SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
DOI:10.5121/ijfcst.2013.3502 13
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP
IN VANET
Abhishek Singh and Anil K. Verma
Computer Science and Engineering Department, Thapar University
ABSTRACT
The main aim of this paper is to present comprehensive study on the performance and behavior of On-
demand Distance Vector Routing approach (AODV), Table Driven Routing approach (DSDV) and Hybrid
Routing approach (ZRP) in VANETs. VANETs are an enhanced form of MANETs where moving nodes are
replaced by vehicles. This paper evaluates these protocols under realistic mobility models to analyze their
performance in VANETs. To evaluate the performance of given protocols, different set of scenarios with
varying nodes density have been simulated with the help of simulators NS-2, SUMO and MOVE.
KEYWORDS
VANETs, AODV, DSDV, ZRP, NS-2, MOVE, SUMO
1. Introduction
In last few years, vehicular networks have fascinated many research authorities and automotive
industries. Vehicular networks are emerging class of wireless networks that have emerged
because of recent advances in wireless technology. Vehicular Ad-hoc NETwork (VANET) is an
advance form of Mobile Ad-hoc NETwork (MANET), where communicating nodes are replaced
by moving vehicles. Implementation of VANETs will help in improving road traffic safety
system by reducing accidents and it will also help in better utilization of roads and resources such
as fuel and time.
This paper is structured as follows: Section 2 standards, regulations and layered architecture of
VANETs. In Section 3 review ad-hoc routing protocols has been given. Section 4 provides details
of simulation setup, Section 5 gives performance metrics and results. Finally, conclusion has been
discussed in section 6.
2. Standards, Regulations & Layered Architecture
For vehicular network it is mandatory that all participating institutes or authorities agree on
common standard. A standard is a set of rules that promote interoperability among equipment
developed by different groups for example IEEE or Society of Automotive Engineers (SAE). To
create a common standard IEEE has introduced IEEE 802.11p [1], it is amendment to the
IEEE802.11a standard to assist the progress of wireless access in vehicular network (WAVE).
Being variant of IEEE 802.11a, IEEE 802.11p additionally covers the specifics of vehicular
network for example dynamic and mobile environment, message transmission in an ad-hoc
manner, low latency. Researchers have developed IEEE 1609 working group which provide
necessary service on higher layer.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
14
The WAVE technology is classified into dedicated short range communication (DSRC). DSRC
enables the communication among OBU(On Board Unit) and RSU ( Road Side Unit). DSRC
composed of both IEEE 802.11p and IEEE 1609 standards, figure 2.1 illustrates the layered
architecture of DSRC .Short overview of 1609 work group deployed in layered architecture has
been given below:
 IEEE 1609.1 defines a resource manager that should allow multiple applications run on
roadside units to communicate with the on-board units of multiple vehicles. It serves on
the application layer [2].
 IEEE 1609.2 defines security services for communication such as authentication of
devices and encryption of messages [2].
 IEEE 1609.3 specifies networking services for communication, including a specific stack
and protocol to handle WAVE short messages (WSM) [2].
 IEEE 1609.4 improves IEEE 802.11p MAC to carryout multi-channel operations [3].
Fig. 2.1 Layered Architecture [3]
3. Ad-Hoc Routing Protocols
Routing protocols in ad hoc networks can be divided into the three classes: Reactive (or On-
demand ), Proactive (or Table-driven), and Hybrid (or Zone Based).
Proactive Routing
These types of protocols are table based because they maintain table of connected nodes to
transmit data from one node to another and each node share its table with another nodes. Example
of proactive routing protocol includes DSDV, OLSR, FSR, DREAM.
Reactive Routing
It is also called On Demand routing because it establish a route to destination whenever a node
has something to send thus reducing burden on network. Reactive routing have route discovery
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
15
phase where network is flooded in search of destination. Example of reactive routing protocol
includes AODV, DSR, TORA.
Hybrid Routing Protocol
In order to increase the scalability and efficiency of routing protocols Hybrid routing combines
the characteristics of both reactive and proactive routing protocols. Generally Hybrid Routing
protocols are based on the concept of zones i.e whole network is divided in to number of zones.
Example of hybrid routing protocol includes ZRP, ZHLS, SLURP.
Destination-Sequenced Distance-Vector Routing (DSDV)
Bellman and Ford designed a centralized algorithm to compute shortest paths in weighted graphs.
Bertsekas and Gallager designed it to be executed in a distributed fashion, which is called
Distributed Bellman–Ford (DBF) algorithm [4]. In distributed Bellman-Ford (DBF), each and
every node maintains a cost to reach to every known destination. Thus, the routing table consists
of a entries <destination, distance, next-hop>.In the beginning all the routing tables are empty,
and each node starts issuing periodic broadcast messages to its 1-hop neighborhood. Main
disadvantage of DBF is that it suffer from a bouncing problem that leads to the count-to-infinity
and looping issues. Loops can appear if out-of-date information is used to compute the shortest
path.
The main objective behind the designing of DSDV [5] is to maintain simplicity and to avoid loop
formation. In DSDV, to communicate with each other, each node refers its routing tables that are
stored at each node of the network. Each routing table at each of the node has information
regarding all available destinations and the number of hops to reach. To maintain consistency in
dynamically varying topology, each node share its routing entries with its neighbor either
periodically or immediately when significant new information is available. Each mobile node has
its new sequence number and the following information for each new route :
 The destination’s IP address
 The number of hops required to reach the destination
 The sequence number of the information received regarding that destination as originally
marked by the destination.
DSDV add a sequence number that indicates the newness of the information to the routing table
and the messages. Routes with the latest sequence number are always preferred for forwarding
the message, in case of same sequence number route with lower distance is preferred. Every
destination increments its sequence number up to the next even number before sending a routing
message. Working of DSDV is given below.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
16
Fig. 3.1 Example of DSDV operation [6].
Consider D in figure 3.1, table 3.1 shows a structure of routing table entries which is maintained
at D and table 3.2 shows the exchanged messages.
Table 3.1 Routing table entries maintained at D
Destination NextHop Distance Sequence No.
A A 1 6
B C 2 6
C C 1 6
D D 0 6
S A 2 6
Table 3.2 Exchanged message by D
Destination Distance Sequence No.
A 1 6
B 2 6
C 1 6
D 0 6
S 2 6
In the beginning, node D sends a message in which it broadcast its routing entries to its
neighborhood, A and C. These nodes revise their routing tables and broadcast a new message to
inform their neighbors that destination D can be reached through them. Next, A receives a
message from B, which announces D at distance 2 and sequence number 6. As A already has a
routing entry for D with the same sequence number and lower distance, it will ignore this
message because both information are equally fresh, but the first provides a shorter route.
Therefore, finally, S can set up a route to D with distance 2 and A as the next hop.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
17
Now let’s take a scenario where node D moves and is no longer in the neighborhood of A and C,
but is in neighborhood of S as given in figure 3.2. The new exchangeable entries at D might then
appear as shown in table 3.3
Fig.3.2 Node D moves and the network topology changes accordingly. The figure depicts how sequence
numbers avoid the use of stale information [6].
Table 3.3 Exchanged message at D
Destination Distance Sequence No.
A 2 8
B 3 8
C 4 8
D 0 8
S 1 8
D issues a new message with a higher sequence number, 8. This nullifies the routing entries for D
in every node of the network, as the new sequence number is higher. The information is
propagated until all the nodes in the network gain knowledge of a new route to D. In this way,
sequence numbers are used to avoid the use of old information, which might cause the formation
of loops or non-optimal routes.
When a link breakage occurs, the destination marks with distance ∞ (any value greater than the
maximum allowed metric) all the routes that used that neighbor as their next hop. This situation is
immediately advertised by a protocol message, and the receiving nodes update those routes with
the next odd number. So, whenever the route is reestablished, the destination will generate an
even sequence number bigger than the one that indicated a broken link and the routes will be
restored.
Ad Hoc On Demand Distance Vector (AODV)
The Ad hoc On-Demand Distance Vector (AODV) [7, 8] is a reactive routing protocol which
allows dynamic, self-starting, multihop routing among participating mobile nodes that desire to
set up and preserve an ad hoc network. It allows the communication between two nodes through
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
18
intermediated nodes, if those two nodes are not within the range of each other. To establish a
route, there is route discovery phase in AODV, along which messages can be passed. Main
objectives of AODV are to establish loop free route and to find shortest route possible. AODV
allows mobile nodes to respond quickly to handle changes in route. When links break, AODV
allows the concerned set of nodes to be notified so that they can invalidate the route. Distinguish
feature of AODV is that it uses destination sequence number for each route entry, which ensures
lop free route. In case there are two routes to a destination, a requesting node selects the one with
greatest sequence number.
For route discovery and maintenance purposes control messages are defined in AODV. Different
control messages are defined as follows.
 RREQ Whenever node desire to communicate with another node it broadcast route
request message (RREQ) to its neighbor nodes. This message is further forwarded by
intermediate nodes until destination is reached. RREQ packet include information such as
RREQ id, destination i.p address, destination sequence number, originator IP address,
originator sequence number.
 RREP When intermediate nodes receive RREQ message they unicast route reply (RREP)
message to source only if it is legitimate destination or it has route to destination and
reverse route is established between source and destination. RREP packets include
information such as hop count, destination sequence number, destination IP address,
originator IP address.
 RERR Whenever link failure occur route error message (RERR) is used in AODV to
invalidate the route. RERR include information such as Unreachable Destination IP
Address, Unreachable Destination Sequence Number.
An additional feature of AODV is the generation of gratuitous RREPs. When an intermediate
node replies an RREQ on behalf of the destination, it also sends an RREP to the destination in
order for this to create a route to the source. This avoids the need of future route discoveries to
establish the reverse route.
Phase 1- Source node broadcast RREQ message, Destination unicast RREP message
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
19
Phase 2- Route established between Source and Destination
Phase 3- Destination is down, its neighbor unicast RERR message to Source
Fig. 3.3 Working of different phases AODV
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP) [9] is a hybrid protocol which is designed by combining the best
properties of both proactive routing protocol as well as reactive routing protocol. The Zone
Routing Protocol is based on the idea of creation of zones. For each node routing zone has been
defined. The radius of the routing zone can be defined as  which is expressed in hops. The zone
includes the nodes, whose distance from the particular node is at most  hops. In Figure 3.4 an
example of routing zone is given where the routing zone of S consist of the nodes A–I, but not J.
Two types of nodes are exist in zone, peripheral nodes and internal nodes. Peripheral nodes
includes those nodes whose least distance to the central node is accurately equal to the zone
radius  (D, G, I, H in Figure 3.4). The nodes whose minimum distance is less than are known
as interior nodes (A, B, F, E, C in Figure 3.4). Since, it can be assumed that that the biggest part
of the traffic is aimed at nearby nodes. Therefore, proactive routing protocol is executed within a
zone while node outside a zone can be reached by reactive routing protocol.
ZRP refers to the locally proactive routing section as the IntrA-zone Routing Protocol (IARP).
The globally reactive routing section is named IntEr-zone Routing Protocol (IERP). Objective of
IARP is to maintain routing information for nodes that exist within the routing zone of the
particular node. In the same way, IERP is a family of reactive routing protocols which is
responsible for better route discovery and route maintenance services by using the topology
information provided by IARP to deliver the route request directly to the peripheral nodes, this
concept is called bordercasting, and is implemented by the Bordercast Resolution Protocol (BRP).
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
20
Fig 3.4 Example of routing zone with =2
Routing in ZRP is shown in figure 3.5. A node that has a packet to send first checks whether the
destination exist in its local zone using information obtained by IARP.
Fig. 3.5 Routing in ZRP with [6]

In that case, the packet can be routed by using proactive routing protocol. Reactive routing is used
for routing the packet if the destination is present outside the zone. For example ‘S’ has a packet
to send to destination ‘D’. S first checks whether destination is within its local zone using IARP.
But ‘D’ is not within its ‘S’ zone. ‘S’ sends a RREQ to its peripheral nodes B1 and B2 using
multicast. Because B2 is within D’s zone, it knows a proactive route to ‘D’ and sends a RREP
back to ‘S’ using unicast.
4. Simulation Setup
All tests have been performed on different scenarios having 10, 20, 40, 80 nodes with 5 and 10
connections for each scenario. Simulators MOVE [10] and SUMO [11] have been used to
generate a grid view map which is shown in figure 4.1. The total area of map is 652 m x 752 m.
NS-2 [12] has been used to simulate the protocols AODV, DSDV and ZRP
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
21
Fig. 4.1 Generated Map
Table 4.1: Simulation Setup
Routing Protocols AODV , DSDV, ZRP
No. of nodes 10,20,40,80
Traffic type TCP
Channel Type Wireless Channel
MAC type IEEE 802.11
Simulation Time 400 ms
Data packet size 512 bytes
Window Size 20
Scenario Urban
Queue Length 50
5. Performance Metrics and Results
Routing protocols can be analyzed and compared by observing their behavior under some
performance metrics. To analyze the behavior of AODV, DSDV, ZRP following performance
metrics has been used. Simulation has been performed on each protocol for 10, 20, 40 and 80
nodes with 5 and 10 connections in each scenario. Warm-up time for each simulation 10ms.
Results obtained are mentioned below:
Normalized Routing Load- Normalized Routing Load (or Normalized Routing Overhead) is
defined as the total number of control packets that has been conveyed per data packet. It is
calculated by dividing the total number of control packets sent by the total number of data packets
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
22
received by destination. It helps to understand the protocol routing overhead; i.e. how many
control packets are needed (for route discovery/maintenance) to transport data packets to their
destinations successfully.
The figure 5.1 (a) and figure 5.1 (b) shows the performance of DSDV, AODV and ZPR routing
protocols with respect to routing load. Here the AODV has a lower network load than DSDV and
ZRP. AODV’s network load was dominated by more number of RREQ packets. Thus, all the
routing load savings for AODV came because of RREQs. In DSDV, due to the mobility, the
topology information is obtained by exchange of routing tables stored at each node. Due to this
reasons, a DSDV generates a more volume of control messages as compared to AODV and thus
routing load increases. In ZRP, because of mobility lots of routes are broken that causes large
number of packet drop and also as the number of nodes increases, route discovery becomes more
complicated and large amount of overhead is introduced because of communication between
IARP and IERP.
Fig. 5.1 (a) NRL vs. Nodes for 5 connections
Fig.5.1 (b) NRL vs. Nodes for 10 connections
Average Throughput – It is defined as amount of data that has been conveyed per unit time
from one node to another. A high throughput network is desirable.
It can be concluded from the figure 5.2 (a) and figure 5.2 (b) that throughput being increased in
AODV protocols. It is observed that the throughput remains almost same for 10 nodes and 20
nodes but rises appreciably for 40 nodes and 80 nodes, this fact can be attributed to the high node
density in the simulation area leading to likelihood of better connectivity. It is also concluded that
as the number of nodes increases , throughput of DSDV decreases, as DSDV uses table driven
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
23
approach to maintain route which introduces extra overhead and its not adaptive to the route
changes that occurs frequently under high mobility, thus its throughput decreases, whereas effect
of more number of nodes is worse in ZRP (Zone Routing Protocol) as it can be observed from the
figure 5.2 (a) and Figure 5.2 (b), this is because of mobility lots of routes are broken that causes
large number of packet drop and also as the number of nodes increases, route discovery becomes
more complicated and large amount of overhead is introduced because of communication
between IARP and IERP.
Fig.5.2 (a) Throughput vs. Nodes for 5 connections
Fig.5.2 (b) Throughput vs. Nodes for 10 connection
Average End to End delay- It can be defined as average propagation time taken by data packet.
It includes various delays introduced because of route discovery, queuing, propagation and
transfer time. It can be concluded form the figure 5.3 (a) and figure 5.3 (b) that end to end delay
in DSDV is less as compared to AODV and ZRP, although it increases as number of nodes
increases but still end to end delay is better than AODV and ZRP, reason being DSDV is
proactive routing protocol which maintain entire routing path to establish route at source, where
as AODV is reactive routing protocol which means it request for the path only when a node has
something to send, which introduce extra delay in AODV. In ZRP end to end delay is less than
AODV for 10 nodes but as node increases end to end delay also increased, because of high
mobility zone is not stable and it consumes more time to reconfigure the zone and route and also
additional delay is introduced because of communication among IERP, IARP and BRP.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
24
Fig. 5.3 (a) End to End Delay vs. Nodes for 5 connections
Fig. 5.3 (b) End to End Delay vs. Nodes for 10 connections
Packet Delivery Fraction- It is defined as the ratio of the total data packets received by the
destinations to those that are generated by the originator i.e source. PDF help to understand how
efficiently a protocol can transport packet from source to destination.
From the figure 5.4 (a) and figure 5.4 (b), it can be concluded that packet delivery fraction of
AODV is better than DSDV and ZRP in all scenarios. PDF help to understand how efficiently a
protocol can transport packet from source to destination. More is the PDF more will be
throughput, as it has been concluded from figure 5.2 (a) and figure 5.2 (b) throughput of AODV
is better, it is all because of better PDF in AODV where as PDF of DSDV and ZRP is low. PDF
of DSDV is good in scenario with 10 nodes and 20 nodes but for 40 nodes and 80 nodes it is
poor, this is due to its characteristics of exchanging entire routing table periodically and also
whenever there is topological changes that introduce appreciable overhead, that consume more
bandwidth, and thus large amount of bandwidth is used in handling these overheads and its PDF
suffers. In case of ZRP its worse, because of mobility lots of routes are broken that causes large
number of packet drop and also as the number of nodes increases, route discovery becomes more
complicated and large amount of overhead is introduced because of communication between
IARP and IERP which leads to more packet drop.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
25
Fig. 5.4 (a) PDF vs. Nodes for 5 connections
Fig.5.4 (b) PDF vs. Nodes for 10 connections
6. Conclusion
In this paper, behavior of reactive routing protocol (AODV), proactive routing protocol (DSDV)
and hybrid routing protocol (ZRP) have been analyzed under the microscopic mobility model.
The evaluations made on these protocols bring out some important characteristics of these
protocols when they are used in VANET.
From the obtained results, it is observed that reactive protocol (AODV) performed well because
mechanisms of route discovery, route maintenance and elimination of periodic broadcasting are
used by AODV and by almost all reactive protocols. It is observed from the result that end to end
delay of DSDV is least which is one of the main requirement in real time system, end to end
delay in DSDV is less because of table driven approach used by almost all proactive protocols,
but because of this approach extra overhead in the network is introduced which degrades it’s
performance with respect to NRL, Throughput and PDF. It is also observed that performance of
hybrid protocol (ZRP) is considerably poor in all scenarios because of various issues that have
been discussed in previous section.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013
26
References
[1] "IEEE 802.11p/D3.0, Draft Amendment for Wireless Access in Vehicular," 2007.
[2] Hannes Hartenstein and Kenneth P.Laberteaux, “VANET Vehicular Applications and Inter-
Networking Technologies”, Wiley Publications, 2010.
[3] Kai-Yun Ho, Po-Chung Kang and Chung-Hsien Hsu,"Implementation of WAVE/DSRC Devices for
Vehicular Communications," in International Symposium on Computer, Communication, Control and
Automation, 2010.
[4] D. Bertsekas and R.Gallager, "Data Networks, "Prentice Hall, 1987, pp. 297-333.
[5] C.E. Perkins and T.J.Watson, " Highly dynamic destination sequenced distance vector routing
(DSDV) for mobile computers," in ACM SIGCOMM_94 Conference on Communications
Architectures, London, U.K, 1994.
[6] M. C. Weigle, S. Olariu, “Vehicular Networks From Theory to Practice”, CRC Press, 2009.
[7] C.E. Perkins and E.M.Royer, "Ad-Hoc On-Demand Distance Vector," in IEEE WMCSA, New
Orleans, 1999.
[8] C.E. Perkins and E.M.Royer, "An implementation study of the AODV routing protocol," in Wireless
Communications and Networking Conference, 2000.
[9] Zygmunt J. Hass, Marc R. Pearlman, Prince Samar, "The Zone Routing Protocol (ZRP) for Ad Hoc
Networks". Internet-Draft,http://tools.ietf.org/id/draft-ietf-manet-zone-zrp-04.txt,2002.
[10] "Mobility model generator for Vehicular networks (MOVE)," [Online]. Available:
www.cs.unsw.edu.au/klan/move/. [Accessed February 2013].
[11] "Simulation of Urban Mobility (SUMO)," [Online]. Available: www. sumo.sourceforge.net..
[Accessed January 2013].
[12] M.Greis, "Ns Tutorial," [Online]. Available: www.isi.edu/nsnam/ns/tutorial/index.html. [Accessed
January 2013].
Authors
Abhishek Singh has completed his Bachelor of Engineering from Gyan Ganga
Institute of Technology and Science, Jabalpur. He has qualified GATE in 2010, 2011,
2012. Currently he is pursuing Master of Engineering in Software Engineering from
Thapar University, Patiala. His area of interests are computer network and ad-hoc
networks
Dr. A. K. Verma is currently a faculty in the department of Computer Science and
Engineering at Thapar University, Patiala. He received his B.S., M.S. and Doctorate
in 1991, 2001 and 2008, respectively, majoring in Computer science and engineering.
He has worked as Lecturer at M.M.M. Engg. College, Gorakhpur from 1991 to 1996.
He joined Thapar University in 1996 and is presently associated with the same
Institute. He has been a visiting faculty to many institutions. He has published over
100 papers in referred journals and conferences (India and Abroad). He has chaired
various sessions in the International and National Conferences. He is a MIEEE,
MACM, MISCI, LMCSI, MIETE, GMAIMA. He is a certified software quality auditor by MoCIT, Govt.
of India. His research interests include wireless networks, routing algorithms and cloud computing.

More Related Content

What's hot

Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Ambreen Zafar
 
Network layer new
Network layer newNetwork layer new
Network layer newreshmadayma
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layerKashyap Davariya
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSRMitesh Thakore
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocolMehedi
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrIAEME Publication
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 

What's hot (19)

Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSR
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
 
Network layer
Network layerNetwork layer
Network layer
 
94
9494
94
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 

Similar to SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET

PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...eeiej_journal
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...ijrap
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...eeiej
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 

Similar to SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET (20)

PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
J011137479
J011137479J011137479
J011137479
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 

More from ijfcstjournal

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSijfcstjournal
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGijfcstjournal
 

More from ijfcstjournal (20)

A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMSA STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
A STATISTICAL COMPARATIVE STUDY OF SOME SORTING ALGORITHMS
 
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERINGA LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
A LOCATION-BASED MOVIE RECOMMENDER SYSTEM USING COLLABORATIVE FILTERING
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 DOI:10.5121/ijfcst.2013.3502 13 SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET Abhishek Singh and Anil K. Verma Computer Science and Engineering Department, Thapar University ABSTRACT The main aim of this paper is to present comprehensive study on the performance and behavior of On- demand Distance Vector Routing approach (AODV), Table Driven Routing approach (DSDV) and Hybrid Routing approach (ZRP) in VANETs. VANETs are an enhanced form of MANETs where moving nodes are replaced by vehicles. This paper evaluates these protocols under realistic mobility models to analyze their performance in VANETs. To evaluate the performance of given protocols, different set of scenarios with varying nodes density have been simulated with the help of simulators NS-2, SUMO and MOVE. KEYWORDS VANETs, AODV, DSDV, ZRP, NS-2, MOVE, SUMO 1. Introduction In last few years, vehicular networks have fascinated many research authorities and automotive industries. Vehicular networks are emerging class of wireless networks that have emerged because of recent advances in wireless technology. Vehicular Ad-hoc NETwork (VANET) is an advance form of Mobile Ad-hoc NETwork (MANET), where communicating nodes are replaced by moving vehicles. Implementation of VANETs will help in improving road traffic safety system by reducing accidents and it will also help in better utilization of roads and resources such as fuel and time. This paper is structured as follows: Section 2 standards, regulations and layered architecture of VANETs. In Section 3 review ad-hoc routing protocols has been given. Section 4 provides details of simulation setup, Section 5 gives performance metrics and results. Finally, conclusion has been discussed in section 6. 2. Standards, Regulations & Layered Architecture For vehicular network it is mandatory that all participating institutes or authorities agree on common standard. A standard is a set of rules that promote interoperability among equipment developed by different groups for example IEEE or Society of Automotive Engineers (SAE). To create a common standard IEEE has introduced IEEE 802.11p [1], it is amendment to the IEEE802.11a standard to assist the progress of wireless access in vehicular network (WAVE). Being variant of IEEE 802.11a, IEEE 802.11p additionally covers the specifics of vehicular network for example dynamic and mobile environment, message transmission in an ad-hoc manner, low latency. Researchers have developed IEEE 1609 working group which provide necessary service on higher layer.
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 14 The WAVE technology is classified into dedicated short range communication (DSRC). DSRC enables the communication among OBU(On Board Unit) and RSU ( Road Side Unit). DSRC composed of both IEEE 802.11p and IEEE 1609 standards, figure 2.1 illustrates the layered architecture of DSRC .Short overview of 1609 work group deployed in layered architecture has been given below:  IEEE 1609.1 defines a resource manager that should allow multiple applications run on roadside units to communicate with the on-board units of multiple vehicles. It serves on the application layer [2].  IEEE 1609.2 defines security services for communication such as authentication of devices and encryption of messages [2].  IEEE 1609.3 specifies networking services for communication, including a specific stack and protocol to handle WAVE short messages (WSM) [2].  IEEE 1609.4 improves IEEE 802.11p MAC to carryout multi-channel operations [3]. Fig. 2.1 Layered Architecture [3] 3. Ad-Hoc Routing Protocols Routing protocols in ad hoc networks can be divided into the three classes: Reactive (or On- demand ), Proactive (or Table-driven), and Hybrid (or Zone Based). Proactive Routing These types of protocols are table based because they maintain table of connected nodes to transmit data from one node to another and each node share its table with another nodes. Example of proactive routing protocol includes DSDV, OLSR, FSR, DREAM. Reactive Routing It is also called On Demand routing because it establish a route to destination whenever a node has something to send thus reducing burden on network. Reactive routing have route discovery
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 15 phase where network is flooded in search of destination. Example of reactive routing protocol includes AODV, DSR, TORA. Hybrid Routing Protocol In order to increase the scalability and efficiency of routing protocols Hybrid routing combines the characteristics of both reactive and proactive routing protocols. Generally Hybrid Routing protocols are based on the concept of zones i.e whole network is divided in to number of zones. Example of hybrid routing protocol includes ZRP, ZHLS, SLURP. Destination-Sequenced Distance-Vector Routing (DSDV) Bellman and Ford designed a centralized algorithm to compute shortest paths in weighted graphs. Bertsekas and Gallager designed it to be executed in a distributed fashion, which is called Distributed Bellman–Ford (DBF) algorithm [4]. In distributed Bellman-Ford (DBF), each and every node maintains a cost to reach to every known destination. Thus, the routing table consists of a entries <destination, distance, next-hop>.In the beginning all the routing tables are empty, and each node starts issuing periodic broadcast messages to its 1-hop neighborhood. Main disadvantage of DBF is that it suffer from a bouncing problem that leads to the count-to-infinity and looping issues. Loops can appear if out-of-date information is used to compute the shortest path. The main objective behind the designing of DSDV [5] is to maintain simplicity and to avoid loop formation. In DSDV, to communicate with each other, each node refers its routing tables that are stored at each node of the network. Each routing table at each of the node has information regarding all available destinations and the number of hops to reach. To maintain consistency in dynamically varying topology, each node share its routing entries with its neighbor either periodically or immediately when significant new information is available. Each mobile node has its new sequence number and the following information for each new route :  The destination’s IP address  The number of hops required to reach the destination  The sequence number of the information received regarding that destination as originally marked by the destination. DSDV add a sequence number that indicates the newness of the information to the routing table and the messages. Routes with the latest sequence number are always preferred for forwarding the message, in case of same sequence number route with lower distance is preferred. Every destination increments its sequence number up to the next even number before sending a routing message. Working of DSDV is given below.
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 16 Fig. 3.1 Example of DSDV operation [6]. Consider D in figure 3.1, table 3.1 shows a structure of routing table entries which is maintained at D and table 3.2 shows the exchanged messages. Table 3.1 Routing table entries maintained at D Destination NextHop Distance Sequence No. A A 1 6 B C 2 6 C C 1 6 D D 0 6 S A 2 6 Table 3.2 Exchanged message by D Destination Distance Sequence No. A 1 6 B 2 6 C 1 6 D 0 6 S 2 6 In the beginning, node D sends a message in which it broadcast its routing entries to its neighborhood, A and C. These nodes revise their routing tables and broadcast a new message to inform their neighbors that destination D can be reached through them. Next, A receives a message from B, which announces D at distance 2 and sequence number 6. As A already has a routing entry for D with the same sequence number and lower distance, it will ignore this message because both information are equally fresh, but the first provides a shorter route. Therefore, finally, S can set up a route to D with distance 2 and A as the next hop.
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 17 Now let’s take a scenario where node D moves and is no longer in the neighborhood of A and C, but is in neighborhood of S as given in figure 3.2. The new exchangeable entries at D might then appear as shown in table 3.3 Fig.3.2 Node D moves and the network topology changes accordingly. The figure depicts how sequence numbers avoid the use of stale information [6]. Table 3.3 Exchanged message at D Destination Distance Sequence No. A 2 8 B 3 8 C 4 8 D 0 8 S 1 8 D issues a new message with a higher sequence number, 8. This nullifies the routing entries for D in every node of the network, as the new sequence number is higher. The information is propagated until all the nodes in the network gain knowledge of a new route to D. In this way, sequence numbers are used to avoid the use of old information, which might cause the formation of loops or non-optimal routes. When a link breakage occurs, the destination marks with distance ∞ (any value greater than the maximum allowed metric) all the routes that used that neighbor as their next hop. This situation is immediately advertised by a protocol message, and the receiving nodes update those routes with the next odd number. So, whenever the route is reestablished, the destination will generate an even sequence number bigger than the one that indicated a broken link and the routes will be restored. Ad Hoc On Demand Distance Vector (AODV) The Ad hoc On-Demand Distance Vector (AODV) [7, 8] is a reactive routing protocol which allows dynamic, self-starting, multihop routing among participating mobile nodes that desire to set up and preserve an ad hoc network. It allows the communication between two nodes through
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 18 intermediated nodes, if those two nodes are not within the range of each other. To establish a route, there is route discovery phase in AODV, along which messages can be passed. Main objectives of AODV are to establish loop free route and to find shortest route possible. AODV allows mobile nodes to respond quickly to handle changes in route. When links break, AODV allows the concerned set of nodes to be notified so that they can invalidate the route. Distinguish feature of AODV is that it uses destination sequence number for each route entry, which ensures lop free route. In case there are two routes to a destination, a requesting node selects the one with greatest sequence number. For route discovery and maintenance purposes control messages are defined in AODV. Different control messages are defined as follows.  RREQ Whenever node desire to communicate with another node it broadcast route request message (RREQ) to its neighbor nodes. This message is further forwarded by intermediate nodes until destination is reached. RREQ packet include information such as RREQ id, destination i.p address, destination sequence number, originator IP address, originator sequence number.  RREP When intermediate nodes receive RREQ message they unicast route reply (RREP) message to source only if it is legitimate destination or it has route to destination and reverse route is established between source and destination. RREP packets include information such as hop count, destination sequence number, destination IP address, originator IP address.  RERR Whenever link failure occur route error message (RERR) is used in AODV to invalidate the route. RERR include information such as Unreachable Destination IP Address, Unreachable Destination Sequence Number. An additional feature of AODV is the generation of gratuitous RREPs. When an intermediate node replies an RREQ on behalf of the destination, it also sends an RREP to the destination in order for this to create a route to the source. This avoids the need of future route discoveries to establish the reverse route. Phase 1- Source node broadcast RREQ message, Destination unicast RREP message
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 19 Phase 2- Route established between Source and Destination Phase 3- Destination is down, its neighbor unicast RERR message to Source Fig. 3.3 Working of different phases AODV Zone Routing Protocol (ZRP) Zone Routing Protocol (ZRP) [9] is a hybrid protocol which is designed by combining the best properties of both proactive routing protocol as well as reactive routing protocol. The Zone Routing Protocol is based on the idea of creation of zones. For each node routing zone has been defined. The radius of the routing zone can be defined as  which is expressed in hops. The zone includes the nodes, whose distance from the particular node is at most  hops. In Figure 3.4 an example of routing zone is given where the routing zone of S consist of the nodes A–I, but not J. Two types of nodes are exist in zone, peripheral nodes and internal nodes. Peripheral nodes includes those nodes whose least distance to the central node is accurately equal to the zone radius  (D, G, I, H in Figure 3.4). The nodes whose minimum distance is less than are known as interior nodes (A, B, F, E, C in Figure 3.4). Since, it can be assumed that that the biggest part of the traffic is aimed at nearby nodes. Therefore, proactive routing protocol is executed within a zone while node outside a zone can be reached by reactive routing protocol. ZRP refers to the locally proactive routing section as the IntrA-zone Routing Protocol (IARP). The globally reactive routing section is named IntEr-zone Routing Protocol (IERP). Objective of IARP is to maintain routing information for nodes that exist within the routing zone of the particular node. In the same way, IERP is a family of reactive routing protocols which is responsible for better route discovery and route maintenance services by using the topology information provided by IARP to deliver the route request directly to the peripheral nodes, this concept is called bordercasting, and is implemented by the Bordercast Resolution Protocol (BRP).
  • 8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 20 Fig 3.4 Example of routing zone with =2 Routing in ZRP is shown in figure 3.5. A node that has a packet to send first checks whether the destination exist in its local zone using information obtained by IARP. Fig. 3.5 Routing in ZRP with [6]  In that case, the packet can be routed by using proactive routing protocol. Reactive routing is used for routing the packet if the destination is present outside the zone. For example ‘S’ has a packet to send to destination ‘D’. S first checks whether destination is within its local zone using IARP. But ‘D’ is not within its ‘S’ zone. ‘S’ sends a RREQ to its peripheral nodes B1 and B2 using multicast. Because B2 is within D’s zone, it knows a proactive route to ‘D’ and sends a RREP back to ‘S’ using unicast. 4. Simulation Setup All tests have been performed on different scenarios having 10, 20, 40, 80 nodes with 5 and 10 connections for each scenario. Simulators MOVE [10] and SUMO [11] have been used to generate a grid view map which is shown in figure 4.1. The total area of map is 652 m x 752 m. NS-2 [12] has been used to simulate the protocols AODV, DSDV and ZRP
  • 9. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 21 Fig. 4.1 Generated Map Table 4.1: Simulation Setup Routing Protocols AODV , DSDV, ZRP No. of nodes 10,20,40,80 Traffic type TCP Channel Type Wireless Channel MAC type IEEE 802.11 Simulation Time 400 ms Data packet size 512 bytes Window Size 20 Scenario Urban Queue Length 50 5. Performance Metrics and Results Routing protocols can be analyzed and compared by observing their behavior under some performance metrics. To analyze the behavior of AODV, DSDV, ZRP following performance metrics has been used. Simulation has been performed on each protocol for 10, 20, 40 and 80 nodes with 5 and 10 connections in each scenario. Warm-up time for each simulation 10ms. Results obtained are mentioned below: Normalized Routing Load- Normalized Routing Load (or Normalized Routing Overhead) is defined as the total number of control packets that has been conveyed per data packet. It is calculated by dividing the total number of control packets sent by the total number of data packets
  • 10. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 22 received by destination. It helps to understand the protocol routing overhead; i.e. how many control packets are needed (for route discovery/maintenance) to transport data packets to their destinations successfully. The figure 5.1 (a) and figure 5.1 (b) shows the performance of DSDV, AODV and ZPR routing protocols with respect to routing load. Here the AODV has a lower network load than DSDV and ZRP. AODV’s network load was dominated by more number of RREQ packets. Thus, all the routing load savings for AODV came because of RREQs. In DSDV, due to the mobility, the topology information is obtained by exchange of routing tables stored at each node. Due to this reasons, a DSDV generates a more volume of control messages as compared to AODV and thus routing load increases. In ZRP, because of mobility lots of routes are broken that causes large number of packet drop and also as the number of nodes increases, route discovery becomes more complicated and large amount of overhead is introduced because of communication between IARP and IERP. Fig. 5.1 (a) NRL vs. Nodes for 5 connections Fig.5.1 (b) NRL vs. Nodes for 10 connections Average Throughput – It is defined as amount of data that has been conveyed per unit time from one node to another. A high throughput network is desirable. It can be concluded from the figure 5.2 (a) and figure 5.2 (b) that throughput being increased in AODV protocols. It is observed that the throughput remains almost same for 10 nodes and 20 nodes but rises appreciably for 40 nodes and 80 nodes, this fact can be attributed to the high node density in the simulation area leading to likelihood of better connectivity. It is also concluded that as the number of nodes increases , throughput of DSDV decreases, as DSDV uses table driven
  • 11. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 23 approach to maintain route which introduces extra overhead and its not adaptive to the route changes that occurs frequently under high mobility, thus its throughput decreases, whereas effect of more number of nodes is worse in ZRP (Zone Routing Protocol) as it can be observed from the figure 5.2 (a) and Figure 5.2 (b), this is because of mobility lots of routes are broken that causes large number of packet drop and also as the number of nodes increases, route discovery becomes more complicated and large amount of overhead is introduced because of communication between IARP and IERP. Fig.5.2 (a) Throughput vs. Nodes for 5 connections Fig.5.2 (b) Throughput vs. Nodes for 10 connection Average End to End delay- It can be defined as average propagation time taken by data packet. It includes various delays introduced because of route discovery, queuing, propagation and transfer time. It can be concluded form the figure 5.3 (a) and figure 5.3 (b) that end to end delay in DSDV is less as compared to AODV and ZRP, although it increases as number of nodes increases but still end to end delay is better than AODV and ZRP, reason being DSDV is proactive routing protocol which maintain entire routing path to establish route at source, where as AODV is reactive routing protocol which means it request for the path only when a node has something to send, which introduce extra delay in AODV. In ZRP end to end delay is less than AODV for 10 nodes but as node increases end to end delay also increased, because of high mobility zone is not stable and it consumes more time to reconfigure the zone and route and also additional delay is introduced because of communication among IERP, IARP and BRP.
  • 12. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 24 Fig. 5.3 (a) End to End Delay vs. Nodes for 5 connections Fig. 5.3 (b) End to End Delay vs. Nodes for 10 connections Packet Delivery Fraction- It is defined as the ratio of the total data packets received by the destinations to those that are generated by the originator i.e source. PDF help to understand how efficiently a protocol can transport packet from source to destination. From the figure 5.4 (a) and figure 5.4 (b), it can be concluded that packet delivery fraction of AODV is better than DSDV and ZRP in all scenarios. PDF help to understand how efficiently a protocol can transport packet from source to destination. More is the PDF more will be throughput, as it has been concluded from figure 5.2 (a) and figure 5.2 (b) throughput of AODV is better, it is all because of better PDF in AODV where as PDF of DSDV and ZRP is low. PDF of DSDV is good in scenario with 10 nodes and 20 nodes but for 40 nodes and 80 nodes it is poor, this is due to its characteristics of exchanging entire routing table periodically and also whenever there is topological changes that introduce appreciable overhead, that consume more bandwidth, and thus large amount of bandwidth is used in handling these overheads and its PDF suffers. In case of ZRP its worse, because of mobility lots of routes are broken that causes large number of packet drop and also as the number of nodes increases, route discovery becomes more complicated and large amount of overhead is introduced because of communication between IARP and IERP which leads to more packet drop.
  • 13. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 25 Fig. 5.4 (a) PDF vs. Nodes for 5 connections Fig.5.4 (b) PDF vs. Nodes for 10 connections 6. Conclusion In this paper, behavior of reactive routing protocol (AODV), proactive routing protocol (DSDV) and hybrid routing protocol (ZRP) have been analyzed under the microscopic mobility model. The evaluations made on these protocols bring out some important characteristics of these protocols when they are used in VANET. From the obtained results, it is observed that reactive protocol (AODV) performed well because mechanisms of route discovery, route maintenance and elimination of periodic broadcasting are used by AODV and by almost all reactive protocols. It is observed from the result that end to end delay of DSDV is least which is one of the main requirement in real time system, end to end delay in DSDV is less because of table driven approach used by almost all proactive protocols, but because of this approach extra overhead in the network is introduced which degrades it’s performance with respect to NRL, Throughput and PDF. It is also observed that performance of hybrid protocol (ZRP) is considerably poor in all scenarios because of various issues that have been discussed in previous section.
  • 14. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.5, September 2013 26 References [1] "IEEE 802.11p/D3.0, Draft Amendment for Wireless Access in Vehicular," 2007. [2] Hannes Hartenstein and Kenneth P.Laberteaux, “VANET Vehicular Applications and Inter- Networking Technologies”, Wiley Publications, 2010. [3] Kai-Yun Ho, Po-Chung Kang and Chung-Hsien Hsu,"Implementation of WAVE/DSRC Devices for Vehicular Communications," in International Symposium on Computer, Communication, Control and Automation, 2010. [4] D. Bertsekas and R.Gallager, "Data Networks, "Prentice Hall, 1987, pp. 297-333. [5] C.E. Perkins and T.J.Watson, " Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers," in ACM SIGCOMM_94 Conference on Communications Architectures, London, U.K, 1994. [6] M. C. Weigle, S. Olariu, “Vehicular Networks From Theory to Practice”, CRC Press, 2009. [7] C.E. Perkins and E.M.Royer, "Ad-Hoc On-Demand Distance Vector," in IEEE WMCSA, New Orleans, 1999. [8] C.E. Perkins and E.M.Royer, "An implementation study of the AODV routing protocol," in Wireless Communications and Networking Conference, 2000. [9] Zygmunt J. Hass, Marc R. Pearlman, Prince Samar, "The Zone Routing Protocol (ZRP) for Ad Hoc Networks". Internet-Draft,http://tools.ietf.org/id/draft-ietf-manet-zone-zrp-04.txt,2002. [10] "Mobility model generator for Vehicular networks (MOVE)," [Online]. Available: www.cs.unsw.edu.au/klan/move/. [Accessed February 2013]. [11] "Simulation of Urban Mobility (SUMO)," [Online]. Available: www. sumo.sourceforge.net.. [Accessed January 2013]. [12] M.Greis, "Ns Tutorial," [Online]. Available: www.isi.edu/nsnam/ns/tutorial/index.html. [Accessed January 2013]. Authors Abhishek Singh has completed his Bachelor of Engineering from Gyan Ganga Institute of Technology and Science, Jabalpur. He has qualified GATE in 2010, 2011, 2012. Currently he is pursuing Master of Engineering in Software Engineering from Thapar University, Patiala. His area of interests are computer network and ad-hoc networks Dr. A. K. Verma is currently a faculty in the department of Computer Science and Engineering at Thapar University, Patiala. He received his B.S., M.S. and Doctorate in 1991, 2001 and 2008, respectively, majoring in Computer science and engineering. He has worked as Lecturer at M.M.M. Engg. College, Gorakhpur from 1991 to 1996. He joined Thapar University in 1996 and is presently associated with the same Institute. He has been a visiting faculty to many institutions. He has published over 100 papers in referred journals and conferences (India and Abroad). He has chaired various sessions in the International and National Conferences. He is a MIEEE, MACM, MISCI, LMCSI, MIETE, GMAIMA. He is a certified software quality auditor by MoCIT, Govt. of India. His research interests include wireless networks, routing algorithms and cloud computing.