SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. III (Jan. - Feb .2016), PP 74-79
www.iosrjournals.org
DOI: 10.9790/2834-11127479 www.iosrjournals.org 74 | Page
Design and Simulation of Mobile Ad Hoc Network for Multiple
Mobility Management
Anubhuti Jain1
, Shashank Mane2
1,2
(Electronics and communication, SBITM Betul, RGPV University Bhopal, India)
Abstract: Now a days many countries are facing a serious problem of mobile signal strength. It has also
become a major issue in many parts of the world. In order to solve this problem use of MANET (mobile ad hoc
network) through WiMAX has popularized. In this paper I will show the complete scenario of MANET network.
In this three conditions are included: when the users are fixed, when the users are movable away from the base
station and the last one is when the users are movable towards the base station. These three conditions are
shown one by one by routing protocol both AODV and DSDV and results are simulated with NS2.
Keywords: AODV, Ad hoc network, DSDV, MANET, NS2, Simulation, WiMAX
I. Introduction
1.1 Mobile Ad Hoc Network(MANET)
Mobile Ad hoc network is a group of wireless equipments knows as wireless nodes, that vigorously
links and transmit information .Wireless nodes can be personal computer with wireless LAN card, Personal
digital assistant (PDA) or additional types of wireless or mobile communication equipments. A wireless node in
general is any computing device that utilizes the air as broadcasting medium.
Fig.1 In this fig we can see there is one base station, through which all the devices like mobiles and laptops are
connected. Base station transfers the data to all devices.
In MANET, a wireless node can be the basis, the target, or transitional node of data broadcasting . A
node playing the task of in between node, functions as a router that can obtain and forward data packets to its
near the objective node. The nature of Ad hoc is the reason because of which wireless nodes have a propensity
to keep moving in place of being still. Consequently, the network topology alters from time to time.
1.2 WiMAX
Worldwide interoperability microwave access includes wireless standards initially formed to give 30-
40 megabit/second data rates and after having 2011 update it allocates up to 1 gigabit/second for stationary
stations. It was named WIMAX by WIMAX Forum which started in June 2001 led and forwarded the
conformity and interoperability of standard IEEE 802.16 or wireless man advanced is nominee for the 4G, in
contest with LTE advanced.
1.3Conditions Related To MANET
In this scenario of MANET, there are eight nodes out of which four users are there, three are relay
stations and one is base station.
1) When users are fixed- In this the base station is fixed along with relay station and users i.e. the users are fixed
on their position and neither move towards the base station nor away from it.
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 75 | Page
2) When the users move towards the base station- In this the base station and relay stations are fixed however,
the users are in continuous motion towards the base station. Time the user takes to reach to the base station
depends on the speed which might be defined by us. It can be changed as per users wish.
3) When the users are moving away from the base station- In this the users are continuously moving away from
the base stations but the base and relay stations are fixed. The time taken depends on the speed of the user
defined earlier.
II. Protocols Used
Here we use two protocols the first one is AODV and the other is DSDV.
2.1 Aodv
AODV is a routing protocol for Ad hoc mobile networks with many mobile nodes. AODV stands for
Ad hoc on demand distance vector. As its name suggests it creates routes on demand by the users. Thus, it is a
reactive protocol. The information about the next hop to the destination and the sequence number is obtained
from the destination are stored by routing table showing the freshness of information obtained.
Furthermore the information about the lively neighbors is collected throughout the discovery of the
target host. When the equivalent route breaks, then the neighbors can be notified. The avoidance of source
routing decreases the routing burden in a large network. It is the main advantage of AODV. In addition another
useful feature of AODV is its application of enlarging ring search to manage the deluge of RREQ (Route
Request) packets and look for routes to strange destinations. Along with this it also supplies destination
sequence numbers, permitting the nodes to have up to date routes.
On the other hand few nodes have to be taken into concern when using AODV. Firstly, it needs
bidirectional links and periodic link layer acknowledgements to become aware of broken links. Then, it needs to
sustain routing tables for maintenance unlike DSR.
2.2 Dsdv
It stands for Destination sequenced distance vector routing. It creates routes automatically and is active
all the time. It checks for updates itself without users demand. DSDV requires more data packets than AODV.
It adds attributes, sequence number, to each route table entry of the conventional routing information protocol
(RIP). Utilizing the initially linked sequence number, the mobile nodes can differentiate stale route information
from the latest and thus prevent the formation of routing loops.
In DSDV, every mobile node belonging to an ad hoc network sustains a routing table, which registers
all existing destinations, the metric and next hop to each destination and a sequence made by the destination
node. Using such routing table which is piled up in each mobile node, the packets are broadcasted between the
nodes of an ad hoc network. Sporadically routing table is updated with advertisement by nodes on an ad hoc
network or when important new information is available to sustain the stability of the routing table with the
vigorously altering topology of the ad hoc network.
At times or at once when network topology modification are sensed, each mobile node advertises
routing information using transmitting or multicasting a routing table update packet. The update packet launch
out with a metric of one to direct connected nodes.It shows that each neighbor is at a distance of one metric
(hop) from the node. It is dissimilar from that of the conventional algorithm. After having the update packet,
routing table is updated by the neighbor with rise in the metric by one and recovery the update packet to the
equivalent neighbors of each of them.
This process will be go over till all the nodes of Ad hoc network get a copy of the update packet with a
equivalent metric. Before updating routing table and retransmitting the update packet for each destination node,
the update data is maintained for a short time till the arrival of the best route. If a node obtains more than one
update packets for the same destination during waiting time duration, the routes with more fresh sequence
numbers are always chosen as the source for packet forwarding decisions. If the update packet with same
sequence number is found with the same node, then the update packet with the smallest metric is utilized and the
existing route will be deleted or stored as less favorable. Interpreting the advertisement of probably unstable root
can moisten the rise and fall of the routing table and decrease the number of retransmission of possible route
entries that enter in with same sequence number.
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 76 | Page
III. Simulation Parameter
Table.1 shows simulation parameters and their description. It shows channel type, protocols, packet size and
other parameters.
IV. Simulation Result
The simulation results are shown below.
Fig.2 In this fig user are fixed at their position
In this figure the red point shows base stations or server, the blue ones are relay stations and green ones are
users. We can see in above diagram, users are fixed at their position i.e. they can’t move towards or away from
the base station. And black circle indicates the coverage area.
Fig. 3 In this fig we can see that the users are moving towards the base station
In this figure the red point shows base stations or server, the blue ones are relay stations and green ones
are users .We can see in this diagram users are moving towards the base station. And black circle indicates the
coverage area.
Parameter Description
1.Channel Wireless
2. Radio propagation Two ray ground
3.Network interface Wireless physical
4. Mac type 802.16
5. Interface queue Drop tail/pre queue
6. Antenna type Omni directional
7. Routing protocol AODV & DSDV
8. Packet size 1000 byte
9. Nodes 8
10. Area 500/500
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 77 | Page
Fig. 4 this graph shows that what happens when the users moving towards the base station in AODV
Fig 4 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate
that the maximum delay of the condition in which user are moving towards the base station for AODV protocol
is about 97 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number
of lines shoes the number of packet communicated in the network which is design using AODV protocol.
Fig.5 this graph shows that what happens when the users moving away from the base station in AODV
Fig 5 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the
maximum delay of the condition in which user are moving towards the base station for AODV protocol is about
98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines
shoes the number of packet communicated in the network which is design using AODV protocol.
Fig 6 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the
maximum delay of the condition in which user are moving away from the base station for AODV protocol is
about 98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of
lines shoes the number of packet communicated in the network which is design using AODV protocol.
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 78 | Page
Fig. 6 this graph shows that what happens when the users moving towards the base station in DSDV
Table. 2 shows the results for AODV protocol when users are moving towards the base station.
Average Throughput 797.6480 kbps
Total packet sent 1720
Total packet received 1474
Packet delivery ratio 85.697674 %
Packet loss ratio 14.302326 %
Table. 3 shows the results for AODV protocol when users are moving away from the base station.
Table.4 shows the results for DSDV protocol when users are moving towards the base station
Average Throughput 657.1686 kbps
Total packet sent 1720
Total packet received 1223
Packet delivery ratio 71.104651 %
Packet loss ratio 28.895349 %
V. Conclusion
From the above all result we can conclude that if the mobile user are fix or moving towards the base
station then the signal strength will increase and high signal to noise ratio obtain due to which we got maximum
packet delivery and less packet loss for AODV as well as DSDV protocol. But if the mobile user moves away
from the base station then the strength of the signal decreases and the result for both the protocols are degrade
than other two scenarios.
VI. Future Work
In the upcoming days we will be able to implement more nodes in MANET. The number of base stat
ion, relay station and users would be increased. Recently in this paper I have used AODV and DSDV routing
protocols but in future we would be implement by many other protocols.
Refrences
[1] Mrs.S.Madhurikkha &Dr.R.Sabitha ,Defending against packet dropping attack using DRI & cross checking mechanism in MANET.
[2] Zahian Ismail& Rosilah Hassan, Effect of packet size on AODV routing protocol implementation in homogenous and heterogenous
manet-2011
[3] S.Mangai & A.Tamilarasi ,Hybrid location aided routing protocol for gps enabled manet clusters-29 Dec 2011
[4] Zhenyu Chen, Lin Guan ,Xingang Wang, Xunli Fan “Ad hoc On-demand Multipath Distance Vector routing with Backup Route
Update Mechanism” IEEE 14TH
International Conference On High Performance Computing And Communications 2012.
[5] Prabhakar D. Dorge, Sanjay S. Dorle, Megha B. Chakole and Dhiraj K. Thote , “Improvement of QoS in VANET with Different
Mobility Patterns” Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012), SKP
Engineering College, Tiruvannamalai, TN., India. 21 - 22 December, 2012.
Average Throughput 1678.0190 kbps
Total packet sent 2375
Total packet received 1977
Packet delivery ratio 83.242105 %
Packet loss ratio 16.757895 %
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 79 | Page
[6] Rajan patel& nimisha patel , A comparative study and simulation of AODV & DSDV manet routing protocol in ns2 & ns3- march
2014.

More Related Content

What's hot

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
pijans
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
IJCNCJournal
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
pijans
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
ijctet
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
International Journal of Computer and Communication System Engineering
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
ijctet
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
cscpconf
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
eSAT Journals
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET Journal
 
L010326978
L010326978L010326978
L010326978
IOSR Journals
 
Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...
eSAT Journals
 
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
IJCI JOURNAL
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
IJERA Editor
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
drboon
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
IOSR Journals
 
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET Journal
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
eSAT Publishing House
 

What's hot (19)

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
 
Ijetcas14 357
Ijetcas14 357Ijetcas14 357
Ijetcas14 357
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
 
10
1010
10
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
L010326978
L010326978L010326978
L010326978
 
Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...
 
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
 
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 

Similar to J011137479

Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
ijsrd.com
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
شيماء شقيرة
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
pijans
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
IAEME Publication
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
ijsrd.com
 
E1073644
E1073644E1073644
E1073644
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
IRJET Journal
 
K017426872
K017426872K017426872
K017426872
IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
Australian Society for Commerce Industry Engineering
 
Cm34531538
Cm34531538Cm34531538
Cm34531538
IJERA Editor
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
ijwmn
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ijasuc
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
IJECEIAES
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
IJCNCJournal
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
IJERA Editor
 

Similar to J011137479 (20)

Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
E1073644
E1073644E1073644
E1073644
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
K017426872
K017426872K017426872
K017426872
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
Cm34531538
Cm34531538Cm34531538
Cm34531538
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 
C011121114
C011121114C011121114
C011121114
IOSR Journals
 
B011120510
B011120510B011120510
B011120510
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
K011138084
K011138084K011138084
K011138084
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 
B011120510
B011120510B011120510
B011120510
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

J011137479

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. III (Jan. - Feb .2016), PP 74-79 www.iosrjournals.org DOI: 10.9790/2834-11127479 www.iosrjournals.org 74 | Page Design and Simulation of Mobile Ad Hoc Network for Multiple Mobility Management Anubhuti Jain1 , Shashank Mane2 1,2 (Electronics and communication, SBITM Betul, RGPV University Bhopal, India) Abstract: Now a days many countries are facing a serious problem of mobile signal strength. It has also become a major issue in many parts of the world. In order to solve this problem use of MANET (mobile ad hoc network) through WiMAX has popularized. In this paper I will show the complete scenario of MANET network. In this three conditions are included: when the users are fixed, when the users are movable away from the base station and the last one is when the users are movable towards the base station. These three conditions are shown one by one by routing protocol both AODV and DSDV and results are simulated with NS2. Keywords: AODV, Ad hoc network, DSDV, MANET, NS2, Simulation, WiMAX I. Introduction 1.1 Mobile Ad Hoc Network(MANET) Mobile Ad hoc network is a group of wireless equipments knows as wireless nodes, that vigorously links and transmit information .Wireless nodes can be personal computer with wireless LAN card, Personal digital assistant (PDA) or additional types of wireless or mobile communication equipments. A wireless node in general is any computing device that utilizes the air as broadcasting medium. Fig.1 In this fig we can see there is one base station, through which all the devices like mobiles and laptops are connected. Base station transfers the data to all devices. In MANET, a wireless node can be the basis, the target, or transitional node of data broadcasting . A node playing the task of in between node, functions as a router that can obtain and forward data packets to its near the objective node. The nature of Ad hoc is the reason because of which wireless nodes have a propensity to keep moving in place of being still. Consequently, the network topology alters from time to time. 1.2 WiMAX Worldwide interoperability microwave access includes wireless standards initially formed to give 30- 40 megabit/second data rates and after having 2011 update it allocates up to 1 gigabit/second for stationary stations. It was named WIMAX by WIMAX Forum which started in June 2001 led and forwarded the conformity and interoperability of standard IEEE 802.16 or wireless man advanced is nominee for the 4G, in contest with LTE advanced. 1.3Conditions Related To MANET In this scenario of MANET, there are eight nodes out of which four users are there, three are relay stations and one is base station. 1) When users are fixed- In this the base station is fixed along with relay station and users i.e. the users are fixed on their position and neither move towards the base station nor away from it.
  • 2. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 75 | Page 2) When the users move towards the base station- In this the base station and relay stations are fixed however, the users are in continuous motion towards the base station. Time the user takes to reach to the base station depends on the speed which might be defined by us. It can be changed as per users wish. 3) When the users are moving away from the base station- In this the users are continuously moving away from the base stations but the base and relay stations are fixed. The time taken depends on the speed of the user defined earlier. II. Protocols Used Here we use two protocols the first one is AODV and the other is DSDV. 2.1 Aodv AODV is a routing protocol for Ad hoc mobile networks with many mobile nodes. AODV stands for Ad hoc on demand distance vector. As its name suggests it creates routes on demand by the users. Thus, it is a reactive protocol. The information about the next hop to the destination and the sequence number is obtained from the destination are stored by routing table showing the freshness of information obtained. Furthermore the information about the lively neighbors is collected throughout the discovery of the target host. When the equivalent route breaks, then the neighbors can be notified. The avoidance of source routing decreases the routing burden in a large network. It is the main advantage of AODV. In addition another useful feature of AODV is its application of enlarging ring search to manage the deluge of RREQ (Route Request) packets and look for routes to strange destinations. Along with this it also supplies destination sequence numbers, permitting the nodes to have up to date routes. On the other hand few nodes have to be taken into concern when using AODV. Firstly, it needs bidirectional links and periodic link layer acknowledgements to become aware of broken links. Then, it needs to sustain routing tables for maintenance unlike DSR. 2.2 Dsdv It stands for Destination sequenced distance vector routing. It creates routes automatically and is active all the time. It checks for updates itself without users demand. DSDV requires more data packets than AODV. It adds attributes, sequence number, to each route table entry of the conventional routing information protocol (RIP). Utilizing the initially linked sequence number, the mobile nodes can differentiate stale route information from the latest and thus prevent the formation of routing loops. In DSDV, every mobile node belonging to an ad hoc network sustains a routing table, which registers all existing destinations, the metric and next hop to each destination and a sequence made by the destination node. Using such routing table which is piled up in each mobile node, the packets are broadcasted between the nodes of an ad hoc network. Sporadically routing table is updated with advertisement by nodes on an ad hoc network or when important new information is available to sustain the stability of the routing table with the vigorously altering topology of the ad hoc network. At times or at once when network topology modification are sensed, each mobile node advertises routing information using transmitting or multicasting a routing table update packet. The update packet launch out with a metric of one to direct connected nodes.It shows that each neighbor is at a distance of one metric (hop) from the node. It is dissimilar from that of the conventional algorithm. After having the update packet, routing table is updated by the neighbor with rise in the metric by one and recovery the update packet to the equivalent neighbors of each of them. This process will be go over till all the nodes of Ad hoc network get a copy of the update packet with a equivalent metric. Before updating routing table and retransmitting the update packet for each destination node, the update data is maintained for a short time till the arrival of the best route. If a node obtains more than one update packets for the same destination during waiting time duration, the routes with more fresh sequence numbers are always chosen as the source for packet forwarding decisions. If the update packet with same sequence number is found with the same node, then the update packet with the smallest metric is utilized and the existing route will be deleted or stored as less favorable. Interpreting the advertisement of probably unstable root can moisten the rise and fall of the routing table and decrease the number of retransmission of possible route entries that enter in with same sequence number.
  • 3. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 76 | Page III. Simulation Parameter Table.1 shows simulation parameters and their description. It shows channel type, protocols, packet size and other parameters. IV. Simulation Result The simulation results are shown below. Fig.2 In this fig user are fixed at their position In this figure the red point shows base stations or server, the blue ones are relay stations and green ones are users. We can see in above diagram, users are fixed at their position i.e. they can’t move towards or away from the base station. And black circle indicates the coverage area. Fig. 3 In this fig we can see that the users are moving towards the base station In this figure the red point shows base stations or server, the blue ones are relay stations and green ones are users .We can see in this diagram users are moving towards the base station. And black circle indicates the coverage area. Parameter Description 1.Channel Wireless 2. Radio propagation Two ray ground 3.Network interface Wireless physical 4. Mac type 802.16 5. Interface queue Drop tail/pre queue 6. Antenna type Omni directional 7. Routing protocol AODV & DSDV 8. Packet size 1000 byte 9. Nodes 8 10. Area 500/500
  • 4. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 77 | Page Fig. 4 this graph shows that what happens when the users moving towards the base station in AODV Fig 4 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the maximum delay of the condition in which user are moving towards the base station for AODV protocol is about 97 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines shoes the number of packet communicated in the network which is design using AODV protocol. Fig.5 this graph shows that what happens when the users moving away from the base station in AODV Fig 5 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the maximum delay of the condition in which user are moving towards the base station for AODV protocol is about 98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines shoes the number of packet communicated in the network which is design using AODV protocol. Fig 6 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the maximum delay of the condition in which user are moving away from the base station for AODV protocol is about 98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines shoes the number of packet communicated in the network which is design using AODV protocol.
  • 5. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 78 | Page Fig. 6 this graph shows that what happens when the users moving towards the base station in DSDV Table. 2 shows the results for AODV protocol when users are moving towards the base station. Average Throughput 797.6480 kbps Total packet sent 1720 Total packet received 1474 Packet delivery ratio 85.697674 % Packet loss ratio 14.302326 % Table. 3 shows the results for AODV protocol when users are moving away from the base station. Table.4 shows the results for DSDV protocol when users are moving towards the base station Average Throughput 657.1686 kbps Total packet sent 1720 Total packet received 1223 Packet delivery ratio 71.104651 % Packet loss ratio 28.895349 % V. Conclusion From the above all result we can conclude that if the mobile user are fix or moving towards the base station then the signal strength will increase and high signal to noise ratio obtain due to which we got maximum packet delivery and less packet loss for AODV as well as DSDV protocol. But if the mobile user moves away from the base station then the strength of the signal decreases and the result for both the protocols are degrade than other two scenarios. VI. Future Work In the upcoming days we will be able to implement more nodes in MANET. The number of base stat ion, relay station and users would be increased. Recently in this paper I have used AODV and DSDV routing protocols but in future we would be implement by many other protocols. Refrences [1] Mrs.S.Madhurikkha &Dr.R.Sabitha ,Defending against packet dropping attack using DRI & cross checking mechanism in MANET. [2] Zahian Ismail& Rosilah Hassan, Effect of packet size on AODV routing protocol implementation in homogenous and heterogenous manet-2011 [3] S.Mangai & A.Tamilarasi ,Hybrid location aided routing protocol for gps enabled manet clusters-29 Dec 2011 [4] Zhenyu Chen, Lin Guan ,Xingang Wang, Xunli Fan “Ad hoc On-demand Multipath Distance Vector routing with Backup Route Update Mechanism” IEEE 14TH International Conference On High Performance Computing And Communications 2012. [5] Prabhakar D. Dorge, Sanjay S. Dorle, Megha B. Chakole and Dhiraj K. Thote , “Improvement of QoS in VANET with Different Mobility Patterns” Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012), SKP Engineering College, Tiruvannamalai, TN., India. 21 - 22 December, 2012. Average Throughput 1678.0190 kbps Total packet sent 2375 Total packet received 1977 Packet delivery ratio 83.242105 % Packet loss ratio 16.757895 %
  • 6. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 79 | Page [6] Rajan patel& nimisha patel , A comparative study and simulation of AODV & DSDV manet routing protocol in ns2 & ns3- march 2014.