SlideShare a Scribd company logo
1 of 9
Download to read offline
http://www.iaeme.com/IJARET/index.asp 215 editor@iaeme.com
International Journal of Advanced Research in Engineering and Technology (IJARET)
Volume 10, Issue 2, March-April 2019, pp. 215-223. Article ID: IJARET_10_02_021
Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02
ISSN Print: 0976-6480 and ISSN Online: 0976-6499
© IAEME Publication
PERFORMANCE ESTIMATION OF ADHOC
ROUTING PROTOCOLS WITH NS2
SIMULATOR
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd
Ali
Research Scholar JNTUH, Hyderabad, India
ABTRACT
A mobile adhoc network is a collection of wireless mobile nodes dynamically
creating a temporary network without usage of any prevailing network infrastructure
or consolidated management. Several routing protocols like Dynamic Source Routing
(DSR), Adhoc On-Demand Distance Vector Routing (AODV) and Destination
Sequenced Distance-Vector (DSDV) have been implemented. In this paper, an attempt
has been made to compare the performance of two prominent on-demand reactive
routing protocols for mobile ad hoc networks: DSR and AODV, along with the
traditional proactive DSDV protocol. A simulation model with MAC and physical layer
models is used to study interlayer interactions and their performance inferences. The
On-demand protocols, AODV and DSR perform better than the table-driven DSDV
protocol. Although DSR and AODV share similar on-demand performance, the
differences in the protocol mechanics can lead to significant performance differentials.
A variation of workload and scenarios, as characterized by mobility, load and size of
the ad hoc network were simulated. The performance analysis is evaluated by means of
varying network load, mobility, and network size. These simulations are conceded out
based on the Rice Monarch Project that has made considerable additions to the NS-2
network simulator to track adhoc simulations.
Keywords: Performance, Analysis, Ad Hoc Network, AODV, DSR, DSDV, NS2.
Cite this Article: Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul
Sattar and Syed Mohd Ali, Performance Estimation of Adhoc Routing Protocols with
Ns2 Simulator, International Journal of Advanced Research in Engineering and
Technology, 10(2), 2019, pp. 215-223.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
1. INTRODUCTION
Wireless networking is a developing technology that permits users to access information and
services electronically, regardless of their geographic location. Wireless networks can be
classified in two types.
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali
http://www.iaeme.com/IJARET/index.asp 216 editor@iaeme.com
1.1. Infrastructure Networks
Infrastructure network comprises of a network with fixed and wired gateways. A mobile host
communicates with a bridge in the network (called base station) within its communication
range. The mobile unit can travel geographically while it is communicating. When it goes out
of range of one base station, it associates with new base station and starts communicating
through it. This is called handoff. In this method the base stations are stationary.
1.2. Infrastructure Less (Adhoc) Networks
In adhoc networks [5] all nodes are mobile and can be linked dynamically in a random manner.
As the range of each host’s wireless transmission is restricted, so to communicate with hosts
outside its transmission range, a host needs to enlist the aid of its nearby hosts in forwarding
packets to the destination. So all nodes of these networks behave as routers and take part in
discovery and maintenance of routes to other nodes in the network. Adhoc networks are suitable
in emergency search and rescue operations, meetings or conventions in which persons wish to
rapidly share information, and data acquirement operations in unfriendly topography. This ad-
hoc routing protocols can be divided into two classifications:
Table Driven Routing Protocols: In table driven routing protocols, reliable and up-to-date
routing information to all nodes is preserved at each node.
On-Demand Routing Protocols: In On-Demand routing protocols, the paths are formed as
and when essential. When a source needs to send to a destination, it raises the route discovery
mechanisms to discover the path to the destination.
2. AD-HOC ROUTING PROTOCOLS DESCRIPTION DESTINATION-
SEQUENCED DISTANCE-VECTOR
The Destination-Sequenced Distance-Vector (DSDV) [3] Routing Algorithm is established on
the idea of the traditional Bellman-Ford Routing Algorithm with certain improvements. Every
mobile node maintains a routing table that lists all available destinations, the number of hops
to reach the destination and the sequence number allocated by the destination node. The
sequence number is used to distinguish stale routes from new ones and therefore avoid the
creation of loops. The nodes occasionally transmit their routing tables to their immediate
neighbors. A station also transmits its routing table if a significant change has occurred in its
table from the last update sent. So, the update is both time-driven and event-driven. The routing
table updates can be sent in two ways: a “full dump” or an incremental update. A full dump
sends the full routing table to the neighbors and could span many packets whereas in an
incremental update only those records from the routing table are sent that has a metric variation
since the last update and it must fit in a packet. If there is space in the incremental update packet
then those records may be incorporated whose sequence number has altered. When the network
is pretty stable, incremental updates are sent to shun extra traffic and full dump are relatively
infrequent. In a fast-changing network, incremental packets can grow big so full dumps will be
more common.
3. AD HOC ON-DEMAND DISTANCE VECTOR ROUTING (AODV)
AODV [2] discovers routes on an as required basis via a similar route discovery process.
However, AODV implements a very different mechanism to maintain routing information.
It uses traditional routing tables, one entry per destination. This is in contrast to DSR, which
can maintain multiple route cache entries for each destination. Without source routing, AODV
relies on routing table entries to broadcast an RREP back to the source and, subsequently, to
route data packets to the destination. AODV uses sequence numbers maintained at each
Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator
http://www.iaeme.com/IJARET/index.asp 217 editor@iaeme.com
destination to determine freshness of routing information and to prevent routing loops. All
routing packets carry these sequence numbers.
An important feature of AODV is the maintenance of timer-based states in each node,
regarding utilization of individual routing table entries. A routing table record is expired if not
used recently. A set of predecessor nodes is preserved for each routing table entry, representing
the set of neighboring nodes which use that entry to route data packets. These nodes are notified
with RERR packets when the next-hop link breaks. Each predecessor node, in turn, forwards
the RERR to its own set of predecessors, thus effectively erasing all routes using the broken
link. In contrast to DSR, RERR packets in AODV are intended to inform all sources using a
link when a failure occurs. Route error propagation in AODV can be visualized conceptually
as a tree whose root is the node at the point of failure and all sources using the failed link as the
leaves.
4. DYNAMIC SOURCE ROUTING (DSR)
The main distinctive feature of DSR [4] is the use of source routing. That is, the sender knows
the complete hop byhop route to the destination. These routes are stored in a route cache. The
data packets carry the source route in the packet header. When a node in the adhoc network
tries to send a data packet to a destination for which it does not already know the route, it uses
a route discovery process to dynamically determine such a route. Route discovery works by
flooding the network with route request (RREQ) packets. Each node receiving an RREQ
rebroadcasts it, unless it is the destination or it has a route to the destination in its route cache.
Such a node replies to the RREQ with a route reply (RREP) packet that is routed back to the
original source. RREQ and RREP packets are also source routed. The RREQ builds up the path
traversed across the network. The RREP routes itself back to the source by traversing this path
backward. The route carried back by the RREP packet is cached at the source for future use. If
any link on a source route is broken, the source node is notified using a route error (RERR)
packet. The source removes any route using this link from its cache. A new route discovery
process must be initiated by the source if this route is still needed. DSR makes very aggressive
use of source routing and route caching.
5. PERFORMANCE ANALYSIS SIMULATION ENVIRONMENT
The simulation experiment is carried out in LINUX (FEDORA 6). The detailed simulation
model is based on network simulator-2 (ver-2.31) [1], is used in the evaluation. The NS
instructions can be used to define the topology structure of the network and the motion mode
of the nodes, to configure the service source and the receiver, to create the statistical data track
file and so on.
6. TRAFFIC MODEL
Continuous bit rate (CBR) traffic sources are used. The source-destination pairs are spread
arbitrarily above the network. Only 512-byte data packets are used. The number of source-
destination pairs and the packet sending rate in each pair is varied to change the obtainable load
in the network.
7. MOBILITY MODEL
The mobility model uses the random waypoint model in a rectangular field. The field
configurations used is: 500 m × 500 m field with 50 nodes. Here, each packet starts its journey
from a random location to a random destination with a randomly chosen speed (uniformly
distributed between 0–20 m/s). Once the destination is reached, another random destination is
targeted after a pause. The pause time, which affects the relative speeds of the mobiles, is varied.
Simulations are run for 100 simulated seconds. Identical mobility and traffic scenarios are used
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali
http://www.iaeme.com/IJARET/index.asp 218 editor@iaeme.com
across protocols to gather fair results. Mobility models were created for the simulations using
50 nodes, with pause times of 0, 10, 20, 40, 100 seconds, maximum speed of 20 m/s, topology
boundary of 500 × 500 and simulation time of 100 secs.
8. PERFORMANCE METRICS [7] PACKET DELIVERY FRACTION
The ratio of the data packets delivered to the destinations to those generated by the CBR
sources is known as packet delivery fraction.
9. AVERAGE END-TO-END DELAY
Average end to end delay includes all possible delays caused by buffering during route
discovery latency, queuing at the interface queue, retransmission delays at the MAC, and
propagation and transfer times of data packets.
10. NORMALIZED ROUTING LOAD
The number of routing packets transmitted per data packet delivered at the destination. Each
hop-wise transmission of a routing packet is counted as one transmission. The first two metrics
are the most significant for best effort traffic. The routing load metric evaluates the efficiency
of the routing protocol. Note, however, that these metrics are not completely independent. For
example, lower packet delivery ratio means that the delay metric is evaluated with fewer
samples. In the conventional perception, the longer the path lengths, the higher the probability
of a packet drops. Thus, with a lower delivery ratio, samples are generally inclined in favor of
smaller path lengths and therefore have less end to end delay.
11. PERFORMANCE RESULTS
For all the simulations, the identical movement models were used, the number of traffic sources
was fixed at 20, the maximum speed of the nodes is set to 20 m/s and the pause time varied as
0 s, 10 s, 20 s, 40 s and 100 s.
12. PACKET DELIVERY FRACTION
The On-demand protocols, DSR and AODV performed predominantly well, transporting over
85% of the data packets irrespective of mobility ratio.
13. AVERAGE END-END PACKET DELAY
The average end-to-end delay of packet delivery was higher in DSDV as compared to both DSR
and AODV. In summary, both the On-demand routing protocols, AODV and DSR
outperformed the Table-driven routing protocol; DSDV and the reasons are discussed later.
Figures 1 and 2 highlight the relative performance of the three routing protocols. All of the
protocols provide a greater proportion of the initiated data packets when there is little node
mobility (i.e., at large pause time), converging to 100% delivery when there is no node mobility.
Following, since both AODV and DSR did better, an effort was made to evaluate the
performance difference among the two by changing the mobility arrangement and number of
traffic sources.
Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator
http://www.iaeme.com/IJARET/index.asp 219 editor@iaeme.com
Figure 1 Packet Delivery Fraction (PDF) Vs Pause time
Figure 2 Average Delay Vs Pause Time
14. VARYING MOBILITY AND NUMBER OF SOURCES TO ANALYZE
THE PERFORMANCE MODIFICATION
Now, again simulations were carried out with the number of traffic sources as 10, 20, 30 and
40.The pause time was varied as 0 (high mobility), 10, 20, 40, 100 (no mobility) and the packets
were directed at a ratio of 4 packets/sec.
14.1. Packet Delivery Fraction Comparison
The packet delivery fractions [7] for DSR and AODV are alike with 10 sources (Fig. 3).
However, with 20, 30 and
40 sources, AODV outperforms DSR by about 15 percent (Fig. 5 and 6) at lower pause
times (higher mobility).
Figure 3 PDF for 10 Sources
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali
http://www.iaeme.com/IJARET/index.asp 220 editor@iaeme.com
Figure 4 PDF for 20 Sources
Figure 5 PDF for 30 Sources
Figure 6 PDF for 40 Sources
14.2. Normalized Routing Load Comparison
In all cases, DSR demonstrates significantly lower routing load than AODV, with the factor
increasing with a growing number of sources. In summary, when the number of sources is low,
Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator
http://www.iaeme.com/IJARET/index.asp 221 editor@iaeme.com
the performance of DSR and AODV is similar regardless of mobility. With large numbers of
sources, AODV starts outperforming DSR for highmobility scenarios. As the data from the
varying sources demonstrate, AODV starts outperforming DSR at a lower load with a larger
number of nodes. DSR always demonstrates a lower routing load than AODV. The major
contribution to AODV’s routing over-head is from route requests, while route replies constitute
a large fraction of DSR’s routing overhead. Furthermore, AODV has more route requests than
DSR, and the converse is true for route replies.
Figure 7 Normalized Routing Load for 10 Sources
Figure 8 Normalized Routing Load for 20 Sources
Figure 9 Normalized Routing Load for 30 Sources
Figure 10 Normalized Routing Load for 40 Sources
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali
http://www.iaeme.com/IJARET/index.asp 222 editor@iaeme.com
15. PERFORMANCE ANALYSIS
The simulation results bring out some important characteristic differences between the routing
protocols. The presence of high mobility implies frequent link failures and each routing protocol
reacts differently during link failures. The different basic working mechanism of these protocols
leads to the differences in the performance. DSDV fails to converge below lower pause times.
At higher rates of mobility (lower pause times), DSDV does poorly, dropping to a 70% packet
delivery ratio. Nearly all of the dropped packets are lost because a stale routing table entry
directed them to be forwarded over a broken link. As described in the earlier section, DSDV
maintains only one route per destination and consequently, each packet that the MAC layer is
unable to deliver is dropped since there are no alternate routes. For DSR and AODV, packet
delivery ratio is independent of offered traffic load, with both protocols delivering between
85% and 100% of the packets in all cases. Since DSDV uses the table-driven approach of
maintaining routing information, it is not as adaptive to the route changes that occur during high
mobility. In contrast, the lazy approach used by the on-demand protocols, AODV and DSR to
build the routing information as and when they are created make them more adaptive and result
in better performance (high packet delivery fraction and lower average end-to-end packet
delays). Next the simulation results of Normalized Routing Load graph with 30 and 40 sources
that compare the performances of AODV and DSR lead us to the following conclusions.
16. MOBILITY EFFECT
In the presence of high mobility, link failures occur very frequently. Link failures trigger new
route discoveries in AODV since it has at most one route per destination in its routing table.
Thus, the frequency of route discoveries in AODV is directly proportional to the number of
route breaks. The reaction of DSR to link failures in comparison is mild and causes route
discovery less often. The reason is the abundance of cached routes at each node. Thus, the route
discovery is delayed in DSR until all cached routes fail. But with high mobility, the chance of
the caches being stale is quite high in DSR. Finally when a route discovery is originated, the
large number of replies received in response is associated with high MAC overhead and cause
improved interfering to data traffic. Hence, the cache staleness and high MAC overhead
together result in significant degradation in performance for DSR in high mobility scenarios. In
lower mobility scenarios, DSR regularly performs better than AODV, because the chances of
find the route in one of the caches is much higher. However, due to the constrained simulation
environment (lesser simulation time and lesser mobility models), the better performance of
DSR over AODV couldn’t be observed.
17. ROUTING LOAD RESULT
DSR almost always has a lower routing load than AODV.
This can be attributed to the caching strategy used by DSR. By virtue of aggressive caching,
DSR is more likely to find a route in the cache, and hence resorts to route discovery less
frequently than AODV.
18. CONCLUSIONS
This project compared the performance of DSDV, AODV and DSR routing protocols for adhoc
networks using ns-2 simulator. DSDV uses the proactive table-driven routing strategy while
both AODV and DSR use the reactive On demand routing strategy. Both AODV and DSR
perform better under high mobility simulations than DSDV. High mobility outcomes in
frequent link failures and the overhead involved in updating all the nodes with the new routing
information as in DSDV is much more than that involved AODV and DSR, where the routes
are created as and when required. DSR and AODV both use on-demand route discovery, but
Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator
http://www.iaeme.com/IJARET/index.asp 223 editor@iaeme.com
with different routing mechanics. In particular, DSR uses source routing and route caches, and
does not depend on any periodic or timer-based activities. DSR exploits caching aggressively
and maintains multiple routes per destination. AODV, on the other hand, uses routing tables,
one route per destination, and destination sequence numbers, a mechanism to prevent loops and
to determine freshness of routes. The general observation from the simulation is that for
application-oriented metrics such as packet delivery fraction and delay AODV, outperforms
DSR in more “stressful” situations (i.e., smaller number of nodes and lower load and/or
mobility), with widening performance gaps with increasing stress (e.g., more load, higher
mobility). DSR, however, consistently generates less routing load than AODV. The poor
performances of DSR are mainly attributed to aggressive use of caching, and lack of any
mechanism to expire stale routes or determine the freshness of routes when multiple choices
are available. Forceful caching, however, seems to help DSR at low loads and also keeps its
routing load down.
19. FUTURE WORK
In upcoming years, extensive complex simulations may possibly be carried out by means of the
project code, in order to increase a more in-depth performance analysis of the adhoc routing
protocols. Further new protocol performance could be studied too.
REFERENCES
[1] NS-2, The ns Manual (formally known as NS Documentation) available at http: //www.
isi.edu/nsnam/ ns/doc.
[2] Ian D. Chakeres and Elizabeth M. Belding-Royer. AODV Routing Protocol Implementation
Design
[3] Charle E. Perkins and Pravin Bhagwat. Highly Dynamic Destination-Sequenced Distance-
Vector Routing (DSDV) for Mobile Computers.
[4] David B. Johnson, David A. Maltz and Josh Broch. DSR: The Dynamic Source Routing
protocol for Multi-Hop Wireless Ad Hoc networks.
[5] Magnus Frodigh, Per Johansson and Peter Larsson. Wireless ad hoc networking—The art
of networking without a network.
[6] Park. V and Corson. M. Temporally-Ordered Routing Algorithm (TORA) Version 1.
Functional Specification.
[7] Gao, Fang, Lu, Yuan, Zhang, Qingshun and Li, Chunli. Simulation and Analysis for the
Performance of the Mobile Ad Hoc Network Routing Protocols.

More Related Content

What's hot

Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingeSAT Publishing House
 

What's hot (18)

Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
J0935461
J0935461J0935461
J0935461
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
Br31467472
Br31467472Br31467472
Br31467472
 

Similar to Performance of Ad Hoc Routing Protocols in NS2

Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 

Similar to Performance of Ad Hoc Routing Protocols in NS2 (20)

Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 

Performance of Ad Hoc Routing Protocols in NS2

  • 1. http://www.iaeme.com/IJARET/index.asp 215 editor@iaeme.com International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 10, Issue 2, March-April 2019, pp. 215-223. Article ID: IJARET_10_02_021 Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 © IAEME Publication PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali Research Scholar JNTUH, Hyderabad, India ABTRACT A mobile adhoc network is a collection of wireless mobile nodes dynamically creating a temporary network without usage of any prevailing network infrastructure or consolidated management. Several routing protocols like Dynamic Source Routing (DSR), Adhoc On-Demand Distance Vector Routing (AODV) and Destination Sequenced Distance-Vector (DSDV) have been implemented. In this paper, an attempt has been made to compare the performance of two prominent on-demand reactive routing protocols for mobile ad hoc networks: DSR and AODV, along with the traditional proactive DSDV protocol. A simulation model with MAC and physical layer models is used to study interlayer interactions and their performance inferences. The On-demand protocols, AODV and DSR perform better than the table-driven DSDV protocol. Although DSR and AODV share similar on-demand performance, the differences in the protocol mechanics can lead to significant performance differentials. A variation of workload and scenarios, as characterized by mobility, load and size of the ad hoc network were simulated. The performance analysis is evaluated by means of varying network load, mobility, and network size. These simulations are conceded out based on the Rice Monarch Project that has made considerable additions to the NS-2 network simulator to track adhoc simulations. Keywords: Performance, Analysis, Ad Hoc Network, AODV, DSR, DSDV, NS2. Cite this Article: Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali, Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator, International Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 215-223. http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2 1. INTRODUCTION Wireless networking is a developing technology that permits users to access information and services electronically, regardless of their geographic location. Wireless networks can be classified in two types.
  • 2. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali http://www.iaeme.com/IJARET/index.asp 216 editor@iaeme.com 1.1. Infrastructure Networks Infrastructure network comprises of a network with fixed and wired gateways. A mobile host communicates with a bridge in the network (called base station) within its communication range. The mobile unit can travel geographically while it is communicating. When it goes out of range of one base station, it associates with new base station and starts communicating through it. This is called handoff. In this method the base stations are stationary. 1.2. Infrastructure Less (Adhoc) Networks In adhoc networks [5] all nodes are mobile and can be linked dynamically in a random manner. As the range of each host’s wireless transmission is restricted, so to communicate with hosts outside its transmission range, a host needs to enlist the aid of its nearby hosts in forwarding packets to the destination. So all nodes of these networks behave as routers and take part in discovery and maintenance of routes to other nodes in the network. Adhoc networks are suitable in emergency search and rescue operations, meetings or conventions in which persons wish to rapidly share information, and data acquirement operations in unfriendly topography. This ad- hoc routing protocols can be divided into two classifications: Table Driven Routing Protocols: In table driven routing protocols, reliable and up-to-date routing information to all nodes is preserved at each node. On-Demand Routing Protocols: In On-Demand routing protocols, the paths are formed as and when essential. When a source needs to send to a destination, it raises the route discovery mechanisms to discover the path to the destination. 2. AD-HOC ROUTING PROTOCOLS DESCRIPTION DESTINATION- SEQUENCED DISTANCE-VECTOR The Destination-Sequenced Distance-Vector (DSDV) [3] Routing Algorithm is established on the idea of the traditional Bellman-Ford Routing Algorithm with certain improvements. Every mobile node maintains a routing table that lists all available destinations, the number of hops to reach the destination and the sequence number allocated by the destination node. The sequence number is used to distinguish stale routes from new ones and therefore avoid the creation of loops. The nodes occasionally transmit their routing tables to their immediate neighbors. A station also transmits its routing table if a significant change has occurred in its table from the last update sent. So, the update is both time-driven and event-driven. The routing table updates can be sent in two ways: a “full dump” or an incremental update. A full dump sends the full routing table to the neighbors and could span many packets whereas in an incremental update only those records from the routing table are sent that has a metric variation since the last update and it must fit in a packet. If there is space in the incremental update packet then those records may be incorporated whose sequence number has altered. When the network is pretty stable, incremental updates are sent to shun extra traffic and full dump are relatively infrequent. In a fast-changing network, incremental packets can grow big so full dumps will be more common. 3. AD HOC ON-DEMAND DISTANCE VECTOR ROUTING (AODV) AODV [2] discovers routes on an as required basis via a similar route discovery process. However, AODV implements a very different mechanism to maintain routing information. It uses traditional routing tables, one entry per destination. This is in contrast to DSR, which can maintain multiple route cache entries for each destination. Without source routing, AODV relies on routing table entries to broadcast an RREP back to the source and, subsequently, to route data packets to the destination. AODV uses sequence numbers maintained at each
  • 3. Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator http://www.iaeme.com/IJARET/index.asp 217 editor@iaeme.com destination to determine freshness of routing information and to prevent routing loops. All routing packets carry these sequence numbers. An important feature of AODV is the maintenance of timer-based states in each node, regarding utilization of individual routing table entries. A routing table record is expired if not used recently. A set of predecessor nodes is preserved for each routing table entry, representing the set of neighboring nodes which use that entry to route data packets. These nodes are notified with RERR packets when the next-hop link breaks. Each predecessor node, in turn, forwards the RERR to its own set of predecessors, thus effectively erasing all routes using the broken link. In contrast to DSR, RERR packets in AODV are intended to inform all sources using a link when a failure occurs. Route error propagation in AODV can be visualized conceptually as a tree whose root is the node at the point of failure and all sources using the failed link as the leaves. 4. DYNAMIC SOURCE ROUTING (DSR) The main distinctive feature of DSR [4] is the use of source routing. That is, the sender knows the complete hop byhop route to the destination. These routes are stored in a route cache. The data packets carry the source route in the packet header. When a node in the adhoc network tries to send a data packet to a destination for which it does not already know the route, it uses a route discovery process to dynamically determine such a route. Route discovery works by flooding the network with route request (RREQ) packets. Each node receiving an RREQ rebroadcasts it, unless it is the destination or it has a route to the destination in its route cache. Such a node replies to the RREQ with a route reply (RREP) packet that is routed back to the original source. RREQ and RREP packets are also source routed. The RREQ builds up the path traversed across the network. The RREP routes itself back to the source by traversing this path backward. The route carried back by the RREP packet is cached at the source for future use. If any link on a source route is broken, the source node is notified using a route error (RERR) packet. The source removes any route using this link from its cache. A new route discovery process must be initiated by the source if this route is still needed. DSR makes very aggressive use of source routing and route caching. 5. PERFORMANCE ANALYSIS SIMULATION ENVIRONMENT The simulation experiment is carried out in LINUX (FEDORA 6). The detailed simulation model is based on network simulator-2 (ver-2.31) [1], is used in the evaluation. The NS instructions can be used to define the topology structure of the network and the motion mode of the nodes, to configure the service source and the receiver, to create the statistical data track file and so on. 6. TRAFFIC MODEL Continuous bit rate (CBR) traffic sources are used. The source-destination pairs are spread arbitrarily above the network. Only 512-byte data packets are used. The number of source- destination pairs and the packet sending rate in each pair is varied to change the obtainable load in the network. 7. MOBILITY MODEL The mobility model uses the random waypoint model in a rectangular field. The field configurations used is: 500 m × 500 m field with 50 nodes. Here, each packet starts its journey from a random location to a random destination with a randomly chosen speed (uniformly distributed between 0–20 m/s). Once the destination is reached, another random destination is targeted after a pause. The pause time, which affects the relative speeds of the mobiles, is varied. Simulations are run for 100 simulated seconds. Identical mobility and traffic scenarios are used
  • 4. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali http://www.iaeme.com/IJARET/index.asp 218 editor@iaeme.com across protocols to gather fair results. Mobility models were created for the simulations using 50 nodes, with pause times of 0, 10, 20, 40, 100 seconds, maximum speed of 20 m/s, topology boundary of 500 × 500 and simulation time of 100 secs. 8. PERFORMANCE METRICS [7] PACKET DELIVERY FRACTION The ratio of the data packets delivered to the destinations to those generated by the CBR sources is known as packet delivery fraction. 9. AVERAGE END-TO-END DELAY Average end to end delay includes all possible delays caused by buffering during route discovery latency, queuing at the interface queue, retransmission delays at the MAC, and propagation and transfer times of data packets. 10. NORMALIZED ROUTING LOAD The number of routing packets transmitted per data packet delivered at the destination. Each hop-wise transmission of a routing packet is counted as one transmission. The first two metrics are the most significant for best effort traffic. The routing load metric evaluates the efficiency of the routing protocol. Note, however, that these metrics are not completely independent. For example, lower packet delivery ratio means that the delay metric is evaluated with fewer samples. In the conventional perception, the longer the path lengths, the higher the probability of a packet drops. Thus, with a lower delivery ratio, samples are generally inclined in favor of smaller path lengths and therefore have less end to end delay. 11. PERFORMANCE RESULTS For all the simulations, the identical movement models were used, the number of traffic sources was fixed at 20, the maximum speed of the nodes is set to 20 m/s and the pause time varied as 0 s, 10 s, 20 s, 40 s and 100 s. 12. PACKET DELIVERY FRACTION The On-demand protocols, DSR and AODV performed predominantly well, transporting over 85% of the data packets irrespective of mobility ratio. 13. AVERAGE END-END PACKET DELAY The average end-to-end delay of packet delivery was higher in DSDV as compared to both DSR and AODV. In summary, both the On-demand routing protocols, AODV and DSR outperformed the Table-driven routing protocol; DSDV and the reasons are discussed later. Figures 1 and 2 highlight the relative performance of the three routing protocols. All of the protocols provide a greater proportion of the initiated data packets when there is little node mobility (i.e., at large pause time), converging to 100% delivery when there is no node mobility. Following, since both AODV and DSR did better, an effort was made to evaluate the performance difference among the two by changing the mobility arrangement and number of traffic sources.
  • 5. Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator http://www.iaeme.com/IJARET/index.asp 219 editor@iaeme.com Figure 1 Packet Delivery Fraction (PDF) Vs Pause time Figure 2 Average Delay Vs Pause Time 14. VARYING MOBILITY AND NUMBER OF SOURCES TO ANALYZE THE PERFORMANCE MODIFICATION Now, again simulations were carried out with the number of traffic sources as 10, 20, 30 and 40.The pause time was varied as 0 (high mobility), 10, 20, 40, 100 (no mobility) and the packets were directed at a ratio of 4 packets/sec. 14.1. Packet Delivery Fraction Comparison The packet delivery fractions [7] for DSR and AODV are alike with 10 sources (Fig. 3). However, with 20, 30 and 40 sources, AODV outperforms DSR by about 15 percent (Fig. 5 and 6) at lower pause times (higher mobility). Figure 3 PDF for 10 Sources
  • 6. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali http://www.iaeme.com/IJARET/index.asp 220 editor@iaeme.com Figure 4 PDF for 20 Sources Figure 5 PDF for 30 Sources Figure 6 PDF for 40 Sources 14.2. Normalized Routing Load Comparison In all cases, DSR demonstrates significantly lower routing load than AODV, with the factor increasing with a growing number of sources. In summary, when the number of sources is low,
  • 7. Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator http://www.iaeme.com/IJARET/index.asp 221 editor@iaeme.com the performance of DSR and AODV is similar regardless of mobility. With large numbers of sources, AODV starts outperforming DSR for highmobility scenarios. As the data from the varying sources demonstrate, AODV starts outperforming DSR at a lower load with a larger number of nodes. DSR always demonstrates a lower routing load than AODV. The major contribution to AODV’s routing over-head is from route requests, while route replies constitute a large fraction of DSR’s routing overhead. Furthermore, AODV has more route requests than DSR, and the converse is true for route replies. Figure 7 Normalized Routing Load for 10 Sources Figure 8 Normalized Routing Load for 20 Sources Figure 9 Normalized Routing Load for 30 Sources Figure 10 Normalized Routing Load for 40 Sources
  • 8. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali http://www.iaeme.com/IJARET/index.asp 222 editor@iaeme.com 15. PERFORMANCE ANALYSIS The simulation results bring out some important characteristic differences between the routing protocols. The presence of high mobility implies frequent link failures and each routing protocol reacts differently during link failures. The different basic working mechanism of these protocols leads to the differences in the performance. DSDV fails to converge below lower pause times. At higher rates of mobility (lower pause times), DSDV does poorly, dropping to a 70% packet delivery ratio. Nearly all of the dropped packets are lost because a stale routing table entry directed them to be forwarded over a broken link. As described in the earlier section, DSDV maintains only one route per destination and consequently, each packet that the MAC layer is unable to deliver is dropped since there are no alternate routes. For DSR and AODV, packet delivery ratio is independent of offered traffic load, with both protocols delivering between 85% and 100% of the packets in all cases. Since DSDV uses the table-driven approach of maintaining routing information, it is not as adaptive to the route changes that occur during high mobility. In contrast, the lazy approach used by the on-demand protocols, AODV and DSR to build the routing information as and when they are created make them more adaptive and result in better performance (high packet delivery fraction and lower average end-to-end packet delays). Next the simulation results of Normalized Routing Load graph with 30 and 40 sources that compare the performances of AODV and DSR lead us to the following conclusions. 16. MOBILITY EFFECT In the presence of high mobility, link failures occur very frequently. Link failures trigger new route discoveries in AODV since it has at most one route per destination in its routing table. Thus, the frequency of route discoveries in AODV is directly proportional to the number of route breaks. The reaction of DSR to link failures in comparison is mild and causes route discovery less often. The reason is the abundance of cached routes at each node. Thus, the route discovery is delayed in DSR until all cached routes fail. But with high mobility, the chance of the caches being stale is quite high in DSR. Finally when a route discovery is originated, the large number of replies received in response is associated with high MAC overhead and cause improved interfering to data traffic. Hence, the cache staleness and high MAC overhead together result in significant degradation in performance for DSR in high mobility scenarios. In lower mobility scenarios, DSR regularly performs better than AODV, because the chances of find the route in one of the caches is much higher. However, due to the constrained simulation environment (lesser simulation time and lesser mobility models), the better performance of DSR over AODV couldn’t be observed. 17. ROUTING LOAD RESULT DSR almost always has a lower routing load than AODV. This can be attributed to the caching strategy used by DSR. By virtue of aggressive caching, DSR is more likely to find a route in the cache, and hence resorts to route discovery less frequently than AODV. 18. CONCLUSIONS This project compared the performance of DSDV, AODV and DSR routing protocols for adhoc networks using ns-2 simulator. DSDV uses the proactive table-driven routing strategy while both AODV and DSR use the reactive On demand routing strategy. Both AODV and DSR perform better under high mobility simulations than DSDV. High mobility outcomes in frequent link failures and the overhead involved in updating all the nodes with the new routing information as in DSDV is much more than that involved AODV and DSR, where the routes are created as and when required. DSR and AODV both use on-demand route discovery, but
  • 9. Performance Estimation of Adhoc Routing Protocols with Ns2 Simulator http://www.iaeme.com/IJARET/index.asp 223 editor@iaeme.com with different routing mechanics. In particular, DSR uses source routing and route caches, and does not depend on any periodic or timer-based activities. DSR exploits caching aggressively and maintains multiple routes per destination. AODV, on the other hand, uses routing tables, one route per destination, and destination sequence numbers, a mechanism to prevent loops and to determine freshness of routes. The general observation from the simulation is that for application-oriented metrics such as packet delivery fraction and delay AODV, outperforms DSR in more “stressful” situations (i.e., smaller number of nodes and lower load and/or mobility), with widening performance gaps with increasing stress (e.g., more load, higher mobility). DSR, however, consistently generates less routing load than AODV. The poor performances of DSR are mainly attributed to aggressive use of caching, and lack of any mechanism to expire stale routes or determine the freshness of routes when multiple choices are available. Forceful caching, however, seems to help DSR at low loads and also keeps its routing load down. 19. FUTURE WORK In upcoming years, extensive complex simulations may possibly be carried out by means of the project code, in order to increase a more in-depth performance analysis of the adhoc routing protocols. Further new protocol performance could be studied too. REFERENCES [1] NS-2, The ns Manual (formally known as NS Documentation) available at http: //www. isi.edu/nsnam/ ns/doc. [2] Ian D. Chakeres and Elizabeth M. Belding-Royer. AODV Routing Protocol Implementation Design [3] Charle E. Perkins and Pravin Bhagwat. Highly Dynamic Destination-Sequenced Distance- Vector Routing (DSDV) for Mobile Computers. [4] David B. Johnson, David A. Maltz and Josh Broch. DSR: The Dynamic Source Routing protocol for Multi-Hop Wireless Ad Hoc networks. [5] Magnus Frodigh, Per Johansson and Peter Larsson. Wireless ad hoc networking—The art of networking without a network. [6] Park. V and Corson. M. Temporally-Ordered Routing Algorithm (TORA) Version 1. Functional Specification. [7] Gao, Fang, Lu, Yuan, Zhang, Qingshun and Li, Chunli. Simulation and Analysis for the Performance of the Mobile Ad Hoc Network Routing Protocols.