Change is the only thing which is constant in this
today’s era. Constant technology updates demand building up
and falling down of infrastructure along with cost involvement.
Today there is a need of adaptive infrastructure called Ad hoc
network.
Ad hoc network is a collection of two or more nodes with
wireless communication having network capability that they can
communicate without centralized manner. So, at any time host
devices may act as a router or as a node. Ad hoc networks can be
erected as wireless technology, comprising of Radio Frequency
(RF) and infrared frequency.
Wireless Ad hoc network is Temporary, Infrastructure less,
Decentralized, self-organized packet switched network. In this
network topology changes dynamically which can results change
in link failure or broken. In this paper we evaluate the
performance parameters like Throughput, End-to-End Delay and
Packet Delivery Ratio of AODV (ad hoc on Demand Vector) and
DSDV (Destination Sequential Distance Vector) protocol. The
simulation tool used is Network Simulator 2 -2.35
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Ad-hoc routing protocols allow nodes in a mobile ad hoc network to discover the network topology and route packets between nodes that may not be directly connected. The key goals of ad-hoc routing protocols are to minimize control overhead and processing overhead, enable multihop routing between nodes not in direct transmission range, dynamically maintain routes as nodes move, and prevent routing loops. There are three main categories of ad-hoc routing protocols: table-driven protocols that maintain up-to-date routing tables via periodic updates, on-demand protocols that find routes only when needed via flooding, and hybrid protocols that use aspects of both table-driven and on-demand routing.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
This document compares the performance of two routing protocols for mobile ad hoc networks: Destination Sequenced Distance Vector (DSDV) and Ad Hoc On-Demand Distance Vector (AODV). It presents the results of simulations run using the ns-2 network simulator. The simulations varied the number of nodes, pause time (mobility rate), and number of data sources. The performance metrics measured were packet delivery ratio, average end-to-end delay, and normalized routing load. The results showed that AODV had higher packet delivery ratios and lower routing loads than DSDV. However, AODV experienced higher delays than DSDV due to its on-demand route discovery process. DSDV performed better in low
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Ad-hoc routing protocols allow nodes in a mobile ad hoc network to discover the network topology and route packets between nodes that may not be directly connected. The key goals of ad-hoc routing protocols are to minimize control overhead and processing overhead, enable multihop routing between nodes not in direct transmission range, dynamically maintain routes as nodes move, and prevent routing loops. There are three main categories of ad-hoc routing protocols: table-driven protocols that maintain up-to-date routing tables via periodic updates, on-demand protocols that find routes only when needed via flooding, and hybrid protocols that use aspects of both table-driven and on-demand routing.
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
This document compares the performance of two routing protocols for mobile ad hoc networks: Destination Sequenced Distance Vector (DSDV) and Ad Hoc On-Demand Distance Vector (AODV). It presents the results of simulations run using the ns-2 network simulator. The simulations varied the number of nodes, pause time (mobility rate), and number of data sources. The performance metrics measured were packet delivery ratio, average end-to-end delay, and normalized routing load. The results showed that AODV had higher packet delivery ratios and lower routing loads than DSDV. However, AODV experienced higher delays than DSDV due to its on-demand route discovery process. DSDV performed better in low
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes several reactive routing protocols for mobile ad hoc networks (MANETs). Reactive protocols create routes only when needed by a source. Dynamic Source Routing uses route requests and replies to find paths, while Temporally-Ordered Routing Algorithm builds and maintains a directed acyclic graph rooted at destinations. Some protocols aim to improve quality of service or support real-time data streams through techniques like bandwidth estimation and mobility prediction. Source Routing with Local Recovery reduces overhead by allowing intermediate nodes to perform local error recovery using route caches when possible.
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses that MANETs are self-configuring networks without centralized control where nodes can act as routers to forward packets. The document classifies routing protocols as proactive (table-driven), reactive (on-demand), or hybrid. It describes examples of proactive routing protocols like DSDV, OLSR, and WRP that maintain up-to-date routing tables and share updates periodically or when changes occur. The document also discusses reactive protocols establish routes on demand and hybrid protocols that combine aspects of proactive and reactive approaches.
This document discusses a simulation of advanced networking using the GloMoSim simulator. It begins with an introduction by Dr. A. Kathirvel, a professor and head of the department of information technology. The document then covers topics like ad hoc wireless networks, research issues in mobile ad hoc networks, ad hoc wireless internet, and concludes with an outline of the simulator session.
The document discusses on-demand driven reactive routing protocols. It provides an overview of table-driven vs on-demand routing protocols and describes two popular on-demand protocols - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) in detail. DSR uses source routing by adding the complete route to packet headers. AODV maintains routing tables at nodes and relies on dynamically establishing next hop information for routes.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that evaluates the performance of two routing protocols (AODV and DSDV) under different traffic patterns (TCP and CBR) in a mobile ad hoc network (MANET) simulation. The paper describes MANET characteristics and challenges for routing. It provides an overview of reactive (AODV), proactive (DSDV), and hybrid routing protocols. It also defines TCP and CBR traffic patterns. The research aims to analyze and compare the packet delivery ratio and end-to-end delay of AODV and DSDV under different traffic loads using the NS-2 simulator. Preliminary results show that reactive protocols perform better in terms of these metrics.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
This document discusses a proposed technique for efficient data transfer of different packet sizes over wireless sensor networks. The technique uses a combination of routing protocols, including AODV, DSDV, and DSR. It aims to improve quality of service for data transmission by using proper packet formatting and compression techniques. The objective is to develop a reliable architecture that can handle both proactive and reactive routing approaches to efficiently manage routing and transmission of data between neighboring nodes. The proposed technique will be implemented and evaluated using a network simulator.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Aristotle wrote about 200 treatises on a wide range of topics, including logic, metaphysics, philosophy of science, ethics, political philosophy, aesthetics, rhetoric, physics, astronomy and biology. He transformed many areas of knowledge. The document also discusses the Popocatepetl volcano in Mexico, describing its name meaning "smoking mountain" and classification as a stratovolcano formed from layers of ash and fragments. It notes the municipalities that border the volcano across the states of Mexico, Morelos and Puebla.
Batch adsorption experiments were carried out for
the adsorption of cationic dye from aqueous solution onto
composite activated carbon. The composite activated carbon was
prepared from brewer’s spent grain and sea bean shell at a ratio
of 1:1. The equilibrium studies were done at different
concentrations and temperatures. The equilibrium data were
fitted to Langmuir, Freundlich, Dubinin-Radushkevich, and
Temkin isotherm models. The results showed that both Lagmuir
and Freundlich isotherm model fitted the data reasonably well
but Freundlich isotherm fitted better in the temperature range
studied. This confirmed that the adsorption is heterogeneous,
non-specific and non-uniform in nature. Kinetic studies were also
undertaken in terms of first order, second order, pseudo first
order, pseudo second order, Elovich, Boyd, and intra-particle
diffusion models. The results indicated that the data followed
pseudo second order model with surface adsorption and intraparticle
diffusion concurrently operating during the adsorbateadsorbent
interaction. The values of the thermodynamic
parameters computed from Van’t Hoff plot confirmed the
process to be endothermic and spontaneous in nature.
Attitudes toward suicide may influence the
treatment content and outcomes. Hence, this study aimed to
investigate how public attitudes toward suicide were influenced
by (1) their degree of idealism; and (2) their degree of
relativism. A questionnaire survey with Suicide Perception
Scale and Ethic Position Questionnaire was carried out on 50
male and 50 female participants (aged 21 and above) from
Klang Valley, Malaysia to obtain answer. The findings
supported both hypotheses, indicated that (1) higher idealism is
associated with lower level of acceptance toward suicide; and
(2) higher relativism is associated with higher level of
acceptance toward suicide. In sum, variations in public’s
attitude toward suicide were related to individual differences in
personal ethical ideologies and moral philosophies.
We present a case of murder with a blunt object.
On the body of the deceased were identified specific traces in
the form of suffusions. Four people were suspected for the
murder. During the investigative four pairs of sneakers were
obtained. A full forensic examination was performed which
excluded three of the four pairs of suspected shoes. The forth
pair was a match. This kind of research is extremely important
in forensic practice and theory, as they allow forensic experts
to identify the objects that left specific traces on the body of a
victim or deceased. They are also extremely important during
investigation of criminal offenses, especially when there is more
than one suspect.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes several reactive routing protocols for mobile ad hoc networks (MANETs). Reactive protocols create routes only when needed by a source. Dynamic Source Routing uses route requests and replies to find paths, while Temporally-Ordered Routing Algorithm builds and maintains a directed acyclic graph rooted at destinations. Some protocols aim to improve quality of service or support real-time data streams through techniques like bandwidth estimation and mobility prediction. Source Routing with Local Recovery reduces overhead by allowing intermediate nodes to perform local error recovery using route caches when possible.
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses that MANETs are self-configuring networks without centralized control where nodes can act as routers to forward packets. The document classifies routing protocols as proactive (table-driven), reactive (on-demand), or hybrid. It describes examples of proactive routing protocols like DSDV, OLSR, and WRP that maintain up-to-date routing tables and share updates periodically or when changes occur. The document also discusses reactive protocols establish routes on demand and hybrid protocols that combine aspects of proactive and reactive approaches.
This document discusses a simulation of advanced networking using the GloMoSim simulator. It begins with an introduction by Dr. A. Kathirvel, a professor and head of the department of information technology. The document then covers topics like ad hoc wireless networks, research issues in mobile ad hoc networks, ad hoc wireless internet, and concludes with an outline of the simulator session.
The document discusses on-demand driven reactive routing protocols. It provides an overview of table-driven vs on-demand routing protocols and describes two popular on-demand protocols - Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV) in detail. DSR uses source routing by adding the complete route to packet headers. AODV maintains routing tables at nodes and relies on dynamically establishing next hop information for routes.
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
Mobile Ad-hoc Network is a kind of wireless network. It is a backbone of new generation advanced communication technology. MANET is an ideal applicant for rescue and emergency situation due to its independence of connected devices of fixed wires. This paper represents a work on trust based system in MANET cluster that can be used to improve the performance of the network even in the existence of not trusted nodes. In the cluster architecture, cluster head and gateway nodes form a communication for routing among neighbouring clusters. But selection of cluster head is the important problem in dynamic Ad-hoc network because cluster head work as coordinator in clustered architecture. In this work, some values have used correspond to the threshold values of forward packet and dropped packet of each node within the network cluster. These values have been used dynamically updated every time and the node is selected as cluster head. In this technique of selecting the node as cluster head, the node which has maximum trusted value is elected as cluster head and this information is updated in every node’s trusted table. After implementation of our desired work, the proposed Dynamic Trust Evaluation of Cluster Head (DTE-CH) technique is analysed with traditional routing protocols and traditional clustering technique viz. Highest Degree Algorithm. The simulation is done by using network simulator software on the basis of different performance metrics throughput, packet delivery ratio, routing overhead, packet drop, average end to end delay and remain energy. Simulation result presents that proposed DTE-CH technique improves the performance of network as compare to most suitable existing AODV MANET protocol based technique as well as traditional highest degree clustering technique.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that evaluates the performance of two routing protocols (AODV and DSDV) under different traffic patterns (TCP and CBR) in a mobile ad hoc network (MANET) simulation. The paper describes MANET characteristics and challenges for routing. It provides an overview of reactive (AODV), proactive (DSDV), and hybrid routing protocols. It also defines TCP and CBR traffic patterns. The research aims to analyze and compare the packet delivery ratio and end-to-end delay of AODV and DSDV under different traffic loads using the NS-2 simulator. Preliminary results show that reactive protocols perform better in terms of these metrics.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
This document summarizes and compares two extended versions of the AODV routing protocol for mobile ad hoc networks (MANETs): Reverse AODV (RAODV) and Multicast AODV (MAODV). RAODV aims to improve routing performance by allowing multiple route reply messages, while MAODV allows nodes to send multicast data packets through a multicast group tree. The document outlines the key features and operations of each protocol, including route discovery processes. It then evaluates and compares the performance of RAODV and MAODV using metrics like end-to-end delay and overhead while varying the number of nodes.
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
This document discusses a proposed technique for efficient data transfer of different packet sizes over wireless sensor networks. The technique uses a combination of routing protocols, including AODV, DSDV, and DSR. It aims to improve quality of service for data transmission by using proper packet formatting and compression techniques. The objective is to develop a reliable architecture that can handle both proactive and reactive routing approaches to efficiently manage routing and transmission of data between neighboring nodes. The proposed technique will be implemented and evaluated using a network simulator.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
Aristotle wrote about 200 treatises on a wide range of topics, including logic, metaphysics, philosophy of science, ethics, political philosophy, aesthetics, rhetoric, physics, astronomy and biology. He transformed many areas of knowledge. The document also discusses the Popocatepetl volcano in Mexico, describing its name meaning "smoking mountain" and classification as a stratovolcano formed from layers of ash and fragments. It notes the municipalities that border the volcano across the states of Mexico, Morelos and Puebla.
Batch adsorption experiments were carried out for
the adsorption of cationic dye from aqueous solution onto
composite activated carbon. The composite activated carbon was
prepared from brewer’s spent grain and sea bean shell at a ratio
of 1:1. The equilibrium studies were done at different
concentrations and temperatures. The equilibrium data were
fitted to Langmuir, Freundlich, Dubinin-Radushkevich, and
Temkin isotherm models. The results showed that both Lagmuir
and Freundlich isotherm model fitted the data reasonably well
but Freundlich isotherm fitted better in the temperature range
studied. This confirmed that the adsorption is heterogeneous,
non-specific and non-uniform in nature. Kinetic studies were also
undertaken in terms of first order, second order, pseudo first
order, pseudo second order, Elovich, Boyd, and intra-particle
diffusion models. The results indicated that the data followed
pseudo second order model with surface adsorption and intraparticle
diffusion concurrently operating during the adsorbateadsorbent
interaction. The values of the thermodynamic
parameters computed from Van’t Hoff plot confirmed the
process to be endothermic and spontaneous in nature.
Attitudes toward suicide may influence the
treatment content and outcomes. Hence, this study aimed to
investigate how public attitudes toward suicide were influenced
by (1) their degree of idealism; and (2) their degree of
relativism. A questionnaire survey with Suicide Perception
Scale and Ethic Position Questionnaire was carried out on 50
male and 50 female participants (aged 21 and above) from
Klang Valley, Malaysia to obtain answer. The findings
supported both hypotheses, indicated that (1) higher idealism is
associated with lower level of acceptance toward suicide; and
(2) higher relativism is associated with higher level of
acceptance toward suicide. In sum, variations in public’s
attitude toward suicide were related to individual differences in
personal ethical ideologies and moral philosophies.
We present a case of murder with a blunt object.
On the body of the deceased were identified specific traces in
the form of suffusions. Four people were suspected for the
murder. During the investigative four pairs of sneakers were
obtained. A full forensic examination was performed which
excluded three of the four pairs of suspected shoes. The forth
pair was a match. This kind of research is extremely important
in forensic practice and theory, as they allow forensic experts
to identify the objects that left specific traces on the body of a
victim or deceased. They are also extremely important during
investigation of criminal offenses, especially when there is more
than one suspect.
Data mining , knowledge discovery is the process
of analyzing data from different perspectives and summarizing it
into useful information - information that can be used to increase
revenue, cuts costs, or both. Data mining software is one of a
number of analytical tools for analyzing data. It allows users to
analyze data from many different dimensions or angles, categorize
it, and summarize the relationships identified. Technically, data
mining is the process of finding correlations or patterns among
dozens of fields in large relational databases. The goal of
clustering is to determine the intrinsic grouping in a set of
unlabeled data. But how to decide what constitutes a good
clustering? It can be shown that there is no absolute “best”
criterion which would be independent of the final aim of the
clustering. Consequently, it is the user which must supply this
criterion, in such a way that the result of the clustering will suit
their needs.
For instance, we could be interested in finding
representatives for homogeneous groups (data reduction), in
finding “natural clusters” and describe their unknown properties
(“natural” data types), in finding useful and suitable groupings
(“useful” data classes) or in finding unusual data objects (outlier
detection).Of late, clustering techniques have been applied in the
areas which involve browsing the gathered data or in categorizing
the outcome provided by the search engines for the reply to the
query raised by the users. In this paper, we are providing a
comprehensive survey over the document clustering.
This document discusses the emergence and growth of mobile commerce (m-commerce) in India. It begins by defining m-commerce as e-commerce transactions made via mobile devices. It then discusses how the large and growing number of mobile internet users in India, reaching 185 million by June 2014, represents significant scope for m-commerce. The document outlines some of the key benefits of m-commerce like convenience, personalized services, and location-based offers. It concludes by stating that m-commerce provides companies an important new platform for marketing and connecting with customers anytime, anywhere.
Caterer | Asian Restaurants - Chef Patricks KitchenLance Libot
Chef Patrick’s Kitchen is a local Chinese restaurant that focuses in delighting the palates of each and every guest with various fresh and delicious dishes all at affordable prices.
This document discusses the history, challenges, and applications of mobile ad hoc networks (MANETs). It describes how MANETs evolved from early packet radio networks developed in the 1970s. Key challenges for MANETs include dynamic topology changes, asymmetric wireless links, and lack of a centralized administration. However, MANETs also enable applications for military communications, disaster recovery, device networking, internet sharing, and wireless sensor networks by allowing devices to self-configure into a network without any infrastructure. While progress has been made, many technical challenges remain in fully realizing the vision of seamlessly integrating MANETs with other networks.
Мы организовываем 5 недель активностей, которые взорвут вашу группу! Что сделать, чтобы полюбиться участникам? Как создать элиту группы? Как заполучить доверие и лояльность? Об этом в нашей презентации!
This document summarizes a study on the effect of nutrients on rice plants grown in sodic soils. The study was conducted over two years on a farmer's field in India. Soil tests found the soil to be low in organic carbon, nitrogen, phosphorus, sulfur, zinc and manganese, and medium in potassium. Rice yields and plant nutrient concentrations increased with the addition of nitrogen, phosphorus, potassium, sulfur, zinc and manganese fertilizers. The highest yield increases came from nitrogen application, followed by phosphorus and potassium. Cumulatively, the added nutrients increased yields by over 80% compared to the control plot with no added nutrients. The soil was found to be deficient in all the nutrients tested. Satisfactory
This paper presents the details on the
experimental investigation carried out to get the desired fresh
properties of the SCC. Tests were performed on various mixtures
to obtain the required SCC. In the present research work we
have replaced 15% of cement with class F fly ash. By varying the
quantity of water and sand the mortar mix was prepared. Later
varying percentage of coarse aggregate was added to the mortar
to obtain the desired SCC.
Baylis-Hillman reaction has been achieved on
different organic motifs but with completion times of three to
six days. Micellar medium of CTAB in water along with the
organic base DABCO has been used to effect the BaylisHillman
reaction on a steroidal nucleus of Withaferin-A for the
first time with different aromatic aldehydes within a day to
synthesize a library of BH adducts (W1a –W14a) and (W1bW14b)
as a mixture of two isomers and W15 as a single
compound. The isomers were separated on column and the
major components were chosen for bio-evaluation. Cytotoxic
activity of the synthesized compounds was screened against a
panel of four cancer cell lines Lung A-549, Breast MCF-7,
Colon HCT-116 and Leukemia THP-1 along with 5-florouracil
and Mitomycin-C as references. All the compounds exhibited
promising activity against screened cell lines and were found to
possess enhaunced activity than parent compound. BH adducts
with aromatic systems having methoxy and nitro groups were
found to be more active.
Un óvalo imperfecto llegó a un lugar donde vivían otros óvalos perfectos que podían rodar rápidamente. Los otros óvalos se burlaron del óvalo imperfecto porque no podía rodar de la misma manera, pero él les explicó que aunque fuera diferente, podía viajar a su manera y que en realidad había muchas formas de ser un óvalo, no solo la forma perfecta.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics. It then classifies routing protocols into proactive (table-driven) and reactive (on-demand) categories. For each category, several representative protocols are described in detail, including DSDV, WRP, CGSR, DSR, AODV, ABR, SSA, and TORA. Their routing mechanisms and approaches to route discovery and maintenance are outlined. The document aims to provide an overview of major MANET routing protocols to help determine the most suitable ones for different network conditions.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Ad Hoc Networks are infrastructure less network in which nodes are connected by Multi-hop wireless links. Each node is acting as a router as it supports distributed routing. Routing challenges occurs as there are frequent path breaks due to the mobility. Various application domains include military applications, emergency search and rescue operations and collaborative computing. The existing protocols used are divided into proactive and on demand routing protocols. The various new routing algorithms are also designed to optimize the performance of a network in terms of various performance parameters. Dual reinforcement routing is learning based approach used for routing. This paper describes the implementation, mathematical evaluation and judging the performance of a network and analyze it to find the performance of a network.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
This document summarizes a research paper on load balancing protocols in mobile ad hoc networks (MANETs). It begins with an abstract of the paper and introduces MANETs and the importance of load balancing in them given nodes' limited resources. It then discusses various load metrics and load balancing routing protocols. Specific protocols covered include Ad Hoc On-Demand Distance Vector (AODV), Ad hoc On-Demand Multipath Distance Vector (AOMDV), and Scalable Multipath On-Demand Routing (SMORT). AOMDV and SMORT aim to compute multiple loop-free paths during route discovery to help balance traffic load across multiple paths. The document concludes that load balanced routing protocols use different metrics to select routes
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
This document summarizes and compares various routing protocols for mobile ad-hoc networks (MANETs). It first describes the characteristics and challenges of MANETs. It then classifies routing protocols for MANETs into three main categories: table-driven (proactive), on-demand (reactive), and hybrid protocols. Examples of protocols from each category are described in detail, including DSDV, AODV, DSR, and ZRP. Key features such as route discovery, table maintenance, and use of proactive and reactive approaches are discussed for each example protocol. Finally, the document compares different protocols based on parameters like scalability, latency, bandwidth overhead, and mobility impact.
Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Net...IJERA Editor
A group of mobile devices called as nodes, without any centralized network, communicates with each other over multi-hop links is called as an Ad-hoc Network (MANET). The military battle-field scenarios, Post-disaster rescue efforts, sensor networks, and entrepreneurs in a conference are some of the examples of mobile ad-hoc networks. Since there is no infrastructure in the network, the routing should be handled at every node. To improve the life time of network different routing protocols are consider. In present routing protocols of ad hoc networks, routing is an act of moving information from a source to destination in an internetwork. Route is selected in the route discovery phase until all the packets are sent out. Due to the continuous flow of packets in a selected route leads to the route failure. In order to reduce this problem we consider PRD-based MMBCR and considering the percentage of the optimum value for periodic route discovery. In our research we are going to analyze the performance of different routing protocols like DSR, MMBCR to get maximum optimum value using Network Simulator Software.
This document compares the performance of the AODV and DSR routing protocols under various network conditions through simulation. It finds that AODV performs better than DSR in terms of packet delivery ratio, with fewer packets lost over time. While DSR initially loses more packets, it is able to reduce packet loss over the course of the longer 20-second simulation compared to AODV.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document discusses key concepts related to ad hoc and wireless sensor networks. It defines ad hoc networks as infrastructureless wireless networks consisting of nodes that act as both senders and receivers and dynamically route data packets. It covers routing algorithms, single vs multi-hop communication, and unicast, broadcast, and multicast transmission models. The document also discusses different types of ad hoc networks including wireless mesh, sensor, and hybrid networks and compares them to cellular networks. It outlines applications and challenges at different layers of the networking protocol stack.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
The document discusses key concepts related to ad hoc and wireless sensor networks. It defines ad hoc networks as infrastructureless, decentralized wireless networks where nodes can act as both senders and receivers and dynamically route data through other nodes. It covers routing algorithms, single vs multi-hop communication, unicast vs broadcast vs multicast transmission, and compares ad hoc networks to cellular networks and WANETs/MANETs. Application areas like military, emergency response, and wireless sensor networks are also mentioned.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
The document provides an overview of routing protocols for mobile ad hoc networks (MANETs). It discusses the characteristics of MANETs and challenges in routing. It classifies routing protocols into three categories: proactive, reactive, and hybrid. Proactive protocols continuously maintain up-to-date routing information through periodic updates. Reactive protocols find routes on demand via route discovery. Hybrid protocols incorporate aspects of both proactive and reactive routing. Examples of protocols from each category are described and compared, including DSDV, AODV, DSR, ZRP, and CEDAR. The document concludes routing in MANET is an active area of research with the goal of protocols responding rapidly to topological changes.
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
This document summarizes a research paper that proposes an efficient routing algorithm for mobile ad hoc networks (MANETs). The paper introduces MANETs and discusses two common routing protocols: Ad hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance-Vector (DSDV). It then proposes an enhancement to AODV that differentiates between relaying and silent nodes to reduce congestion during route discovery. Simulations show the proposed AODV algorithm performs better than the standard AODV and DSR protocols in terms of packet delivery ratio, end-to-end delay, and throughput.
Similar to PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS (20)
This document summarizes research on metal-on-metal hip implants. It discusses how metal-on-metal hip implants were developed over 30 years ago and have been refined through advances in manufacturing and materials science. It reviews various modeling techniques used to analyze the performance of metal-on-metal hip implants, including finite element analysis, numerical solutions of Reynolds' equation, and multi-grid methods. The document finds that while metal-on-metal implants offer strengths like strength and low wear rates, more research is still needed to fully understand factors like lubrication, materials used, geometry, and input parameters in order to minimize failures and revision surgeries.
Background Hospital contributes significantly tangible and intangible resources on a concurred plan by the scheduling of surgery on the OT list. Postponement decreases efficiency by declining throughput leads to wastage of resources hence burden to the nation. Patients and their family face economic and emotional implication due to the postponement. Postponement rate being a quality indicator controls check mechanism could be developed from the results. Postponement of elective scheduled operations results in inefficient use of the operating room (OR) time on the day of surgery. Inconvenience to patients and families are also caused by postponements. Moreover, the day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extent of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology A cross-sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from March 1st to September 30th, 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (surgeons, Anesthetist, Nursing Officer) and they were further evaluated time series analysis of scheduling of Operation Theater for moving average technique. Results Total 958 surgeries were scheduled and 772 surgeries performed were and 186 surgeries were postponed with a postponement rate of 19.42% in the cardiac surgery department during the study period. Month-wise postponement Rate exponential smoothing of time series data shows the dynamic of operating suits. To test throughput Postponement rate was plotted the postponed surgeries and on regression analysis is in a perfect linear relationship.
Introduction: Postponement of elective scheduled operations results in inefficient use of operating room (OR) time on the day of surgery. Inconvenience to patients and families also caused by postponements. Moreover, day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extend of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology: A cross sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from march 1st to September 30th 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (Surgeons, Anesthetist, Nursing officer) and they were further evaluated Time series analysis of scheduling of Operation Theater for Moving average Technique. Results: total 2,466 surgeries were scheduled and 1,980 surgeries were performed and 486 surgeries were postponed in the general surgery department during the study period. Month wise postponement forecast was in accordance with the performed surgeries and on regression analysis postponed surgeries were in perfect linear relationship with the postponement Rate.
In the present paper the experimental study of
Nanotechnology involves high cost for Lab set-up and the
experimentation processes were also slow. Attempt has also
been made to discuss the contributions towards the societal
change in the present convergence of Nano-systems and
information technologies. one cannot rely on experimental
nanotechnology alone. As such, the Computer- simulations and
modeling are one of the foundations of computational
nanotechnology. The computer modeling and simulations
were also referred as computational experimentations. The
accuracy of such Computational nano-technology based
experiment generally depends on the accuracy of the following
things: Intermolecular interaction, Numerical models and
Simulation schemes used. The essence of nanotechnology is
therefore size and control because of the diversity of
applications the plural term nanotechnology is preferred by
some nevertheless they all share the common feature of control
at the nanometer scale the latter focusing on the observation
and study of phenomena at the nanometer scale. In this paper,
a brief study of Computer-Simulation techniques as well as
some Experimental result
Solar cell absorber Kesterite- type Cu2ZnSnS4 (CZTS) thin films have been prepared by Chemical Bath Deposition (CBD). UV–vis absorption spectra measurement indicated that the band gap of as-synthesized CZTS was about1.68 eV, which was near the optimum value for photovoltaic solar conversion in a single-band-gap device. The polycrystalline CZTS thin films with kieserite crystal structure have been obtained by XRD. The average of crystalline size of CZTS is 27 nm
Multilevel inverters play a crucial part in the
areas of high and medium voltage applications. Among the three
main multilevel inverters used, the capacitor clamped multilevel
inverter(CCMLI) has advantage with respect to voltage
redundancies. This work proposes a switching pattern to improve
the performance of chosen H-bridge type CCMLI over
conventional CCMLI. The PWM technique used in this work is
Phase Opposition Disposition PWM(PODPWM). The
performance of proposed H-bridge type CCMLI is verified
through MATLAB-Simulink based simulation. It has been
observed that the THD is low in chosen CCMLI compared to
conventional CCMLI.
This document summarizes a research paper that designed a digital matched filter (DMF) to compress a binary phase code modulation (BPCM) signal encoded with a 13-chip Barker code. The DMF was implemented on an FPGA using a digital convolution algorithm in the time domain. The DMF design included a direct digital frequency synthesizer to generate the BPCM signal, a digital noise generator to add noise, and digital delay lines and shift registers to perform the convolution. Test results showed the input and output signals on an oscilloscope for different signal-to-noise ratio levels. The DMF achieved a processing gain of 11.14 dB.
Flooding is one of the most devastating natural
disasters in Nigeria. The impact of flooding on human activities
cannot be overemphasized. It can threaten human lives, their
property, environment and the economy. Different techniques
exist to manage and analyze the impact of flooding. Some of these
techniques have not been effective in management of flood
disaster. Remote sensing technique presents itself as an effective
and efficient means of managing flood disaster. In this study,
SPOT-10 image was used to perform land cover/ land use
classification of the study area. Advanced Space borne Thermal
Emission and Reflection Radiometer (ASTER) image of 2010 was
used to generate the Digital Elevation Model (DEM). The image
focal statistics were generated using the Spatial Analyst/
Neighborhood/Focal Statistics Tool in ArcMap. The contour map
was produced using the Spatial Analyst/ Surface/ Contour Tools.
The DEM generated from the focal statistics was reclassified into
different risk levels based on variation of elevation values. The
depression in the DEM was filled and used to create the flow
direction map. The flow accumulation map was produced using
the flow direction data as input image. The stream network and
watershed were equally generated and the stream vectorized. The
reclassified DEM, stream network and vectorized land cover
classes were integrated and used to analyze the impact of flood on
the classes. The result shows that 27.86% of the area studied will
be affected at very high risk flood level, 35.63% at high risk,
17.90% at moderate risk, 10.72% at low risk, and 7.89% at no
risk flood level. Built up area class will be mostly affected at very
high risk flood level while farmland will be affected at high risk
flood level. Oshoro, Imhekpeme, and Weppa communities will be
affected at very high risk flood inundation while Ivighe, Uneme,
Igoide and Iviari communities will be at risk at high risk flood
inundation level. It is recommended among others that buildings
that fall within the “Very High Risk” area should be identified
and occupants possibly relocated to other areas such as the “No
Risk” area.
Without water, humans cannot live. Since time began,
we have lived by the water and vast tracts of waterless land have
been abandoned as it is too difficult to inhabit. At any given
moment, the earth’s atmosphere contains 4,000 cubic miles of
water, which is just 0.000012% of the 344 million cubic miles of
water on earth. Nature maintains this ratio via evaporation and
condensation, irrespective of the activities of man.
There is a certain need for an alternative to solve the water
scarcity. Obtaining water from the atmosphere is nothing new -
since the beginning of time, nature’s continuous hydrologic cycle
of evaporation and condensation in the form of rain or snow has
been the sole source and means of regenerating wholesome water
for all forms of life on earth.
An effective method to generate water is by the separation of
moisture present in air by condensation. In this study, the water
present in air is condensed on the surface of a container and then
collected in an external jacket provided on the container.
Insulations are provided to optimize the inner temperature of the
container.
The method is although uncommon but has certain advantages
which make it a success. The process is economical and does not
require a lot of utilities. It also helps in further reducing the
carbon footprint.
In every moment of functioning the Li-Ion
battery must provide the power required by the user, to have a
long operating life and to and to provide high reliability in
operation. The methods for analysis and testing batteries are
ensuring that all these conditions imposed to the batteries are
met by being tested depending on their intended use.
The success rate of real estate project is
decreasing as there is large scale of project and participation of
entities. It is necessary to study the risk factors involved in the
project. This paper focused on types of risks involved in the
project, risk factors, risk management tools & techniques.
Identification of risk of the project in terms of the total cost of the
project has been divided under Technical, Financial, Sociopolitical
and Statutory cost centers. Large real estate projects
have to tackle the following issues: land acquisition, skilledlabour
shortage, non-availability of skilled project managers, and
mechanization of the construction process to cater to the growing
demands. Non- availability of supporting infrastructure, political
issues like instability of the government leading to regulatory
issues, social issues, marketing forms an important part in these
projects as this is a onetime investment and the purchase cycle is
long , long development period makes the same project be at
different points in the real estate value cycle.
This document reviews the use of copper slag as a partial replacement for fine aggregate in concrete. It summarizes 12 previous studies that investigated replacing sand with copper slag at various percentages. The key findings of the studies are:
- Compressive, tensile, and flexural strength of concrete generally increase when replacing up to 40% of fine aggregate with copper slag.
- Workability of concrete mixes also tends to increase with copper slag replacement due to its physical properties.
- Copper slag concrete shows improved resistance to sulfate attack compared to traditional concrete.
- Maximum strength gains are observed around 20-40% fine aggregate replacement with copper slag. Beyond 50% replacement, strengths start to decrease.
- Copper slag
- Security is a concept similar to being cautious
or alert against any danger. Network security is the condition of
being protected against any danger or loss. Thus safety plays a
important role in bank transactions where disclosure of any data
results in big loss. We can define networking as the combination
of two or more computers for the purpose of resource sharing.
Resources here include files, database, emails etc. It is the
protection of these resources from unauthorized users that
brought the development of network security. It is a measure
incorporated to protect data during their transmission and also
to ensure the transmitted is protected and authentic.
Security of online bank transactions here has been
improved by increasing the number of bits while establishing the
SSL connection as well as in RSA asymmetric key encryption
along with SHA1 used for digital signature to authenticate the
user
Background: Septoplasty is a common surgical
procedure performed by otolaryngologists for the correction of
deviated nasal septum. This surgery may be associated with
numerous complications. To minimize these complications,
otolaryngologists frequently pack both nasal cavities with
different types of nasal packing. Despite all its advantages,
nasal packing is also associated with some disadvantages. To
avoid these issues, many surgeons use suturing techniques to
obviate the need for packing after surgery.
Objective: To determine the efficacy and safety of trans-septal
suture technique in preventing complications and decreasing
morbidity after septoplasty in comparison with nasal packing.
Patients and methods: Prospective comparative study. This
study was conducted in the department of Otolaryngology -
Head and Neck Surgery, Rizgary Teaching Hospital - Erbil,
from the 6th of May 2014 to the 30th of November 2014.
A total of 60 patients aged 18-45 years, undergoing septoplasty,
were included in the study. Before surgery, patients were
randomly divided into two equal groups. Group (A) with transseptal
suture technique was compared with group (B) in which
nasal packing with Merocel was done. Postoperative morbidity
in terms of pain, bleeding, postnasal drip, sleep disturbance,
dysphagia, headache and epiphora along with postoperative
complications including septal hematoma, septal perforation,
crustation and synechiae formation were assessed over a follow
up period of four weeks.
Results: Out of 60 patients, 37 patients were males (61.7%)
and 23 patients were females (38.3%). Patients with nasal
packing had significantly more postoperative pain (P<0.05)><0.05). There was no significant difference between
the two groups with respect to nasal bleeding, septal
hematoma, septal perforation, crustation and synechiae
formation.
Conclusion: Septoplasty can be safely performed using transseptal
suturing technique without nasal packing.
This document summarizes a study that evaluated the quality of drainage water in Al-Shamiya al-sharqi drain in Diwaniya city, Iraq for use in irrigation. 10 water samples were collected from locations along the drain and analyzed for various chemical parameters. An Irrigation Water Quality Index (IWQI) was used to assess the water quality, taking into account parameters like EC, sodium, chloride, bicarbonate and SAR that most affect water quality for irrigation. The IWQI was then integrated with a GIS system to map the water quality. The results found that 52% of the drainage water fell in the "Low restriction" category, 47% was "Moderate restriction" and 1% was
The cable-hoisting method and rail cable-lifting
method are widely used in the construction of suspension bridge.
This paper takes a suspension bridge in Hunan as an example,
and expounds the two construction methods, and analyzes their
respective merits and disadvantages.
The batteries used in electric and hybrid vehicles
consists of several cells with voltages between 3.6V battery and
4.2 V in series or parallel combinations of configurations for
obtaining the necessary available voltages in the operation of a
hybrid electric vehicle. How malfunction of a single cell affects
the behavior of the entire battery pack, BMS main function is to
protect individual cells against over-discharge, overload or
overheating. This is done by correct balancing of the cells. In
addition BMS estimates the battery charge status
This project aims at using (PD-MCPWM) Phase
disposition multi carrier pulse width modulation technique to
reduce leakage current in a transformerless cascaded multilevel
inverter for PV systems. Advantages of transformerless PV
inverter topology is as follows, simple structure, low weight and
provides higher efficiency , but however this topology provides a
path for the leakage current to flow through the parasitic
capacitance formed between the PV module and the ground.
Modulation technique reduces leakage current with an added
advantage without adding any extra components.
Many people in Africa depend on water from
rivers and borehole, but purity of the drinking water from these
sources remains questionable. Mudzira River being the longest
River in a village called Vimtim located in Mubi North Local
government area in Adamawa State was studied in the months of
September to December, 2012 to ascertain the suitability of the
water for human consumption and other related uses. Five study
point: inlet (A, B), middle (C) and out let (D, E) were adopted for
monitoring the physico-chemical parameters using standard
procedures. The mean total temperature values were A (25.000C),
B (24.500C), C (25.500C), D (24.000C) and E (24.000C. Average P
H
values were A (8.00), B (7.87), C (8.20) D (8.37) and E (8.13). The
average conductivity values were A (73.90
1 cms
), B
(73.11
1 cms
), D (74.00
1 cms
) and E (73. 80
1 cms
). The
average total dissolves solid value of each sample were A (17.10),
B (17.10), C (20.00) D (21.64) and E (21.60.). The average
turbidity value of sample were A (47.00), B (47.00), C (50.00) D
(53.00) and E (50.00). Average total hardness value are A
(20.00mg/l), B (20.00mg/L) C (24.00mg/L), D (20.00mg/L) and E
(20.00mg/L). The average chloride content were A (12mg/L), B
(16mg/L), C (12 mg/L) D (16mg/L) and E (16mg/L). The average
calcium content were A (0.3mg/L) B (0.4mg/L), C (0.3mg/L), D
(0.3mg/L) and E (0.2mg/L). The average content of magnesium
were A (12mg/L), B (16mg/L), C (16Mg/L), D (12mg/L), E
(12mg/L). The lead content of River Mudzira water was
negligible. The mean coliform count were A (4), B (3), C (6), D
(7), and E (4).The values of the parameters studied were within
the WHO/NAFDAC recommended standards, excepts for total
coliform levels. In conclusion Vimtim residents consuming
untreated water from River Mudzira are potentially exposed to
possible acute, sub chronic or even chronic water borne diseases
like typhoid fever, dysentery, diarrhea etc.
Microstrip patch antennas are the most common form
of printed antennas. They became very popular due to their low
profile geometry, light weight and low cost. A Rectangular
Microstrip Patch Antenna with probe feed and substrate used is
Arlon AD260 has the relative permittivity of which is 2.6 is
designed and simulated using high frequency structure simulator
(HFSS). All the Parameters of this microsrip patch Antenna such
as bandwidth, S - parameter, Reflection loss and VSWR has been
found and plotted. The main objective of this work is to consider
the reactive loading effect on the patch and its effect towards the
improvement of the antenna characteristics, particularly the
radiation characteristics in principle plane (E and H) is
examined. As per theoretical approach reactive loading creates
either capacitive loading or inductive loading. Due to this effect
the antenna performance may be degraded or enhanced in terms
of efficiency, isolation, gain, impedance matching etc. The results
of this designed antenna are compared with the existing Micro
strip antenna
More from International Journal of Technical Research & Application (20)
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Setup Warehouse & Location in Odoo 17 Inventory
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS
1. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 264-268
264 | P a g e
PERFORMANCE COMPARISON OF AODV AND
DSDV ROUTING PROTOCOLS IN WIRELESS AD
HOC NETWORKS
Rushikesh Dhananjay Imade1, Rushikesh Prataprao Bhoite2, Akshay Sadashiv Bhoite3
Dept. of E&TC (BE student),
Vidya Pratishthan’s college of Engg., Baramati, India
imaderushikesh@gmail.com, bhoite.rushikesh@gmail.com, akshay.bhoite60@gmail.com
Abstract— Change is the only thing which is constant in this
today’s era. Constant technology updates demand building up
and falling down of infrastructure along with cost involvement.
Today there is a need of adaptive infrastructure called Ad hoc
network.
Ad hoc network is a collection of two or more nodes with
wireless communication having network capability that they can
communicate without centralized manner. So, at any time host
devices may act as a router or as a node. Ad hoc networks can be
erected as wireless technology, comprising of Radio Frequency
(RF) and infrared frequency.
Wireless Ad hoc network is Temporary, Infrastructure less,
Decentralized, self-organized packet switched network. In this
network topology changes dynamically which can results change
in link failure or broken. In this paper we evaluate the
performance parameters like Throughput, End-to-End Delay and
Packet Delivery Ratio of AODV (ad hoc on Demand Vector) and
DSDV (Destination Sequential Distance Vector) protocol. The
simulation tool used is Network Simulator 2 -2.35.
Index Terms— Ad hoc network, AODV, DSDV, QoS,
Routing Protocols, NS-2.
I. INTRODUCTION
In today’s infrastructure hungry world, cost involvement
dominates the network type and one of the most vivacious and
vigorous field today is that of ad hoc networks. Within the past
few years the field has seen so rapid expansion of visibility
and work due to the spread of inexpensive, widely available
wireless devices and the network community’s interest in
mobile computing.
The ad hoc networks could be classified into first, second
and third generation network system. Today ad hoc network
considered as third generation. The history of ad hoc network
traced back to the DoD1-sponsored Packet Radio Network
(PRNET) research for military purpose in 1972’s[1]. In 1973’s
the concept of real time ad hoc networks arrived with
computers, notepads, smartphones, PDA’s and another
worthwhile communication devices. In this period working
group on MANET was born and made efforts to standardize
the routing protocol[2].
Wireless networks are classified as infrastructured and
infrastructure less network. Infrastructure based wireless
networks are also called as Cellular network. In cellular
network, communication between different nodes are done by
fixed base stations or routers[3].Infrastructure less wireless
networks are also known as Ad hoc networks .Ad hoc
networks differs from other networks because of following
characteristics: Infrastructure less, decentralized and
temporary network in which data must be routed via
intermediate nodes having single or multihop wireless links
which results frequent change in network topology[3].
In this paper we carry out a systematic performance study
of the two routing protocols for mobile ad hoc network – Ad
hoc On Demand Distance Vector Routing (AODV) and
Destination Sequential Distance Vector (DSDV) protocol in
the hybrid networking environment.
We have used the means of simulation using NS- 2 to
gather data about these routing protocols in order to evaluate
their performance.
The FACTORS which needs to be considered while
choosing a routing protocol for MANET are:
a) Finding an optimal route: The protocol should find optimal
route while sending the packet to the destination. The
parameters that are required to decide the optimal route are
Delay, Bandwidth, hop count, traffic and reliability, etc.
b) Energy efficient: Each node in ad hoc network has battery
power as a source to use energy optimally. The protocol
should have minimum processing and transmission time as
a function of energy.
c) Bandwidth efficient: In MANET each node have energy
and bandwidth associated with it. If we reduce the number
of periodic updates, traffic in the network also reduces
proportionally. So, bandwidth utilization is high.
d) Convergence: Whenever the topology of the network
changes to choose shortest path, the protocol should adjust
himself to get the stable network in minimum time.
e) Loop free: When packet from the sender remains in the
network while reaching to the desired destination loops are
formed in the network. Because of loops Bandwidth gets
wasted. Therefore protocol should be chosen in such
manner that network is loop free.
f) Route failure and discovery: Some mechanism is needed to
detect the route failure and also route discovery to
propogate the information. The new configuration should
converge fast to stable state.
g) Multiple route: As in MANET all nodes are arbitarily
moving for a single source-destination pair results into link
failure. Because of multiple route, alternate route is to be
provided for packet delivery which reduces delay and
improves packet delivery ratio. Also multiple routes
avoid the Congestion (Traffic).
h) Sleep function: As each nodes in ad hoc network should be
energy efficient, therefore nodes other than those who are
not involved in communication process should go into
power saving mode or sleep mode for any random period
of time, without affecting the network.
i) Scalability: The performance of the network should not be
affected by increasing or decreasing the number of nodes
in the network.
II. AD HOC ROUTING PROTOCOLS
Ad hoc routing protocols are divided into two categories:
2. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 264-268
265 | P a g e
1. Table-Driven routing protocol: Table driven routing
attempts to maintain periodic information about the
path from each node to every other node in the
network i.e. These protocols require each node to
store their routing information and when there is a
change in network topology updating has to be made
throughout the network[4]. Low latency is suitable
for real-time traffic. Bandwidth might get wasted due
to periodic updates. The Destination-Sequenced
Distance-Vector Routing (DSDV) protocol is a table
driven algorithm.
2. On-Demand routing protocol: In on demand routing
protocol route between source and destination is
created only on demand (or whenever
required).Route discovery is done by broadcasting
route request (RREQ) packet in the network. There
should be significant delay occurs during route
discovery[4]. This routing protocol were designed not
only to save energy and bandwidth but also to reduce
traffic intensity associated with each node.
Comparison of table driven and on demand routing
protocol is shown in below table
Proactive(Table-Driven) Reactive(On-Demand)
Route from each node to
every other node in the
network
Routes from Source to
Destination only
Routes are ready to use
instantaneously
Routes constructed when
needed, higher connection
setup delay
Periodic route-update
packets
Route update when
necessary
Large routing tables Small or No routing tables
A. DSDV (Table Driven routing protocol)
DSDV stands for Destination Sequential Distance Vector
routing protocol. This protocol is an adaption of RIP (Routing
Information Protocol) which adds sequence number to RIP
routing table[5]. Each node in the network has routing table
associated with it and consists information about next hop
(number of hops required to reach destination), address of the
destination and sequence number received from that
destination. Sequence number determines whether route is
fresh or stale[6]. When node receives packet from it's previous
node, it compares the present sequence number with old. If
new sequence number is greater than old one then it kept new
or greater sequence number. If both sequence numbers are
same then the number with minimum number of hopes is
considered[7].
In DSDV routing table updated periodically during which
node generate two updates: Full dump and increament update.
In full update whole routing table is sent(bandwidth wasting)
and in increamental update just latest information updates are
sent. Because of periodic updates in DSDV bandwidth might
get wasted[8]. The performance of this protocol is highly
depends on periodic updates and latency time which will affect
the speed and capacity of the network[9]. So, in real time this
protocol is unpropitious for the network which contains the
giant number of nodes with high mobility.
B. AODV (On Demand routing protocol)
AODV stands for Ad hoc on demand distance vector
routing protocol. In AODV source generates route request
packet (RREQ) and broadcast through the entire network to
send packet to the destination. Unlike DSDV protocol AODV
does not route to the all nodes and maintains its routing
table[6].
This protocol uses symmetrical link i.e. it uses same path
for send and reply a packet. When route request packet is
broadcasted, all neighboring nodes receive that packet and
checks its routing table. If the entry in routing table is not
present then this node also broadcast the request and record
the entry of previous node in its own routing table. This entry
is used in future to establishing reverse path. In the same
manner each node in network broadcast RREQ packet to
forward the information until it reaches to the destination[3].
When packet is reached at destination the route reply packet is
generated in reverse path with minimum number of hopes.
Each node which receives the route reply packet sets a forward
pointer to the node from which packet is received[10]. In this
way a forward path is created to propogate information in
future.
The AODV protocol contains mechanism which uses
periodic Hello message to check the local connectivity. In case
of link failure or link broken Route Error packet (RERR) is
generated to determine the link broken. Node removes the
corresponding route entry after receiving RERR packet. This
protocol uses multiple route[9]. If one route is fails or broken
another route is provided for packet exchange because of this
overhead or data traffic is avoided.
III. METHODOLOGY
Network creation with number of nodes.
Ad-hoc routing algorithms.
Proactive(Table Driven)Routing e.g. (OLSR, DSDV)
Reactive(On Demand) Routing e.g. (AODV, DSR)
Path Discovery
Path Maintenance
Local Connectivity Maintenance
Simulation of Ad hoc network using NS-2
A. Methodology used in DSDV for communication:
When X receives information from Y about a route to
Z
- Let destination sequence number for Z at X be S(X),
S(Y) is sent from Y
- If S(X)>S(Y), then X ignores the routing
information received from Y
- If S(X)=S(Y), and cost of going through Y is
smaller than the route known to X, then X sets Y as
the next hop to Z
- If S(X)<S(Y), then X sets Y as the next hop to Z
and S(X) is updated to equal S(Y)
B. Methodology used in DSDV for communication:
i. When source (node’1) wants to communicate with
destination (node’8) it first broadcast the route
request (RREQ) packet to its neighbourhood nodes as
shown in below figure:
3. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 264-268
266 | P a g e
Figure 1: Route Discovery in AODV
ii. After getting the packet from source, destination
release a packet named route reply (RREP) in reverse
path as shown in below figure:
Figure 2: Route Reply in AODV
IV. NETWORK SIMULATOR: NS-2
Simulation is widely used in engineering research. There
are a number of simulation tools available to simulate the
behavior of various networks and routing protocols.
In this paper we used simulation tool named NS-2
(Network Simulator) of version 2(2.35)[11]. NS-2 is a discrete
event driven network simulation tool for simulation and it is
freely available.NS-2 is primarily Unix based and works at
packet level. It is an open source solution implemented in C++
and Otcl programming languages at UCB (University Of
Carolina Berkley).NS-2 provides highly modular platform for
simulation of wired as well as wireless networks[12]. It
provides substantial support to simulate bunch of protocols
like TCP, UDP, FTP, HTTP and DSR. Results of the
simulations are obtained in a trace files which records the
entire event[1]. The output of simulation is visualized through
Nam (Network Animator).The Architecture of NS-2 is as
shown in figure:
Figure 3: Architecture of NS-2
V. SIMULATION SCENARIO
Simulation process consists preprocessing and
postprocessing. In preprocessing we define topology,
configure the nodes, protocol type, MAC layer address type,
channel type, traffic type (TCP) and in postprocessing we
analyze the script written in TCL language and generate the
graphs corresponds to each network parameter.
In this paper we proposed a topography of size
500mX400m, with 4 wireless nodes among which 3 nodes
move randomly and 1 node is stationary. We did the
simulation for 150uS with speed as 3m/s and 5m/s for
different nodes.
The network simulation parameters we have used for our
simulation purpose shown in the below table.
The paper analyses the simulation results of DSDV and
AODV protocol in ad hoc network. It creates two different
files: Trace file and Nam file. Trace file store different event
statistics events like source-destination address, protocol type,
traffic agent, initial time, size of packet, whether packet is
delivered or dropped and Nam file gives visualization of
simulated network. These two files are useful for checking the
performance parameters or QoS (Quality of Services) of the
network[13].
VI. PERFORMANCE METRICS
The performance of the protocols depends on various
inter-relating metrics which plays important role in analytical
observation of the protocol. Following are the some important
parameters which we are selected to study the performance of
DSDV and AODV protocols in this simulation study:
Throughput: It is defined as the amount of data transferred
successfully from source to destination in given period of
time. It measures effectiveness of a routing protocol.
Throughput = N/T
Where N is the number of bits received successfully by all
destinations and T is simulation time.
Average End-to-End Delay: It is the time or delay required by
packet to reach destination from source. It includes all possible
delays caused during route discovery, processing delay,
Queueing delay, Transmission delay, Propagation delay, etc. It
determines the reliability of routing protocol.
Packet Delivery ratio: It is defined as the ratio of packet sent
by traffic source to the packet received by traffic sink. PDR
determines correctness and efficiency of ad hoc network.
VII. PERFORMANCE RESULTS
The simulation results are presented in the form of graphs.
In this paper we generate the graphs by APP tool with
analysing trace file in NS2. Following figure show the output
of Nam (Network animator).
4. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 264-268
267 | P a g e
Figure 4: Network Animator Window
In network animator window we see node’2 is stationary
while node’0 and node’1 are source and destination
respectively which communicates through intermediate node’3
and node’2 with TCP as a traffic agent.
Graph shows comparison between the two protocols and
between a different numbers of sources on the basis of the
aforementioned metrics as a function of time.
Throughput
Based on simulation results, throughput of DSDV increases
initially and reduces as time increases while in AODV
throughput increases initially and remains same throughout the
given period of time. Hence, performance of AODV is better
than that of DSDV over same interval of time.
Figure 5: Throughput for AODV
Figure 6: Throughput for DSDV
Average End-to-End Delay
Based on the simulation results, end to end delay of DSDV
protocol is less as routing information is already stored in
routing table i.e. proactive protocol. In AODV protocol route
discovery is on demand hence it has more delay. Therefore
reliability of DSDV protocol is higher than AODV protocol.
Figure 7: Avg. End-to-End Delay for AODV
Figure 8: Avg. End-to-End Delay for DSDV
Packet Delivery ratio
From the simulation results it is clear that PDR of AODV
protocol is always better than that of DSDV protocol. The
PDR of DSDV is low at lower time and suddenly increases to
high value as time interval increases. Hence, reliability of
AODV protocol is higher than DSDV protocol.
Figure 9: PDR for AODV
Figure 10: PDR for DSDV
5. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 3 (May-June 2015), PP. 264-268
268 | P a g e
VIII. CONCLUSION
In this paper, the performance of the two MANET
Routing protocols DSDV and AODV was analyzed using NS-
2 Simulator. Comprehensive simulation results of Average
End-to-End delay, Throughput, and Packet Delivery Ratio are
proposed. From the results we conclude that
*Throughput of AODV is higher than DSDV.
*PDR of AODV is higher than DSDV.
*Delay of AODV Is higher than DSDV.
*DSDV protocol consumes more Bandwidth and has a more
overload as compared to that of AODV protocol.
So we can say overall performance of AODV is better than
DSDV.
REFERENCES
[1] Ram Ramnathan and Jason Redy,”A Brief Overview of Ad
Hoc Networks: Challenges and Directions”, IEEE May 2002.
[2] Magnus Frodigh, Per Johansson and Peter Larsson, “Wireless
Ad Hoc Networking-The art of networking without a
network”, Ericsson Review No.4,2000.
[3] Sunil Kumar and Jyotsna Sengupta, "AODV and OLSR
routing protocols for wireless Ad hoc and Mesh networks"
IEEE 2010.
[4] Nadia Qasim, Fatin Said and Hamid Aghvami” Mobile Ad
Hoc Networking Protocols’ Evaluation through Simulation
for Quality of Service”, IJCS 17 February 2009.
[5] Yang Xiao and Haizhon Li, "Local data control and
admission control for QoS of wireless Ad hoc network" IEEE
2004.
[6] Dhirendra Kumar Sharma, Chiranjeev Kumar, Sandeep Jain
and Neeraj Tyagi, "An Enhancement of Ad hoc routing
protocol for wireless Ad hoc routing protocol" ,IEEE 2012.
[7] V.Sekar, B.S.Manoj, and C.Silva Ram Murthy, "Routing for
single interface MCN architecture and pricing schemes for
data traffic in for multiple-hop cellular N/W", proceedings
of IEEE ICC 2003,vol. 2, pp. 967-973, May 2003.
[8] Minar Delvar and Donald Allen,"Evaluating the
communication performance of an Ad hoc wireless network"
by IEEE 2002.
[9] Fakhar Uddin Ahmed, Department of Computer Science LCB
College, Guwahati Assam, India “Simulation and
Performance Analysis of Real and Non-Real Time traffic in
IEEE 802.11 Ad Hoc Network with NS2”, Vol. 2, Issue 1,
Jan. 2014.
[10] Mohammed Bouhorma, H. Bentaouit and A. Boudhir,
"Performance comparison of Ad hoc Routing protocols
AODV and DSR", IEEE 2009.
[11] The Network Simulator-2 http://www isi.edu/nsnam/-ns/
[12] Dr. P.K.Suri, & Sandeep Maan ¸“Simulation of Packet
Telephony in Mobile Ad hoc Networks Using Network
Simulator”,
[13] (IJACSA) International Journal of Advanced Computer
Science and Applications, Vol. 2, No.1, January 2011.
Tutorial
http://www.isi.edu/nsnam/ns/tutorial/index.html
http://nile.wpi.edu/NS/