International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
Mobile Ad-hoc Network (MANET) is a kind of wireless network. A Wireless ad-hoc
network is a temporary network with no network infrastructure. The nodes communicate with each
other, they co-operate by forwarding data packets to other nodes in the network. Thus the nodes
find a path to the destination node using routing protocols. Due to the security vulnerabilities of
the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes.
One of these attacks is the Sinkhole Attack. Sinkhole attack is a kind of routing attack in MANET.
A sinkhole node tries to attract all the network packets to it-self from all neighboring nodes. This
paper focuses on to detect and prevent sinkhole node. By using a hybrid detection technique which
combines the advantages of both reactive and proactive routing Protocol to detect the black hole
node. It also shows performance of ZRP.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
Routing protocol is taking a vital role in the modern internet era. A routing protocol determines
how the routers communicate with each other to forward the packets by taking the optimal path to travel
from a source node to a destination node in the network layer. Algorithms that are used for route selection
and data structure are the main parts for the network layer. But in this paper we have explored four
eminent dynamic routing protocols namely, Routing Information Protocol (RIP), Open Shortest Path First
(OSPF) & Enhanced Interior Gateway Routing Protocol (EIGRP) and Interior Gateway Routing Protocol
(IGRP) protocols. Evaluation of these routing protocols is performed based on the quantitative metrics
such as Delay, FTP, E-mail, HTTP, VoIP and Video Conferencing through the simulated network models.
The simulation results are analyzed, with a comparison between these protocols on the effectiveness and
performance in network implemented. Results show that EIGRP will be best for delay, E-mail and FTP but
for real time applications OSPF and RIP give better results
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Detection and Prevention of Sinkhole Attack on Zone Routing Protocol (ZRP) in...Editor IJMTER
Mobile Ad-hoc Network (MANET) is a kind of wireless network. A Wireless ad-hoc
network is a temporary network with no network infrastructure. The nodes communicate with each
other, they co-operate by forwarding data packets to other nodes in the network. Thus the nodes
find a path to the destination node using routing protocols. Due to the security vulnerabilities of
the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious nodes.
One of these attacks is the Sinkhole Attack. Sinkhole attack is a kind of routing attack in MANET.
A sinkhole node tries to attract all the network packets to it-self from all neighboring nodes. This
paper focuses on to detect and prevent sinkhole node. By using a hybrid detection technique which
combines the advantages of both reactive and proactive routing Protocol to detect the black hole
node. It also shows performance of ZRP.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
Survey of Reactive Routing Protocols for MANETIOSR Journals
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
Routing protocol is taking a vital role in the modern internet era. A routing protocol determines
how the routers communicate with each other to forward the packets by taking the optimal path to travel
from a source node to a destination node in the network layer. Algorithms that are used for route selection
and data structure are the main parts for the network layer. But in this paper we have explored four
eminent dynamic routing protocols namely, Routing Information Protocol (RIP), Open Shortest Path First
(OSPF) & Enhanced Interior Gateway Routing Protocol (EIGRP) and Interior Gateway Routing Protocol
(IGRP) protocols. Evaluation of these routing protocols is performed based on the quantitative metrics
such as Delay, FTP, E-mail, HTTP, VoIP and Video Conferencing through the simulated network models.
The simulation results are analyzed, with a comparison between these protocols on the effectiveness and
performance in network implemented. Results show that EIGRP will be best for delay, E-mail and FTP but
for real time applications OSPF and RIP give better results
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...IJCNCJournal
Mobile Ad hoc Network (MANET) is a distributed, infrastructure-less and decentralized network. A routing
protocol in MANET is used to find routes between mobile nodes to facilitate communication within the
network. Numerous routing protocols have been proposed for MANET. Those routing protocols are
designed to adaptively accommodate for dynamic unpredictable changes in network's topology. The mobile
nodes in MANET are often powered by limited batteries and network lifetime relies heavily on the energy
consumption of nodes. In consequence, the lack of a mobile node can lead to network partitioning. In this
paper we analyse, evaluate and measure the energy efficiency of three prominent MANET routing protocols
namely DSR, AODV and OLSR in addition to modified protocols. These routing protocols follow the
reactive and the proactive routing schemes. A discussion and comparison highlighting their particular
merits and drawbacks are also presented. Evaluation study and simulations are performed using NS-2 and
its accompanying tools for analysis and investigation of results.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
In this paper, we proposed a replacement hybrid multipath routing protocol for
MANET known as Hybrid Multipath Progressive Routing Protocol for MANET (HMPRP),
during this work we improve the performance of accepted MANET routing protocols,
namely, the Ad-hoc On-demand Distance Vector routing protocol and use of their most
popular properties to formulate a replacement Hybrid routing protocol using the received
signal strength. The proposed routing protocol optimizes the information measure usage of
MANETs by reducing the routing overload and overhead. This proposed routing protocol
additionally extends the battery lifetime of the mobile devices by reducing the specified
variety of operations for (i) Route determination (ii) for packet forwarding. Simulation
results are used to draw conclusions regarding the proposed routing algorithm and
compared it with the AODV, OLSR, and ZRP protocol. Experiments carried out based on
this proposed algorithm, shows that better performance are achieved with regard to AODV,
OLSR, and ZRP routing algorithm in terms of packet delivery ratio, throughput, energy
consumed and end-to-end packet delay.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Ft3410671073
1. Ankur Sharma, Er. Rakesh Kumar / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1067-1073
1067 | P a g e
Performance Measurement and Analysis of OLSR Routing
Protocol Based On Node Scenarios Using NS2 Simulator
Ankur Sharma1
, Er. Rakesh Kumar2
1
(Department of Computer Science and Engineering, Sant Baba Bhag Singh Institute of Engineering &
Technology-Punjab Technical University, India
2
(Department of Information Technology, Sant Baba Bhag Singh Institute of Engineering & Technology-
Punjab Technical University, India
ABSTRACT
To design of a wireless network,
measurement of performances and selection of
optimum path based on various parameters are
the main strategies In this paper, performance
analysis is carried out on “Optimized Link State
Routing Protocol” OLSR routing protocol and
measurement of performance analysis based on
different simulation parameters under various
simulation environments is presented. We
develop the simulation environment of small
network (5, 10,15,25,30 Nodes) using NS2 and
observed the complexity of the mobile ad-hoc
network. The various performance parameters
like average end-to-end delay, packets sent and
received, jitter in network, throughput,
commutative distribution and frequency
distributions has been analyzed. The paper
describes all the simulator parameters taken and
then compares the effect of complexity of
simulation environment in performance of OLSR
routing protocol. Our goal is to carry out a
systematic comparative measurement study of
Optimized Link State Routing (OLSR) protocol
in consideration of QoS parameters based on
different simulation parameters. We have
changed the different simulation environment
and measured the various parameters such as
throughput, end-to-end delay, packet delivery
rate etc.
Keywords – MANET, OLSR, NS2, Throughput,
Delay, Packet Delivery Ratio
I. INTRODUCTION
A mobile ad hoc network (MANET) is a
self-configuring infrastructure less network of
mobile devices connected by wireless. Each device
in a MANET is free to move independently in any
direction, and will therefore change its links to other
devices frequently. Each must forward traffic
unrelated to its own use, and therefore be a router.
The primary challenge in building a MANET is
equipping each device to continuously maintain the
information required to properly route traffic. Such
networks may operate by themselves or may be
connected to the larger Internet. MANETs are a kind
of wireless ad hoc networks that usually has a
routable networking environment on top of a Link
Layer ad hoc network [1]
MANET network comprising of wireless
mobile nodes also known as mobile nodes (MNs)
that pass the massages to each other without
centralized control or any kind of established
infrastructure. The communication between various
MNs directly depends upon the radio range. When
MNs are within the range of radio frequencies, they
can send the packets to each other while the MNs
which are distant of each other rely on their
neighbouring MNs to forward the packets. Each MN
acts as either a host or router. In MANET
environment, MNs are free to join or leave the
network at any point of time, resulting in a highly
dynamic network environment compared to wired
network [2]
Routing protocols used in MANET
network are divided into two categories: Proactive
and Reactive. Proactive routing protocols are table-
driven protocols and they always maintain current
up-to-date routing information by sending control
messages periodically between the hosts which
update their routing tables. The proactive routing
protocols use link-state routing algorithms which
frequently flood the link information about its
neighbours. [3] Reactive or on-demand routing
protocols create routes when they are needed by the
source host and these routes are maintained while
they are needed. Such protocols use distance-vector
routing algorithms. [4]
Figure 1 depicts the MANET protocol
structure of various routing protocols such as
Proactive, Reactive and Hybrid protocols.
Optimized Link State Protocol (OLSR) is a
proactive routing protocol, so the routes are always
immediately available when needed. OLSR is an
optimization version of a pure link state protocol. So
the topological changes cause the flooding of the
topological information to all available hosts in the
network. To reduce the possible overhead in the
network protocol uses Multipoint Relays (MPR).
2. Ankur Sharma, Er. Rakesh Kumar / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1067-1073
1068 | P a g e
Figure 1: MANET protocol structure
Pro-Active / Table Driven routing Protocols
Proactive Manet’s protocols are also called
as table-driven protocols and will actively determine
the layout of the network. Through a regular
exchange of network topology packets between the
nodes of the network, at every single node an
absolute picture of the network is maintained. There
is hence minimal delay in determining the route to
be taken. This is especially important for time-
critical traffic [24].
When the routing information becomes
worthless quickly, there are many short-lived routes
that are being determined and not used before they
turn invalid. Therefore, another drawback resulting
from the increased mobility is the amount of traffic
overhead generated when evaluating these
unnecessary routes. This is especially altered when
the network size increases. The portion of the total
control traffic that consists of actual practical data is
further decreased. Lastly, if the nodes transmit
infrequently, most of the routing information is
considered redundant. The nodes, however, continue
to expend energy by continually updating these
unused entries in their routing tables as mentioned,
energy conservation is very important in a MANET
system design. Therefore, this excessive expenditure
of energy is not desired. Thus, proactive MANET
protocols work best in networks that have low node
mobility or where the nodes transmit data
frequently. Examples of Proactive MANET
Protocols include:
1. Optimized Link State Routing (OLSR)
2. Fish-eye State Routing (FSR)
3. Destination-Sequenced Distance Vector
(DSDV)
4. Cluster-head Gateway Switch Routing
Protocol (CGSR)
Reactive (On Demand) protocols
Portable nodes- Notebooks, palmtops or
even mobile phones usually compose wireless ad-
hoc networks. This portability also brings a
significant issue of mobility. This is a key issue in
ad-hoc networks. The mobility of the nodes causes
the topology of the network to change constantly.
Keeping track of this topology is not an easy task,
and too many resources may be consumed in
signaling. Reactive routing protocols were intended
for these types of environments. These are based on
the design that there is no point on trying to have an
image of the entire network topology, since it will
be constantly changing. Instead, whenever a node
needs a route to a given target, it initiates a route
discovery process on the fly, for discovering out a
pathway [8].
Reactive protocols start to set up routes on-demand.
The routing protocol will try to establish such a
route, whenever any node wants to initiate
communication with another node to which it has no
route. This kind of protocols is usually based on
flooding the network with Route Request (RREQ)
and Route reply (RERP) messages .By the help of
Route request message the route is discovered from
source to target node; and as the target node gets a
RREQ message it send RERP message for the
confirmation that the route has been established.
This kind of protocol is usually very effective on
single-rate networks. It usually minimizes the
number of hops of the selected path. However, on
multi-rate networks, the number of hops is not as
important as the throughput that can be obtained on
a given path [15].
The different types of On Demand driven protocols
are:
1. Ad hoc On Demand Distance Vector
(AODV)
2. Dynamic Source routing protocol (DSR)
3. Temporally ordered routing algorithm
(TORA)
4. Associatively based routing (ABR)
5. Signal Stability-Based Adaptive Routing
(SSA)
6. Location-Aided Routing Protocol (LAR)
Hybrid Routing Protocols
Since proactive and reactive protocols each
work best in oppositely different scenarios, hybrid
method uses both. It is used to find a balance
between both protocols. Proactive operations are
restricted to small domain, whereas, reactive
protocols are used for locating nodes outside those
domains [8]. Examples of hybrid protocols are:
1. Zone Routing Protocol, (ZRP)
2. Wireless Ad hoc Routing Protocol,
(WARP)
II. OLSR ROTUING PROTOCOL
An OLSR is a proactive or table driven,
link-state routing protocol. Link-state routing
algorithms choose best route by determining various
characteristics like link load, delay, bandwidth etc.
Link-state routes are more reliable, stable and
accurate in calculating best route and more
3. Ankur Sharma, Er. Rakesh Kumar / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1067-1073
1069 | P a g e
complicated than hop count. To update topological
information in each node, periodic message is
broadcast over the network. Multipoint relays are
used to facilitate efficient flooding of control
message in the network. Route calculations are done
by multipoint relays to form the rout from a given
node to any destination in the network. The OLSR
protocol is developed to work independently from
other protocols. Conceptually, OLSR contain three
generic elements: a mechanism for neighbour
sensing, a mechanism for efficient flooding of
control traffic, and a specification of how to select
and diffuse sufficient topological information in the
network in order to prove optimal routes [5].
Neighbour Sensing
In OLSR, neighbour nodes related
information are gathered with “HELLO” messages
which are send over network periodically [6]. These
“HELLO” message detect changes in neighbour
nodes and related information such as interface
address, type of link symmetric, asymmetric or lost
and list of neighbours known to the node. Each node
updates and maintains an information set, describing
the neighbor and two-hop neighbor periodically
after some time.
Multi Point Relay (MPR)
The idea of multipoint relays is to
minimize the overhead of flooding message in the
network by reducing redundant retransmission in the
same region. In MPR (Multi Point Relay) a node
which is selected by its one hop neighbor to “re-
transmit” all the broadcast messages that it receive
from other node, provided that the message is not a
duplicate, and that the time to live field of the
message is greater than one [6]. In OLSR protocol,
Multi Point Relays use of “HELLO” message to
find its one hop neighbor and its two hop neighbors
through their response. Each node has a Multi Point
Relay selection set, which indicates, which node
acts as a MPR. Message is forward after the node
gets new broadcast message and message sender’s
interface address in the MPR Selector Set. MPR
Selector Set is update continuously using “HELLO”
message which are periodic because neighbor nodes
is called of dynamic nature of MANET.
Topology Control Information
Topology Control messages are diffused
with the purpose of providing each node in the
network with sufficient link-state information to
allow route calculation [6]. TC messages are
broadcast periodically by a node. Like “HELLO”
messages with these TC messages the topological
information are diffused over the entire network. A
minimum criterion for the node is to send at least
the link of its MPR Selector Set [5], [7].
PACKET FORMAT OF OLSR
OLSR uses unified packet format to carry
information related to the protocol. This particular
packet can be embedded in UDP datagrams for
transmission over the network. It Contains Packet
Length (0-15 bytes) and next 16-31 bytes in packet
format Reserved for future use, Message Type,
Message Size and Information[8].
Figure 2: Packet format of OLSR
III. SIMULATION PLATFORM CREATION
For the simulation of nodes in mobile
adhoc network (MANET), we have created the
platform on windows as well as on Ubuntu as linux
distribution. As per the research study, we have
come to know that considering that the refresh rate
of the monitor under Linux system is lower (60)
compared with Windows XP (you may improve it to
85). This low rate is harmful for your eyes. Also,
many guys cannot install NS2 under Window XP
successfully. We are very happy to compile and
install NS2 under Window XP system [9]. But at the
end we can use any kind of environment such as
Ubuntu based of windows based for simulation.
The MANET network simulations are
implemented using NS-2 simulator [10]. Nodes in
the simulation move according to a model that we
call Random Waypoint Mobility model [11]. Each
node is then assigned a particular trajectory. The
simulation period for each scenario is 50 seconds.
Packet size of 512 bytes for transmission and
receiving of packets has been set for communication
between nodes. In each simulation scenario, the
nodes are initially located at the center of the
simulation region. The MAC layer protocol IEEE
802.11 is used in all simulations with the data rate
11 Mbps. The transmission range is 250m. The
application used to generate is CBR traffic and IP is
used as Network layer protocol. The performance
evaluation, as well as the design and development of
routing protocols for MANETs, requires additional
parameters which is addressed in RFC developed by
Internet Engineering Task Force (IETF)
IV. PERFORMANCE EVALUATION AND
RESULTS
Performance Measurement Evaluation and
Results
o Performance Evaluation
4. Ankur Sharma, Er. Rakesh Kumar / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1067-1073
1070 | P a g e
Here we present the measurement of various
parameters by implementing the simulation
environment based on complexity of the nodes. As
we increase the number of nodes for performing the
simulation of OLSR protocol, number of sent and
delivered packet changes, which in turn changes the
throughput and avg. end to end delay. Throughput
is defined as the ratio of the data delivered to the
destination of the data sent out by the sources.
Average end-to-end delay is the avg. time a packet
takes to reach its destination. The table’s shows
difference between sent packets, received packets,
throughput and avg. end to end delay as the number
of nodes is increased.
The goal of our experiments is to examine
and quantify the effects of various factors and their
interactions on the overall performance of ad hoc
networks. Each run of the simulator accepts as input
a scenario file that describes the exact motion of
each node. The performance metrics helps to
characterize the network that is substantially
affected by the routing algorithm to achieve the
required Quality of Service (QoS). In this work, the
following metrics are considered.
End-to-End Delay (EED): It is the time taken for an
entire message to completely arrive at the
destination from the source. Evaluation of end-to-
end delay mostly depends on the following
components i.e. propagation time (PT), transmission
time (TT), queuing time (QT) and processing delay
(PD). Therefore,
EED is evaluated as:
EED = PT + TT + QT + PD. (1)
Throughput: It is the measure of how fast a node
can actually sent the data through a network. So
throughput is the average rate of successful message
delivery over a communication channel.
Packet Sent and Received: It is the total number of
packets sent and received during the complete
simulation timeframe, packet size is 512 bytes.
Jitter: jitter is the variation in the time between
packets arriving, caused by network congestion,
timing drift, or route changes.
Cumulative Distribution Function: CDF is short
for cumulative distribution function. This function
describes a statistical distribution. It has the value, at
each possible outcome, of the probability of
receiving that outcome or a lower one. A CDF is
usually denoted in capital letters.
Consider for example some F(x), with x a real
number is the probability of receiving a draw less
than or equal to x. A particular form of F(x) will
describe the normal distribution, or any other one-
dimensional distribution.
Frequency Distribution: A representation, either in
a graphical or tabular format, which displays the
number of observations within a given interval. The
intervals must be mutually exclusive and exhaustive.
Frequency distributions are usually used within a
statistical context.
Control Overhead: It is ratio of the control
information sent to the actual data received at each
node.
Packet Delivery Ratio (PDR): It is the ratio of the
total data bits received to total data bits sent from
source to destination.
Simulation Parameters for OLSR protocol:
Following table signifies the simulation parameters
taken for simulation environment; various
parameters have been measured by simulating the
OLSR routing protocol using NS-2 simulator;
column 1 signify the simulation parameters like
packet size, time duration etc; column 2 depicts the
corresponding values of them like packet size is 512
bytes, duration of simulation is 50 sec. etc.
Simulation Parameters: Following table
depict the various simulation parameters
Simulation Parameters Values
Network Type Mobile Ad Hoc
Connection Pattern Radio-propagation
Packet size 512 bytes
Duration 50s
Connection Type CBR/UDP
Simulation Area ( sq.m) 600
No. of Nodes 5,10,15,25,30
Table 1: Simulation Parameters
V. RESULTS AND ANALYSIS
During the course of implementation of
this research, an attempt was made to compare the
performances of OLSR routing protocol based on
various node scenarios and positions under the same
simulation environment. For all the simulations, the
same movement models were used, the numbers of
traffic sources are varied, the maximum speed of the
nodes was set to 20m/s and the packet size is fixed
to 512 bytes. The area of simulation is 600 sq.m
For the experimental significance, here we
only discuss the experimental results of simulation
of 5 nodes only. The simulations environment is the
same for other nodes of 10,15,25,30 no. of nodes.
The diversity of the experiments is more as we
increase the number of nodes in a simulation
environment.
5. Ankur Sharma, Er. Rakesh Kumar / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1067-1073
1071 | P a g e
Figure 3: Simulation with 5 nodes
Figure 3 depicts the OLSR simulation
environment with 5 nodes as well as Sending and
Receiving Packets.
Figure 4 depicts the throughput of sending
packets with respect to total simulation time. As we
have mentioned that total simulation time we have
set in our simulation environment is 50 sec, we have
run the simulation script which implements the
OLSR routing protocol for a period of 50 seconds.
We have got the following throughput of the packet
sent. Throughput is the average number of packets
sent during the complete simulation time window.
In the following graph, X-axis depicts the
simulation time in seconds which we have chosen in
our case is 50 seconds; Y-axis depicts the
throughput of sending packets. We can see that
more the simulation time, more will be the
throughput of the sending packets.
Figure 4: Throughput of sent packets vs Simulation
time.
Similarly as throughput of sending packets
vs simulation times has been depicted above, figure
5 represent the Throughput of receiving packets
during the simulation time. X-axis represents the
total simulation time and Y-axis represents the
throughput obtained during that simulation time. As
we have run the simulation for a complete duration
of 50 seconds.
The throughput or network throughput is the
average rate of successful message delivery over a
communication channel. This data may be delivered
over a physical or logical link, or pass through a
certain network node. The throughput is usually
measured in bits per second (bit/s or bps), and
sometimes in data packets per second or data
packets per time slot. The system
throughput or aggregate throughput is the sum of the
data rates that are delivered to all terminals in a
network.
The throughput can be analyzed
mathematically by means of queuing theory, where
the load in packets per time unit is denoted arrival
rate λ, and the throughput in packets per time unit is
denoted departure rate μ [22].
Figure 5: Throughput of Received Packets Vs
Simulation Time.
Figure 6: Jitter sent on all nodes
6. Ankur Sharma, Er. Rakesh Kumar / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1067-1073
1072 | P a g e
Finally we compare the Average end to end
delay vs various simulation nodes based on the
packets.
5 10 15 25 30
Packets
Sent
226 365 552 926 1105
Avg End
to end
delay
.254 .272 .363 .454. .5
Table 2: Comparison of various parameters v/s no of
nodes.
Table 2 depicts the comparison of packet
sent during the simulation time period with respect
to average end to end delay. It is obvious that when
we increase the number of nodes in a simulation
environment, it will affect the corresponding end to
end delay. But we can see, in case of 10 numbers of
nodes, there is a little increase in end to end delay
time but when we move to 15 numbers of nodes, the
cumulative difference is slightly high as compare to
the previous one. We can say there is no fixed
differences noticed by implementing the various
nodes.
VI. CONCLUSION
In this work we evaluated the four
performance measurement of OLSR routing
protocol i.e. packets sent and received, jitter, end-to-
end delay, throughput, cumulative and frequency
distribution of sent and received packets with
different number of nodes. OLSR routing protocol
was simulated with 5,10,15,25 and 30 nodes moving
randomly in an area of within the network range 600
sq m. The performance of OLSR protocol through a
network different size carried out a comparative
analysis of the performance and found it had better
performance in all aspects in a network.
From results reported above, we concluded
that as we increase the number of nodes for
performing the simulation of OLSR protocol,
number of sent and delivered packet changes, which
in turn changes the throughput and avg. end to end
delay. The OLSR protocol is the better solution for
high mobility condition. The OLSR protocol is
more efficient in networks with high density and
highly sporadic traffic. But the best situation is
when there are a large number of hosts. OLSR
requires that it continuously has some bandwidth in
order to receive the topology update messages.
In future, utilizing these performances we
can design such a protocol that can be suitably
provide data integrity as well as data delivery in
highly random mobility network better QoS
applications. In our research study, we have
considered a packet of data of 512 bytes and
minimum packet size is 48 bytes but in multimedia
application, we should have packet bigger. So, our
future work will consist of studying multimedia
traffic on this protocol and queue management, as
well as finding a solution for supporting different
data stream.
VII. ACKNOWLEDGEMENTS
During the course of this research work and
implementations, we would like to thank Er. Rakesh
Kumar, Assistant professor for his support and
extremely useful guidance. Without his guidance it
was not possible to carry out this kind of research.
REFERENCES
[1] en.wikipedia.org/wiki/Mobile_ad_hoc net
work
[2] S. Gowrishankar et al, “Scenario based
Performance Analysis of AODV and
OLSR inMobile Ad hoc Networks”,
Proceedings of the 24th South East Asia
Regional Computer Conference, November
18-19, 2007, Bangkok, Thailand
[3] [C. Perkins, E. B. Royer and S. Das (2003),
“Ad hoc On-Demand Distance Vector
(AODV) Routing”, RFC 3561, IETF
Network Working Group, July.
[4] T. Clausen and P. Jacquet (2003),
“Optimized Link State Routing Protocol
(OLSR)”, RFC 3262, IETF Network
Working Group, October 2003
[5] T.H. Clausen,et al,”The optimized link state
routing protocol evaluating through
experiments and simulation”,mindpass
center for distributed system,Aalborg
university ,Denmark.
[6] T. Clause .et al,”Optimized link state
routing protocol”,i.etf.org/rfc3626.txt,oct.
2003
[7] P. Jacquet et al,”Optimized Link State
routing protocol”,draft –ieff-olsr-04.txt-
work in progress,march 2001.
[8] www.wikipedia.com
[9] Manual for installing NS2.29 under
Window XP
[10] “The network simulator ns-
2.http://www.isi.edu/nsnam/ns2,”
[11] Tracy Camp, Jeff Boleng and Vanessa
Davies (2002), “A survey of Mobility
Models for Ad hoc Network Research”,
Wireless Communications and Mobile
computing: A special issue on Ad
hocnetwork Research, vol 2, No5, pp. 483-
502, 2002
[12] Kuldeep Vats et al, Simulation and
Performance Analysis of OLSR Routing
Protocol Using OPNET, International
Journal of Advanced Research in
Computer Science and Software
Engineering Volume 2, issue 2, February
2012,
[13] J.Macker,“mobile ad hoc Networking
(MANET): routing protocol performance
7. Ankur Sharma, Er. Rakesh Kumar / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1067-1073
1073 | P a g e
issues and Evaluation considerations“.IETF
RFC 2501, January 1999.
[14] Amendeep verma,” A study of performance
comparision of simulation ad-hoc network
routing protocol” IJCTA vol 2 (3),565-569.
[15] P. Jacqual et al,”performance analysis of
OLSR multi port relay flooding in two ad-
hoc wireless network model”INRIA.
[16] C.K Toh,”Ad-Hoc mobile wireless
network”, Prentice Hall PTR 2002;ISBN 0-
130078179.
[17] C.E.Perkins,”Ad-hoc
Networkings”,Addison-wesley 2001,ISBN
0-20130976-9.
[18] H.Zhou,”A survey on routing protocol in
MANET”,technical report:MS0-CSE-03-
08,mar,2003.
[19] A.N.Al-Khwildi, et al,”An efficient routing
protocol for wireless ad-hoc
network”,SETIT 2007.
[20] A.Zaballas et.al,”Ad hoc
routingperformance study using OPNET
modeler”, university Ramon Liull,
Barcelona (Spain)
[21] Charles E. Perkins et.al,”Ad-hoc on
demand distance vector (AODV)
Routing”,draft-left-aodv-08.txt-work in
progress,march 2001.
[22] http://en.wikipedia.org/wiki/Throughput
[23] Krishna Gorantala, ―Routing in Mobile
Ad-hoc Networks, Umea
University,Sweden, June-2006.