call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technolog
The document discusses and compares the performance of two on-demand routing protocols for mobile ad hoc networks (MANETs), Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV). The protocols were simulated using the NS-2 network simulator across different network parameters and their performance was evaluated based on average throughput, end-to-end delay, and packet delivery ratio. The results showed that AODV generally performed better than DSR, having lower end-to-end delays and higher throughput, especially as the packet size and number of nodes increased. However, DSR may resort to route discovery less often than AODV since it can maintain multiple routes for a source-
This document analyzes and compares the scalability of three mobile ad hoc network (MANET) routing protocols - AODV, TORA, and OLSR - by simulating them using varying numbers of nodes. The key findings are:
1) In terms of end-to-end delay, OLSR consistently performs better than AODV and TORA as the number of nodes increases from 25 to 75.
2) For throughput, OLSR outperforms AODV and TORA across all network sizes tested.
3) The study concludes that OLSR demonstrates better scalability than AODV and TORA based on its performance with increasing numbers of nodes in terms of
Abstract- Delay Tolerant Network (DTN) in routing concerns itself with the ability to route data from source to destination which is the fundamental ability all communication network must have. During the transmission of packets it has the fixed landmark so that only one path can be chosen. It cannot choose the alternative path, that path is considered to be as the best path. To solve this problem, an optimized inter – landmark data routing algorithm, namely DTN – FLOW which chooses the alternative path that is considered to be as the shortest and best path. The DTN – FLOW algorithm not only transmit packet with the use of landmark and inter – landmark. The information message will be performed in all the nodes so the performance of each and every node decreases by means of traffic. In order to increase the high throughput, node to node communication can be done effectively in DTN network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a simulation-based performance analysis of three routing protocols (CBRP, DSR, AODV) for mobile ad hoc networks (MANETs) under different node densities. The analysis varies the number of data sources and evaluates the protocols based on packet delivery ratio, average end-to-end delay, and normalized routing load. The simulation is conducted using the NS-2 network simulator for dense and sparse network topologies with 50 nodes each, varying node speeds and transmission ranges. Results show that CBRP performs better than DSR and AODV in terms of normalized routing load for more than 15 sources in both dense and sparse topologies, while AODV has lower delay than CBR
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
MANET is
an autonomous system of mobile nodes attached by wireless links. It represents
a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into
an ad
-
hoc network topology. The devices in the network may hav
e limited transmission
range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need f
or an
effective routing protocol. In this paper we study various classifications of routing protocols and
th
eir types
for wireless mobile ad
-
hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing proto
cols on based on a given set of
parameters
Scalability, Latency, Bandwidth, Control
-
ov
erhead, Mobility impact
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that evaluates the performance of two routing protocols (AODV and DSDV) under different traffic patterns (TCP and CBR) in a mobile ad hoc network (MANET) simulation. The paper describes MANET characteristics and challenges for routing. It provides an overview of reactive (AODV), proactive (DSDV), and hybrid routing protocols. It also defines TCP and CBR traffic patterns. The research aims to analyze and compare the packet delivery ratio and end-to-end delay of AODV and DSDV under different traffic loads using the NS-2 simulator. Preliminary results show that reactive protocols perform better in terms of these metrics.
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
This document compares the performance of two routing protocols for mobile ad hoc networks: Destination Sequenced Distance Vector (DSDV) and Ad Hoc On-Demand Distance Vector (AODV). It presents the results of simulations run using the ns-2 network simulator. The simulations varied the number of nodes, pause time (mobility rate), and number of data sources. The performance metrics measured were packet delivery ratio, average end-to-end delay, and normalized routing load. The results showed that AODV had higher packet delivery ratios and lower routing loads than DSDV. However, AODV experienced higher delays than DSDV due to its on-demand route discovery process. DSDV performed better in low
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
In Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Every node operates as an end system and as a router to forward packets. In this paper mainly focused on Mac layer because this layer is most important for the data communication using control the packet loss and we worked on the comparison based performance of wimax802.16 and wireless802.11 networks using Ad hoc on- demand Distance Vector Routing Protocol and Dynamic Source Routing Protocol. In this paper we used the different maximum speed for the network. And this comparison based on unicast On-demand routing procedure and our simulation for mobile ad hoc networks discover and maintain only needed the design and follows the idea that each node by sending routing packets whenever a communication is requested and compared various parameter packet delivery ratio, normalized routing load and e-e delay. These simulations are carried out using the Network simulator version-2. The results presented in this work illustrate the importance in carefully evaluating and implementing routing protocols in an ad hoc environment.
This document analyzes the effect of node density on different routing protocols under FTP and HTTP applications. It simulates scenarios with varying node densities (20-130 nodes) using routing protocols AODV, DSR, GRP and OLSR. Key quality of service (QoS) metrics - throughput, delay, network load and packet delivery ratio - are evaluated and compared. The results show that OLSR generally performs best in terms of throughput and delay for both FTP and HTTP applications. GRP performs best for network load, while AODV has the highest packet delivery ratio for FTP. In conclusion, OLSR is the best overall routing protocol for supporting FTP and HTTP applications in mobile ad-hoc networks according to
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
The document summarizes a study that evaluated the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSDV, and DSR. The protocols were simulated using the NS-2 network simulator across networks of 30 to 70 nodes. Key performance metrics analyzed include packet delivery fraction, average end-to-end delay, normalized routing load, and packet loss. The results found that AODV performed best in terms of packet delivery fraction and shortest end-to-end delay, while DSDV had the lowest normalized routing load and DSR had the lowest packet loss. Overall, the document compares the performance of these three MANET routing protocols under different conditions using simulation results.
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the
nodes are free to move randomly within the network and share information dynamically. To achieve an
efficient routing various protocols have been developed so far which vary in their nature and have their
own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on
demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols
against different parameters. Finally a comparison has been presented between all of them.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.
This document summarizes and compares three routing protocols for mobile ad hoc networks (MANETs): AODV, DSR, and DSDV. It describes that MANETs are infrastructureless wireless networks without centralized administration. Routing in MANETs is complex due to frequent changes in network topology as nodes move. The document then provides an overview of AODV as a reactive routing protocol that establishes routes on demand, DSR as another reactive source-initiated protocol using source routing, and DSDV as a proactive table-driven protocol that maintains routing tables. It notes that AODV routing messages require little processing to minimize overhead and allows quick reaction to link breaks.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
This document summarizes a research paper that proposes a synthesizable checker for the AMBA AXI protocol. The AXI protocol is commonly used for on-chip communication in system-on-chip (SoC) designs. The proposed checker contains 44 rules to verify AXI protocol compliance and was implemented using Verilog. Simulation results showed the checker design requires 70.7K gate counts and has a critical path of 4.13 ns, allowing it to operate at 242 MHz. The checker is intended to improve SoC integration by verifying correct protocol usage and helping debug communication issues.
Computer Science
Active and Programmable Networks
Active safety systems
Ad Hoc & Sensor Network
Ad hoc networks for pervasive communications
Adaptive, autonomic and context-aware computing
Advance Computing technology and their application
Advanced Computing Architectures and New Programming Models
Advanced control and measurement
Aeronautical Engineering,
Agent-based middleware
Alert applications
Automotive, marine and aero-space control and all other control applications
Autonomic and self-managing middleware
Autonomous vehicle
Biochemistry
Bioinformatics
BioTechnology(Chemistry, Mathematics, Statistics, Geology)
Broadband and intelligent networks
Broadband wireless technologies
CAD/CAM/CAT/CIM
Call admission and flow/congestion control
Capacity planning and dimensioning
Changing Access to Patient Information
Channel capacity modelling and analysis
Civil Engineering,
Cloud Computing and Applications
Collaborative applications
Communication application
Communication architectures for pervasive computing
Communication systems
Computational intelligence
Computer and microprocessor-based control
Computer Architecture and Embedded Systems
Computer Business
Computer Sciences and Applications
Computer Vision
Computer-based information systems in health care
Computing Ethics
Computing Practices & Applications
Congestion and/or Flow Control
Content Distribution
Context-awareness and middleware
Creativity in Internet management and retailing
Cross-layer design and Physical layer based issue
Cryptography
Data Base Management
Data fusion
Data Mining
Data retrieval
Data Storage Management
Decision analysis methods
Decision making
Digital Economy and Digital Divide
Digital signal processing theory
Distributed Sensor Networks
Drives automation
Drug Design,
Drug Development
DSP implementation
E-Business
E-Commerce
E-Government
Electronic transceiver device for Retail Marketing Industries
Electronics Engineering,
Embeded Computer System
Emerging advances in business and its applications
Emerging signal processing areas
Enabling technologies for pervasive systems
Energy-efficient and green pervasive computing
Environmental Engineering,
Estimation and identification techniques
Evaluation techniques for middleware solutions
Event-based, publish/subscribe, and message-oriented middleware
Evolutionary computing and intelligent systems
Expert approaches
Facilities planning and management
Flexible manufacturing systems
Formal methods and tools for designing
Fuzzy algorithms
Fuzzy logics
GPS and location-based app
This document discusses using natural language processing (NLP) techniques to analyze content in social networking sites. Specifically, it aims to identify abusive or defaming content in blog and social media posts. It first provides background on NLP and its role in understanding human language at a semantic level. This includes techniques like named entity recognition, coreference resolution, relationship extraction, and sentiment analysis. The document then discusses how NLP can be applied to analyze social media content and filter out noise to better understand conversations and sentiment. The goal is to automatically detect and rate abusive content in posts using a combination of NLP and HTML analysis.
This document describes the design of an autonomous ploughing vehicle controlled by a microcontroller. The vehicle uses DC gear motors connected to a ploughing device to till fields automatically. A wireless camera on the vehicle transmits video to a remote user's PC via an RF transceiver and AV receiver. The user can then control the vehicle's movement and ploughing operations either automatically through keyboard commands or manually in real-time. The microcontroller interprets commands from the RF transceiver to control the DC motors and ploughing actions according to the user's instructions to remotely plough agricultural fields.
This document presents a method for classifying MRI brain images using a neuro-fuzzy model. It discusses extracting textural features from MRI images using principal component analysis for dimensionality reduction. An Adaptive Neuro-Fuzzy Inference System (ANFIS) is used as the neuro-fuzzy classifier to classify images as normal or abnormal based on the extracted features. The neuro-fuzzy model combines the learning ability of neural networks with the advantages of fuzzy logic rule-based systems to accurately classify MRI brain images.
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
This document reviews energy storage systems for passive cooling. It discusses several types of cooling energy storage systems, including chilled water storage, ice storage, and phase change material (PCM) storage. It summarizes several studies that have experimentally analyzed the performance of ice storage air conditioning systems and thermal management systems using PCM. The studies found that energy storage systems can effectively shift peak cooling loads to off-peak periods and reduce energy consumption and costs compared to conventional cooling systems without storage. Energy is charged to the storage during off-peak times and discharged during peak times to meet cooling demands.
The document presents design charts for estimating the deflection of a thin circular elastic plate resting on a Pasternak foundation. The charts show deflection values for different nondimensional values of modulus of subgrade reaction and shear modulus. The charts were developed using a nondimensional expression for deflection derived through a strain energy approach. The analysis considers the tensionless characteristics of the Pasternak foundation model and the potential for lift-off of the plate from the surface.
call for papers, research paper publishing, where to publish research paper, ...
Similar to call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technolog
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
In order to reduce the communication cost and time we are looking forward for successful implementation
of an infrastructure less network like Mobile Ad Hoc Network in all arena of wireless mobile
communication. But still it is a challenge to decide a most appropriate routing protocol for MANET. In
MANET there is no fixed topology due to the mobility of nodes, interference, multipath propagation and
path loss. Since MANET does not use fixed infrastructure rather it always have to find suitable router and
routing path for each communication, existing established routing protocol is not suitable for MANET to
function properly. Different Routing protocols have been proposed to meet the challenges with MANETs.
This paper evaluates the performances of four MANET routing protocols which are DSDV, AODV, DSR
and TORA over TCP, a Transport Layer Protocol. The performance metrics which are considered in this
paper are packet delivery fractions, normalized routing overload, end to end delay and throughput. DSDV
is a proactive protocol and the others are reactive protocols.
The document evaluates the performance of 5 routing protocols (AODV, DSR, TORA, OLSR, GRP) in a mobile ad hoc network (MANET) using the OPNET simulator. Simulations were run with 30, 60, and 90 nodes using email and video conferencing applications. Performance was analyzed based on throughput, delay, load, and data dropped. In general, GRP and OLSR had the lowest delay, DSR and GRP had the lowest load, and OLSR and AODV had the highest throughput, while TORA often had the worst performance based on the metrics. The evaluation provides insights into the relative performance of the routing protocols under different conditions in a MANET
This document summarizes a research paper that examines the performance of three mobile ad hoc network (MANET) routing protocols: AODV, DSR, and DSDV. Through network simulations varying the number of nodes and connections, the paper evaluates the routing protocols based on average end-to-end delay, normalized routing load, packet delivery fraction, and throughput. The simulation results show that AODV generally has better performance than DSR and DSDV in terms of lower delay, higher packet delivery, and better throughput, especially as the network size increases. However, DSDV maintains more consistent performance than the reactive protocols as network conditions change.
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
This document analyzes the performance of three routing protocols - AODV, DSDV, and OLSR - in mobile ad hoc networks based on packet delivery ratio. It simulates the protocols using NS-3 simulator over 600 seconds with 50 nodes moving randomly. The results show that OLSR has the best performance with high and stable packet delivery ratio, while DSDV has the worst performance with many dropped packets. AODV shows average performance throughout the simulation.
This document analyzes the performance of three routing protocols - AODV, DSDV, and OLSR - in a mobile ad hoc network simulation using the NS-3 simulator. It describes the key characteristics of each protocol and the simulation setup, which involved 50 nodes moving according to a random waypoint model. The performance metric studied was packet delivery ratio. The results showed that OLSR achieved the highest packet delivery ratio, performing better than AODV and DSDV in delivering packets from source to destination nodes over the 600 second simulation.
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
This document summarizes and compares various routing protocols for mobile ad-hoc networks (MANETs). It first describes the characteristics and challenges of MANETs. It then classifies routing protocols for MANETs into three main categories: table-driven (proactive), on-demand (reactive), and hybrid protocols. Examples of protocols from each category are described in detail, including DSDV, AODV, DSR, and ZRP. Key features such as route discovery, table maintenance, and use of proactive and reactive approaches are discussed for each example protocol. Finally, the document compares different protocols based on parameters like scalability, latency, bandwidth overhead, and mobility impact.
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
This document summarizes and surveys several enhanced routing protocols that have been developed for mobile ad hoc networks (MANETs). It begins by providing background on routing challenges in MANETs and classifications of routing protocols. It then describes several traditional and widely used routing protocols, including DSDV, OLSR, TORA, DSR, and AODV. The document focuses on summarizing several new routing protocols that have been proposed to improve upon existing protocols. It discusses protocols such as BAWB-DSR, CCSR, RAMP, AODV-SBA, CBRP-R, and CBTRP - noting techniques, advantages, and disadvantages of each. The overall purpose is to review
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
This document analyzes the performance of different routing protocols (AODV, DSR, DSDV) under various mobility models (random waypoint, random direction, random walk) and node speeds in mobile ad hoc networks. It finds that reactive protocols like AODV and DSR generally have higher packet delivery ratios than proactive DSDV, but end-to-end delays vary depending on the mobility model and node speed. The document proposes an algorithm to select the best routing protocol based on whether data delivery or time is the higher priority, and whether nodes are stationary or mobile. DSDV is preferred when data delivery is most important, while DSR performs better for time-critical applications.
Comparative analysis of manet reactive protocolsprj_publication
This document compares two reactive routing protocols for mobile ad hoc networks (MANETs) - Ad Hoc On-Demand Distance Vector (AODV) routing and Dynamic Source Routing (DSR). It provides an overview of MANETs and characteristics of reactive protocols. AODV establishes routes on demand and uses destination sequence numbers to ensure freshness. DSR is similar but uses source routing where the source node specifies the route in packets. The document analyzes the operation of each protocol and compares their advantages and disadvantages, finding that AODV generally outperforms DSR under higher stress conditions while DSR is better under less stressful situations.
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
This document analyzes the performance of two reactive MANET routing protocols, DSR and DSDV, under TCP Vegas and TCP Newreno variants through simulations. The simulations measured packet delivery ratio, average end-to-end delay, and total packets dropped. The results showed that DSDV generally had a higher packet delivery ratio but also higher end-to-end delay and more packet drops compared to DSR. DSR performed better in terms of delay and drops due to its on-demand route discovery, while DSDV maintained more consistent routes leading to better packet delivery.
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
A Mobile Ad hoc NETwork (MANET), is a self-configuring infra structure less network of mobile devices
connected by wireless links. ad hoc is Latin and means "for this purpose". Each device in a MANET is free
to move independently in any direction, and will therefore change its links to other devices frequently. Each
must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building
a MANET is equipping each device to continuously maintain the information required to properly route
traffic. QOS is defined as a set of service requirements to be met by the network while transporting a
packet stream from source to destination. Intrinsic to the notion of QOS is an agreement or a guarantee by
the network to provide a set of measurable pre-specified service attributes to the user in terms of delay,
jitter, available bandwidth, packet loss, and so on. The analysis is mainly between proactive or table-driven
protocols like OLSR (Optimized Link State Routing) viz DSDV (Destination Sequenced Distance Vector) &
CGSR (Cluster Head Gateway Switch Routing) and reactive or source initiated routing protocols viz
AODV (Ad hoc on Demand distance Vector) & DSR (Dynamic Source Routing). The QoS analysis of the
above said protocols is simulated on NS2 and results are shown thereby.
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
An ad hoc network is often defined as an “infrastructureless” network, meaning a network without the
usual routing infrastructure like fixed routers and routing backbones. Typically, the ad hoc nodes are
mobile and the underlying communication medium is wireless. Each ad hoc node may be capable of acting
as a router.it’s charactrizied by multihop wireless connection and frequently changing networks.we
compare the performance of on-demand routing protocols for mobile ad-hoc networks are distributed
cache updating for the dynamic source routing protocol(DSR) and ad hoc on-demand distance vector
routing (AODV).the simulation model of the medium access control(MAC) layer is evaluting the
performance of MANET protocols.DSR and AODV protocols share similar behavours.we evalute the
both on demand protocols DSR and AODV based on packet delivery ratio , packet delivery latency,mobility
variation with total number of errors, packet and normalized routing overhead,end-to-end delay by varying
in node density.the performance and characterictics are explained by the graph models.
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
An ad hoc network is a network created by wireless hosts that can be mobile. This means that no
infrastructure such as a central station, router, roaming, or anything else used by other networks to help
network structure or anything else that other networks use to help Network structure, is not used. Rather,
they are just a few wireless nodes connecting to non-neighboring nodes with the help of the neighboring
nodes. Wireless ad hoc mobile network (MANET) and Wireless ad hoc inter-car network (VANET), are
among wireless networks which have the most effective parameters in the ability of this type of networksto
transfer multimedia from source to destination. In this research, we examine the challenges and solutions
presented in DODV, DSR, and DSDV protocols
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2IJERA Editor
Mobile ad hoc network (MANETS) consists of wireless nodes communicating without any centralized administration .thus each node acts as a host and a router. There are many routing protocols designed for MANETS. The Dynamic Source Routing protocol (DSR) is a simple and efficient Routing protocol designed specifically for use in multi-hop wireless mobile nodes. This paper describes the design the implementation of DSR protocol in NS-2 simulator environment. We also analyze the performance of the DSR for various performance matrixes such as average end to- end delay, throughput and packet delivery ratio. The analysis was made for different number of nodes using the NS-2 simulator.
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless
links, to form an arbitrary topology. The nodes are free to move arbitrarily in the topology. Thus, the
network's wireless topology may be random and may change quickly. An ad Hoc network is formed by
sensor networks consisting of sensing, data processing, and communication components. There is frequent
occurrence of congested links in such a network as wireless links inherently have significantly lower
capacity than hardwired links and are therefore more prone to congestion. Here we proposed a algorithm
which involves the reduction in the delay with the help of Request_set created on the basis of the location
information of the destination node. Across the paths found in the Route_reply (RREP) packets the load is
equally distributed
Similar to call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technolog (20)
This document discusses the impact of data mining on business intelligence. It begins by defining business intelligence as using new technologies to quickly respond to changes in the business environment. Data mining is an important part of the business intelligence lifecycle, which includes determining requirements, collecting and analyzing data, generating reports, and measuring performance. Data mining allows businesses to access real-time, accurate data from multiple sources to improve decision making. Using business intelligence and data mining techniques can help businesses become more efficient and make better decisions to increase profits and customer satisfaction. The expected results of applying business intelligence include improved decision making through accurate, timely information to support organizational goals and strategic plans.
This document presents a novel technique for solving the transcendental equations of selective harmonics elimination pulse width modulation (SHEPWM) inverters based on the secant method. The proposed algorithm uses the secant method to simplify the numerical solution of the nonlinear equations and solve them faster compared to other methods. Simulation results validate that the proposed method accurately estimates the switching angles to eliminate specific harmonics from the output voltage waveform and achieves near sinusoidal output current for various modulation indices and numbers of harmonics eliminated.
This document summarizes a research paper that designed and implemented a dual tone multi-frequency (DTMF) based GSM-controlled car security system. The system uses a DTMF decoder and GSM module to allow a car to be remotely controlled and secured from a mobile phone. It works by sending DTMF tones from the phone through calls to the GSM module in the car. The decoder interprets the tones and a microcontroller executes commands to disable the ignition or control other devices. The system was created to improve car security and accessibility through remote monitoring and control with DTMF and GSM technology.
This document presents an algorithm for imperceptibly embedding a DNA-encoded watermark into a color image for authentication purposes. It applies a multi-resolution discrete wavelet transform to decompose the image. The watermark, encoded into DNA nucleotides, is then embedded into the third-level wavelet coefficients through a quantization process. Specifically, the watermark nucleotides are complemented and used to quantize coefficients in the middle frequency band, modifying the coefficients. The watermarked image is reconstructed through inverse wavelet transform. Extraction reverses these steps to recover the watermark without the original image. The algorithm aims to balance imperceptibility and robustness through this wavelet-based, blind watermarking scheme.
1) The document analyzes the dynamic saturation point of a deep-water channel in Shanghai port based on actual traffic data and a ship domain model.
2) A dynamic channel transit capacity model is established that considers factors like channel width, ship density, speed, and reductions due to traffic conditions.
3) Based on AIS data from the channel, the average traffic flow is calculated to be 15.7 ships per hour, resulting in a dynamic saturation of 32.5%, or 43.3% accounting for uneven day/night traffic volumes.
The document summarizes research on the use of earth air tunnels and wind towers as passive solar techniques. Key findings include:
- Earth air tunnels circulate air through underground pipes to take advantage of the stable temperature 4 meters below ground for cooling in summer and heating in winter. Testing showed the technique can reduce ambient temperatures by up to 14 degrees Celsius.
- Wind towers circulate air through tall shafts to cool air entering buildings at night and provide downward airflow of cooled air during the day.
- Experimental testing of an earth air tunnel system over multiple months found maximum temperature reductions of 33% in spring and minimum reductions of 15% in summer.
The document compares the mechanical and physical properties of low density polyethylene (LDPE) thin films and sheets reinforced with graphene nanoparticles. LDPE/graphene thin films were produced via solution casting, while sheets were made by compression molding. Testing showed that the thin films had enhanced tensile strength, lower melt flow index, and higher thermal stability compared to sheets. The tensile strength of thin films increased by up to 160% with 1% graphene, while sheets increased by 70%. Melt flow index decreased more for thin films, indicating higher viscosity. Thin films also showed greater improvement in glass transition temperature. These results demonstrate that processing technique affects the properties of LDPE/graphene nanocomposites.
The document describes improvements made to a friction testing machine. A stepper motor and PLC control system were added to automatically vary the load on friction pairs, replacing the manual method. Tests using the improved machine found that the friction coefficient decreases as the load increases, and that abrasive and adhesive wear increased with higher loads. The improved machine allows more accurate and convenient testing of friction pairs under varying load conditions.
This document summarizes a research article that investigates the steady, two-dimensional Falkner-Skan boundary layer flow over a stationary wedge with momentum and thermal slip boundary conditions. The flow considers a temperature-dependent thermal conductivity in the presence of a porous medium and viscous dissipation. Governing partial differential equations are non-dimensionalized and transformed into ordinary differential equations using similarity transformations. The equations are highly nonlinear and cannot be solved analytically, so a numerical solver is used. Numerical results are presented for the skin friction coefficient, local Nusselt number, velocity and temperature profiles for varying parameters like the Falkner-Skan parameter and Eckert number.
An improvised white board compass was designed and developed to enhance the teaching of geometrical construction concepts in basic technology courses. The compass allows teachers to visually demonstrate geometric concepts and constructions on a white board in an engaging, hands-on manner. It supports constructivist learning principles by enabling students to observe and emulate the teacher. The design process utilized design and development research methodology to test educational theories and validate the practical application of the compass. The improvised compass was found to effectively engage students and improve their performance in learning geometric constructions.
The document describes the design of an energy meter that calculates energy using a one second logic for improved accuracy. The meter samples voltage and current values using an ADC synchronized to the line frequency via PLL. It calculates active and reactive power by averaging the sampled values over each second. The accumulated active power for each second is multiplied by one second to calculate energy, which is accumulated and converted to kWh. Test results showed the meter achieved an error of 0.3%, within the acceptable limit for class 1 meters. Considering energy over longer durations like one second helps reduce percentage error in the calculation.
This document presents a two-stage method for solving fuzzy transportation problems where the costs, supplies, and demands are represented by symmetric trapezoidal fuzzy numbers. In the first stage, the problem is solved to satisfy minimum demand requirements. Remaining supplies are then distributed in the second stage to further minimize costs. A numerical example demonstrates using robust ranking techniques to convert the fuzzy problem into a crisp one, which is then solved using a zero suffix method. The total optimal costs from both stages provide the solution to the original fuzzy transportation problem.
1) The document proposes using an Adaptive Neuro-Fuzzy Inference System (ANFIS) controller for a Distributed Power Flow Controller (DPFC) to improve voltage regulation and power quality in a transmission system.
2) A DPFC is placed at a load bus in an IEEE 4 bus system and its performance is compared using a PI controller and ANFIS controller.
3) Simulation results show the ANFIS controller provides faster convergence and better voltage profile maintenance during voltage sags and swells compared to the PI controller.
The document describes an improved particle swarm optimization algorithm to solve vehicle routing problems. It introduces concepts of leptons and hadrons to particles in the algorithm. Leptons interact weakly based on individual and neighborhood best positions, while hadrons (local best particles) undergo strong interactions by colliding with the global best particle. When stagnation occurs, particle decay is used to increase diversity. Simulations show the improved algorithm avoids premature convergence and finds better solutions compared to the basic particle swarm optimization.
This document presents a method for analyzing photoplethysmographic (PPG) signals using correlative analysis. The method involves calculating the autocorrelation function of the PPG signal, extracting the envelope of the autocorrelation function using a low pass filter, and approximating the envelope by determining attenuation coefficients. Ten PPG signals were collected from volunteers and analyzed using this method. The attenuation coefficients were found to have similar values around 0.46, providing a potentially useful parameter for medical diagnosis.
This document describes the simulation and design of a process to recover monoethylene glycol (MEG) from effluent waste streams of a petrochemical company in Iran. Aspen Plus simulation software was used to model the process, which involves separating water, salts, and various glycols (MEG, DEG, TEG, TTEG) using a series of distillation columns. Sensitivity analyses were performed to optimize column parameters such as pressure, reflux ratio, and boilup ratio. The results showed that MEG, DEG, TEG, and TTEG could be recovered at rates of 5.01, 2.039, 0.062, and 0.089 kg/hr, respectively.
This document presents a numerical analysis of fluid flow and heat transfer characteristics of ventilated disc brake rotors using computational fluid dynamics (CFD). Two types of rotor configurations are considered: circular pillared (CP) and diamond pillared radial vane (DP). A 20° sector of each rotor is modeled and meshed. Governing equations for mass, momentum, and energy are solved using ANSYS CFX. Boundary conditions include 900K and 1500K isothermal rotor walls for different speeds. Results show the DP rotor has 70% higher mass flow and 24% higher heat dissipation than the CP rotor. Velocity and pressure distributions are more uniform for the DP rotor at higher speeds, ensuring more uniform cooling. The
This document describes the design and testing of an automated cocoa drying house prototype in Trinidad and Tobago. The prototype included automated features like a retractable roof, automatic heaters, and remote control. It aims to address issues with the traditional manual sun drying process, which is time-consuming and relies on human monitoring of changing weather conditions. Initial testing with farmers showed interest in the automated system as a potential solution.
This document presents the design of a telemedical system for remote monitoring of cardiac insufficiency. The system includes an electrocardiography (ECG) device that collects and digitizes ECG signals. The ECG signals undergo digital signal processing including autocorrelation analysis. Graphical interfaces allow patients and doctors to view ECG data and attenuation coefficients derived from autocorrelation analysis. Data is transmitted between parties using TCP/IP protocol. The system aims to facilitate remote monitoring of cardiac patients to reduce hospitalizations through early detection of health changes.
The document summarizes a polygon oscillating piston engine invention. The engine uses multiple pistons arranged around the sides of a polygon within cylinders. As the pistons oscillate, they compress and combust air-fuel mixtures to produce power. This design achieves a very high power-to-weight ratio of up to 2 hp per pound. Engineering analysis and design of a prototype 6-sided engine is presented, showing it can produce 168 hp from a 353 cubic feet per minute air flow at 12,960 rpm. The invention overcomes issues with prior oscillating piston designs by keeping the pistons moving in straight lines within cylinders using conventional piston rings.
More from International Journal of Engineering Inventions www.ijeijournal.com (20)
call for papers, research paper publishing, where to publish research paper, journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJEI, call for papers 2012,journal of science and technolog
1. International Journal of Engineering Inventions
ISSN: 2278-7461, www.ijeijournal.com
Volume 1, Issue 3 (September 2012) PP: 32-39
On Demand Routing Protocols for Mobile Adhoc Network
Soni Dalal1, Mr Sukhvir Singh(HOD)2
1, 2
N.C. College of Engineering, Israna (INDIA) -132107
Abstract––In an ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. There is no
stationary infrastructure such as base stations. The routing protocol must be able to keep up with the high degree of
node mobility that often changes the network topology drastically and unpredictably. Most of the on demand routing
protocols for Manets namely AODV and DSR perform well with uniform output under low network load, mobility, traffic
sources. The objective of the proposed work is to evaluate the performances of each of these protocols under large
number of traffic sources, greater mobility with lesser pause time and varying offered load. Also the metrics taken into
account are: Packet Size /average throughput of generating packets, Packet size / average simulation end to end delay,
packet send time at source node / end-to-end delay. On the basis of the obtained results the performances of the above-
mentioned on demand routing protocols for Manets is compared using network simulator-2 (NS2).
Index Terms––AODV - Ad Hoc On-demand Distance Vector Routing, DSRP - Dynamic Source Routing Protocol, TORA
- Temporally Ordered Routing Algorithm, NAM- Network Animator, NS- Network Simulator.
I. INTRODUCTION
Mobile Adhoc Network : Wireless networking [1,6] is an emerging technology that allows users to access information and
services electronically, regardless of their geographic position. Wireless networks can be classified in two types: -
Infrastructured Network: Infrastructured network consists of a network with fixed and wired gateways. A mobile
host communicates with a bridge in the network (called base station) within its communication radius. The mobile
unit can move geographically while it is communicating. When it goes out of range of one base station, it connects
with new base station and starts communicating through it. This is called handoff. In this approach the base
stations are fixed.
Infrastructure less (Ad hoc) Networks:In ad hoc networks all nodes are mobile and can be connected
dynamically in an arbitrary manner. All nodes of these networks behave as routers and take part in discovery and
maintenance of routes to other nodes in the network. Ad hoc networks are very useful in emergency search-and-
rescue operations, meetings or conventions in which persons wish to quickly share information, and data
acquisition operations in inhospitable terrain.
1.1The ad-hoc routing protocols can be divided into two categories:
Table-driven routing protocols. In table driven routing protocols, consistent and up-to-date routing information
to all nodes is maintained at each node.
On-Demand routing protocols:In On-Demand routing protocols, the routes are created as and when required.
When a source wants to send to a destination, it invokes the route discovery mechanisms to find the path to the
destination. The motivation behind the on-demand protocols is that the "routing overhead" (typically measured in
terms of the number of routing packets transmitted, as opposed to data packets) is typically lower than the shortest
path protocols as only the actively used routes are maintained. There are four multi-hop wireless ad hoc network
routing protocols that cover a range of design choices:
Destination-Sequenced Distance-Vector (DSDV)
Temporally Ordered Routing Algorithm (TORA)
Dynamic Source Routing (DSR)
Ad Hoc On-Demand Distance Vector Routing (AODV).
While DSDV is a table-driven routing protocol, TORA, DSR, AODV, fall under the On-demand routing protocols category.
1.2 Dynamic Source Routing (DSR)
The Dynamic Source Routing Protocol [2] is a source-routed on-demand routing protocol. A node maintains route
caches containing the source routes that it is aware of. The node updates entries in the route cache as and when it learns
about new routes. The two major phases of the protocol are: route discovery and route maintenance. When the source node
wants to send a packet to a destination, it looks up its route cache to determine if it already contains a route to the
destination. If it finds that an unexpired route to the destination exists, then it uses this route to send the packet. But if the
node does not have such a route, then it initiates the route discovery process by broadcasting a route request packet. The
route request packet contains the address of the source and the destination, and a unique identification number. Each
intermediate node checks whether it knows of a route to the destination. If it does not, it appends its address to the route
record of the packet and forwards the packet to its neighbors. To limit the number of route requests propagated, a node
32
2. On Demand Routing Protocols for Mobile Adhoc Network
processes the route request packet only if it has not already seen the packet and it's address is not present in the route record
of the packet. A route reply is generated when either the destination or an intermediate node with current information about
the destination receives the route request packet. A route request packet reaching such a node already contains, in its route
record, the sequence of hops taken from the source to this node.
As the route request packet propagates through the network, the route record is formed. If the route reply is
generated by the destination then it places the route record from route request packet into the route reply packet
1.3 Ad Hoc On-Demand Distance Vector Routing (AODV)
AODV is a reactive protocol or on-demand protocol [1]. Ad-hoc on demand distance vector routing protocol uses
destination sequence number to offer loop free routing and fresh route to the destination. Unlike tables driven protocols it
does not maintain status of the network via continuous updates. This approached help in reducing the number of messages
and the size of the routes tables.
AODV provides both multicast, and uni-cast connectivity in an ad-hoc environment. One of the main features of
AODV is to respond quickly whenever a link breakage in active route is found.
AODV is a combination of both DSR and DSDV. It inherits the basic on-demand mechanism of route discovery and route
maintenance from DSR plus the use of hop-by-hop routing sequence numbers and periodic beacons from DSDV.
II. METHODS
Problem Definition: The objective of the dissertation work is to analyse and then do a simulation comparison of
two on demand routing protocol for mobile ad hoc networks. The two reactive protocols that have been simulated and
compared are: Dynamic source routing (DSR) protocol and Ad-Hoc On Demand Distance Vector (AODV) routing protocol.
Although both of these protocols share the common feature of being Reactive in nature, yet they behave differently when
subjected to identical network conditions in terms of packet size, number of traffic sources, mobility rate, topological area,
number of nodes, mobility model.
2.1 Tool Used: The simulations were conducted on an Intel Pentium IV processor at 2.8 GHz, 256 MB of RAM running
Red Hat Linux 10
Network Simulator-2 (NS-2): The version of network simulator used for simulation is NS-2.27.
Mobility Model: Random Waypoint Model
2.2 Metrices considered for performance evaluation are:
1.Packet size Vs Average Throughput Of Generating Packets.
2.Packet Size Vs Average Simulation End-to-End Delay.
3.Packet Send Time At Source Node Vs Simulation End-to-End Delay.
2.2.1 Now to get a clear picture of the above mentioned metrices I define them as:
Average Simulation End-to-End Delay: This implies the delay a packet suffers between leaving the sender
application and arriving at the receiver application.
Average Throughput or Packet Delivery Ratio: The ratio between the number of packets sent out by the sender
application and the number of packets correctly received by the corresponding peer application
2.3 Network Simulator:
Background on the ns-2 simulator: NS simulator [12,11] is based on two languages :an object oriented simulator
,written in c++ ,and a Otcl (an object oriented extension of Tcl) interpreter ,used to execute user’s command scripts.
NS has a rich library of network and protocol objects. There are two class hierarchies: the compiled c++ hierarchy and the
interpreted Otcl one ,with one to one correspondence between them.
The compiled c++ hierarchy allows us to achieve efficiency in the simulation and the faster execution times.This is in
particular useful for the detailed definition and operation of protocols. This allows one to reduce packet and event processing
time.
33
3. On Demand Routing Protocols for Mobile Adhoc Network
2.4 Tcl and Otcl programming:
Tcl (Tool Command Language) [12,11] is used by millions of people in the world. It is a language with a very
simple sintaxis and it allows easy integration with other languages. Tcl was created by Jhon Ousterhout. The characterstics
of these languages are:
It allows a fast development
It provide a graphic interface
It is compatible with many platforms
It is flexible for integration
It is easy to use
It is free
2.5 Visualisation : Using NAM
NAM stands for network animator. Network Animator (NAM) is an animation tool for viewing network
simulation traces and real world packet traces .It supports topology layout, packet level animation and various data
inspection tools. Before starting to use NAM, a trace file needs to be created. This trace file is usually generated by NS. It
contains topology information, e.g. nodes and links, as well as packet traces. During a simulation, the user can produce
topology configurations, layout information and packet traces using tracing events in NS. Once the trace file is generated,
NAM can be used to animate it. Upon startup, NAM will read the trace file, create topology, pop up a window, do layout if
necessary and then pause at time 0. Through its user interface, NAM provides control over many aspects of animation. In
Figure a screenshot of a NAM window is shown, where the most important functions are explained.
Although the NAM software contains bugs, as do the NS software, it works fine most of the times and causes only
little trouble. NAM is an excellent first step to check that the scenario works as expected. NS and NAM can also be used
together for educational purpose and to easily demonstrate different networking issues.
III. RESULTS AND CONCLUSIONS
Following table gives a glance of the parameters that were considered for the simulation.
Parameter
No. of Mobile Nodes 40 80 100
No. of Traffic sources 20 27 30
Type of traffic TCP TCP TCP
Nodes Speed (0-20) m/s (0-20) m/s (0-20) m/s
Packet Size 1024 bytes 1024 bytes 1024 bytes
Topology Area 1100* 1100 1100* 1100 m*m 1100* 1100 m*m
m* m
3.1 Metrices considered for performance evaluation are:
1.Packet size Vs Average Throughput Of Generating Packets.
2.Packet Size Vs Average Simulation End-to-End Delay.
3.Packet Send Time At Source Node Vs Simulation End-to-End Delay.
34
4. On Demand Routing Protocols for Mobile Adhoc Network
The table given above shows the three different sets that were considered for the experiment. The number of nodes
was varied as 40,80,100 with the traffic sources 20,27 and 30 respectively. Also the type of traffic sources were TCP.The
packet size was taken to be the same 1024 bytes. Each of the mobile nodes select a random destination at the specified time
and moves towards it. The simulation ends just one second before the total simulation time, which is taken to be 400
seconds. When the packet size was further increased to 2048 bytes, there was a lot of network congestion and both of the
protocols failed to deliver any results.
The following graphs shows the results that were obtained and the comparison of the two On-Demand routing protocols:
DSR and AODV.
Graph A-For 100 nodes
1-Packet size Vs Average Throughput of Generating Packets
Packet Size Vs Average Throughput of
Generating Packets-100 nodes
100
Average
DSR
50
AODV
0
0 500 1000 1500
Packet Size(Bytes)
From this graph we observe that as the packet size is increasing the average throughput of generating packets for
DSR is slightly greater than AODV.
2-Packet send time at Source node Vs. Simulation End To End Delay
Packet Send Time At Source Node Vs
Simulation End To End Delay-100 nodes
End To End
100
Delay
DSR
50
AODV
0
0 100 200 300 400
Packet Send tim e at source node
Here we observe that the end to end delay of DSR is greater than AODV.
3-Packet Size Vs Average Simulation End to End Delay
Packet Size Vs Average Simulation End To
End Delay-100 nodes
End To End Delay
1
DSR
0.5 AODV
0
0 2000
Packet Size(Bytes)
This graph shows that as the packet size is increasing the average simulation end to end delay of DSR increases
and is greater than AODV.
35
5. On Demand Routing Protocols for Mobile Adhoc Network
Graph B-For 40 Nodes
1-Packet size Vs Average Throughput of Generating Packets
From this graph it is clear that the average throughput of generating packets for AODV is greater than DSR.
2-Packet send time at Source node Vs. Simulation End To End Delay
Packet Send Time at Source Node Vs
End to End Delay -40 nodes
60
End to End Delay
50
40
DSR
30
20 AODV
10
0
0 40 80 12 16 20 24 28 32 36 40
0 0 0 0 0 0 0 0
Send Time
Here also we can see that the end to end delay of DSR is much greater than AODV
3-Packet Size Vs Average Simulation End to End Delay
From this we observe that the average simulation end to end delay of DSR is increasing as the packet size is increasing.
36
6. On Demand Routing Protocols for Mobile Adhoc Network
Graph C- For 80 Nodes
1-Packet size Vs Average Throughput of Generating Packets
Packet Size Vs Average Throughput
of Generating Packets-80 nodes
90
80
70
60
Average
50 DSR
40 AODV
30
20
10
0
0 200 400 600 800 100 120
0 0
Packet Size(Bytes)
One can clearly notice that the average throughput of generating packets for AODV increases as the packet size
keeps increasing.
2-Packet send time at Source node Vs. Simulation End To End Delay
Here we observe that the end to end delay of DSR is much greater than AODV.
3-Packet Size Vs Average Simulation End to End Delay
This graph shows that average simulation end to end delay of DSR goes on increasing as the packet size increases.
37
7. On Demand Routing Protocols for Mobile Adhoc Network
3.2 Conclusion:
The On-Demand routing protocols are much efficient to handle the dynamics of mobile ad-hoc networks than the
table driven routing protocol. We need to undertake much deeper study of all these reactive routing protocols which could
prove beneficial to make enhancements in performance of these protocols. It is highly recommended that we start with the
basic building blocks of these protocols and see how each of these blocks interact with each other and thereby observing
how the interaction could be coordinated more effectively so as to lead to increase in performance differentials.
The protocols I took for my study are: AODV and DSR.
AODV although is an On-Demand routing protocol yet it maintains routing tables. We can say that it has features
of both table driven and reactive routing protocol. It has only one entry per source/destination pair, so it has to resort to route
discovery more often than DSR. DSR do not make use of any routing tables. Instead it can have more than one route per
source/destination pair. It makes complete use of source routing, that means the source or the initiator of the data packet has
to determine the complete hop by hop route to the destination. Due to the availability of many alternate routes it has to resort
to route discovery less often than AODV.
On the basis of result, it was concluded that as the packet size is increased the end-to-end delay of AODV is lesser
than that of DSR for larger number of nodes; average throughput of generating packets for DSR is larger than that of AODV
for larger number of Nodes and traffic sources. However the average throughput of generating packets for AODV is greater
when the numbers of nodes are 40 and 80. Delay is an important metric which decides the efficiency of the routing protocol.
DSR (Dynamic source routing) protocol is not a winner when it comes to the large size of the network. The end-
to-end delay is increased when the packet size is increased. The degraded performance might be because of the aggressive
use of caching. The basic problem is that in highly dynamic environment, the cache becomes stale and could lead to
significant downfall in performance. There is a lot of scope related to the use of caching in DSR.
So AODV gave the best performance overall, making it suitable for medium as well as larger networks.
3.3 Future Scope:
We need to evaluate these protocols AODV, DSR using different mobility models: Reference Point Group
Mobility, Freeway. Also none of these protocols have any mechanism for load balancing, so there is much scope related to
this work. Apart from this the caching strategy used by DSR needs to be more efficient in order to handle frequent topology
changes when the simulation environment is highly dynamic. So there is a need to remove stale entries from the cache more
effectively thereby the performance of DSR could be considerably improved.
ACKNOWLEDGMENT
I deem my proud privilege to express my sincere thanks and gratitude to NCCE, Panipat to provide me an
opportunity to pursue this work. My special thanks & regards to Mr. SUKHVIR SINGH (HOD) who has guided me with
all his relevant knowledge regarding this evaluation.
REFERENCES
1. Hongbo Zhou "A Survey on routing protocols in manets”: Technical report: MSU-CSE-03-08 mar 28,2003.
2. Johnson et al "DSR: Dynamic source routing protocol for multihop wireless ad hoc networks", IETF, Feb 2002.
3. Samba Sesay et al "Simulation comparison of four wireless ad hoc routing protocols" Information technology
journal 3(3): 219-226,2004.
4. Perkins, Royer, Das, Marina "Performance comparison of two on demand routing protocols for ad hoc networks"
IEEE Infocom 2000 conference.
5. Broch et al "Performance comparison of multihop wireless ad hoc network routing protocols "
http://www.monarch.cs.cmu.edu/
6. Padmini Mishra "Routing protocols for ad hoc mobile wireless network" misra@cis.ohio-staLte.edu
7. Elizabeth M.Royer, C.K.Toh "A Review of current routing protocols for adhoc mobile wireless network"
eroyer@alpha.ece.ucsb.edu,cktoh@ee.gatech.edu
8. "Performance evaluation of ad hoc routing protocols using ns2 simulation"
9. Fan Bai, Narayanan Sadagopan, Ahmed Helmy “BRICS: A Building-block approach for analyzing routing
protocols in ad hoc networks-a case study of reactive routing protocols.”
10. C.K. Toh,”Ad hoc Mobile Wireless Networks: Protocols and systems”, Prentice Hall, New Jersy 2002.
11. Marc Greis ’Tutorial,www.isi.edu/nsnam/ns/tutorial.
12. NS Simulator for beginners
13. Sampo Naski,”Performance of Ad hoc Routing Protocol :Characteristics and
Comparison,” Seminar on Internetworking,2004.
14. Laura Marie Feeney, “A taxonomy for routing protocols in mobile ad hoc networks,” Tech. Rep., Swidish Institute
of computer science, www.sics.se/Imfeeney/, October 1999.
15. IETF working group ,www.ietf.org/html.charters/manet-charter.html.
16. Fan Bai, Ahmed Helmy,”A Survey of Mobility Models in Wireless Ad hoc Networks”, University of South
California, USA.
17. T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless
Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking Research, Trends
and Applications, vol. 2, no. 5, 2002,pp. 483–502.
38
8. On Demand Routing Protocols for Mobile Adhoc Network
18. Haas Z.J, Pearlman M.R, Samar P, “The Zone Routing Protocol (ZRP) for AdHoc Networks,” IETF Internet Draft,
July 2002.
19. Perkins C.; Belding-Royer E.M.; Das S, “Ad hoc On-Demand Distance Vector(AODV) Routing,” IETF Internet
Draft, Jan 2002.
20. Asis Nasipuri, Book Chapter “Mobile ad hoc Networking,” in hand book of RF and Wireless Technologies, Edited
by Farid Dowla, Newnes, 2004.
39