SlideShare a Scribd company logo
GTU PG SCHOOL ,
Gandhinagar
Comparison of proactive and reactive
routing protocol in mobile ad-hoc
network
Vrajesh Parikh (141060753008)
Outline
Classification of Routing Protocols
Proactive vs. Reactive Routing Protocols
Proactive and Reactive Protocols Comparison
Performance Metrics
Result and Performance Comparison
Classification of Routing Protocols
Classification of Routing Protocols
• Proactive Protocols
▫ have lower latency due to maintenance of routes at all times
▫ can result in much higher overhead due to frequent route
updates
▫ when a packet needs to be forwarded, the route is already
known
• Reactive Protocols may have
▫ higher latency since the routes have to be discovered when the
source node initiates a route request
▫ lower overhead since routes are maintained only on-demand
basis
▫ Determine a route only when there is data to send.
Proactive vs. Reactive Routing Protocols
..
• Latency of route discovery
▫ Proactive protocols: Little or no delay for route determination
 since routes are maintained at all times
▫ Reactive protocols: Significant delay in route determination
 Employ flooding (global search)
 Control traffic may be burst
• Overhead of route discovery/maintenance
▫ Proactive protocols: Consume bandwidth to keep routes up-to-date
 Maintain routes which may never be used
▫ Reactive protocols: Lower overhead since routes are determined on
demand
• Which approach achieves a better trade-off depends on the traffic and mobility
patterns
▫ Low traffic with high mobility : Reactive
▫ High traffic with low mobility : Proactive
5
Proactive and Reactive Protocols
Comparison
PERFORMANCE METRICS
 The performance comparison of routing protocols on the following
performance metrics:
Packet Delivery Ratio
Packet delivery ratio is calculated by dividing the number of packets received by the
destination through the number of packets originated by the application layer of the
source
Average End-To-End Delay
Average End-to-End delay (seconds) is the average time it takes a
data packet to reach the destination. This metric is calculated by subtracting ―time at
which first packet was transmitted by source from ―time at which first data packet
arrived to destination.
Throughput
The throughput of the protocols can be defined as percentage of the packets received by
the destination among the packets sent by the source. It is the amount of data per time
unit that is delivered from one node to another via a communication link.
RESULTS AND PERFORMANCE
COMPARISION
• Performance of AODV , TORA and DSDV protocols is
evaluated under both CBR and TCP traffic pattern. Extensive
Simulation is done by using NS-2.
Average End to End Delay for CBR
Traffic Pattern
Average End to End Delay TCP Traffic
Pattern
CONCLUSIONS
This study was conducted to evaluate the performance Reactive
(AODV , TORA) and Proactive protocols (DSDV) of MANET
based on both CBR and TCP traffic. These routing protocols were
compared in terms of Packet delivery ratio, Average end-to-end
delay and Throughput when subjected to change in no. of nodes.
Simulation results show that Reactive protocols better in terms of
packet delivery ratio and average end-to-end delay. Future work will
be to evaluate the performance of these protocols by varying the
speed , pause time. Performance can also be analyzed for other
parameters like Jitter, Routing Overhead. By evaluating the
performance of these protocols new protocols can be implemented
or changes can be suggested in the earlier protocols to improve the
performance.
[1] Mazhar H malik Department of informatics Universita Ca’ Foscari Venezia,
Italy malik@dsi.unive.it “Performance Analysis of Proactive and Reactive
Protocols in Mobile Ad-hoc Networking: A Simulation based Analysis” 2014, IEEE
[2] Vikas Singla, Department of Information Technology “Traffic Pattern based
performance comparison of Reactive and Proactive protocols of Mobile Ad-hoc
Networks”, 2010 International Journal of Computer Applications
REFERENCES
?

More Related Content

What's hot

Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
Menaga Selvaraj
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
DSDV VS AODV
DSDV VS AODV DSDV VS AODV
DSDV VS AODV
Senthil Kanth
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
Ali Habeeb
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
ZituSahu
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
SuganthiN2
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
KABILESH RAMAR
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
junnubabu
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
Pallepati Vasavi
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 

What's hot (20)

Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
DSDV VS AODV
DSDV VS AODV DSDV VS AODV
DSDV VS AODV
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
MANET in Mobile Computing
MANET in Mobile ComputingMANET in Mobile Computing
MANET in Mobile Computing
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 

Viewers also liked

Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
ITM Universe - Vadodara
 
Smith chart basics
Smith chart basicsSmith chart basics
Smith chart basics
Mahamed Gamal
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocols
Rama Raman
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Rajesh Karumanchi
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Sushant Kushwaha
 
Aodv slide
Aodv slideAodv slide
Aodv slideDavid
 
Proactive vs Reactive
Proactive vs ReactiveProactive vs Reactive
Proactive vs Reactive
Valentin Hanga
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Sushant Kushwaha
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
@zenafaris91
 
DYNAMIC SOURCE ROUTING (DSR)
DYNAMIC SOURCE ROUTING  (DSR)DYNAMIC SOURCE ROUTING  (DSR)
DYNAMIC SOURCE ROUTING (DSR)
Shankha Subhra Ghosh
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
Shanka Mahakumbura
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
sashar86
 
Proactive vs reactive
Proactive vs reactiveProactive vs reactive
Proactive vs reactive
Tery Casey
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
Raj Sikarwar
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
3 handoff management
3 handoff management3 handoff management
3 handoff managementవం శీ
 

Viewers also liked (20)

Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
 
Smith chart basics
Smith chart basicsSmith chart basics
Smith chart basics
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocols
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
Aodv slide
Aodv slideAodv slide
Aodv slide
 
Proactive vs Reactive
Proactive vs ReactiveProactive vs Reactive
Proactive vs Reactive
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
DYNAMIC SOURCE ROUTING (DSR)
DYNAMIC SOURCE ROUTING  (DSR)DYNAMIC SOURCE ROUTING  (DSR)
DYNAMIC SOURCE ROUTING (DSR)
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Proactive vs reactive
Proactive vs reactiveProactive vs reactive
Proactive vs reactive
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
3 handoff management
3 handoff management3 handoff management
3 handoff management
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 

Similar to proactive and reactive routing comparisons

Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Jitender Grover
 
Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
IJERA Editor
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET Journal
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n
IAESIJEECS
 
A Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc NetworksA Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc Networks
IJERA Editor
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKAN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
IJCNCJournal
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
IJCNCJournal
 
Ex36918926
Ex36918926Ex36918926
Ex36918926
IJERA Editor
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
Jitender Grover
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
ijmnct
 
Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...
IJCNCJournal
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
IOSR Journals
 
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...Oluwatomi Ajayi
 
R045059297
R045059297R045059297
R045059297
IJERA Editor
 
A340105
A340105A340105
A340105
IJERA Editor
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
smita gupta
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
ijtsrd
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
eSAT Publishing House
 

Similar to proactive and reactive routing comparisons (20)

Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
 
Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n
 
A Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc NetworksA Performance Comparison of Routing Protocols for Ad Hoc Networks
A Performance Comparison of Routing Protocols for Ad Hoc Networks
 
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORKAN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
AN EFFICIENT AND STABLE ROUTING ALGORITHM IN MOBILE AD HOC NETWORK
 
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc NetworkAn Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
 
Ex36918926
Ex36918926Ex36918926
Ex36918926
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...Performance analysis of routing protocols and tcp variants under http and ftp...
Performance analysis of routing protocols and tcp variants under http and ftp...
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
The Performance Analysis of Selected Routing Protocols for Mobile Ad hoc Netw...
 
R045059297
R045059297R045059297
R045059297
 
A340105
A340105A340105
A340105
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 

More from ITM Universe - Vadodara

141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides
ITM Universe - Vadodara
 
Customized software testing and Regression testing
Customized software testing and Regression testingCustomized software testing and Regression testing
Customized software testing and Regression testing
ITM Universe - Vadodara
 
Preventing JellyFish Attack
Preventing JellyFish AttackPreventing JellyFish Attack
Preventing JellyFish Attack
ITM Universe - Vadodara
 
NFC and Android applications
NFC and Android applicationsNFC and Android applications
NFC and Android applications
ITM Universe - Vadodara
 
Wireless multimedia sensor network
Wireless multimedia sensor networkWireless multimedia sensor network
Wireless multimedia sensor network
ITM Universe - Vadodara
 
141060753008 3715302
141060753008 3715302141060753008 3715302
141060753008 3715302
ITM Universe - Vadodara
 
141060753008 3715301
141060753008 3715301141060753008 3715301
141060753008 3715301
ITM Universe - Vadodara
 
141060753008 3715306
141060753008 3715306141060753008 3715306
141060753008 3715306
ITM Universe - Vadodara
 
Handoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesHandoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet services
ITM Universe - Vadodara
 

More from ITM Universe - Vadodara (9)

141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides141060753008 vrajesh parikh_slides
141060753008 vrajesh parikh_slides
 
Customized software testing and Regression testing
Customized software testing and Regression testingCustomized software testing and Regression testing
Customized software testing and Regression testing
 
Preventing JellyFish Attack
Preventing JellyFish AttackPreventing JellyFish Attack
Preventing JellyFish Attack
 
NFC and Android applications
NFC and Android applicationsNFC and Android applications
NFC and Android applications
 
Wireless multimedia sensor network
Wireless multimedia sensor networkWireless multimedia sensor network
Wireless multimedia sensor network
 
141060753008 3715302
141060753008 3715302141060753008 3715302
141060753008 3715302
 
141060753008 3715301
141060753008 3715301141060753008 3715301
141060753008 3715301
 
141060753008 3715306
141060753008 3715306141060753008 3715306
141060753008 3715306
 
Handoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet servicesHandoff scheme for high speed mobile internet services
Handoff scheme for high speed mobile internet services
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

proactive and reactive routing comparisons

  • 1. GTU PG SCHOOL , Gandhinagar Comparison of proactive and reactive routing protocol in mobile ad-hoc network Vrajesh Parikh (141060753008)
  • 2. Outline Classification of Routing Protocols Proactive vs. Reactive Routing Protocols Proactive and Reactive Protocols Comparison Performance Metrics Result and Performance Comparison
  • 3. Classification of Routing Protocols Classification of Routing Protocols
  • 4. • Proactive Protocols ▫ have lower latency due to maintenance of routes at all times ▫ can result in much higher overhead due to frequent route updates ▫ when a packet needs to be forwarded, the route is already known • Reactive Protocols may have ▫ higher latency since the routes have to be discovered when the source node initiates a route request ▫ lower overhead since routes are maintained only on-demand basis ▫ Determine a route only when there is data to send. Proactive vs. Reactive Routing Protocols
  • 5. .. • Latency of route discovery ▫ Proactive protocols: Little or no delay for route determination  since routes are maintained at all times ▫ Reactive protocols: Significant delay in route determination  Employ flooding (global search)  Control traffic may be burst • Overhead of route discovery/maintenance ▫ Proactive protocols: Consume bandwidth to keep routes up-to-date  Maintain routes which may never be used ▫ Reactive protocols: Lower overhead since routes are determined on demand • Which approach achieves a better trade-off depends on the traffic and mobility patterns ▫ Low traffic with high mobility : Reactive ▫ High traffic with low mobility : Proactive 5
  • 6. Proactive and Reactive Protocols Comparison
  • 7. PERFORMANCE METRICS  The performance comparison of routing protocols on the following performance metrics: Packet Delivery Ratio Packet delivery ratio is calculated by dividing the number of packets received by the destination through the number of packets originated by the application layer of the source Average End-To-End Delay Average End-to-End delay (seconds) is the average time it takes a data packet to reach the destination. This metric is calculated by subtracting ―time at which first packet was transmitted by source from ―time at which first data packet arrived to destination. Throughput The throughput of the protocols can be defined as percentage of the packets received by the destination among the packets sent by the source. It is the amount of data per time unit that is delivered from one node to another via a communication link.
  • 8. RESULTS AND PERFORMANCE COMPARISION • Performance of AODV , TORA and DSDV protocols is evaluated under both CBR and TCP traffic pattern. Extensive Simulation is done by using NS-2.
  • 9. Average End to End Delay for CBR Traffic Pattern
  • 10. Average End to End Delay TCP Traffic Pattern
  • 11. CONCLUSIONS This study was conducted to evaluate the performance Reactive (AODV , TORA) and Proactive protocols (DSDV) of MANET based on both CBR and TCP traffic. These routing protocols were compared in terms of Packet delivery ratio, Average end-to-end delay and Throughput when subjected to change in no. of nodes. Simulation results show that Reactive protocols better in terms of packet delivery ratio and average end-to-end delay. Future work will be to evaluate the performance of these protocols by varying the speed , pause time. Performance can also be analyzed for other parameters like Jitter, Routing Overhead. By evaluating the performance of these protocols new protocols can be implemented or changes can be suggested in the earlier protocols to improve the performance.
  • 12. [1] Mazhar H malik Department of informatics Universita Ca’ Foscari Venezia, Italy malik@dsi.unive.it “Performance Analysis of Proactive and Reactive Protocols in Mobile Ad-hoc Networking: A Simulation based Analysis” 2014, IEEE [2] Vikas Singla, Department of Information Technology “Traffic Pattern based performance comparison of Reactive and Proactive protocols of Mobile Ad-hoc Networks”, 2010 International Journal of Computer Applications REFERENCES
  • 13. ?