resources with them. These selfish nodes may severely affect the performance of
routing protocols in MANET.
In this paper, we compare the performance of four routing protocols under security attack of node
misbehavior in MANET. We investigate AODV and DSR reactive routing protocols and OLSR and GRP
proactive routing protocols using Riverbed Modeler simulator. The performance comparison is carried out
using two types of misbehaving nodes. The metrics used are End-to-End delay, Packet Delivery Ratio, Data
dropped and the Load. The experimental results show that AODV routing protocol performs better than the
other routing protocols with higher packet delivery ratio. Further, OLSR routing protocol outperforms the
other routing protocols with minimum End-to-End delay.
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
Mobile Ad-Hoc Networks (MANETs) are supreme ruler and demoralization wireless scheme. MANETs are infrastructure less i.e. their structure is not fixed, and the nodes be able to move about and can leave the network whenever they want. The nodes are to perform as more over router and host. In MANETs, the node can be in contact with every node as their configuration is not fixed and the nodes starts transmitting the packets to each other for the establishment of the connection. To hitch the link, the nodes make use of some routing protocols like Ad-Hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and DestinationSequenced Distance Vector (DSDV). Security in MANET is the key matter meant for the fundamental utility of network. There are many attacks caused in MANET. Blackhole attack is one that occurs in MANET. A Black hole attack is an attack where the node, which is malicious advertise itself as having the optimal route to the destination and drops all the packets instead of forwarding further t o the destination. Here, we have shown the blackhole attack in AODV and DSR. Through simulation we evaluate the performance of the two above protocols under blackhole attack.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. In this paper we explain an effective and scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks (WASN) by using third party reply model, n-hop local ring and time-to-live based local recovery. Our goal is to reduce time delay for delivery of the data packets, routing overhead and improve the data packet delivery ratio. The resulting algorithm AODV-ES is then simulated by NS-2 under Linux operating system. The performance of routing protocol is evaluated under various mobility rates and found that the proposed routing protocol is better than AODV.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
Performance comparison of routing protocols in mobile ad hoc networksijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
Routing protocols have
an important
role in any
Mobile Ad Hoc Network
(MANET).
Researchers
have
elaborated several routing protocols that possess different performance levels
. In this
p
aper
we
give a
performance evaluation of
AODV,
DSR,
DSDV
, OLSR and DYMO
routing protocol
s
in
Mobile Ad Hoc
Networks
(MANETS)
to
determine
the best
in different scenarios
. We
analyse
these
MANET
routing
protocols by
using
NS
-
2 simulator
. We specify how
the
Number of No
d
es
parameter influences
their
performance. In this study
,
performance is
calculated
in terms
of Packet Delivery Ratio,
Average
End to
End Delay, Normalised Routing Load and Average Throughput
Similar to A Simulated Behavioral Study of DSR Routing Protocol Using NS-2 (20)
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
1. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 64 | P a g e
A Simulated Behavioral Study of DSR Routing Protocol Using
NS-2
Ali El-Desoky*,Amany Sarhan**, Reham Arnous***
*Department of computers and system engineering, Faculty of Engineering, Mansoura University, Egypt
** Department of Computer and system engineering, Faculty of Engineering, Tanta University.
**Department of computers and system engineering, Faculty of Engineering, Mansoura University, Egypt
Abstract
Mobile ad hoc network (MANETS) consists of wireless nodes communicating without any centralized
administration .thus each node acts as a host and a router. There are many routing protocols designed for
MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed
specifically for use in multi-hop wireless mobile nodes. This paper describes the design the implementation of
DSR protocol in NS-2 simulator environment. We also analyze the performance of the DSR for various
performance matrixes such as average end to- end delay, throughput and packet delivery ratio. The analysis was
made for different number of nodes using the NS-2 simulator.
Keywords – MANETs, DSR, routing protocol, performance evaluation, NS-2
I. Introduction
Wireless networks are emerging new technology
where there is no physical wired connection between
sender and receiver, but rather the network is
connected by radio waves and/or microwaves to
maintain communications. Wireless networks are
rapidly evolving, and is playing an increasing role in
the lives of people throughout the world as they
provide connection flexibility between users in
different places. Wireless networks are classified into
two categories; Infrastructure networks and Ad Hoc
networks. In Infrastructure networks devices are
connected using a central device, namely a wireless
access point. An access point (AP) represents a
central coordinator for all nodes. AP acts as a master
with all the other stations associating to it. All
communications pass through the AP. A wireless ad
hoc network is a decentralized type of wireless
network. Ad hoc networks do not rely on a
preexisting infrastructure or any centralized access
points. Mobile ad hoc networks (MANETs) are self-
organized and self-configuring infrastructurless
networks of mobile devices communicating through
wireless links. In MANETs the nodes which are in
the transmission range of each other communicate
directly, otherwise communication is done through
intermediate nodes which forward packets; hence the
node acts as a router and a node, these networks are
also called as multi-hop networks [1, 2]. Routing in
MANETs is considered a challenging task due to the
mobility of nodes and limited bandwidth and energy.
There are several types of routing protocol developed
for efficient routing in MANETs [3]. Theycan be
categorized into two different approaches; position-
based routing and topology-based routing [4-
7].Position-based or geographic routing approaches
rely on knowing the nodes’ physical location
information. Thus, it is necessary for nodes to obtain
their coordinates either by using a location service
such as GPS or other types of positioning services. In
Topology-based routing protocols the paths are
maintained and routes are established based on the
information about the links that exist in the network.
These protocols can be further divided into proactive
(table driven), reactive (on demand) and hybrid
approaches.
Table-driven (proactive) routing protocol:
Proactive protocols discover routes and maintain
them in routing tables, each node maintains up-to-
date routing table containing a list of all the
destinations, next hop, number of hops to each
destination. Hello packets are exchanged periodically
in order to inform nodes about changes in the
topology. Destination sequenced distance vector
(DSDV), wireless routing protocol (WRP) and global
state routing (GSR) are examples of proactive routing
protocols.
On demand (Reactive) routing protocol: The main
idea in reactive routing (on-demand routing) is to
find and maintain routes 'only when there is needs
(on demand) which by turn minimize routing
overhead but it may result in initial delays until the
routes are set up. There are different types of on
demand routing protocols such as Ad hoc On
Demand Distance Vector (AODV), Dynamic Source
routing protocol (DSR), temporally ordered routing
RESEARCH ARTICLE OPEN ACCESS
2. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 65 | P a g e
algorithm (TORA), Ad-hoc On-demand Multipath
Distance Vector Routing (AOMDV). Our discussion
is limited to DSR protocol.
Hybrid routing protocols area combination of both
reactive and proactive approaches. Zone routing
protocol (ZRP) is an example [8-11].
II. DSR protocol description
The DSR is a pure reactive routing protocol
based on the concept of source routing. it employs
route discovery and route maintenance procedures
working together in a way that that can enable nodes
to discover and maintain routes to arbitrary
destinations in thenetwork [12-15]. Each node
maintains its route cache which is kept in the memory
to save the discovered route for future use. The node
updates entries in the route cache when it learns
about new routes.The original DSR keeps multiple
routes to a destination ordered by hop count. It
selects a route having the minimal number of hops
between the available routes. DSR uses the route
selection based on the shortest path algorithm; it
selects a route having the minimal number of hops
between the available routes. When a source node
wants to send a data packet to destination node, it
first checks its route cache for a route to the desired
destination; If a route is found the node uses it to
send the packet. The route is inserted in the packet
header and then the packet is forwarded to its
destination through this route. In case there is no
route to the desired destination in the node's route
cache, it applies a route discovery process by
broadcasting a route request packet (RREQ) to all its
neighbors. The source node appends source ID,
destination ID and a unique request ID to it. The
packet also contains a route record listing the address
of each intermediate node it passes through. The
source route initializes this record as an empty list.
When an intermediate node receives a RREQ packet
it appends its id to the RREQ packet’s route- record
then it rebroadcasts the RREQ again, unless it is the
destination node, or it has a route to the intended
destination in its cache. When initiating a Route
Discovery, the sending node saves the original packet
in a local buffer called the Send Buffer. Each packet
in the Send Buffer is stamped with the time that it
was placed into the Buffer the packet is saved in the
send buffer until a route found or it reaches time out
period. The packet is discarded in case of timeout.
Timeout period is necessary for preventing the Send
Buffer from overflowing. When the route request
reaches either the destination itself or a node that has
a route to the destination, a route reply (RREP) is
generated. The RREP is then sent back (through the
reverse path found in the route record of RREQ) to
the source node. The source node then appends this
path to the original packet saved in the send buffer
and forwards it to destination through it. It also
updates its route cache with this new learned route
[16-20]. For route maintenance procedure; DSR uses
two types of packets; route error packets and
acknowledgment. When a node detects a
transmission problem on forwarding a packet, it
generates a route error packet while acknowledgment
packets are used to confirm the correct operation of
the route links [21-25].
III. DSR implementation in NS-2
simulator
NS-2 is a an object oriented ,open source
network simulation tool which can be used by
researchers working on wired or wireless networks as
it supplies numerous models and source codes of
routing protocols. There are two programming
languages used in NS-2 otcl and C++ language. C++
is used for detailed protocol implementation where
otcl language is used to write script files (simulation
script) where users describe the model to be
simulated then NS-2 interpret the script and output
the simulation process and result to an output file
(trace file). The simulation process and result can be
shown by Nam and Xgraph files [26, 27]. There are
two main types of NS-2 agents routing agents and
transport layer agents. A routing agent creates,
transmits and receives control packets and routing
protocol commands to act accordingly, where as
Connecting an application to a low level network, a
transport layer agent controls the congestion and
reliability of a data flow based on an underling
transport layer protocol .NS-2 implements agents in
C++ [28, 29]. The DSR routing protocol is
implemented in NS-2as Agent (DSR Agent). This
section analyses the DSR source code in NS-2. The
chart in figure 1 shows the basic functions of the
DSR agent. When a DSR agent receives a packet it
first arrives at recv method (basic function) which
first checks the packet header to see if it has a valid
source route (srh) then calls different functions to
handle the packet as shown in flow chart described in
figure 1. If no source route found in packet header
and it is not a broadcast packet, it will be handled
through the method named handlePktWithoutSR
which is described later in the flow chart shown in fig
2. If there is a valid source route then the packet is
handled through methods handlePacketReceipt
described in figure 3. If the current node is the
destination (P.dest= net_id) else it is handled either
through the method handleRouteRequest (described
in flowchart shown in figure 4) if it is a RREQ
packet, or through handleForwarding method if it is
not a RREQ packet.
IV. Simulation
In this paper the DSR is analyzed using the NS-2
simulator. Three performance metrics are used to
evaluate the performance Average End-To-End
3. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 66 | P a g e
Delay, Throughput, and packet delivery ratio for
various numbers of nodes considering TCP as the
transport protocol and FTP as the traffic generator.
4.1. Simulation tool and parameter
The simulations tool used is NS-2. Before starting the
simulation a tcl script is created that describes the
simulated model which defines the network topology
composed of nodes, routers, links, and shared media.
Otcl language is used to write the script file.Table 1
shows a part of the tcl script containing the tcl coding
which specify the simulation parameters.
Table 1 tcl code for simulation setup parameters
Set val(chan) channel /wireless channel ;# channel type
Set val(prop) propagation /two rayground ;# radio-propagation model
Set val(netif) phy/wirelessphy ;# network interface type
Set val(mac) mac802_11 ;# mac type
Set val(ifq) cmupriqueue
Set val(ll) ll
Set val(ant) AntenaomniAntena
Set val(ifqlen) 50 ;# max packet in ifq
Set val(nn) 120 ;# number of mobile nodes
Set val(rp) dsr ;# routing protocol
Set val(x) 500
Set val(y) 400
Set val(stop) 150 ;# time of simulation end
4.2. Simulation analysis and Performance metrics
After running the tcl script at the end of each simulation, a NAM trace file and a tr file which is a trace file will
be created by NS-2 automatically. NAM trace file is used as an input to network animator (NAM) which is used
to graphically visualize the simulator while the trace file is used for simulations analysis. AWK Scripts are used
for processing the data from the output (trace files). The performance of the simulation is evaluated according to
the following performance metrics.
Average end to end delay: Average End-to-End delay is the average time it takes a data packet to reach the
destination. Low average end-to end delay indicating good performance. it is calculated using awk script
(delay.awk) which processes the trace file and produces the result.Table3 represents the average end-to-end
delay for all packets received for (20,30,40,50,60,70,80,90,100,110,120,130,140,150) nodes.
Table 2. Average End-to-End Delay of DSR at different numbers of nodes.
No of nodes 20 30 40 50 60 70 80 90 100 110 120 130 140
Delay (ms) 199.470 191.878
179.74
7
199.38
5
205.325
147.31
7
148.67
3
223.39
9
179.04
3
176.976
209.56
9
171.9
02
210.424
DSR end to end delay decreases with increase the number of nodes till 80 nodes. So DSR protocol good for
nodes less than 80. Increasing number of nodes Increases the number of hops in routes and in its turn increases
the time it take the packet to reach the destination.
Throughput: The throughput is defined as the total amount of received data packets divided by the simulation
time. The throughput is measured in bits per second (bps). Table3 represents the throughput for different
numbers of nodes.
Table3. Throughput at different numbers of nodes
Number of
nodes
20 30 40 50 60 70 80 90 100 110 120 130 140
Throughput
(kbps)
521.3
3
536.6
6
542.38
541.6
4
522.0
2
577.3
8
558.77 521.43 520.64 556.38
522.9
2
557.45 532.46
DSR throughput increases with increase the number of nodes till 80 nodes. With the increase of number of
nodes than 80 the throughput decreases. This may result due to the increase of routing overhead by increasing
the number of nodes.
4. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 67 | P a g e
Packet Delivery Ratio: Packet delivery ratio is the ratio of number of packets received at the destination to the
number of packets sent from the source. The performance is better when packet delivery ratio is high .The
reason for having better packet delivery ratio of DSR is that allow packets to stay in the send buffer until a valid
route found then data packets are sent on that route to be delivered at the destination.
Table 4. Packet delivery ratio at different numbers of nodes.
N o o f n o d e s 20 30 40 50 60 70 80 90 100 110 120 130 140
No of packets sent 1337
3
1378
8
1258
2
1256
3
1339
3
1201
4
1296
9
1340
5
1210
9
1294
4
1341
7
1293
9
1366
5No of received packets 1334
8
1376
4
1255
7
1253
7
1336
9
1195
8
1294
4
1338
2
1204
9
1292
0
1339
4
1291
3
1364
2Packet delivery
ratio
.998
1
.998
3
.998
0
.997
9
.998
2
.995
3
.998
1
.998
3
.995
0
.998
1
.998
3
.998
0
.998
3
V. Conclusion
In this paper, a detailed description of DSR routing algorithm and its implementation as arouting agent
(DSR agent) in NS-2 is presented. The performance of DSR is evaluated in terms of throughput,average end-to-
end delay, and packet delivery ratio for various numbersof nodes using the NS-2 simulator. From the above
simulation result analysis, we can conclude that DSR provides good performance for routing in wireless ad hoc
networks.
VI. Future work
DSR protocol for routing in ad-hoc networks works fine where nodes are not equipped with GPS or any
other device to be aware of its own positions.Networks are assumed to be heterogeneous; some nodes may be
aware of their position through GPS while some others are not. We are currently working to develop a routing
algorithm which is able to take the advantages of position information of nodes when available but also to be
able to continue the routing through a reactive on demand fashion like DSR scenario.
References
[1.] SS. Dhenakaran, and A Parvathavarthini. An overview of routing protocols in Mobile ad-hoc network.
International journal of advanced research in computer science and software engineering, 3(2), 2013,
251-259.
[2.] M Kumar, N Geethanjali, and N. Ramesh Babu. Performance evaluation of AODV and FSR routing
protocols in MANETS. Global Journal of computer science and technology, 13(4), 2013, 29-34.
[3.] A. Odeh, E. AbdelFattah, and M. Alshwokan. Performance evaluation of AODV and DSR routing
protocols in MANET networks. International journal of distributed and parallel systems, 3(4), 2012,
13-17
[4.] K. Pandey K, and A. Swaroop. A comprehensive performance analysis of proactive, reactive and hybrid
MANETs routing protocols. International journal of computer science, 8(6), 2011, 432-436
[5.] K. Vanaja, and R. Umaram. A simulated behavioural study of prominent reactive routing protocol
AODV of MANET using NS-2. International journal of advanced research in commuter and
communication engineering, 1(3), 2012, 161-166
[6.] H. Soni, and P. Verma. Performance based survey of routing protocol in MANET. International Journal
of Advanced Research in Computer Engineering & Technology, 2(1), 2013, 145-154
[7.] K. Patel, R. Kumar, andK. Daniel. Performance analysis and behaviouralstudy of proactive and reactive
routing protocols in MANET. International journal of advanced research in computer and
communication engineering, 2(4), 2013, 1789-1796
[8.] KR. Reddy, S. Venkata Raju, and N. Venkatadri. Reactive, proactive MANET routing protocol
comparison. International journal of Video&image processing and network security, 12(5), 2012, 22-27
[9.] G. Balamurugan, P. Sakthivel, and C. Jayanavithraa. The comparative study of adhoc network routing
protocols. International Journal of Advanced Research in Computer and Communication Engineering,
3(2), 2014, 5337-5340.
[10.] A. Hinds, M. Ngulube, S. Zhu, and H. Al-Aqrabi. A review of routing protocols for mobile ad-hoc
NETworks (MANET). International journal of information and education technology,3(1), 2013, 1-5
[11.] TP. Singh, S. Dua, and V. Das. Energy-efficient routing protocols in mobile ad-hoc networks.
International journal of advanced research in computer science and software engineering, 2(1), 2012,
132-137.
[12.] R. Saleh, M Saman, and N. Rahman N. A new policy for path selection in dynamic source routing
protocol for mobile ad-hoc networks. Journal of computer science, 9(5), 2013, 551-557
5. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 68 | P a g e
[13.] K. Manoj, R. Kumar, and K. Arti. Analysis of delay and throughput in MANET for DSR protocol.
world academy of science, engineering and technology, 5(2), 2011, 653-656
[14.] S. sofat, and A Gupta. A Survey on Throughput Analysis of DSR Routing Protocol in
MANETs.International Journal of Multidisciplinary in Cryptology and Information Security, 2(2),
2013, 56-63
[15.] N. Khan, and N. Agarwal. Adaptive routing in mobile adhoc networks and comparison between routing
protocols aodv and dsr for apu strategy. Journal of computer science 2014 (ICAET-2014): 58-65
[16.] R. Jagannadha, K. Sreenu, and P. Kalpana. A study on dynamic source routing protocol for wireless ad-
hoc networks. International Journal of Advanced Research in Computer and Communication
Engineering, 1(8), 2012, 522-529
[17.] Y. Saravanan, and D Vijayakumar. Performance of reactive and proactive MANET routing protocols
with trajectories. International Journal of Engineering Research and Technology, 1(8), 2012, 24-29
[18.] D. NareshVadhwani, D. Kulhare, and M. Singh. Behavior analysis of DSR MANET protocol with http
traffic using opNET simulator, The International Journal of Innovative Research in Computer and
Communication Engineering, 1(3), 2013, 680-686.
[19.] S. Ali and A. Ali.Performance analysis of AODV, DSR and OLSR in MANET (LAP LAMBERT
Academic Publishing, 2011).
[20.] R. Sharma, and S. Sabharwal. Dynamic source routing protocol (DSR). International journal of
advanced research in computer science and software engineering, 3(4), 2013, 293-241
[21.] S.V. Gumaste, M.U. Kharat, and V.M. Thakare. Performance analysis of DSR protocol. International
journal of scientific and engineering research, 1(3), 2013, 62-68
[22.] R. Saleh, M. Saman, and M. Rahman. Impact of route selection metrics on the performance of DSR
protocols for MANETs. International Journal of Computer Science Issues, 10(2), 2013, 123-126
[23.] D. Goel. A new approach of route selection in DSR using time routing metric in MANET. International
Journal of Advanced Research in Computer Science and Software Engineering, 4(4), 2014, 360-363
[24.] P Rohal, R. Dahiya, and P. Dahiya. Study and analysis of throughput, delay and packet delivery ratio in
MANET for topology based routing protocols (AODV, DSR, and DSDV). International Journal of
Advanced Research in Engineering and Technology, 1(2), 2013, 54-58
[25.] D.N. Vadhwani, M. Singh, D. Kulhare. Simulation of wireless dynamic source routing protocol with IP
traffic flow analysis, memory efficiency and increased throughput. IJCom, 3(4), 2013, 136-141
[26.] S. Upadhyay, P. Joshi, N. Gandotra, and A. Kumari. Comparison and performance analysis of reactive
type DSR, AODV and proactive type DSDV routing protocol for wireless mobile ad-hoc network, using
NS-2 simulator. Journal of engineering and computer innovations, 2(10), 2012, 36-47
[27.] M. Chandrika, and N. Papanna. Performance comparison of AOMDV and POR routing protocols in
MANETs. International Journal of Engineering Research and Applications, 3(4), 2013, 37-41
[28.] T. Issariyakul, and E. Hossain, Introduction to network simulator NS2 (New York: Springer, 2012
[29.] A. Gani, Q. Han, N. B. adrulAnuar, and O. Zakaria. Enhancing DSR protocol performance in mobile ad
hoc network using ACK reply. WSEAS TRANSACTIONS On Communications, 2(2), 2009, 227-236
6. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 69 | P a g e
Fig1. Handling packet arrival in DSR agent implemented in NS2
Yes
No
Is RREQ No
(Iam a hop)
handleForwardin
g
(Get next hop,
Forward pkt to)
Done
handleRouteRequest
(process RREQthat is not for me)
Done
p.dst=net-id
Done
handlePacketReceip
t
Yes
N
o
DSR Packet Received
YesIs srh valid
(souce route in pkt
header)
Is BcastPkt
Yes
handlePacketWithoutS
R
Done
No
Init sr
(Give a pkt source
header)
sendOutBcastPkt
Done
Yes
P.src=net-id
(I am initiator)
Error
No
Done
Verify if another
packet in send buffer
waiting this Route
sendOutPacketWithRoute
Begin
Yes
Ignore pkt
Yes No
acceptDataPkt
(it is a data packet for me)
Done
Yes No
Update route cache
acceptRouteReply
R.REP
Done
returnSrcRouteToRequestor
(Take the route in pkt, add my ID to end of it
then return Route to the sender of pkt)
No
Seen before
R.Req
Fig3. handlePacketReceipt method
7. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 70 | P a g e
Fig 5. Average-end-to-end delay for number of nodes.
0
50
100
150
200
250
20
30
40
50
60
70
80
90
100
110
120
130
140
average end-to-end delay
average end-to-end
delay
Fig 4. handleRouteRequest method
Yes
No
Ignore packet
(Pkt is a request that has been
already processed)
Done
Propagate R.Req to neighbors
Is there a Route
to dest in cache
Add my ID to Route Record
Done
Send R.REP to Source
Done
Begin
Is pkt seen
before
YesNo
8. Ali El-Desoky et al.Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 2), December 2014, pp.64-71
www.ijera.com 71 | P a g e
Fig 6. Throughput over number of nodes.
Fig 7. Packet delivery ratio at different nodes.
490
500
510
520
530
540
550
560
570
580
590
20 30 40 50 60 70 80 90 100 110 120 130 140
throughput
throughput
0.993
0.994
0.995
0.996
0.997
0.998
0.999
20
30
40
50
60
70
80
90
100
110
120
130
140
packet delivery ratio
packet delivery ratio