SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 339
IMPLEMENTATION OF DYNAMIC SOURCE ROUTING (DSR) IN
MOBILE AD HOC NETWORK (MANET)
Thiyam Romila Devi1
, Rameswari Biswal2
, Vikram Kumar3
, Abhishek Jena4
1, 2, 3, 4
M.Tech, School of Electronics, KIIT University, Odisha, India
romilath@gmail.com, rameswaribiswal@gmail.com, vikram_2006be@yahoo.co.in, bapuni207@gmail.com
Abstract
Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s
is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays
an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network
(MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its
location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network.
The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest
path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in
Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The
performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing
overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection.
All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better
performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number
of hop to transfer information between nodes.
Keywords: MANET, DSR, ANT Algorithm
----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
1.1 MANET Overview
Mobile ad hoc network (MANET) is a autonomous and
dynamic network consist of wireless mobile hosts or nodes.
For example, communication between remote notes is based
on multiple hop. These nodes are dynamically and arbitrarily
located in such a manner that the interconnections between
nodes are capable of changing on a continual basis. Thus
MANETs are self configuring as there is no central
management system with configuration responsibilities. All
the mobile nodes can communicate each other directly if they
are in others wireless links radio range. In order to enable data
transfer they either communicate through single hop or multi
hop with the help of intermediate nodes. MANETs allow
ubiquitous service access anywhere, anytime without any
fixed infrastructure, thus named as an infrastructure-less
network that can be widely used in military, battlefields,
management services, classrooms, various multimedia
applications and conference halls. The Fig-1. shows the
MANET
Fig-1: Infrastructure less Network
1.2 DSR Protocol and Optimization
The DSR (Dynamic source routing) protocol is a simple and
efficient routing protocol for wireless mesh network which is
designed for the use in multi- hop wireless ad hoc network of
mobile nodes. DSR allows the network to be completely self-
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 340
organizing and self-configuring, without the need of any
predefined infrastructure. This protocol is composed of the
two main mechanisms of a) Route discovery and b) Route
maintenance. These two work together to allow nodes to
discover and maintain routes to arbitrarily destination in the ad
hoc network [1].
1.2.1 Route Discovery
Route Discovery is used to discover a route from source to
particular destination using two stages; Route request (RREQ)
and Route Reply(RREP). This method also includes some
optimization measures; during route request process, and
intermediate node can be authorized to issue a complete route
reply if it contains a valid route to the destination in its route
cache memory. Whenever a source wants to communicate
with destination and if it does not have a route in its Route
Cache, it broadcasts a RREQ message to find a particular
route. Each neighbour receives the RREQ and appends its
own address to the address list in the RREQ (if it has not
already processed the same request earlier) and re-broadcasts
the packet. This process will continue until either the
maximum hop counter is incremented (or RREQ is rejected)
or the destination is reached. The destination receives the
RREQ, appends its address and generates a route reply packet
(RREP) back towards the source using the reverse of the
accumulated route in latter case. When the source finally
receives RREP, it will store the route in its Route Cache [2].
Fig-2: DSR Route Discovery
During the process of discovery, there's a problem that should
be noticed. In the Figure1 above, node D may receive the
router requests both from node C and node E at the same time,
this will lead to the message collision, and the correct requests
cannot be accepted. Therefore, the broadcast in Ad hoc
network isn't reliable. This kind of problem can be avoided by
random delay transmission, authentication and so on.
However, random delay transmission cannot guarantee to
choose the best suitable router item, while the authentication
has to send more router control messages, thus results in more
resource wasted and load aggravation. There comes up a new
algorithm to solve this problem, i.e. ANT Algorithm
1.2.2 Route Maintenance
Route Maintenance is used to manage (cache, expire, switch
among) previously discovered routes. Once some nodes find
the neighbouring link that data is to be sent by is disconnected,
they immediately send a route error message RERR to source
node. When the source node receives the error packet, it
deletes all the routes that use the invalid link from the buffer,
and starts a new route discovery process if necessary. The
nodes that forward the error packet along the way delete all
the route in the broken link from their own routing table. The
route discovery procedure of DSR protocol often discovers
many routes from source node to destination node. And route
with minimal hop is more possible chosen for data
transmission than others, the nodes frequently chosen are more
likely to consume more energy, which results in short usage of
battery.
1.3 Architecture of Mobile communication system
based on DSR
DSR is used to replace the former routing protocol in BS. In
the same time the backbone network of mobile
communication system becomes an entire IP network. Every
BS has assigned a unique IP address and the data transmitted
between the BSs results into the IP formation of the same data.
The Fig- 2. Shows BS of Mobile communication network after
the improvement.
The basic elements of BS are-
a) Wireless link control layer- This layer defines reliable data
transmission between MS and BS in circuit mode and it can be
expanded like as link layer.
b) Wireless resource management layer- It both builds and
removes the wireless link between MS and BS for the MS
where it moves in network when the link state transmission is
being maintained.
c) Mobility management layer- It realizes some functions of
MS such as user's register and authorization in the service area
of different BSs.
d) Communication management layer- It realizes the functions
of management to wireless users such as routing management
and routing management.
e) Switching- It realizes the IP's disposal of data. It can be
discovered and maintained the route between BSs of source
MS and destination MS according to DSR protocol.
f) Wireless channels (Uu) interface- It defines the wireless
interface between BS and Ms.
g). Wireless channels (lu) interface- It defines the wireless
interface between BSs.
The Fig-3 shows the data flow from one BS to another BS
with two wireless hops in mobile communication with the
entire mobility of data and also shows how the inclusion of
more intermediate BSs would behave. The MS originates a
typical data packet and is arriving at the BS A through Uu
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 341
interface. At BS A the packet must transverse the entire
protocol stacks, from the Uu interface down to the lu interface.
At the intermediate BS, the packet must brought up to DSR
sub layer and will be examined and is sent out again. Hence ,
packets do not go beyond the DSR sub layer in the route. All
the packets are originated from and is terminated at the sub
layer of DSR. The relaying of control packets is same as that
of the data packets.
Fig-3: BS of Mobile Communication Network
2. ANT ALGORITHM
ANT algorithm is an algorithm that is similar as the behavior
of ant colonies, known as ant system. Ant can find the
shortest route between the nest and the food source by
footprints or pheromones on the path that has been
traversed. Ants are practically blind but they still manage to
find their way to and from food. These observations inspired a
new type of algorithm called ant algorithms (or ant
systems)[3][4][5][6]. In order to determine the shortest route,
Ant algorithm is being used and the steps of determining are
as follows:-
a). Initialization parameters value algorithm. The intensity of
inter-node ant trail and changes (τij), many of nodes (n)
includes the coordinates (x, y) or the distance between
nodes (dij), Origin node and destination node, constant
cycle of ants (Q), constant intensity controller ant trail (α),
the value of α ≥ 0, constant control visibility (β), the
value of β ≥ 0, visibility between nodes = 1/dij (ηij), the
number of ants (m), evaporation constant trail of ants (ρ),
ρ values must be > 0 and <1 to prevent infinite
pheromone trail, and the maximum number of cycles
(NCmax) is fixed during the algorithm run, while costs
(τij) will be updated at each cycle algorithm from the
first cycle (NC = 1) to reach the maximum number of
cycles (NC = NCmax) or until there is convergence. After
we initialization parameters, further we Initialize the first
node each ant. First performed initialization (τij), then (m)
ants are placed on certain first node randomly. This ant
called forward ant packet, it will trace the route to the
destination node. When it was discovered the destination
node, the ants would go back through the same route. In
this condition the ant called backward ant.
b). Charging the first node in the tabu list. Tabu list is a table
containing the visibility of information between nodes.The
results of the first node initialization every ant in first step
should be filled as the first element of the table list. The
result of this step is to fill its first element table list each ant
with a particular node index, which means that every
tabuk (1) can contain node index between 1and n as the
initialization in step (a).
c). Composition of each ant route to all node. Ant colonies
that have been distributed to some or each node will start to
travel from each first node as the origin node and one
other node as the destination node. Then from the second
node, respectively, ant colonies will continue the trip by
choosing one of the nodes that are not on tabuk as the next
destination node. Journey ant colony continues until all the
nodes one by one visited or have occupied tabuk.If s expressed
sequence index visit, expressed as tabuk origin node (s) and
other node is expressed as {Ntabuk}, then the destination
node is used to determine the probability of the node
equations to visit [3][4][5][6]:
= (1)
for j , for other j with I
as the index of the origin node and J as index destination
node.
d). Calculation of route length of every ant. Calculation of
closed route length (length closed tour) or Lk any ants
performed after one cycle completed by all ants. This
calculation is done based each tabuk with the following
equation with dij is the distance between node i to node j
[3][4][5][6] :
(2)
(3)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 342
to search the shortest route. After every ant Lk is
calculated, will get a minimum length of each cycle routes
closed or Lmin NC and minimum values on the whole length
of the route is closed or Lmin. Calculation of changes in
the value of the intensity of inter-node ant footprints. Ant
colonies will leave footprints on the path between the nodes in
its path. The existence of evaporation and the difference in
the number of ants making the possibility of a change in the
value of the intensity of inter-node ant footprints. The
equation this changes is [3][4][5][6] :
(4)
Changes in intensity values between nodes and
footprints every ant is calculated based on the equation:
, for (i,j) origin node and destination node
in tabuk (5)
= 0, for other (i,j)
e). The calculation of the value of the intensity of internodes
ant footprints for the next cycle. Ant footprints intensity
values between nodes on all paths between nodes is likely
to change due to evaporation and the difference in the
number of ants that passed. For the next cycle, the ant will
pass the track intensity prices have changed. Ant footprints
intensity values between nodes for the next cycle is
calculated by the equation [3][4][5][6]:
= P* (6)
further Reset the value of the intensity changes between
nodes ant footprints. For the next cycle of price changes
ant trail intensity between the nodes need to be rearranged
in order to have a value equal to zero.
f). Emptying of tabu list, and repeat step b if necessary.
Tabu list needs to be emptied to be filled again with the
new order of nodes in the next cycle, if the maximum
number of cycles has not been achieved or has not
convergence. Algorithm is repeated from step b with prices
intensity parameter ant footprints among nodes that have
been updated.
3. SIMULATION
3.1. Simulation Parameter
In this paper we simulate the transmission of packet data in
mobile Ad Hoc network using DSR protocol that has been
optimized using Ant algorithm ( DSR-Ant). For simulation we
have used Qualnet 5.2 Software. In our simulation we have
taken simulation area 500X500 meters, radio propagation
model Rayleigh and Rician and simulation time 100ms. The
performance will be measured in terms of Qos parameters of
delay and throughput. For analyzing routing scenario, we have
considered routing overhead and hop count. Above mentioned
parameters plays very important roles in analyzing the
network. Delay and throughput parameter gives performance
at receiver side and routing overhead and hop count parameter
used to analyze routing performance based on algorithm used.
3.2. Scenario Analysis
We have analyzed three scenarios to evaluate DSR
performance in velocity of node movement. This is to evaluate
the routing protocol performance in velocity variation and
environment.
 In first scenario, we have fixed nodes and increasing
the velocity of node and data is being transmitted
between the nodes. In this we used 9 values between
2m/s to 18m/s.
 In second scenario, we implement various pause time
to evaluate routing protocol performance in dynamic
network. We have used pause time values between
10s to 100s.
 In third scenario, we have implemented constant
velocity with increasing traffic connection between
the node. We have used ten different traffic
connection and the number of node between 2 to 20.
When there is more traffic then queuing is higher and
produces congestion in network.
4. RESULT AND ANALYSIS
4.1. For velocity scenario
The result shows higher throughput and smaller end -to-end
delay as shown in Fig-4.1(a) and Fig-4.1(b)[7]. DSR-ant
searches the best path needs more routing overhead in a
manner such that protocol find shortest path with smaller hop
change in velocity will effect the shape and configuration of
network data transmission path. In this scenario, we have
analyzed that DSR-ant performance is better than standard
DSR in throughput, smaller end-to-end delay and number of
hop to send the message but DSR-ant has larger routing
overhead.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 343
Fig-4.1: (a) Throughput
Fig-4.1: (b) End-to-end delay
4.2. Result and Analysis Pause Time Scenario
The Fig-4.2(a) and Fig-4.2(b)[7] shows the pause time
scenario of end-to-end delay and Throughput. We have
analyzed that DSR-ant has smaller end-to-end delay because
this algorithm can search most efficient path with higher
throughput than standard DSR.
Fig-4.2: (a) End-to-end delay
Fig-4.2: (b) Throughput
4.3. Result and Analysis Traffic Connection Scenario
The traffic connection scenario is shown in Fig-4.3 (a), (b), (c)
and (d)[7]. When we are increasing traffic connection in the
network between the user or node will create congestion,
larger number of packets will wait in queue in the system and
lesser bandwidth. The routing protocol that has been
optimized with Ant algorithm can improved the performance
with smaller end-to-end delay and lesser number of hop. DSR-
ant have higher throughput in comparison to standard DSR but
due to complex calculation in DSR-ant to find the shortest
path, we have higher value of routing overhead.
Fig-4.3: (a) End-to-end delay
Fig-4.3: (b) Throughput
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 344
Fig-4.3: (c) Routing overhead
Fig-4.3: (d) Average hop count
CONCLUSIONS
Ant algorithm is a very good tool to be implemented in
optimization of mobile ad hoc network. we have implemented
it using Qualnet 5.2 in reference to three different scenario and
compared our result with a standard DSR. Our result shows
that DSR-ant can improve the performance of MANET in
respect to end-to-end delay, throughput and number of hop to
transfer the message from sender to receiver. We can reduce
time needed to search for the shortest path using the Ant
algorithm. This will makes our mobile Ad hoc network faster
REFERENCES
[1]. Istikmal, Meylanie Olivya, "Performance Analysis of
Routing Protocol on Data Forwarding Effectiveness in
Mobile Ad hoc Network", Proceedings of The 5th
International Conference on Telematics System, Services
and Applications. Institute Technology of Bandung,
November 19-21, 2009.
[2]. Zhaohua Long, Zheng He."Optimization and
Implementation of DSR Route Protocol based on Ad hoc
network".
[3]. Gianni Di Caro and Marco Dorigo. “AntNet: Distributed
Stigmergetic Control for Communications Networks”. Journal
of Artificial Intelligence Research, 9:317–365, 1998.
[4]. Gianni Di Caro."Ant Colony Optimization and Its
Application to Adaptive Routing in Telecommunication
Network"
[5]. Vincensius LR, Indrarini Dyah I, Istikmal . "Performance
Analysis DSDV and ZRP based Ant algorithm at Mobile Ad
hoc network". Telecommunications Journal of Research and
Development, december 2010 volume 15-number 2,pp-109
[6]. Leksono, Agus.“Ant Colony Optimization (ACO)
Algorithm to Completed Travelling Salesman Problem (TSP).
Faculty of Mathematics and natural Sciences, University of
Dipengoro,2009.
[7]. Istikmal."Analysis And Evaluation Optimization Dynamic
Source Routing ( DSR ) Protocol in Mobile Adhoc Network
Based on Ant Algorithm". International Conference of
information and communication technology (ICoICT),2013.
BIOGRAPHIES
Thiyam Romila Devi:- Has received B.E
in Electronics and communication
Engineering from KNSIT, Bangalore
under Visvesvaraya Technological
University (VTU),Belgaum, India. She is
presently pursuing M. Tech from KIIT-
University, Bhubaneswar, Odisha, India with specialization in
Communication System Engineering (ETC).
Rameswari Biswal: Has received B.Tech in
Electronics and Communication Engineering
from BCET, Balasore under Biju Patnayak
University of Technology (BPUT), India.
She is presently pursuing M. Tech from
KIIT-University, Bhubaneswar, Odisha, with
specialization in Communication System Engineering (ETC).
Vikram Kumar:- Has received B.E. in
Electronics and communication
Engineering from LNCT, Bhopal under
Rajiv Gandhi Proudyogiki vishwavidyalaya
(RGTU), India. He is presently pursuing
M. Tech from KIIT-University, Bhubaneswar, Odisha, with
specialization in Communication System Engineering (ETC).
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 345
Abhishek Jena:- Has received B. Tech in
Electronics and communication
Engineering from SRM College of
Engineering ,Chennai under SRM
University, India. He is presently
pursuing M. Tech from KIIT-University,
Bhubaneswar, Odisha, with specialization
in Communication System Engineering (ETC)

More Related Content

What's hot

1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the
yasinalimohammed
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
ijdpsjournal
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
eSAT Publishing House
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdma
eSAT Publishing House
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
Saurabh Mishra
 
Location updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manetLocation updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manet
eSAT Journals
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
eSAT Journals
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
eSAT Publishing House
 
Geographical routing protocols for mobile ad hoc networks a survey on their ...
Geographical routing protocols for mobile ad hoc networks  a survey on their ...Geographical routing protocols for mobile ad hoc networks  a survey on their ...
Geographical routing protocols for mobile ad hoc networks a survey on their ...
eSAT Journals
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
cscpconf
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
eSAT Publishing House
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
KhushbooGupta145
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
ijwmn
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
eSAT Publishing House
 
F04503057062
F04503057062F04503057062
F04503057062
ijceronline
 
E1073644
E1073644E1073644
E1073644
IJERD Editor
 

What's hot (17)

1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the1.a distributed three hop routing protocol to increase the
1.a distributed three hop routing protocol to increase the
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
Pilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdmaPilot aided scheduling for uplink ofdma
Pilot aided scheduling for uplink ofdma
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Location updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manetLocation updation for energy efficient geographic routing in manet
Location updation for energy efficient geographic routing in manet
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 
Geographical routing protocols for mobile ad hoc networks a survey on their ...
Geographical routing protocols for mobile ad hoc networks  a survey on their ...Geographical routing protocols for mobile ad hoc networks  a survey on their ...
Geographical routing protocols for mobile ad hoc networks a survey on their ...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
F04503057062
F04503057062F04503057062
F04503057062
 
E1073644
E1073644E1073644
E1073644
 

Viewers also liked

IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16
Spiro Vellore
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
itsjadu
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
yatin1988
 
Manet
ManetManet
Mymanet
MymanetMymanet
Mymanet
Akshay Vasava
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
shashi712
 
Ad hoc
Ad hocAd hoc
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
Sohebuzzaman Khan
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
Tarun Varshney
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
Sushant Kushwaha
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
Aman Gupta
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
Aman Saurabh
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Sushant Kushwaha
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
swatikamat
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
Md. Mashiur Rahman
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
Subhankar Chakraborty
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
Elanthendral Mariappan
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
Darpan Dekivadiya
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
Chandra Meena
 

Viewers also liked (20)

IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16IEEE HARDWARE TITLES 2015-16
IEEE HARDWARE TITLES 2015-16
 
mobile computing and ad hoc network
mobile computing and ad hoc networkmobile computing and ad hoc network
mobile computing and ad hoc network
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
Manet
ManetManet
Manet
 
Mymanet
MymanetMymanet
Mymanet
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 

Similar to Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)

A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
eSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
eSAT Journals
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attack
eSAT Publishing House
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
eSAT Publishing House
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
eSAT Journals
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...
eSAT Publishing House
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
eSAT Publishing House
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
eSAT Journals
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
Eswar Publications
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
eSAT Journals
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
eSAT Publishing House
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
eSAT Journals
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
eSAT Publishing House
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...
eSAT Journals
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes in
eSAT Publishing House
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
IRJET Journal
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
eSAT Publishing House
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
eSAT Journals
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
eSAT Journals
 

Similar to Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet) (20)

A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attack
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...Performance evaluation of various types of nodes in manet with dsr routing pr...
Performance evaluation of various types of nodes in manet with dsr routing pr...
 
Performance evaluation of various types of nodes in
Performance evaluation of various types of nodes inPerformance evaluation of various types of nodes in
Performance evaluation of various types of nodes in
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniquesEstimation of morphometric parameters and runoff using rs &amp; gis techniques
Estimation of morphometric parameters and runoff using rs &amp; gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Digital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes completeDigital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes complete
shubhamsaraswat8740
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
drshikhapandey2022
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
Abdullah Al Noman
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Massimo Talia
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
uqyfuc
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 

Recently uploaded (20)

Digital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes completeDigital Image Processing Unit -2 Notes complete
Digital Image Processing Unit -2 Notes complete
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUESAN INTRODUCTION OF AI & SEARCHING TECHIQUES
AN INTRODUCTION OF AI & SEARCHING TECHIQUES
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
Presentation on Food Delivery Systems
Presentation on Food Delivery SystemsPresentation on Food Delivery Systems
Presentation on Food Delivery Systems
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 

Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 339 IMPLEMENTATION OF DYNAMIC SOURCE ROUTING (DSR) IN MOBILE AD HOC NETWORK (MANET) Thiyam Romila Devi1 , Rameswari Biswal2 , Vikram Kumar3 , Abhishek Jena4 1, 2, 3, 4 M.Tech, School of Electronics, KIIT University, Odisha, India romilath@gmail.com, rameswaribiswal@gmail.com, vikram_2006be@yahoo.co.in, bapuni207@gmail.com Abstract Generally, the Base station (BS) is fixed in the mobile communication system however in Mobile Ad hoc network, Base Station (BS)s is not used, thus it is named as infrastructure less network which can manage its network independently. The Routing protocol plays an important role and a lot of research has been done in this area. This paper presents a protocol for routing mobile ad hoc network (MANET) that uses dynamic source routing. This protocol adapts quickly to the change in the routing path as the host is changing its location frequently. DSR allows the network to be fully self-organising and self-configuring without the need for any existing network. The protocol is composed of the two mechanisms of route discovery and route maintenance work together to search for the shortest path and also to maintain source route to arbitrary destination in the Mobile ad hoc network, we used optimize routing protocol in Mobile ad hoc network (MANET).This optimization is done on DSR (Dynamic Source Routing) protocol using ANT algorithm. The performance of DSR is analyzed using Qualnet 5.2 with respect to QOS (Quality of Service) of throughput, end to end delay, Routing overhead, Average hop count. All the parameter are analyzed in three different scenario of velocity, pause time and traffic connection. All the result are compared with the result of standard DSR routing protocol. The comparison shows that the DSR-ant has better performance than standard DSR. By using Ant algorithm, the DSR optimization can be improved with a smaller delay and the number of hop to transfer information between nodes. Keywords: MANET, DSR, ANT Algorithm ----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION 1.1 MANET Overview Mobile ad hoc network (MANET) is a autonomous and dynamic network consist of wireless mobile hosts or nodes. For example, communication between remote notes is based on multiple hop. These nodes are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Thus MANETs are self configuring as there is no central management system with configuration responsibilities. All the mobile nodes can communicate each other directly if they are in others wireless links radio range. In order to enable data transfer they either communicate through single hop or multi hop with the help of intermediate nodes. MANETs allow ubiquitous service access anywhere, anytime without any fixed infrastructure, thus named as an infrastructure-less network that can be widely used in military, battlefields, management services, classrooms, various multimedia applications and conference halls. The Fig-1. shows the MANET Fig-1: Infrastructure less Network 1.2 DSR Protocol and Optimization The DSR (Dynamic source routing) protocol is a simple and efficient routing protocol for wireless mesh network which is designed for the use in multi- hop wireless ad hoc network of mobile nodes. DSR allows the network to be completely self-
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 340 organizing and self-configuring, without the need of any predefined infrastructure. This protocol is composed of the two main mechanisms of a) Route discovery and b) Route maintenance. These two work together to allow nodes to discover and maintain routes to arbitrarily destination in the ad hoc network [1]. 1.2.1 Route Discovery Route Discovery is used to discover a route from source to particular destination using two stages; Route request (RREQ) and Route Reply(RREP). This method also includes some optimization measures; during route request process, and intermediate node can be authorized to issue a complete route reply if it contains a valid route to the destination in its route cache memory. Whenever a source wants to communicate with destination and if it does not have a route in its Route Cache, it broadcasts a RREQ message to find a particular route. Each neighbour receives the RREQ and appends its own address to the address list in the RREQ (if it has not already processed the same request earlier) and re-broadcasts the packet. This process will continue until either the maximum hop counter is incremented (or RREQ is rejected) or the destination is reached. The destination receives the RREQ, appends its address and generates a route reply packet (RREP) back towards the source using the reverse of the accumulated route in latter case. When the source finally receives RREP, it will store the route in its Route Cache [2]. Fig-2: DSR Route Discovery During the process of discovery, there's a problem that should be noticed. In the Figure1 above, node D may receive the router requests both from node C and node E at the same time, this will lead to the message collision, and the correct requests cannot be accepted. Therefore, the broadcast in Ad hoc network isn't reliable. This kind of problem can be avoided by random delay transmission, authentication and so on. However, random delay transmission cannot guarantee to choose the best suitable router item, while the authentication has to send more router control messages, thus results in more resource wasted and load aggravation. There comes up a new algorithm to solve this problem, i.e. ANT Algorithm 1.2.2 Route Maintenance Route Maintenance is used to manage (cache, expire, switch among) previously discovered routes. Once some nodes find the neighbouring link that data is to be sent by is disconnected, they immediately send a route error message RERR to source node. When the source node receives the error packet, it deletes all the routes that use the invalid link from the buffer, and starts a new route discovery process if necessary. The nodes that forward the error packet along the way delete all the route in the broken link from their own routing table. The route discovery procedure of DSR protocol often discovers many routes from source node to destination node. And route with minimal hop is more possible chosen for data transmission than others, the nodes frequently chosen are more likely to consume more energy, which results in short usage of battery. 1.3 Architecture of Mobile communication system based on DSR DSR is used to replace the former routing protocol in BS. In the same time the backbone network of mobile communication system becomes an entire IP network. Every BS has assigned a unique IP address and the data transmitted between the BSs results into the IP formation of the same data. The Fig- 2. Shows BS of Mobile communication network after the improvement. The basic elements of BS are- a) Wireless link control layer- This layer defines reliable data transmission between MS and BS in circuit mode and it can be expanded like as link layer. b) Wireless resource management layer- It both builds and removes the wireless link between MS and BS for the MS where it moves in network when the link state transmission is being maintained. c) Mobility management layer- It realizes some functions of MS such as user's register and authorization in the service area of different BSs. d) Communication management layer- It realizes the functions of management to wireless users such as routing management and routing management. e) Switching- It realizes the IP's disposal of data. It can be discovered and maintained the route between BSs of source MS and destination MS according to DSR protocol. f) Wireless channels (Uu) interface- It defines the wireless interface between BS and Ms. g). Wireless channels (lu) interface- It defines the wireless interface between BSs. The Fig-3 shows the data flow from one BS to another BS with two wireless hops in mobile communication with the entire mobility of data and also shows how the inclusion of more intermediate BSs would behave. The MS originates a typical data packet and is arriving at the BS A through Uu
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 341 interface. At BS A the packet must transverse the entire protocol stacks, from the Uu interface down to the lu interface. At the intermediate BS, the packet must brought up to DSR sub layer and will be examined and is sent out again. Hence , packets do not go beyond the DSR sub layer in the route. All the packets are originated from and is terminated at the sub layer of DSR. The relaying of control packets is same as that of the data packets. Fig-3: BS of Mobile Communication Network 2. ANT ALGORITHM ANT algorithm is an algorithm that is similar as the behavior of ant colonies, known as ant system. Ant can find the shortest route between the nest and the food source by footprints or pheromones on the path that has been traversed. Ants are practically blind but they still manage to find their way to and from food. These observations inspired a new type of algorithm called ant algorithms (or ant systems)[3][4][5][6]. In order to determine the shortest route, Ant algorithm is being used and the steps of determining are as follows:- a). Initialization parameters value algorithm. The intensity of inter-node ant trail and changes (τij), many of nodes (n) includes the coordinates (x, y) or the distance between nodes (dij), Origin node and destination node, constant cycle of ants (Q), constant intensity controller ant trail (α), the value of α ≥ 0, constant control visibility (β), the value of β ≥ 0, visibility between nodes = 1/dij (ηij), the number of ants (m), evaporation constant trail of ants (ρ), ρ values must be > 0 and <1 to prevent infinite pheromone trail, and the maximum number of cycles (NCmax) is fixed during the algorithm run, while costs (τij) will be updated at each cycle algorithm from the first cycle (NC = 1) to reach the maximum number of cycles (NC = NCmax) or until there is convergence. After we initialization parameters, further we Initialize the first node each ant. First performed initialization (τij), then (m) ants are placed on certain first node randomly. This ant called forward ant packet, it will trace the route to the destination node. When it was discovered the destination node, the ants would go back through the same route. In this condition the ant called backward ant. b). Charging the first node in the tabu list. Tabu list is a table containing the visibility of information between nodes.The results of the first node initialization every ant in first step should be filled as the first element of the table list. The result of this step is to fill its first element table list each ant with a particular node index, which means that every tabuk (1) can contain node index between 1and n as the initialization in step (a). c). Composition of each ant route to all node. Ant colonies that have been distributed to some or each node will start to travel from each first node as the origin node and one other node as the destination node. Then from the second node, respectively, ant colonies will continue the trip by choosing one of the nodes that are not on tabuk as the next destination node. Journey ant colony continues until all the nodes one by one visited or have occupied tabuk.If s expressed sequence index visit, expressed as tabuk origin node (s) and other node is expressed as {Ntabuk}, then the destination node is used to determine the probability of the node equations to visit [3][4][5][6]: = (1) for j , for other j with I as the index of the origin node and J as index destination node. d). Calculation of route length of every ant. Calculation of closed route length (length closed tour) or Lk any ants performed after one cycle completed by all ants. This calculation is done based each tabuk with the following equation with dij is the distance between node i to node j [3][4][5][6] : (2) (3)
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 342 to search the shortest route. After every ant Lk is calculated, will get a minimum length of each cycle routes closed or Lmin NC and minimum values on the whole length of the route is closed or Lmin. Calculation of changes in the value of the intensity of inter-node ant footprints. Ant colonies will leave footprints on the path between the nodes in its path. The existence of evaporation and the difference in the number of ants making the possibility of a change in the value of the intensity of inter-node ant footprints. The equation this changes is [3][4][5][6] : (4) Changes in intensity values between nodes and footprints every ant is calculated based on the equation: , for (i,j) origin node and destination node in tabuk (5) = 0, for other (i,j) e). The calculation of the value of the intensity of internodes ant footprints for the next cycle. Ant footprints intensity values between nodes on all paths between nodes is likely to change due to evaporation and the difference in the number of ants that passed. For the next cycle, the ant will pass the track intensity prices have changed. Ant footprints intensity values between nodes for the next cycle is calculated by the equation [3][4][5][6]: = P* (6) further Reset the value of the intensity changes between nodes ant footprints. For the next cycle of price changes ant trail intensity between the nodes need to be rearranged in order to have a value equal to zero. f). Emptying of tabu list, and repeat step b if necessary. Tabu list needs to be emptied to be filled again with the new order of nodes in the next cycle, if the maximum number of cycles has not been achieved or has not convergence. Algorithm is repeated from step b with prices intensity parameter ant footprints among nodes that have been updated. 3. SIMULATION 3.1. Simulation Parameter In this paper we simulate the transmission of packet data in mobile Ad Hoc network using DSR protocol that has been optimized using Ant algorithm ( DSR-Ant). For simulation we have used Qualnet 5.2 Software. In our simulation we have taken simulation area 500X500 meters, radio propagation model Rayleigh and Rician and simulation time 100ms. The performance will be measured in terms of Qos parameters of delay and throughput. For analyzing routing scenario, we have considered routing overhead and hop count. Above mentioned parameters plays very important roles in analyzing the network. Delay and throughput parameter gives performance at receiver side and routing overhead and hop count parameter used to analyze routing performance based on algorithm used. 3.2. Scenario Analysis We have analyzed three scenarios to evaluate DSR performance in velocity of node movement. This is to evaluate the routing protocol performance in velocity variation and environment.  In first scenario, we have fixed nodes and increasing the velocity of node and data is being transmitted between the nodes. In this we used 9 values between 2m/s to 18m/s.  In second scenario, we implement various pause time to evaluate routing protocol performance in dynamic network. We have used pause time values between 10s to 100s.  In third scenario, we have implemented constant velocity with increasing traffic connection between the node. We have used ten different traffic connection and the number of node between 2 to 20. When there is more traffic then queuing is higher and produces congestion in network. 4. RESULT AND ANALYSIS 4.1. For velocity scenario The result shows higher throughput and smaller end -to-end delay as shown in Fig-4.1(a) and Fig-4.1(b)[7]. DSR-ant searches the best path needs more routing overhead in a manner such that protocol find shortest path with smaller hop change in velocity will effect the shape and configuration of network data transmission path. In this scenario, we have analyzed that DSR-ant performance is better than standard DSR in throughput, smaller end-to-end delay and number of hop to send the message but DSR-ant has larger routing overhead.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 343 Fig-4.1: (a) Throughput Fig-4.1: (b) End-to-end delay 4.2. Result and Analysis Pause Time Scenario The Fig-4.2(a) and Fig-4.2(b)[7] shows the pause time scenario of end-to-end delay and Throughput. We have analyzed that DSR-ant has smaller end-to-end delay because this algorithm can search most efficient path with higher throughput than standard DSR. Fig-4.2: (a) End-to-end delay Fig-4.2: (b) Throughput 4.3. Result and Analysis Traffic Connection Scenario The traffic connection scenario is shown in Fig-4.3 (a), (b), (c) and (d)[7]. When we are increasing traffic connection in the network between the user or node will create congestion, larger number of packets will wait in queue in the system and lesser bandwidth. The routing protocol that has been optimized with Ant algorithm can improved the performance with smaller end-to-end delay and lesser number of hop. DSR- ant have higher throughput in comparison to standard DSR but due to complex calculation in DSR-ant to find the shortest path, we have higher value of routing overhead. Fig-4.3: (a) End-to-end delay Fig-4.3: (b) Throughput
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 344 Fig-4.3: (c) Routing overhead Fig-4.3: (d) Average hop count CONCLUSIONS Ant algorithm is a very good tool to be implemented in optimization of mobile ad hoc network. we have implemented it using Qualnet 5.2 in reference to three different scenario and compared our result with a standard DSR. Our result shows that DSR-ant can improve the performance of MANET in respect to end-to-end delay, throughput and number of hop to transfer the message from sender to receiver. We can reduce time needed to search for the shortest path using the Ant algorithm. This will makes our mobile Ad hoc network faster REFERENCES [1]. Istikmal, Meylanie Olivya, "Performance Analysis of Routing Protocol on Data Forwarding Effectiveness in Mobile Ad hoc Network", Proceedings of The 5th International Conference on Telematics System, Services and Applications. Institute Technology of Bandung, November 19-21, 2009. [2]. Zhaohua Long, Zheng He."Optimization and Implementation of DSR Route Protocol based on Ad hoc network". [3]. Gianni Di Caro and Marco Dorigo. “AntNet: Distributed Stigmergetic Control for Communications Networks”. Journal of Artificial Intelligence Research, 9:317–365, 1998. [4]. Gianni Di Caro."Ant Colony Optimization and Its Application to Adaptive Routing in Telecommunication Network" [5]. Vincensius LR, Indrarini Dyah I, Istikmal . "Performance Analysis DSDV and ZRP based Ant algorithm at Mobile Ad hoc network". Telecommunications Journal of Research and Development, december 2010 volume 15-number 2,pp-109 [6]. Leksono, Agus.“Ant Colony Optimization (ACO) Algorithm to Completed Travelling Salesman Problem (TSP). Faculty of Mathematics and natural Sciences, University of Dipengoro,2009. [7]. Istikmal."Analysis And Evaluation Optimization Dynamic Source Routing ( DSR ) Protocol in Mobile Adhoc Network Based on Ant Algorithm". International Conference of information and communication technology (ICoICT),2013. BIOGRAPHIES Thiyam Romila Devi:- Has received B.E in Electronics and communication Engineering from KNSIT, Bangalore under Visvesvaraya Technological University (VTU),Belgaum, India. She is presently pursuing M. Tech from KIIT- University, Bhubaneswar, Odisha, India with specialization in Communication System Engineering (ETC). Rameswari Biswal: Has received B.Tech in Electronics and Communication Engineering from BCET, Balasore under Biju Patnayak University of Technology (BPUT), India. She is presently pursuing M. Tech from KIIT-University, Bhubaneswar, Odisha, with specialization in Communication System Engineering (ETC). Vikram Kumar:- Has received B.E. in Electronics and communication Engineering from LNCT, Bhopal under Rajiv Gandhi Proudyogiki vishwavidyalaya (RGTU), India. He is presently pursuing M. Tech from KIIT-University, Bhubaneswar, Odisha, with specialization in Communication System Engineering (ETC).
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 345 Abhishek Jena:- Has received B. Tech in Electronics and communication Engineering from SRM College of Engineering ,Chennai under SRM University, India. He is presently pursuing M. Tech from KIIT-University, Bhubaneswar, Odisha, with specialization in Communication System Engineering (ETC)