COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
Routing protocols for mobile ad-hoc networks have to
face the challenge of frequently changing topology, low
transmission power and asymmetric links. Both
proactive and reactive routing protocols prove to be
inefficient under these circumstances. The Zone Routing
Protocol (ZRP) combines the advantages of the proactive
and reactive approaches by maintaining an up-to-date
topological map of a zone centered on each node. Within
the zone, routes are immediately available. For
destinations outside the zone, ZRP employs a route
discovery procedure, which can benefit from the local
routing information of the zones.
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
Routing protocols for mobile ad-hoc networks have to
face the challenge of frequently changing topology, low
transmission power and asymmetric links. Both
proactive and reactive routing protocols prove to be
inefficient under these circumstances. The Zone Routing
Protocol (ZRP) combines the advantages of the proactive
and reactive approaches by maintaining an up-to-date
topological map of a zone centered on each node. Within
the zone, routes are immediately available. For
destinations outside the zone, ZRP employs a route
discovery procedure, which can benefit from the local
routing information of the zones.
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
MANETS are working in distributed environment and dynamically changing the network topology. MANET protocols can be table driven or on demand as per requirement. DSDV (Destination Sequenced Distance Vector) and OLSR (Optimized Link State Routing protocol) both are table driven (proactive) protocol. Performances of both proactive protocols are evaluated using NS-2 simulator under various metrics and no. of mobile nodes is 10 in the network.
Simulation (http://www.tetcos.com/ ) of Sink Hole Attack in Mobile Ad-Hoc Networks can be done NetSim Network Simulator
follow this link for more Details: http://www.tetcos.com/
MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
MANETS are working in distributed environment and dynamically changing the network topology. MANET protocols can be table driven or on demand as per requirement. DSDV (Destination Sequenced Distance Vector) and OLSR (Optimized Link State Routing protocol) both are table driven (proactive) protocol. Performances of both proactive protocols are evaluated using NS-2 simulator under various metrics and no. of mobile nodes is 10 in the network.
Simulation (http://www.tetcos.com/ ) of Sink Hole Attack in Mobile Ad-Hoc Networks can be done NetSim Network Simulator
follow this link for more Details: http://www.tetcos.com/
MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols- Contention based protocols with Reservation Mechanisms- Contention based protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
Today, Voice over Wireless Local Area Network (VOWLAN) is the most accepted Internet application.
There are a large number of literatures regarding the performance of various WLAN networks. Most of
them focus on simulations and modeling, but there are also some experiments with real networks. This
paper explains the comparison of performance of two different VOIP (Voice over Internet Protocol)
applications over the same IEEE 802.11a wireless network. Radio link standard 802.11a have maximum
transmission rate of 54Mbps. First protocol is session initiation protocol (SIP) and second is H.323
protocol. First one has an agent called SIP proxy. Second have a gateway reflects the characteristics of a
Switched Circuit Network (SCN). With this comparison we have required to obtain a better understanding
of wireless network suitability for voice communication in IP network.
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes.
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
Mobile ad hoc network is a collection of wireless nodes that are communicate other
nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an
autonomous system that means no need for depaentd other nodes it have own capability
to handle and controlling all funcitionlity, to sending and receiving all information form
one device to other device. MANET has power full feature that controlling itself by
dynamic nature, multihop,low power and configuration of the system. In this paper we
analyzing, simulation and implements the TC messages and HELLO Message by MPR of
OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet
simulator to simulate and implement the performance of OLSR routing protocols takes
various performance metrics like hello message sent (HMS) , hello message received
(HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages
received on Constant Bit Rate (CBR) using random waypoint model. In this paper check
the performance OLSR routing protocol gives effective performance for lage networks.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
Abstract
Mobile Ad Hoc Network (MANET) are becoming more and more important in the modern environment. It can be used instantly to connect to the local or remote network without using the pre-existing infrastructure. The mobile or user in the network can together establish the infrastructure. In order to improve the limited range of radio transmission, multiple network ‘hops’ are needed so that the communication between the mobiles can be establish. There are varieties of protocol that had been proposed for the hopping methods but most of them suffer from high overhead. This project proposed a new method of hopping protocol for IEEE 802.11b using the existing network protocol which is Address Resolution Protocol (ARP). The ARP message is used in the network to find the MAC address of the destination. This can also be done by having multi hops where the proposed method using ARP designed will make an intermediate node act as a router in order to find the destination address and forward the data successfully. In this proposed method, the data is directly passed to the intermediate node and the intermediate node will help to find the route to the destination and passed the data to the destination node. This will reduce the transmission time. From the simulation obtained, it proved that the proposed method using the ARP protocol can works well as the existing network protocol which is Ad Hoc On-Demand Distance Vector (AODV). The simulation is composed into two types of environment which are with and without obstacles. The throughput, the packet loss and the round trip time for various distances is simulated and the results shows that the performance of the proposed method using ARP is much better compared to the AODV.
Index Terms: Address Resolution Protocol (ARP), Ad-Hoc, 802.11 Wifi, Hopping
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Monitoring Java Application Security with JDK Tools and JFR Events
Ismail&&ziko 2003
1. Computer Science Department
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK
WITH MEDICAL DATA
Prepared by:
ISMAIL H-MOFTAH ELDABAR
Supervised by:
Professor Zakaria Suliman Zubi
2. Ad Hoc wireless network that without any central controlling
authority, which is a collection of mobile nodes that are dynamically
and arbitrarily located in such a manner that the interconnections
between nodes are capable of changing on a continual basis, so nodes
cooperate to route a packet.
Limited bandwidth of throughput and low delay in high density nodes
are tow characteristics of Ad Hoc wireless network.
The purpose of the routing protocols is to discover rapid changes of
the topology in such a way that intermediate nodes can act as routers
to forward packets on behalf of the communicating pair .
Route construction should be done with a minimum of overhead and
bandwidth consumption. In configuration, topology management
issues are even more important in the context of Ad Hoc wireless
networks.
2
12/15/13
2
4. What is the wireless network?
Ad Hoc Wireless network is used in many applications such as healthcare,
military, environmental, home automation, farming, surveillance security and
traffic control. It normally consists of hundreds or thousands of nodes each
capable to work as router, processing, and transmitting environmental
information.
However, an Ad Hoc Wireless network consists of nodes which could also
have a fixed location or randomly deployed to monitor the environment, certain
physical phenomena or to detect and track certain objects in an area of work.
Ad Hoc Wireless networks are useful in the wide world which has static
network structure that required by infrastructure network.
In Ad Hoc Wireless network any communication between nodes always
requires routing over multi-hop paths between the source node and the
destination node to self-organize and form a network over different links. 12/15/13
4
4
5. Infrastructure Mode using a central device, called a wireless access point. All
wireless nodes can be connect to Ethernet network through this access point.
5
12/15/13
6. Ad Hoc Mode is a collection of mobile nodes in communication without using
infrastructure.
6
12/15/13
7. Obstacles,
Noise,
Interference and
Fading.
which will reduce throughput and increase time delay for the data flow.
The links typically have less bandwidth than a wired network.
Each node in an Ad Hoc wireless network node functions as both a host and
a router, and the control of the network is circulated among the nodes.
7
12/15/13
8. Find the most suitable Ad Hoc routing protocol for the designed network.
Evaluate three most popularly used routing protocols.
Ad Hoc On Demand Distance Vector (AODV),
Optimized Link State Routing Protocol (OLSR) and
Temporally-Ordered Routing Algorithm (TORA).
Build a network connected to a server via a wireless in OpNet simulater.
The evaluation will be conducted in terms of throughput and delay of these
protocols.
8
12/15/13
9. Study
Protocol
(Hsu J.Bhatia 2003)
Performance of mobile
ad hoc networking
routing protocols in
realistic scenarios
(Vahid 2006)
Performance
Comparison of
Routing Protocols for
Mobile Ad Hoc
Networks
Simulator
Metrics
Conclusion
AODV,OLSR, QualNet
DSR and ZRP
Packet delivery
ratio, latency
and jitter of
data packets
AODV is overall
better as
compared to
other.
DSDV,
TORA, DSR
and AODV
Weighted Path
Optimality,
Network’s Load
Deviation,
Average end-toend delay,
Jitter.
DSDV is best in
Path Optimality,
DSDV and AODV
in delay, DSR in
load balancing
and DSDV in
jitter.
Ns-2
CBR traffic
source,
movement
model
based on
pause time
9
12/15/13
10. Study
Protocol
Simulator
Metrics
Conclusion
(Rahman 2010)
A Simulation Based
Performance
Comparison of
Routing Protocol on
Mobile Ad-hoc
Network
(Anuj K 2010)
Performance
analysis of AODV,
DSR & TORA
Routing Protocols
AODV,
DYMO, ZRP
and OLSR
Qualnet 4.5
CBR traffic
source, two-ray
propagation
path loss model,
mobility based
on pause time
NS-2
Packet
Delivery
Fraction,
Average Endto-end delay,
Jitter and
Throughput
average Endto-End delay
and packet
delivery ratio
DYMO best in PDF,
OLSR and ZRP
good in average
end to end delay,
ZRP better than
others in
throughput
TORA is suitable
for operation in
large mobile
networks having
dense population
of nodes.
AODV, DSR
and TORA
10
12/15/13
13. AODV uses three control messages to obtain and maintain routes:
Route Request (RREQ)
Route Reply (RREP)
Route Request (RREQ ) and Route Replay (RREP( message (Jian Wu 2007)
Route Error (RERR)
If a node is unable to forward packet, it generates a RERR
message. When the originator node receives the RERR, it initiates
a new route discovery for the given route.
13
12/15/13
14. Optimized Link State Routing (OLSR)
HELLO
TC - Topology Control
MID - Multiple Interface Declaration
14
)MPR and normal flooding (Mohamed 2011
multipoint relays (MPRs)
to minimize the number of
control messages flooding
in the network.
12/15/13
15. Temporary Ordered Routing Algorithm (TORA)
Re-establishing route on failure link 5-7.
The new reference level is node5
Height of each node updated a result of message
15
12/15/13
16. Optimized Link State Routing (OLSR)
OLSR employs multipoint relays (MPRs) to minimize the number of control messages
flooding in the network. Each node chooses a subset of its one hop neighbors (MPRs)
in such a way that these MPRs will cover all two-hop away neighbors. Hence,
messages are only flooded through MPRs, and not to all nodes. Flooding through
multipoint relays (MPRs) reduce the number of duplicate transmissions.
16
(MPR and normal flooding (Mohamed 2011
12/15/13
17. Three control messages are defined to provide this functionality:
HELLO
HELLO messages are exchanged between neighbours only, and diffuse
information about the one hop neighbours of a node.
Two hop neighbourhood can be discovered, and further, the MPRs of the given
node can be chosen.
The MPRs chosen by a node is further marked in the following HELLO messages
broadcasted by that node.
TC - Topology Control
All nodes chosen as MPR will transmit TC messages.
The TC messages contain the address of the node generating the message, as
well as the list of nodes that has chosen the given node as MPR.
TC messages are further flooded using the MPRs, disseminating network
topology information to all the nodes in the OLSR network.
MID - Multiple Interface Declaration
The MID message is broadcasted by nodes running OLSR on more
than one
network interface.
17
12/15/13
18. Temporary Ordered Routing Algorithm (TORA)
TORA maintains multiple routes to the destination when topology changes
frequently. It consists of link reversal of the Directed Acyclic Graph (ACG). It uses
Internet MANET Encapsulation Protocol (IMEP) for link status and neighbour
connectivity sensing. IMEP provide reliable, in-order delivery of all routing control
messages from a node to all of its neighbours, and notification to the routing
protocol whenever a link neighbours is created or broken.
18
12/15/13
19. Temporary Ordered Routing Algorithm (TORA)
As TORA is for multihop networks which is considered to minimize the
communication overhead associated with adapting to network topological changes
by localization of algorithmic reaction. Moreover, it is bandwidth efficient and highly
adaptive and quick in route repair during link failure figure2.8 and providing multiple
routes to destination node in wireless networks.
Re-establishing route on failure link 5-7.
The new reference level is node5
Height of each node updated a result of message
19
12/15/13
20. We will choose two criteria which derived for QoS as follows:
Throughput:
the ratio of successfully transmitted of total amount of data receiver actually
receives from sender by bits divided by the time taken by receiver to obtain the
last packet by second for the entire network; this includes all routing data and
user data (Rahman 2010).
Delay:
The time elapsed between the creation of a packet at its source and its
destruction at the destination, measured in seconds (Singla 2009). The packet
end-to-end delay is the time of generation of a packet by the source up to the
destination reception. So this is the time that a packet takes to go across the
network. This time is expressed in sec (Jha 2010).
20
12/15/13
21. The purpose of this project is to research methods of transmitting real time
data from a number of dynamic nodes in hospital environment.
1000m× 1000m indoor.
50-100 mobile workstations
wireless network server
21
12/15/13
22. The model parameters that will use in the experiments are summarized
Parameter
Value
Simulator
OpNet Modeler 14.0
Number of wireless Nodes
50-100 mobile workstations and one mobile Server
Ad Hoc Routing Protocols
AODV, OLSR and TORA
Time of simulation
1800 seconds (30 minutes)
Simulation area
Indoor, 1000m x 1000 meters
Transmission range
30-90 m
Physical Characteristics
IEEE 802.11g
Data rate
54 Mbps
Applications
HTTP, FTP, DATABASE, EMAIL and PRINT.
Metrics
Throughput and Delay
22
12/15/13
23. Application
Attributes
The Describe
Selection
File Transfer Protocol enables file transfers and
1
FTP
1,048,576 byte
downloads between nodes.
(8Megabits)
Hypertext
2
Heavy browsing
HTTP
307,200 byte
application
Transfer
protocol
Protocol (HTTP)
foundation
is
of
an
data
communication for the World wide web.
(2.34Megabits)
Electronic mail is a method of exchanging
3
Email
2,000 byte
(0.02Megabits)
messages from an author to one or more
recipients. Modern Email operates across the
internet or other computer network.
23
12/15/13
24. Application
Attributes
The Describe
Selection
A database is an organized collection of data. A
database
system implies
that
the
data
is
managed to some level of quality (measured in
4
Database
32,76byte
terms of accuracy, availability, usability, and
(0.25 megabits)
resilience) and this in turn often implies the use
of a general-purpose database management
system (DBMS).
Color (Min 3,000Print out job submission on paper.
Max 9,000,000) byte
5
Print
(0.023 – 68.7
megabits)
24
12/15/13
25. Flow chart of OpNet
Create Network
Network
configuration
Run Simulation
View results
25
Test Result Analysis
12/15/13
26. Five main Scenarios for each network design (50-100 nodes)
Each scenario has one service for all nodes in our network designed.
Scenario 1: FTP on all workstations and the server.
Scenario 2: HTTP on all workstations and the server.
Scenario 3: EMAIL on all workstations and the server.
Scenario 4: DATABASE on all workstations and the server.
Scenario 5: PRINT on all workstations and the server.
Each scenario we will apply 3 routing protocols:
Ad Hoc On-Demand Distance Vector (AODV),
Optimized Link State Routing Protocol (OLSR) and
Temporally-Ordered Routing Algorithm (TORA).
26
12/15/13
27. Simulation can be defined to show the eventual real behavior of the selected
system model, and it is a comprehensive set of tools with all the components for
custom network modeling and simulation. In this paper, an effort has been made
to perform a simulation model for ad hoc wireless network to monitor the
performance metrics of the network in different scenarios, and focus on the
comparison of data obtained by using OpNet modeler, also, the result obtained
from these different scenarios while a route recognized between source and
destination matchup is maintained as long as desirable by the source with
routing protocols selected.
27
12/15/13