SlideShare a Scribd company logo
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
1
PERFORMANCE COMPARISON AND
ANALYSIS OF MOBILE AD HOC ROUTING
PROTOCOLS
T K Godder1
, M. M Hossain2
, M M Rahman1
, Md. Sipon Miah1
and S K
Mondal3
1
Dept. of Information & Communication Engineering
Islamic University, Kushtia 7003, Bangladesh.
2
Dept. of Applied Physics &Electronic Engineering
Rajshahi University, Rajshahi 6205, Bangladesh.
3
Dept. of Computer Science and Engineering
Islamic University, Kushtia 7003, Bangladesh
E-mail:{tkict, drmahbub_07}@yahoo.com, mdsiponmiah@gmail.com
ABSTRACT
A mobile ad hoc network (MANET) is a wireless network that uses multi-hop peer-to-peer routing instead
of static network infrastructure to provide network connectivity. MANETs have applications in rapidly
deployed and dynamic military and civilian systems. The network topology in a MANET usually changes
with time. Therefore, there are new challenges for routing protocols in MANETs since traditional routing
protocols may not be suitable for MANETs. Researchers are designing new MANET routing protocols
and comparing and improving existing MANET routing protocols before any routing protocols are
standardized using simulations. However, the simulation results from different research groups are not
consistent with each other. This is because of a lack of consistency in MANET routing protocol models
and application environments, including networking and user traffic profiles. Therefore, the simulation
scenarios are not equitable for all protocols and conclusions cannot be generalized. Furthermore, it is
difficult for one to choose a proper routing protocol for a given MANET application. According to the
aforementioned issues, this paper focuses on MANET routing protocols. Specifically, my contribution
includes the characterization of different routing protocols and compare and analyze the performance of
different routing protocols.
KEYWORDS
MANET
1. INTRODUCTION
Movements of nodes in a mobile ad hoc network cause the nodes to move in and out of range
from one another. As the result, there is a continuous making and breaking of links in the
network, making the network connectivity (topology) to vary dynamically with time. Since the
network relies on multi-hop transmissions for communication, this imposes major challenges for
the network layer to determine the multi-hop route over which data packets can be transmitted
between a given pair of source and destination nodes. Because of this time-varying nature of the
topology of mobile ad hoc networks, traditional routing techniques, such as the shortest-path
and link-state protocols that are used in fixed networks, cannot be directly applied to ad hoc
networks. A fundamental quality of routing protocols for ad hoc networks is that they must
dynamically adapt to variations of the network topology. This is implemented by devising
techniques for efficiently tracking changes in the network topology and rediscovering new
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
2
routes when older ones are broken. Since an ad hoc network is infrastructure less, these
operations are to be performed in a distributed fashion with the collective cooperation of all
nodes in the network.
Because of its many challenges, routing has been a primary focus of researchers in mobile ad
hoc networks. The MANET working group in the IETF has been working on the issue of
standardizing an IP based routing standard for mobile ad hoc networks. Consequently, a large
number of dynamic routing protocols applicable to mobile ad hoc networks have been
developed. Based on when routing activities are initiated, routing protocols for mobile ad hoc
networks may be broadly classified into three basic categories: (a) proactive or table-driven
protocols, (b) reactive or on-demand routing protocols, and (c) hybrid routing protocols.
DSDV OLSR FSR FSLS DSR AODV ZRP LANMAR
Figure 1. Classification and examples of ad hoc routing protocols.
Traditional distance-vector and link-state routing protocols [1] are proactive in that they
maintain routes to all nodes, including nodes to which no packets are sent. For that reason they
require a periodic control message, which leads to scarce resources such as power and link
bandwidth being used more frequently for control traffic as mobility increases. One example of
a proactive routing protocol is Optimized Link State Routing Protocol (OLSR) [2]. OLSR,
which has managed to reduce the utilization of bandwidth significantly. Reactive routing
protocols, on the other hand, operate only when there is a need of communication between two
nodes. This approach allows the nodes to focus either on routes that are being used or on routes
that are in process of being set up. Examples of reactive routing protocols are Ad hoc On-
Demand Distance Vector (AODV) [3], and Dynamic Source Routing (DSR) [4].
Both proactive and reactive routing has specific advantages and disadvantages that make them
suitable for certain types of scenarios. Proactive routing protocols have their routing tables
updated at all times, thus the delay before sending a packet is minimal. However, routing tables
that are always updated require periodic control messages that are flooded through the whole
network- an operation that consumes a lot of time, bandwidth and energy. On the other hand,
reactive routing protocols determine routes between nodes only when they are explicitly needed
to route packets. However, whenever there is a need for sending a packet, the mobile node must
first find the route if the route is not already known. This route discovery process may result in
considerable delay. Combining the proactive and reactive approaches results in a hybrid routing
protocol.
Ad Hoc routing protocols
Hybrid
Reactive
(On-demand)
Proactive
(table-driven)
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
3
A hybrid approach minimizes the disadvantages, but also the advantages of the two combined
approaches. The Zone Routing Protocol (ZRP) [5] is such a hybrid reactive /proactive routing
protocol. Each mobile node proactively maintains routes within a local region (referred to as the
routing zone). Mobile nodes residing outside the zone can be reached with reactive routing.
2. SIMULATION SET UP
This section describes the scenario, the movement model and the communication model used in
this study. Moreover, it presents the parameters used in the simulations.
2.1. Scenario
The studied scenario consists of 15 mobile nodes, 2 gateways, 2 routers and 2 hosts. The
topology is a rectangular area with 800 m length and 500 m width. A rectangular area was
chosen in order to force the use of longer routes between nodes than would occur in a square
area with equal node density. The two gateways are placed on each side of the area; their x,y-
coordinates in meters are (100,250) and (700,250). All simulations are run for 900 seconds of
simulated time.
Five of the 15 mobile nodes are constant bit rate traffic sources. They are distributed randomly
within the mobile ad hoc network. The time when the five traffic sources start sending data
packets is chosen uniformly distributed within the first ten seconds of the simulation. After this
times the sources continue sending data until one second before the end of the simulation. The
destination of each of the sources is one of the two hosts, chosen randomly.
A screenshot of the simulation scenario is shown in Figure 1. The five mobile nodes that are
marked with a ring are the sources. The two hexagonal nodes are the gateways and the four
square nodes are the two hosts and the two routers.
Figure 1. Screenshot of the simulation scenario.
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
4
2.3. Movement Model
The mobile nodes move according to the “random waypoint” model [6]. Each mobile node
begins the simulation by remaining stationary for pause time seconds. It then selects a random
destination in the defined topology area and moves to that destination at a random speed. The
random speed is distributed uniformly between zero (zero not included) and some maximum
speed. Upon reaching the destination, the mobile node pauses again for pause time seconds,
selects another destination, and proceeds there as previously described. This movement pattern
is repeated for the duration of the simulation.
2.4. Communication Model
In the scenario used in this study, five mobile nodes communicate with one of two fixed nodes
(hosts) located on the internet through a gateway. As the goal of the simulations was to compare
the different approaches for gateway discovery, the traffic source was chosen to be a constant
bit rate (CBR) source. Each source mobile node generates packets every 0.2 seconds in this
paper. Since each packet contain 512 bytes of data, the amount of generated data is 5*512*8
bit/s = 20 kbit/s, for each source. The traffic connection pattern is generated by CMU’s traffic
generator (cbrgen.tcl). The main parameters in cbrgen.tcl are “connections” (number of sources)
and “rate” (packet rate); see Table 1.
2.5. Parameters
The parameters that are common for all simulations are given in table 1 and the parameters that
are specific for some simulations are shown in table 2.
Table 1: General parameters used in all simulations.
Parameter Value
Transmission range 250 m
Simulation time 900 s
Topology size 800 m X 500 m
Number of mobile nodes 15
Number of sources 5
Number of gateways 2
Traffic type Constant bit rate
Packet rate 5 packets/s
Packet size 512 bytes
Pause time 5 s
Maximum speed 10 m/s
The transmission range is the maximum possible distance between two communicating mobile
nodes. If the distance between two mobile nodes is larger than 250 m they cannot communicate
with each other directly.
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
5
Table 2: Specific parameters used in some simulations.
Parameter Value
ADVERTISEMENT_INTERVAL Varied from 2-60 seconds
ADVERTISEMENT_ZONE 3 hops
ADVERTISEMENT_INTERVAL is used when proactive and hybrid discovery methods are
used. ADVERTISEMENT_ZONE is used for hybrid gateway discovery method and defines the
range within which proactive gateway discovery is used.
3. PERFORMANCE METRICS
The second goal of this paper was to “implement and compare different approaches for gateway
discovery”. Comparing the different methods is done by simulating them and examining their
behavior. In the simulations in the following section, the effects of different gateway
advertisement intervals are evaluated. In comparing the gateway discovery approaches, the
evaluation has been done according to the following two metrics:
_ The packet delivery ratio is defined as the number of received data packets divided by the
number of generated data packets.
_ The end-to-end delay is defined as the time a data packet is received by the destination minus
the time the data packet is generated by the source.
4. RESULTS AND DISCUSSIONS
In this section the effect of varying gateway advertisement intervals is evaluated. Since gateway
advertisements are not sent in the reactive gateway discovery approach, the results for this
approach are constant and independent of the advertisement interval. Each data point is an
average value of 10 runs with the same communication model, but different randomly generated
movement patterns.
4.1. Packet Delivery Ratio
Table 3 shows the packet delivery ratio of three gateway discovery methods of are proactive,
reactive and hybrid:
Table 3. The value of packet delivery ratio
Interval(s) 2 10 20 30 40 50 60
Proactive 99.84 99.8379 99.842 99.82 99.815 99.795 99.825
Reactive 99.81 99.81 99.81 99.81 99.81 99.81 99.81
Hybrid 99.85 99.835 99.815 99.825 99.82 99.8275 99.835
The values of the Table 3 are from the analysis of the out.tr file of the simulation environment.
Figure 3 shows the packet delivery ratio with advertisement intervals between 2 and 60 seconds.
As the figure shows, the packet delivery ratio is very high (above 99.8 %) for all three gateway
discovery approaches. The figure also shows that the difference between the three approaches is
very small. However, the proactive and hybrid approaches have some larger packet delivery
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
6
ratio than the reactive approach, especially with short advertisement intervals. The reason is that
the short advertisement intervals result in more gateway information (RREP_I and GWADV
packets).
A mobile node that receive a RREP_I or a GWADV message, update its route entry for the
gateway. Therefore, it is more likely for the mobile nodes to have fresher and shorter routes to a
gateway and thereby minimizing the risk for link breaks. Link breaks can result in lost data
packets since the source continues to send data packets until it receives a RERR message from
the mobile node that has a broken link. The longer the route is (in number of hops), the longer
times it can take before the source receive a RERR and hence, more data packets can be lost.
When the advertisement interval increases, a mobile node receives less gateway information and
consequently it does not update the route to the gateway as often as for short advertisement
intervals. Therefore, the positive effect of periodic gateway information is decreased as the
advertisement interval increases.
Packet delivery ratio vs. Advertisement interval
99.76
99.78
99.8
99.82
99.84
99.86
2 10 20 30 40 50 60
Advertisement interval (s)
Packet
delivery
ratio
(%)
Proactive
Reactive
Hybrid
Figure 3. Combine Packet delivery ratio
4.2 Average End-to-end Delay
Table 4 show the average end to end delay of the three gateway discovery methods that are:
Table 4. The value of average end to end delay
Interval(s) 2 10 20 30 40 50 60
Proactive 19.235 19.435 19.512 19.615 19.665 19.725 19.7521
Reactive 20.5 20.5 20.5 20.5 20.5 20.5 20.5
Hybrid 19.465 19.256 19.3 19.3524 19.3649 19.3755 19.2689
Figure 5 shows the average end-to-end delay with advertisement intervals between 2 and 60
seconds. As the figure shows, the average end-to-end delay is less for the proactive and hybrid
approaches than for the reactive approach. The reason is that the periodic gateway information
sent by the gateways allows the mobile nodes to update their route entries for the gateways more
often, resulting in fresher and shorter routes. With the reactive approach a mobile node
continues to use a route to a gateway until it is broken. In some cases this route can be pretty
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
7
long (in number of hops) and even if the mobile node is much closer to another gateway it does
not use this gateway, but continues to send the data packets along the long route to the gateway
further away until the route is broken. Therefore, the end-to-end delay increases for these data
packets, resulting in increased average end-to-end delay for all data packets. The figure also
shows that the average end-to-end delay is decreased slightly for short advertisement intervals
when the advertisement interval is increased. At the first thought this might seem unexpected.
However, it can be explained by the fact that very short advertisement intervals result in a lot of
control traffic which lead to higher processing times for data packets at each node. Moreover,
since the AODV messages are prioritized over data packets, these have to wait in the routing
queue until the AODV messages are sent, resulting in higher end-to-end delay.
Average end-to-end delay vs. Advertisement interval
18.6
18.8
19
19.2
19.4
19.6
19.8
20
20.2
20.4
20.6
2 10 20 30 40 50 60
Advertisement interval (s)
Average
end-to-end
delay
(ms)
Proactive
Reactive
Hybrid
Figure 5. Combine Average End to End Delay
5. CONCLUSION
In this research, three methods for detection of these gateways have been presented,
implemented and compared. The three methods for gateway detection are referred to as reactive,
proactive and hybrid gateway discovery. The comparison between these methods provides us
useful information. In this paper, the individual description of the three different gateway
methods (that reactive, proactive and hybrid) of packet delivery ratio and average end-to-end
delay. Next it analyze the comparison of the gateway methods.
Regarding the packet delivery ratio, the result is largely the same, regardless of which gateway
discovery method is used. As for the average end-to-end delay, the proactive and hybrid
methods perform slightly better than the reactive method.
The results presented are valid for the specific scenario used in this work. Therefore, one cannot
tell which of the gateway discovery methods the best one for every possible scenario is. There
are many factors that can be changed and their impact should be investigated. Unfortunately the
scope of this paper made it impossible to deal with more than a part of these interesting issues.
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
8
References
[1] Comer D.E. Internetworking With TCP/IP Volume I: Principles, Protocols, and Architectures,
fourth edition, 2000.
[2] Clausen T.; Jacquet P.; Laouiti A.; Minet P.; Muhlethaler P.; Qayyum A.; Viennot L.
Optimized Link State Routing Protocol, IETF Internet Draft, July 2002. Work in progress.
[3] Perkins C.; Belding-Royer E.M.; Das S. Ad hoc On-Demand Distance Vector(AODV) Routing,
IETF Internet Draft, Jan 2002.Work in progress.
[4] Johnson D.B.; Maltz D.A.; Hu Y.; Jetcheva J.G. The Dynamic Source Routing Protocol for
Mobile Ad Hoc Networks (DSR), IETF Internet Draft, Feb 2002.Work in progress.
[5] Haas Z.J.; Pearlman M.R.; Samar P. The Zone Routing Protocol (ZRP) for Ad Hoc Networks,
IETF Internet Draft, July 2002.Work in progress.
[6] Johnson D.B.; Maltz D.A. Dynamic Source Routing in Ad HocWireless Networks, in: Mobile
Computing (Imielinski T. and Korth H.), chapter 5, pages 153-181.Kluwer Academic Publishers,
1996.
[7] Bernard M. Gateway Detection and Selection for Wireless Multihop Internet Access, Master’s
thesis, (Olching, Germany), 2002.
[8] Holland G.; Vaidya N. Analysis of TCP Performance over Mobile Ad Hoc Networks,in
Proceedings of IEEE/ACM MOBICOM, 1999.
[9] Hong X.; Xu K.; Gerla M. Scalable Routing Protocols for Mobile Ad Hoc Networks,IEEE
Network, July/August 2002.
[10] Jönsson U.; Alriksson F.; Larsson T.; Johansson P.; Maguire G.Q. MIPMANET - Mobile IP for
Mobile Ad Hoc Networks, in Proceedings of the Workshop onMobile Ad Hoc Networking and
Computing (MobiHoc), Boston, USA, 2000.
[11] Schiller J. Mobile Communications, 2000.
[12] Xi J.; Bettstetter C.Wireless Multihop Internet Access: Gateway Discovery, Routing and
Addressing, in Proceedings of the International Conference on Third GenerationWireless and
Beyond (3Gwireless’02), San Francisco, USA, May 2002.
[13] McCanne S.; Floyd S. ns Network Simulator. http://www.isi.edu/nsnam/ns/. Fall K; Varadhan
K., and the VINT project. The ns manual.
[14] The MANET web page, http://www.ietf.org/html.charters/manet-charter.html.
[15] The Mobile Ad Hoc Networks, http://en.wikipedia.org/wiki/Mobile_ad-hoc_network.htm.
[16] Wireless Embedded Systems, Computer Science Department, University of California at
Berkeley,“Self-organized wireless sensor network,”August,2001.Available at
http://webs.cs.berkeley.edu/800demo.
[17] A Study of Mobile Ad-Hoc Network Architectures and Technologies .David Blount, Submitted
for MSc National University of Ireland, Cork, April 2004
[18] Abhishek Patil, Amit Sahoo “Routing Protocols for Ad-Hoc Wireless Networks “Dept. of
Electrical & Computer Engineering ,Michigan State University .
[19] Mobile Ad Hoc Networks, Asis Nasipuri, Department of Electrical &Computer Engineering, the
University of North Carolina at Charlotte Charlotte, NC 28223-0001
[20] Clausen .T , Dearlove .C “The Optimized Link-State Routing Protocol version 2” The OLSRv2
Design Team MANET Working Group ,Internet draft , March 6, 2006.
[21] Haas, Z.J., Pearlman, M.R. and Samar, P., "Intrazone Routing Protocol (IARP)," IETF Internet
Draft, draft-ietf-manet-iarp-02.txt, July 2002.
[22] Haas, Z.J., Pearlman, M.R. and Samar, P., "Interzone Routing Protocol (IERP)," IETF Internet
Draft, draft-ietf-manet-ierp-02.txt, July 2002.
Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011
9
Authors
Tapan Kumar Godder received the Bachelor’s, Master’s and M.Phil degree in
Applied Physics & Electronics from Rajshahi University, Rajshahi. In 1994, 1995
and 2007, respectively. He is courrently Associate Professor in the department of
ICE, Islamic University, Kushtia-7003, Bangladesh. He has seventeen published
papers in international and national journals. His areas of interest include
internetworking, AI & mobile communication.
M M Hassain is professor in the department of Applied Physics and Electronics
Engineering, Rajshahi University, Rajshahi 6205, Bangladesh. He is currently
honorable Vice-Chancellor in Pabna Science and Technology University, Pabna,
Bangladesh.
M. Mahbubur Rahman received the Bachelor’s and Master‘s Degree in
Physics, Rajshahi University, in 1983, 1994 and PhD degree in Computer
Science & Engineering in 1997. He is courrently Professor in the department of
ICE, Islamic University, Kushtia-7003, Bangladesh. He has twenty four
published papers in international and national journals. His areas of interest
include internetworking, AI & mobile communication.
Md. Sipon Miah received the Bachelor’s and Master‘s Degree in the Department
of Information and Communication Engineering from Islamic University,
Kushtia, in 2006 and 2007, respectively. He is courrently Lecturer in the
department of ICE, Islamic University, Kushtia-7003, Bangladesh. Since 2003, he
has been a Research Scientist at the Communication Reasearch Laboratory,
Department of ICE, Islamic University, Kushtia, where he belongs to the spread-
spectrum research group. He is pursuing research in the area of internetworking
in wireless communication. He has four published paper in international and one
national journals in the same areas. His areas of interest. Include Wireless
Communications, optical fiber communication, Spread Spectrum and mobile
communication.
S K Mondal received the Bachelor’s, and Master’s degree in Applied Physics & Electronics from
Rajshahi University, Rajshahi. In 1994, and 1995 respectively. He is courrently Associate Professor in the
department of CSE, Islamic University, Kushtia-7003, Bangladesh.

More Related Content

Similar to Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols

Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
IJERA Editor
 
E1073644
E1073644E1073644
E1073644
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Narendra Singh Yadav
 
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
ijasuc
 
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
ijasuc
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsIAEME Publication
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IOSR Journals
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
IJCNCJournal
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
IJCNCJournal
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
ijwmn
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
IJCNCJournal
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
IJECEIAES
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
ijtsrd
 

Similar to Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols (20)

Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
E1073644
E1073644E1073644
E1073644
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
 
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
EBCD: A ROUTING ALGORITHM BASED ON BEE COLONY FOR ENERGY CONSUMPTION REDUCTIO...
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocols
 
H01115155
H01115155H01115155
H01115155
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
Evaluation of Energy Consumption of Reactive and Proactive Routing Protocols ...
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 

More from CSEIJJournal

IOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGY
IOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGYIOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGY
IOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGY
CSEIJJournal
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
CSEIJJournal
 
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTIONDATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
CSEIJJournal
 
Call for Articles - Computer Science & Engineering: An International Journal ...
Call for Articles - Computer Science & Engineering: An International Journal ...Call for Articles - Computer Science & Engineering: An International Journal ...
Call for Articles - Computer Science & Engineering: An International Journal ...
CSEIJJournal
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection Strategy
CSEIJJournal
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
CSEIJJournal
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
CSEIJJournal
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
CSEIJJournal
 
Paper Submission - Computer Science & Engineering: An International Journal (...
Paper Submission - Computer Science & Engineering: An International Journal (...Paper Submission - Computer Science & Engineering: An International Journal (...
Paper Submission - Computer Science & Engineering: An International Journal (...
CSEIJJournal
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
CSEIJJournal
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
CSEIJJournal
 
Lightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement ProtocolnLightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement Protocoln
CSEIJJournal
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
CSEIJJournal
 
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
CSEIJJournal
 
Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
Reconfiguration Strategies for Online Hardware Multitasking in Embedded SystemsReconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
CSEIJJournal
 
Adaptive Stabilization and Synchronization of Hyperchaotic QI System
Adaptive Stabilization and Synchronization of Hyperchaotic QI SystemAdaptive Stabilization and Synchronization of Hyperchaotic QI System
Adaptive Stabilization and Synchronization of Hyperchaotic QI System
CSEIJJournal
 
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksAn Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
CSEIJJournal
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
CSEIJJournal
 
Topic Tracking for Punjabi Language
Topic Tracking for Punjabi LanguageTopic Tracking for Punjabi Language
Topic Tracking for Punjabi Language
CSEIJJournal
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
CSEIJJournal
 

More from CSEIJJournal (20)

IOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGY
IOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGYIOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGY
IOT SOLUTIONS FOR SMART PARKING- SIGFOX TECHNOLOGY
 
Reliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software ApplicationsReliability Improvement with PSP of Web-Based Software Applications
Reliability Improvement with PSP of Web-Based Software Applications
 
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTIONDATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
DATA MINING FOR STUDENTS’ EMPLOYABILITY PREDICTION
 
Call for Articles - Computer Science & Engineering: An International Journal ...
Call for Articles - Computer Science & Engineering: An International Journal ...Call for Articles - Computer Science & Engineering: An International Journal ...
Call for Articles - Computer Science & Engineering: An International Journal ...
 
A Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection StrategyA Complexity Based Regression Test Selection Strategy
A Complexity Based Regression Test Selection Strategy
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
 
Paper Submission - Computer Science & Engineering: An International Journal (...
Paper Submission - Computer Science & Engineering: An International Journal (...Paper Submission - Computer Science & Engineering: An International Journal (...
Paper Submission - Computer Science & Engineering: An International Journal (...
 
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image RetrievalPerformance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
Performance Comparison of PCA,DWT-PCA And LWT-PCA for Face Image Retrieval
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
 
Lightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement ProtocolnLightweight Certificateless Authenticated Key Agreement Protocoln
Lightweight Certificateless Authenticated Key Agreement Protocoln
 
Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...Call for Papers - Computer Science & Engineering: An International Journal (C...
Call for Papers - Computer Science & Engineering: An International Journal (C...
 
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...Recommendation System for Information Services Adapted, Over Terrestrial Digi...
Recommendation System for Information Services Adapted, Over Terrestrial Digi...
 
Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
Reconfiguration Strategies for Online Hardware Multitasking in Embedded SystemsReconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
Reconfiguration Strategies for Online Hardware Multitasking in Embedded Systems
 
Adaptive Stabilization and Synchronization of Hyperchaotic QI System
Adaptive Stabilization and Synchronization of Hyperchaotic QI SystemAdaptive Stabilization and Synchronization of Hyperchaotic QI System
Adaptive Stabilization and Synchronization of Hyperchaotic QI System
 
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor NetworksAn Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
An Energy Efficient Data Secrecy Scheme For Wireless Body Sensor Networks
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
Topic Tracking for Punjabi Language
Topic Tracking for Punjabi LanguageTopic Tracking for Punjabi Language
Topic Tracking for Punjabi Language
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 

Recently uploaded

road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 

Recently uploaded (20)

road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 

Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols

  • 1. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 1 PERFORMANCE COMPARISON AND ANALYSIS OF MOBILE AD HOC ROUTING PROTOCOLS T K Godder1 , M. M Hossain2 , M M Rahman1 , Md. Sipon Miah1 and S K Mondal3 1 Dept. of Information & Communication Engineering Islamic University, Kushtia 7003, Bangladesh. 2 Dept. of Applied Physics &Electronic Engineering Rajshahi University, Rajshahi 6205, Bangladesh. 3 Dept. of Computer Science and Engineering Islamic University, Kushtia 7003, Bangladesh E-mail:{tkict, drmahbub_07}@yahoo.com, mdsiponmiah@gmail.com ABSTRACT A mobile ad hoc network (MANET) is a wireless network that uses multi-hop peer-to-peer routing instead of static network infrastructure to provide network connectivity. MANETs have applications in rapidly deployed and dynamic military and civilian systems. The network topology in a MANET usually changes with time. Therefore, there are new challenges for routing protocols in MANETs since traditional routing protocols may not be suitable for MANETs. Researchers are designing new MANET routing protocols and comparing and improving existing MANET routing protocols before any routing protocols are standardized using simulations. However, the simulation results from different research groups are not consistent with each other. This is because of a lack of consistency in MANET routing protocol models and application environments, including networking and user traffic profiles. Therefore, the simulation scenarios are not equitable for all protocols and conclusions cannot be generalized. Furthermore, it is difficult for one to choose a proper routing protocol for a given MANET application. According to the aforementioned issues, this paper focuses on MANET routing protocols. Specifically, my contribution includes the characterization of different routing protocols and compare and analyze the performance of different routing protocols. KEYWORDS MANET 1. INTRODUCTION Movements of nodes in a mobile ad hoc network cause the nodes to move in and out of range from one another. As the result, there is a continuous making and breaking of links in the network, making the network connectivity (topology) to vary dynamically with time. Since the network relies on multi-hop transmissions for communication, this imposes major challenges for the network layer to determine the multi-hop route over which data packets can be transmitted between a given pair of source and destination nodes. Because of this time-varying nature of the topology of mobile ad hoc networks, traditional routing techniques, such as the shortest-path and link-state protocols that are used in fixed networks, cannot be directly applied to ad hoc networks. A fundamental quality of routing protocols for ad hoc networks is that they must dynamically adapt to variations of the network topology. This is implemented by devising techniques for efficiently tracking changes in the network topology and rediscovering new
  • 2. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 2 routes when older ones are broken. Since an ad hoc network is infrastructure less, these operations are to be performed in a distributed fashion with the collective cooperation of all nodes in the network. Because of its many challenges, routing has been a primary focus of researchers in mobile ad hoc networks. The MANET working group in the IETF has been working on the issue of standardizing an IP based routing standard for mobile ad hoc networks. Consequently, a large number of dynamic routing protocols applicable to mobile ad hoc networks have been developed. Based on when routing activities are initiated, routing protocols for mobile ad hoc networks may be broadly classified into three basic categories: (a) proactive or table-driven protocols, (b) reactive or on-demand routing protocols, and (c) hybrid routing protocols. DSDV OLSR FSR FSLS DSR AODV ZRP LANMAR Figure 1. Classification and examples of ad hoc routing protocols. Traditional distance-vector and link-state routing protocols [1] are proactive in that they maintain routes to all nodes, including nodes to which no packets are sent. For that reason they require a periodic control message, which leads to scarce resources such as power and link bandwidth being used more frequently for control traffic as mobility increases. One example of a proactive routing protocol is Optimized Link State Routing Protocol (OLSR) [2]. OLSR, which has managed to reduce the utilization of bandwidth significantly. Reactive routing protocols, on the other hand, operate only when there is a need of communication between two nodes. This approach allows the nodes to focus either on routes that are being used or on routes that are in process of being set up. Examples of reactive routing protocols are Ad hoc On- Demand Distance Vector (AODV) [3], and Dynamic Source Routing (DSR) [4]. Both proactive and reactive routing has specific advantages and disadvantages that make them suitable for certain types of scenarios. Proactive routing protocols have their routing tables updated at all times, thus the delay before sending a packet is minimal. However, routing tables that are always updated require periodic control messages that are flooded through the whole network- an operation that consumes a lot of time, bandwidth and energy. On the other hand, reactive routing protocols determine routes between nodes only when they are explicitly needed to route packets. However, whenever there is a need for sending a packet, the mobile node must first find the route if the route is not already known. This route discovery process may result in considerable delay. Combining the proactive and reactive approaches results in a hybrid routing protocol. Ad Hoc routing protocols Hybrid Reactive (On-demand) Proactive (table-driven)
  • 3. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 3 A hybrid approach minimizes the disadvantages, but also the advantages of the two combined approaches. The Zone Routing Protocol (ZRP) [5] is such a hybrid reactive /proactive routing protocol. Each mobile node proactively maintains routes within a local region (referred to as the routing zone). Mobile nodes residing outside the zone can be reached with reactive routing. 2. SIMULATION SET UP This section describes the scenario, the movement model and the communication model used in this study. Moreover, it presents the parameters used in the simulations. 2.1. Scenario The studied scenario consists of 15 mobile nodes, 2 gateways, 2 routers and 2 hosts. The topology is a rectangular area with 800 m length and 500 m width. A rectangular area was chosen in order to force the use of longer routes between nodes than would occur in a square area with equal node density. The two gateways are placed on each side of the area; their x,y- coordinates in meters are (100,250) and (700,250). All simulations are run for 900 seconds of simulated time. Five of the 15 mobile nodes are constant bit rate traffic sources. They are distributed randomly within the mobile ad hoc network. The time when the five traffic sources start sending data packets is chosen uniformly distributed within the first ten seconds of the simulation. After this times the sources continue sending data until one second before the end of the simulation. The destination of each of the sources is one of the two hosts, chosen randomly. A screenshot of the simulation scenario is shown in Figure 1. The five mobile nodes that are marked with a ring are the sources. The two hexagonal nodes are the gateways and the four square nodes are the two hosts and the two routers. Figure 1. Screenshot of the simulation scenario.
  • 4. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 4 2.3. Movement Model The mobile nodes move according to the “random waypoint” model [6]. Each mobile node begins the simulation by remaining stationary for pause time seconds. It then selects a random destination in the defined topology area and moves to that destination at a random speed. The random speed is distributed uniformly between zero (zero not included) and some maximum speed. Upon reaching the destination, the mobile node pauses again for pause time seconds, selects another destination, and proceeds there as previously described. This movement pattern is repeated for the duration of the simulation. 2.4. Communication Model In the scenario used in this study, five mobile nodes communicate with one of two fixed nodes (hosts) located on the internet through a gateway. As the goal of the simulations was to compare the different approaches for gateway discovery, the traffic source was chosen to be a constant bit rate (CBR) source. Each source mobile node generates packets every 0.2 seconds in this paper. Since each packet contain 512 bytes of data, the amount of generated data is 5*512*8 bit/s = 20 kbit/s, for each source. The traffic connection pattern is generated by CMU’s traffic generator (cbrgen.tcl). The main parameters in cbrgen.tcl are “connections” (number of sources) and “rate” (packet rate); see Table 1. 2.5. Parameters The parameters that are common for all simulations are given in table 1 and the parameters that are specific for some simulations are shown in table 2. Table 1: General parameters used in all simulations. Parameter Value Transmission range 250 m Simulation time 900 s Topology size 800 m X 500 m Number of mobile nodes 15 Number of sources 5 Number of gateways 2 Traffic type Constant bit rate Packet rate 5 packets/s Packet size 512 bytes Pause time 5 s Maximum speed 10 m/s The transmission range is the maximum possible distance between two communicating mobile nodes. If the distance between two mobile nodes is larger than 250 m they cannot communicate with each other directly.
  • 5. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 5 Table 2: Specific parameters used in some simulations. Parameter Value ADVERTISEMENT_INTERVAL Varied from 2-60 seconds ADVERTISEMENT_ZONE 3 hops ADVERTISEMENT_INTERVAL is used when proactive and hybrid discovery methods are used. ADVERTISEMENT_ZONE is used for hybrid gateway discovery method and defines the range within which proactive gateway discovery is used. 3. PERFORMANCE METRICS The second goal of this paper was to “implement and compare different approaches for gateway discovery”. Comparing the different methods is done by simulating them and examining their behavior. In the simulations in the following section, the effects of different gateway advertisement intervals are evaluated. In comparing the gateway discovery approaches, the evaluation has been done according to the following two metrics: _ The packet delivery ratio is defined as the number of received data packets divided by the number of generated data packets. _ The end-to-end delay is defined as the time a data packet is received by the destination minus the time the data packet is generated by the source. 4. RESULTS AND DISCUSSIONS In this section the effect of varying gateway advertisement intervals is evaluated. Since gateway advertisements are not sent in the reactive gateway discovery approach, the results for this approach are constant and independent of the advertisement interval. Each data point is an average value of 10 runs with the same communication model, but different randomly generated movement patterns. 4.1. Packet Delivery Ratio Table 3 shows the packet delivery ratio of three gateway discovery methods of are proactive, reactive and hybrid: Table 3. The value of packet delivery ratio Interval(s) 2 10 20 30 40 50 60 Proactive 99.84 99.8379 99.842 99.82 99.815 99.795 99.825 Reactive 99.81 99.81 99.81 99.81 99.81 99.81 99.81 Hybrid 99.85 99.835 99.815 99.825 99.82 99.8275 99.835 The values of the Table 3 are from the analysis of the out.tr file of the simulation environment. Figure 3 shows the packet delivery ratio with advertisement intervals between 2 and 60 seconds. As the figure shows, the packet delivery ratio is very high (above 99.8 %) for all three gateway discovery approaches. The figure also shows that the difference between the three approaches is very small. However, the proactive and hybrid approaches have some larger packet delivery
  • 6. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 6 ratio than the reactive approach, especially with short advertisement intervals. The reason is that the short advertisement intervals result in more gateway information (RREP_I and GWADV packets). A mobile node that receive a RREP_I or a GWADV message, update its route entry for the gateway. Therefore, it is more likely for the mobile nodes to have fresher and shorter routes to a gateway and thereby minimizing the risk for link breaks. Link breaks can result in lost data packets since the source continues to send data packets until it receives a RERR message from the mobile node that has a broken link. The longer the route is (in number of hops), the longer times it can take before the source receive a RERR and hence, more data packets can be lost. When the advertisement interval increases, a mobile node receives less gateway information and consequently it does not update the route to the gateway as often as for short advertisement intervals. Therefore, the positive effect of periodic gateway information is decreased as the advertisement interval increases. Packet delivery ratio vs. Advertisement interval 99.76 99.78 99.8 99.82 99.84 99.86 2 10 20 30 40 50 60 Advertisement interval (s) Packet delivery ratio (%) Proactive Reactive Hybrid Figure 3. Combine Packet delivery ratio 4.2 Average End-to-end Delay Table 4 show the average end to end delay of the three gateway discovery methods that are: Table 4. The value of average end to end delay Interval(s) 2 10 20 30 40 50 60 Proactive 19.235 19.435 19.512 19.615 19.665 19.725 19.7521 Reactive 20.5 20.5 20.5 20.5 20.5 20.5 20.5 Hybrid 19.465 19.256 19.3 19.3524 19.3649 19.3755 19.2689 Figure 5 shows the average end-to-end delay with advertisement intervals between 2 and 60 seconds. As the figure shows, the average end-to-end delay is less for the proactive and hybrid approaches than for the reactive approach. The reason is that the periodic gateway information sent by the gateways allows the mobile nodes to update their route entries for the gateways more often, resulting in fresher and shorter routes. With the reactive approach a mobile node continues to use a route to a gateway until it is broken. In some cases this route can be pretty
  • 7. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 7 long (in number of hops) and even if the mobile node is much closer to another gateway it does not use this gateway, but continues to send the data packets along the long route to the gateway further away until the route is broken. Therefore, the end-to-end delay increases for these data packets, resulting in increased average end-to-end delay for all data packets. The figure also shows that the average end-to-end delay is decreased slightly for short advertisement intervals when the advertisement interval is increased. At the first thought this might seem unexpected. However, it can be explained by the fact that very short advertisement intervals result in a lot of control traffic which lead to higher processing times for data packets at each node. Moreover, since the AODV messages are prioritized over data packets, these have to wait in the routing queue until the AODV messages are sent, resulting in higher end-to-end delay. Average end-to-end delay vs. Advertisement interval 18.6 18.8 19 19.2 19.4 19.6 19.8 20 20.2 20.4 20.6 2 10 20 30 40 50 60 Advertisement interval (s) Average end-to-end delay (ms) Proactive Reactive Hybrid Figure 5. Combine Average End to End Delay 5. CONCLUSION In this research, three methods for detection of these gateways have been presented, implemented and compared. The three methods for gateway detection are referred to as reactive, proactive and hybrid gateway discovery. The comparison between these methods provides us useful information. In this paper, the individual description of the three different gateway methods (that reactive, proactive and hybrid) of packet delivery ratio and average end-to-end delay. Next it analyze the comparison of the gateway methods. Regarding the packet delivery ratio, the result is largely the same, regardless of which gateway discovery method is used. As for the average end-to-end delay, the proactive and hybrid methods perform slightly better than the reactive method. The results presented are valid for the specific scenario used in this work. Therefore, one cannot tell which of the gateway discovery methods the best one for every possible scenario is. There are many factors that can be changed and their impact should be investigated. Unfortunately the scope of this paper made it impossible to deal with more than a part of these interesting issues.
  • 8. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 8 References [1] Comer D.E. Internetworking With TCP/IP Volume I: Principles, Protocols, and Architectures, fourth edition, 2000. [2] Clausen T.; Jacquet P.; Laouiti A.; Minet P.; Muhlethaler P.; Qayyum A.; Viennot L. Optimized Link State Routing Protocol, IETF Internet Draft, July 2002. Work in progress. [3] Perkins C.; Belding-Royer E.M.; Das S. Ad hoc On-Demand Distance Vector(AODV) Routing, IETF Internet Draft, Jan 2002.Work in progress. [4] Johnson D.B.; Maltz D.A.; Hu Y.; Jetcheva J.G. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), IETF Internet Draft, Feb 2002.Work in progress. [5] Haas Z.J.; Pearlman M.R.; Samar P. The Zone Routing Protocol (ZRP) for Ad Hoc Networks, IETF Internet Draft, July 2002.Work in progress. [6] Johnson D.B.; Maltz D.A. Dynamic Source Routing in Ad HocWireless Networks, in: Mobile Computing (Imielinski T. and Korth H.), chapter 5, pages 153-181.Kluwer Academic Publishers, 1996. [7] Bernard M. Gateway Detection and Selection for Wireless Multihop Internet Access, Master’s thesis, (Olching, Germany), 2002. [8] Holland G.; Vaidya N. Analysis of TCP Performance over Mobile Ad Hoc Networks,in Proceedings of IEEE/ACM MOBICOM, 1999. [9] Hong X.; Xu K.; Gerla M. Scalable Routing Protocols for Mobile Ad Hoc Networks,IEEE Network, July/August 2002. [10] Jönsson U.; Alriksson F.; Larsson T.; Johansson P.; Maguire G.Q. MIPMANET - Mobile IP for Mobile Ad Hoc Networks, in Proceedings of the Workshop onMobile Ad Hoc Networking and Computing (MobiHoc), Boston, USA, 2000. [11] Schiller J. Mobile Communications, 2000. [12] Xi J.; Bettstetter C.Wireless Multihop Internet Access: Gateway Discovery, Routing and Addressing, in Proceedings of the International Conference on Third GenerationWireless and Beyond (3Gwireless’02), San Francisco, USA, May 2002. [13] McCanne S.; Floyd S. ns Network Simulator. http://www.isi.edu/nsnam/ns/. Fall K; Varadhan K., and the VINT project. The ns manual. [14] The MANET web page, http://www.ietf.org/html.charters/manet-charter.html. [15] The Mobile Ad Hoc Networks, http://en.wikipedia.org/wiki/Mobile_ad-hoc_network.htm. [16] Wireless Embedded Systems, Computer Science Department, University of California at Berkeley,“Self-organized wireless sensor network,”August,2001.Available at http://webs.cs.berkeley.edu/800demo. [17] A Study of Mobile Ad-Hoc Network Architectures and Technologies .David Blount, Submitted for MSc National University of Ireland, Cork, April 2004 [18] Abhishek Patil, Amit Sahoo “Routing Protocols for Ad-Hoc Wireless Networks “Dept. of Electrical & Computer Engineering ,Michigan State University . [19] Mobile Ad Hoc Networks, Asis Nasipuri, Department of Electrical &Computer Engineering, the University of North Carolina at Charlotte Charlotte, NC 28223-0001 [20] Clausen .T , Dearlove .C “The Optimized Link-State Routing Protocol version 2” The OLSRv2 Design Team MANET Working Group ,Internet draft , March 6, 2006. [21] Haas, Z.J., Pearlman, M.R. and Samar, P., "Intrazone Routing Protocol (IARP)," IETF Internet Draft, draft-ietf-manet-iarp-02.txt, July 2002. [22] Haas, Z.J., Pearlman, M.R. and Samar, P., "Interzone Routing Protocol (IERP)," IETF Internet Draft, draft-ietf-manet-ierp-02.txt, July 2002.
  • 9. Computer Science & Engineering: An International Journal (CSEIJ), Vol.1, No.1, April 2011 9 Authors Tapan Kumar Godder received the Bachelor’s, Master’s and M.Phil degree in Applied Physics & Electronics from Rajshahi University, Rajshahi. In 1994, 1995 and 2007, respectively. He is courrently Associate Professor in the department of ICE, Islamic University, Kushtia-7003, Bangladesh. He has seventeen published papers in international and national journals. His areas of interest include internetworking, AI & mobile communication. M M Hassain is professor in the department of Applied Physics and Electronics Engineering, Rajshahi University, Rajshahi 6205, Bangladesh. He is currently honorable Vice-Chancellor in Pabna Science and Technology University, Pabna, Bangladesh. M. Mahbubur Rahman received the Bachelor’s and Master‘s Degree in Physics, Rajshahi University, in 1983, 1994 and PhD degree in Computer Science & Engineering in 1997. He is courrently Professor in the department of ICE, Islamic University, Kushtia-7003, Bangladesh. He has twenty four published papers in international and national journals. His areas of interest include internetworking, AI & mobile communication. Md. Sipon Miah received the Bachelor’s and Master‘s Degree in the Department of Information and Communication Engineering from Islamic University, Kushtia, in 2006 and 2007, respectively. He is courrently Lecturer in the department of ICE, Islamic University, Kushtia-7003, Bangladesh. Since 2003, he has been a Research Scientist at the Communication Reasearch Laboratory, Department of ICE, Islamic University, Kushtia, where he belongs to the spread- spectrum research group. He is pursuing research in the area of internetworking in wireless communication. He has four published paper in international and one national journals in the same areas. His areas of interest. Include Wireless Communications, optical fiber communication, Spread Spectrum and mobile communication. S K Mondal received the Bachelor’s, and Master’s degree in Applied Physics & Electronics from Rajshahi University, Rajshahi. In 1994, and 1995 respectively. He is courrently Associate Professor in the department of CSE, Islamic University, Kushtia-7003, Bangladesh.