SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
INTERNATIONAL JOURNAL OF ELECTRONICS AND
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME
      COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 3, Issue 3, October- December (2012), pp. 68-83
                                                                             IJECET
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2012): 3.5930 (Calculated by GISI)                   ©IAEME
www.jifactor.com



  PERFORMANCE ANALYSIS OF MOBILE AD-HOC NETWORK USED
         FOR TRAFFIC MONITORING APPLICATION

                                         Manoj Tolani
                                      Assistant Professor
                              PSIT-College of Engineering, Kanpur
                                    manoj9721@gmail.com

                                           Arti Saxena
                                Assistant Professor (HOD ECE)
                              PSIT-College of Engineering, Kanpur
                                      arti.saxena@psit.in
ABSTRACT

The main focus of our research work is to analyze performance of MANET network for remote
area. We suggest various important applications of MANET & finally design MANET for one of
these applications. We discuss MANET network for traffic monitoring application. In our
research work we compare performance of different routing protocol for FTP service. We
increase density of traffic, change the mobility of vehicles and analyze the network.
Keywords: AODV, OLSR, DSR, MANET, FTP, HTTP

   1. INTRODUCTION

MANET stands for Mobile Ad-Hoc network. It is a type of self-configurable wireless network.
MANET not needs any vital infrastructure or fixed infrastructure. It does not need any
centralized support services so that it is type of self-configurable devices, MANET consist of
various Mobile nodes router and wireless connection devices such as Wi-Fi. MANET not needs
any vital infrastructure or fixed infrastructure. MANET is become very popular in last few years
due to its importance in research field. Due to its property of network self-configuration it is used
in the places where urgent need of network connection. So that this type of network is used in
disaster areas where infrastructure is totally damaged, such as flood affected areas, places where
satellites are not capable to cover the area, in battlefield to identify the movement of the army. In
this paper our main focus to analyze the network for traffic monitoring application. We increase
the density of traffic and also increase load by varying inter-arrival time.
When designing MANET network for analysis we use various trajectories, mobility profile &
propagation model. We also use terrain profile to make analysis more real.

                                                 68
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME
                                                         October-

   2. MANET NETWORK FOR TRAFFIC MONITORING APPLICATION

We can also use MANET for traffic monitoring application as shown in figure1 & 2. On
                                                                              figure
crossings we need to determine traffic on the road and pass traffic through signals of the road
have maximum traffic (figure 1) On Highway vehicles are moving with high speeds, on these
                                  ).
roads sometimes accidents of vehicles take place or sometimes vehicles not follow traffic rules,
            times
in that case camera mounted on the central of road sometimes not capable to capture the images
of distant vehicles. In that case MANET is very useful, we form MANET by m    mounting camera
on each of the vehicles and these moving vehicles capture the images at definite interval and
transfer these images from node to node to the central sink node (figure 2).




            Figure 2.1. Vehicles work as mobile nodes & sink node is at the crossing
                      .




           Figure 2.2. Vehicles work as mobile nodes & sink node is between the road
                     .                                                          road.

   3. WLAN & OTHER PARAMETERS

For analysis purpose we use various common parameters to analyze the network as shown in
table below.




                                                 69
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

 SIMULATION PARAMETERS
 No. Of Nodes                     31,51, 71,101
 Simulation time                  600 sec
 ROUTING MAC PROTOCOL
 Routing Protocol                 AODV,OLSR,DSR
 MAC Protocol                     802.11b
 Data Rate                        11Mbps
 RADIO CHARACTERISTICS
 Transmitted Power                5mW
 Packet Reception Power Threshold -95dBm
 MANET FTP TRAFFIC GENERATION PARAMETERS
 Command Mix                      0%
 Inter request Time               1, 2, 3 & 4 sec
 File Size                        10 KB
 MOBILITY PROFILE
 Mobility type                    Default Random Waypoint Mobility
 Speed                            Uniform_int 10,40,80 m/s
 Pause Time                       100 sec
 TRAJECTORY PROFILE
 Propagation Model                Free Space
 Terrain data Type                DTED

                   Table 3.1: Various parameters set for MANET network

   4. ANALYSIS OF VARIOUS IMPORTANT PARAMETERS

We design MANET for traffic monitoring application. When designing MANET for this
applications its performance depend several important parameters, we analyze each parameters
for different routing protocols. The important parameters that affect the MANET performance
for these applications are discussed below.
    1) Increasing number of Nodes
    2) Mobility of Nodes
    3) Increasing Traffic

   4.1 INCREASING NUMBER OF NODES

For analysis we take several scenarios by changing number of nodes & compare their
performance. Initially there are 31 nodes in a MANET network, we increase number of nodes
and check their performance. We are also analyzing MANET performance for different routing
protocols.

4.2 MOBILITY OF NODES
In a MANET, mobile nodes are small in size (Mobile Phones, Laptops etc.) and so that there
antenna size is also small as compared to surrounding objects. As we already discussed its
application in flood affected areas, in battlefield, in urban areas where the surrounding objects

                                                 70
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

always cause the problem. Movement of mobile nodes also causes the problem of fading and
multipath propagation. Fading is used to describe the rapid fluctuation of amplitude, phase or
multiple delays of a radio signal over a short period of time. These waves called multipath
waves.

4.3 INCREASING TRAFFIC

We can increase traffic by decreasing inter-arrival time of packet generation, so that we take 66
nodes MANET network. The inter-arrival time of packet generation in first case is 10 sec and
then we reduce it to 2, 0.4, 0.08, 0.02 sec. As we reduce interval of two packets more packets are
generated in same duration and traffic increases. In traffic monitoring application if the vehicles
generate more snapshots it may be possible that buffer overflow take place of nodes and loss of
information. Because these vehicles (nodes) work as a router, so they store snapshots taken by
them and also store snapshots taken by other nodes when routing the traffic. So it is very
important to determine how much traffic they can store and transmit without loss of traffic
information.

4.4 MANET NETWORK                       DESIGN         FOR       TRAFFIC         MONITORING
APPLICATION
To design MANET network for traffic monitoring application we take 40 nodes MANET
structure in which internodes average distance 15-20m. We assume that central node provide
service to the bounded area of 275m*150m. There are 40 moving vehicles work as mobile node
form MANET network, each vehicle moving with speed of 50m/s and mounted camera to take
snapshots. Let us consider that each snapshot is of the size of 10KB. As we discuss earlier that
central node work as a FTP server all nodes upload image to FTP server.

   5. DATA ANALYSIS BASED ON SIMULATION RESULTS
We analyze the data step by step from simulation results. In each case we describe simulation
parameters set for simulations, various other parameters also describe that are same for all
simulations.
   5.1 EFFECT OF INCREASING NUMBER OF NODES
As from the results it is clear that if the density of nodes increases in any particular area than
traffic also increases. Due to more traffic network load also increases, If the medium is
congestion less increasing the load cause increase in throughput While if the channel is
congested, increase in load cause decrease in throughput and so that data dropped increases. We
take average value of throughput but it is not so smooth at the duration when collision count
increase throughput reduces. On increasing the no. of nodes obviously more traffic is generated
and so that throughput increases but it is become isolated because network has a limited capacity
to hold the traffic and then data loss take place. Also some collision count also increases due to
increasing traffic and throughput reduces from its actual value. Closely observing the results it is
clear that as the no. of nodes increases traffic also increases and so that network overhead, in
case of AODV routing protocol data drop increases as no. of nodes increases and delay also
increases. In case of AODV have less than 50 nodes having very less delay and suitable for real
time applications. AODV is a reactive routing protocol so that delay due to route formation also
cause problem in real time operations for heavy traffic. In case of DSR, throughput is too low
when there is less no. of nodes this is due to it maintains large cache (route information table) to

                                                 71
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME
                                                         October-

store data for transmission [4]. Also due to large cache delay is also higher. As in this network
nodes are not moving (stationary nodes) so that performance of OLSR routing protocol is better
as compare to other routing protocol, because it is table driven routing protocol and so route is
already formed and so that it have no route discovery delay. OLSR produces no data dropped
                                                                OLSR
due to buffer overflow and due to retry threshold. We analyze the MANET network for self-
similar traffic (Table 5.1.1.1). Load increases with increasing no. of nodes. Finally we can say
that OLSR perform better than AODV and DS   DSR.




                         Figure 5.1.1: Throughput comparison of AODV




                            Figure 5.1.2: Delay comparison of AODV




                          Figure 5.1
                             ure 5.1.3: Throughput comparison of DSR

                                                 72
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME




                             Figure 5.1.4: Delay Comparison of DSR




                         Figure 5.1.5: Throughput comparison of OLSR




                            Figure 5.1.6: Delay Comparison of OLSR




                                                 73
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

           No. of     Throughp      Load     Delay        Data dropped        Data dropped
           Nodes      ut (kbps)     (kbps)   (mili sec)   Bufferoverflow      Retrythreshold

              31         2400         140        1           0kbps                  0kbps
 AODV



              51         9600         380        5              0                      0
              71        21000        750        10              0                     25
             101        22000        1150     25000            270                  16000
              31           50          50        1              0                      0
 DSR




              51           85          85        3              0                     10
              71        21000        750        10              0                     25
             101         800         2300     52000           1800                  18000
              31          500          55      0.35          --No--                 --No--
              51         2500         110      0.44          --No--                 --No--
 OLSR




              71         7200         175       0.5          --No--                 --No--
             101        18000         300      0.62          --No--                 --No--
             121        31500         400       0.7          --No--                 --No--
             131        38500         450      0.74          --No--                 --No--
                        Table 5.1.1: Data analysis from Simulation results

5.2 EFFECT OF MOBILITY OF NODES

From the results it is clear that in AODV as the speed of the nodes increases throughput reduces
and so that initially there delay is larger as initially throughput is same and due to movement of
nodes new route formation take place so that there overhead of route request message cause
delay in packet transmission, so that initially delay increases but after that throughput reduces
due to movement of node and delay also reduces. Similarly performance of OLSR also degraded
as the speed of nodes increases and at high speeds very sharp change in speed take place, delay is
not much affected by speed as the time passes delay reduces as throughput also reduces and
much of the data is dropped. In both AODV and OLSR load is lower as compared to the
throughput. But in case of DSR for the same traffic throughput is much lower with respect to
load, this is due to DSR feel congested channel as it maintains maintain large cache (route
information table) to store transmission data, frequent changes due to high mobility need to
periodically updating and so that delay increases but also more nodes become in communication
range and multipath channel of outdated or state route information in forwarding packet
increases, so that its throughput also increase as speed increases but although it is lower with
respect to the OLSR & AODV. Below color codes are given.




                                                 74
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME
                                                         October-




                         Figure 5.2.1: Throughput comparison of OLSR




                             Figure 5.2.2: Delay comparison of OLSR




                         Figure 5.2.3 Throughput comparison of AODV
                                5.2.3:




                                                 75
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME




                            Figure 5.2.4: Delay comparison of AODV




                          Figure 5.2.5: Throughput comparison of DSR




                             Figure 5.2.6: Delay comparison of DSR

At lower speed performance of OLSR is better while at higher speed performance of AODV is
better in terms of delay and throughput.

5.3 EFFECT OF INCREASING TRAFFIC
From the results it is clear that in case of OLSR delay is much lower as compared to DSR &
AODV. As the traffic increases throughput increases but large traffic cause increase in collision
count & so that reduction in throughput. Data analysis from simulation results is shown in Table
5.1.3.1. From the results it is also clear that OLSR is less sensitive to increase in traffic, it can
handle large traffic as compared to AODV.


                                                 76
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME
                                                         October-




                         Figure 5.3.1: Throughput comparison of OLSR




                             Figure 5.3.2 Delay comparison of OLSR
                                    5.3.2:




                         Figure 5.3.3 Throughput comparison of AODV
                                5.3.3:




                                                 77
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME




                            Figure 5.3.4: Delay comparison of AODV




                          Figure 5.3.5: Throughput comparison of DSR




                             Figure 5.3.6: Delay comparison of DSR




                                                 78
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

                Inter      Through      Load        Delay       Data Dropped           Data dropped
               arrival       -put      (kbps)      (milisec)    Bufferoverflow        Retry threshold
               Time(s       (kbps)                                  (kbps)                (kbps)
                 ec)
                 10           6000        250         10             --No--                --No--
                  2          17000        500         10             --No--                --No--
 AODV




                 0.4         14000       1100         19             --No--                --No--
                0.08         13000       1800         21             --No--                --No--
                0.02         12000       2800         21              2100                  1500
                 10           6600        200         0.5               0                  0.005
                  2           6600        250         0.5               0                  0.010
 OLSR




                 0.4          6900        500         0.6              280                   10
                0.08          7400       1200         1.9             1000                  1150
                0.02          2000       3200         16              2000                  1250
                 10             30          2         10                0                  0.010
                  2             70         55         10                0                  0.010
 DSR




                 0.4           700       2200       35000             1800                  10.2
                0.08           750       3900       32000             3200                   12
                0.02           780       8200       30000             7800                   12
                                 Table 5.3.1: Data analysis from Simulation results

5.4 MANET NETWORK DESIGN                                       FOR       TRAFFIC        MONITORING
APPLICATION FOR FTP SERVICE

As shown in figure data dropped take place when inter arrival time is 1s and in case of 2s, 3s
&4s very negligible amount of data dropped take place so that throughput is lower in case of 1s.
We analyze the results for two routing protocol AODV & OLSR for same traffic. From the final
results we get that OLSR perform better & having no data dropped, but due to mobility routing
overhead cause reduction in throughput. Although OLSR perform better, but for high speeds as
we discuss later that performance much degraded in OLSR with respect to AODV.

 Inter-arrival time      1 sec                  2 sec                3 sec             4 sec
 Color code




                             Figure 5.4.1: Throughput comparison of FTP (AODV)



                                                        79
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME




                         Figure 5.4.2: Delay comparison of FTP (AODV)




                     Figure 5.4.3: Throughput comparison of FTP (OLSR)




                         Figure 5.4.4: Delay comparison of FTP (OLSR)




                                                 80
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

                                                                FTP
                                            AODV                              OLSR
         THROUGHPUT                        5800kbps                          4200kbps
                                           8000kbps                          2900kbps
                                           7000kbps                          2400kbps
                                           6200kbps                          2100kbps

      DATA DROPPED                          50kbps                            0kbps
    (BUFFER OVERFLOW)
                                            0.5kbps                           0kbps
                                            0.1kbps                           0kbps
                                           0.005kbps                          0kbps
             DELAY                          1000ms                             6ms
                                             11ms                             1.8ms
                                              7ms                             1.2ms
                                              5ms                              1ms
                          Table 5.4.1: Data analysis of different services

From the results it is clear that for self-similar traffic Ftp Service performs better than Http
Service both in terms of delay and data dropped. Ftp with OLSR is best for application but
throughput is better for AODV so that we prefer OLSR with FTP service for real time
applications and for non-real time application we prefer AODV.

   6. CONCLUSION & FUTURE SCOPE

From the complete analysis of results it is clear that for real time operations OLSR performance
is best while in terms of throughput AODV perform best but non-real time applications. So for
traffic monitoring application we can use AODV while in battlefield application OLSR perform
better. Results also show that FTP has larger delay but higher throughput so we use it for traffic
monitoring application.
In our research work we end the work with the idea of MANET design for rural area for internet
connectivity. In future we can design a real model of MANET based internet for rural areas; we
also analyze the network performance of this network & compare performance for different
services. In future we can also design MANET network by using WI-Max technology IEEE
802.16, which has another important qualities which improve the performance of MANET
network.




                                                 81
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

REFERENCES
[1]. Patrick Sondi, DhavyGantsou and Sylvain Lecomte, “Mobile Ad Hoc Network-Based
      Monitoring Of Battlefields Or Rescue Operations In Urban Scenarios”, UKSim Fourth
      European Modelling Symposium on Computer Modelling and Simulation, pages pp 408-413,
      IEEE 2010.
[2]. Zahian Ismail, Rosilah Hassan, “Effects of Packet Size on AODV Routing Protocol
      Implementation in Homogeneous and Heterogeneous MANET”, 2011 Third International
      Conference on Computational Intelligence, Modelling& Simulation, pages pp 351-356, IEEE
      2011.
[3]. MostafaFazeli, HasanVaziri, “Assessment Of Throughput Performance Under OPNET
      Modeler Simulation Tools In Mobile Ad Hoc Networks (MANET’s)”, 2011 Third
      International Conference on Computational Intelligence, Communication Systems and
      Networks,pages pp 328-331, IEEE 2011.
[4]. Ashish Shrestha, FiratTekiner, “On MANET Routing Protocols for Mobility and Scalability”
      2009 International Conference on Parallel and Distributed Computing, Applications and
      Technologies, pages pp 451-456, IEEE 2009.
[5]. R.K.Nadesh , D.Sumathy, M. B. BenjulaAnbu Malar, “Performance Analysis Of MANET
      (WLAN) Using Different Routing Protocols In Multi Service Environments-An Quantitative
      Study”, Int. J. Advanced Networking and Applications Volume: 03, Issue: 02, Pages:1076-
      1079 (2011)
[6]. Al-Maashri, A. and Ould-Khaoua, M. (2006) “Performance Analysis Of MANET Routing
      Protocols in the presence of Self-Similar Traffic” , Proceedings of the 31st IEEE Conference
      on Local Computer Networks,2006, 14-16 November 2006, pages pp. 801-807, Tampa,
      Florida, USA.
[7]. Yi Wang, Hairong Chen, Xinyu Yang and Deyun Zhang, “Cluster Based Location-Aware
      Routing Protocol For Large Scale Heterogeneous Manet”, Second International
      Multisymposium on Computer and Computational Science, Computer Society pages pp 366-
      373, IEEE (2007).
[8]. EmadAboelela, “Computer Networks A System Approach, Edition-3 ,Networks Simulation
      Experiment Mannual”, University of Massachusetts Dartmouth ,2003.
[9]. Theodore S.Rappaport “Wireless Communications Principles and Practice” pearson
      publication, second edition, 2010.
[10]. Jochen Schiller “Mobile Communications” Pearson publication, second edition, 2009.
[11]. Dharma Prakash Agarwal, Qing-An zeng “Introduction to wireless and mobile systems”
      THOMSON Vikas publishing House, 2003.
[12]. Ashish Shrestha, Firat Tekiner, “On MANET Routing Protocols for Mobility and
      Scalability”, International Conference on Parallel and Distributed Computing, Applications
      and Technologies, 2009, pages pp. 451-456, IEEE, 2009.
[13]. Beauchamp, K. G.; “Computer Communications - 2nd ed.” - Chapman and Hall, 1990. –
      0412370700
[14]. Comer, Douglas; “Computer Networks and Internets: with Internet Applications - 3rd ed.”,
      Prentice Hall, Upper Saddle River, N.J., 2001. – 013091449.
[15]. Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani – A Survey of Secure Mobile Ad Hoc
      Routing Protocols, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO.
      4, FOURTH QUARTER 2008.


                                                 82
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

[16]. Luc  Hogie; Pascal Bouvry; Frederic Guinand – “An Overview of MANETs Simulation”;
      Elsevier B.V.; 2006.
[17]. Mackenzie, Lewis; “Communications and Networks.” -: McGraw-Hill, London, 1998. –
      0077092732
[18]. Murthy, C. Siva Ram; “Ad Hoc Wireless Networks: Architectures and Protocols.” - :
      Prentice Hall PTR, Upper Saddle River, N.J., 2004 - 013147023x
[19]. Na Wu (1999) QoS - Driven Routing and Resource Scheduling In Wired and Wireless
      Networks, UMI, Bell & Howell Information and Learning, 300 Nor1h Zeeb Road, Ann
      Arbor, MI 48108-1346 USA -800- 521-0600
[20]. Odom, Wendell, Tom Knott; “Networking basics CCNA 1 companion” -: Cisco,
      Indianapolis, Ind., 2006. – 1587131641
[21]. Peterson, Larry L. & Bruce S. Davie; “Computer Networks: A systems approach - 3rd ed.”,
      Morgan Kaufmann, San Francisco, Calif.; London 2003.
[22]. R.K.Nadesh , D.Sumathy, M. B. Benjula Anbu Malar, “Performance Analysis of MANET
      (WLAN) Using Different Routing Protocols in Multi service Environments-An Quantitative
      Study”, Int. J. Advanced Networking and Applications Volume: 03, Issue: 02, Pages
      pp:1076-1079 (2011)
[23]. Sondi, p.; Gantsou,D.; Lecomte, S.;, “Performance Evaluation Of Multimedia Application
      over an OLSR-Based Mobile Ad-Hoc Network using OPNET” Computer Modelling &
      Simulation (UKSim), 12th international conference, 2010.




                                                 83

Contenu connexe

Tendances

IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemeSAT Publishing House
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofEditor Jacotech
 
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...ijcsse
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variIAEME Publication
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksPanimalar Engineering College
 
Channel estimation for high data rate communication in mobile wi max system
Channel estimation for high data rate communication in mobile wi max systemChannel estimation for high data rate communication in mobile wi max system
Channel estimation for high data rate communication in mobile wi max systemIAEME Publication
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...TELKOMNIKA JOURNAL
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...pijans
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksTELKOMNIKA JOURNAL
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELPERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELIJCSES Journal
 
IRJET- A Novel Technique for the Transmission of Digital Data through Ban...
IRJET-  	  A Novel Technique for the Transmission of Digital Data through Ban...IRJET-  	  A Novel Technique for the Transmission of Digital Data through Ban...
IRJET- A Novel Technique for the Transmission of Digital Data through Ban...IRJET Journal
 

Tendances (18)

Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm system
 
Performance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints ofPerformance analysis of aodv with the constraints of
Performance analysis of aodv with the constraints of
 
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
Impact of Randomness on MAC Layer Schedulers over High Speed Wireless Campus ...
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with vari
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
B25004007
B25004007B25004007
B25004007
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
 
Channel estimation for high data rate communication in mobile wi max system
Channel estimation for high data rate communication in mobile wi max systemChannel estimation for high data rate communication in mobile wi max system
Channel estimation for high data rate communication in mobile wi max system
 
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
Wireless power transfer enabled NOMA relay systems: two SIC modes and perform...
 
Wireless Networks
Wireless NetworksWireless Networks
Wireless Networks
 
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
PERFORMANCE EVALUATION OF VEHICULAR AD HOC NETWORK (VANET) USING CLUSTERING A...
 
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networksComparison study on secrecy probability of AF-NOMA and AF-OMA networks
Comparison study on secrecy probability of AF-NOMA and AF-OMA networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELPERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
 
M0111397100
M0111397100M0111397100
M0111397100
 
IRJET- A Novel Technique for the Transmission of Digital Data through Ban...
IRJET-  	  A Novel Technique for the Transmission of Digital Data through Ban...IRJET-  	  A Novel Technique for the Transmission of Digital Data through Ban...
IRJET- A Novel Technique for the Transmission of Digital Data through Ban...
 

En vedette

Mathematical modeling and analysis of hoop stresses in hydroforming deep draw...
Mathematical modeling and analysis of hoop stresses in hydroforming deep draw...Mathematical modeling and analysis of hoop stresses in hydroforming deep draw...
Mathematical modeling and analysis of hoop stresses in hydroforming deep draw...iaemedu
 
Prediction of behaviour in forming of sintered copper 10%tungsten nano powder...
Prediction of behaviour in forming of sintered copper 10%tungsten nano powder...Prediction of behaviour in forming of sintered copper 10%tungsten nano powder...
Prediction of behaviour in forming of sintered copper 10%tungsten nano powder...iaemedu
 
Extraction of qrs complexes using automated bayesian regularization neural ne...
Extraction of qrs complexes using automated bayesian regularization neural ne...Extraction of qrs complexes using automated bayesian regularization neural ne...
Extraction of qrs complexes using automated bayesian regularization neural ne...iaemedu
 
Optimization of cutting parameters for surface roughness in turning no restri...
Optimization of cutting parameters for surface roughness in turning no restri...Optimization of cutting parameters for surface roughness in turning no restri...
Optimization of cutting parameters for surface roughness in turning no restri...iaemedu
 
Comparison of 100 torr and 200 torr bpsg layer deposited using sub atmospheri...
Comparison of 100 torr and 200 torr bpsg layer deposited using sub atmospheri...Comparison of 100 torr and 200 torr bpsg layer deposited using sub atmospheri...
Comparison of 100 torr and 200 torr bpsg layer deposited using sub atmospheri...iaemedu
 
Design of power efficient 4x4 array multiplier using adiabatic logic
Design of power efficient 4x4 array multiplier using adiabatic logicDesign of power efficient 4x4 array multiplier using adiabatic logic
Design of power efficient 4x4 array multiplier using adiabatic logiciaemedu
 

En vedette (6)

Mathematical modeling and analysis of hoop stresses in hydroforming deep draw...
Mathematical modeling and analysis of hoop stresses in hydroforming deep draw...Mathematical modeling and analysis of hoop stresses in hydroforming deep draw...
Mathematical modeling and analysis of hoop stresses in hydroforming deep draw...
 
Prediction of behaviour in forming of sintered copper 10%tungsten nano powder...
Prediction of behaviour in forming of sintered copper 10%tungsten nano powder...Prediction of behaviour in forming of sintered copper 10%tungsten nano powder...
Prediction of behaviour in forming of sintered copper 10%tungsten nano powder...
 
Extraction of qrs complexes using automated bayesian regularization neural ne...
Extraction of qrs complexes using automated bayesian regularization neural ne...Extraction of qrs complexes using automated bayesian regularization neural ne...
Extraction of qrs complexes using automated bayesian regularization neural ne...
 
Optimization of cutting parameters for surface roughness in turning no restri...
Optimization of cutting parameters for surface roughness in turning no restri...Optimization of cutting parameters for surface roughness in turning no restri...
Optimization of cutting parameters for surface roughness in turning no restri...
 
Comparison of 100 torr and 200 torr bpsg layer deposited using sub atmospheri...
Comparison of 100 torr and 200 torr bpsg layer deposited using sub atmospheri...Comparison of 100 torr and 200 torr bpsg layer deposited using sub atmospheri...
Comparison of 100 torr and 200 torr bpsg layer deposited using sub atmospheri...
 
Design of power efficient 4x4 array multiplier using adiabatic logic
Design of power efficient 4x4 array multiplier using adiabatic logicDesign of power efficient 4x4 array multiplier using adiabatic logic
Design of power efficient 4x4 array multiplier using adiabatic logic
 

Similaire à Performance analysis of mobile ad hoc network

Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsIAEME Publication
 
A framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networA framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networIAEME Publication
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...IJECEIAES
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...IRJET Journal
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...IAEME Publication
 
Abstract + Poster (MSc Thesis)
Abstract + Poster (MSc Thesis)Abstract + Poster (MSc Thesis)
Abstract + Poster (MSc Thesis)Louis Abalu
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P ijwmn
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET Journal
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetIJCERT
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Dr Sandeep Kumar Poonia
 

Similaire à Performance analysis of mobile ad hoc network (20)

Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocols
 
A framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networA framework for efficient routing protocol metrics for wireless mesh networ
A framework for efficient routing protocol metrics for wireless mesh networ
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
Comparative Analysis of Mobility Models Using Routing Protocol for Vehicular ...
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
50120130404054
5012013040405450120130404054
50120130404054
 
Abstract + Poster (MSc Thesis)
Abstract + Poster (MSc Thesis)Abstract + Poster (MSc Thesis)
Abstract + Poster (MSc Thesis)
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANET
 
eaodv
eaodveaodv
eaodv
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
IRJET-QOS parameter analysis of UMTS networks based on Handovers and Sectoriz...
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...
 

Plus de iaemedu

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationiaemedu
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reorderingiaemedu
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanismiaemedu
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cmaiaemedu
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presenceiaemedu
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineeringiaemedu
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacementiaemedu
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approachiaemedu
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentiaemedu
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationiaemedu
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyiaemedu
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 

Plus de iaemedu (20)

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow application
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reordering
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanism
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cma
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presence
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineering
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacement
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approach
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environment
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow application
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classify
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 

Performance analysis of mobile ad hoc network

  • 1. INTERNATIONAL JOURNAL OF ELECTRONICS AND International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), pp. 68-83 IJECET © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2012): 3.5930 (Calculated by GISI) ©IAEME www.jifactor.com PERFORMANCE ANALYSIS OF MOBILE AD-HOC NETWORK USED FOR TRAFFIC MONITORING APPLICATION Manoj Tolani Assistant Professor PSIT-College of Engineering, Kanpur manoj9721@gmail.com Arti Saxena Assistant Professor (HOD ECE) PSIT-College of Engineering, Kanpur arti.saxena@psit.in ABSTRACT The main focus of our research work is to analyze performance of MANET network for remote area. We suggest various important applications of MANET & finally design MANET for one of these applications. We discuss MANET network for traffic monitoring application. In our research work we compare performance of different routing protocol for FTP service. We increase density of traffic, change the mobility of vehicles and analyze the network. Keywords: AODV, OLSR, DSR, MANET, FTP, HTTP 1. INTRODUCTION MANET stands for Mobile Ad-Hoc network. It is a type of self-configurable wireless network. MANET not needs any vital infrastructure or fixed infrastructure. It does not need any centralized support services so that it is type of self-configurable devices, MANET consist of various Mobile nodes router and wireless connection devices such as Wi-Fi. MANET not needs any vital infrastructure or fixed infrastructure. MANET is become very popular in last few years due to its importance in research field. Due to its property of network self-configuration it is used in the places where urgent need of network connection. So that this type of network is used in disaster areas where infrastructure is totally damaged, such as flood affected areas, places where satellites are not capable to cover the area, in battlefield to identify the movement of the army. In this paper our main focus to analyze the network for traffic monitoring application. We increase the density of traffic and also increase load by varying inter-arrival time. When designing MANET network for analysis we use various trajectories, mobility profile & propagation model. We also use terrain profile to make analysis more real. 68
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME October- 2. MANET NETWORK FOR TRAFFIC MONITORING APPLICATION We can also use MANET for traffic monitoring application as shown in figure1 & 2. On figure crossings we need to determine traffic on the road and pass traffic through signals of the road have maximum traffic (figure 1) On Highway vehicles are moving with high speeds, on these ). roads sometimes accidents of vehicles take place or sometimes vehicles not follow traffic rules, times in that case camera mounted on the central of road sometimes not capable to capture the images of distant vehicles. In that case MANET is very useful, we form MANET by m mounting camera on each of the vehicles and these moving vehicles capture the images at definite interval and transfer these images from node to node to the central sink node (figure 2). Figure 2.1. Vehicles work as mobile nodes & sink node is at the crossing . Figure 2.2. Vehicles work as mobile nodes & sink node is between the road . road. 3. WLAN & OTHER PARAMETERS For analysis purpose we use various common parameters to analyze the network as shown in table below. 69
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME SIMULATION PARAMETERS No. Of Nodes 31,51, 71,101 Simulation time 600 sec ROUTING MAC PROTOCOL Routing Protocol AODV,OLSR,DSR MAC Protocol 802.11b Data Rate 11Mbps RADIO CHARACTERISTICS Transmitted Power 5mW Packet Reception Power Threshold -95dBm MANET FTP TRAFFIC GENERATION PARAMETERS Command Mix 0% Inter request Time 1, 2, 3 & 4 sec File Size 10 KB MOBILITY PROFILE Mobility type Default Random Waypoint Mobility Speed Uniform_int 10,40,80 m/s Pause Time 100 sec TRAJECTORY PROFILE Propagation Model Free Space Terrain data Type DTED Table 3.1: Various parameters set for MANET network 4. ANALYSIS OF VARIOUS IMPORTANT PARAMETERS We design MANET for traffic monitoring application. When designing MANET for this applications its performance depend several important parameters, we analyze each parameters for different routing protocols. The important parameters that affect the MANET performance for these applications are discussed below. 1) Increasing number of Nodes 2) Mobility of Nodes 3) Increasing Traffic 4.1 INCREASING NUMBER OF NODES For analysis we take several scenarios by changing number of nodes & compare their performance. Initially there are 31 nodes in a MANET network, we increase number of nodes and check their performance. We are also analyzing MANET performance for different routing protocols. 4.2 MOBILITY OF NODES In a MANET, mobile nodes are small in size (Mobile Phones, Laptops etc.) and so that there antenna size is also small as compared to surrounding objects. As we already discussed its application in flood affected areas, in battlefield, in urban areas where the surrounding objects 70
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME always cause the problem. Movement of mobile nodes also causes the problem of fading and multipath propagation. Fading is used to describe the rapid fluctuation of amplitude, phase or multiple delays of a radio signal over a short period of time. These waves called multipath waves. 4.3 INCREASING TRAFFIC We can increase traffic by decreasing inter-arrival time of packet generation, so that we take 66 nodes MANET network. The inter-arrival time of packet generation in first case is 10 sec and then we reduce it to 2, 0.4, 0.08, 0.02 sec. As we reduce interval of two packets more packets are generated in same duration and traffic increases. In traffic monitoring application if the vehicles generate more snapshots it may be possible that buffer overflow take place of nodes and loss of information. Because these vehicles (nodes) work as a router, so they store snapshots taken by them and also store snapshots taken by other nodes when routing the traffic. So it is very important to determine how much traffic they can store and transmit without loss of traffic information. 4.4 MANET NETWORK DESIGN FOR TRAFFIC MONITORING APPLICATION To design MANET network for traffic monitoring application we take 40 nodes MANET structure in which internodes average distance 15-20m. We assume that central node provide service to the bounded area of 275m*150m. There are 40 moving vehicles work as mobile node form MANET network, each vehicle moving with speed of 50m/s and mounted camera to take snapshots. Let us consider that each snapshot is of the size of 10KB. As we discuss earlier that central node work as a FTP server all nodes upload image to FTP server. 5. DATA ANALYSIS BASED ON SIMULATION RESULTS We analyze the data step by step from simulation results. In each case we describe simulation parameters set for simulations, various other parameters also describe that are same for all simulations. 5.1 EFFECT OF INCREASING NUMBER OF NODES As from the results it is clear that if the density of nodes increases in any particular area than traffic also increases. Due to more traffic network load also increases, If the medium is congestion less increasing the load cause increase in throughput While if the channel is congested, increase in load cause decrease in throughput and so that data dropped increases. We take average value of throughput but it is not so smooth at the duration when collision count increase throughput reduces. On increasing the no. of nodes obviously more traffic is generated and so that throughput increases but it is become isolated because network has a limited capacity to hold the traffic and then data loss take place. Also some collision count also increases due to increasing traffic and throughput reduces from its actual value. Closely observing the results it is clear that as the no. of nodes increases traffic also increases and so that network overhead, in case of AODV routing protocol data drop increases as no. of nodes increases and delay also increases. In case of AODV have less than 50 nodes having very less delay and suitable for real time applications. AODV is a reactive routing protocol so that delay due to route formation also cause problem in real time operations for heavy traffic. In case of DSR, throughput is too low when there is less no. of nodes this is due to it maintains large cache (route information table) to 71
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME October- store data for transmission [4]. Also due to large cache delay is also higher. As in this network nodes are not moving (stationary nodes) so that performance of OLSR routing protocol is better as compare to other routing protocol, because it is table driven routing protocol and so route is already formed and so that it have no route discovery delay. OLSR produces no data dropped OLSR due to buffer overflow and due to retry threshold. We analyze the MANET network for self- similar traffic (Table 5.1.1.1). Load increases with increasing no. of nodes. Finally we can say that OLSR perform better than AODV and DS DSR. Figure 5.1.1: Throughput comparison of AODV Figure 5.1.2: Delay comparison of AODV Figure 5.1 ure 5.1.3: Throughput comparison of DSR 72
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME Figure 5.1.4: Delay Comparison of DSR Figure 5.1.5: Throughput comparison of OLSR Figure 5.1.6: Delay Comparison of OLSR 73
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME No. of Throughp Load Delay Data dropped Data dropped Nodes ut (kbps) (kbps) (mili sec) Bufferoverflow Retrythreshold 31 2400 140 1 0kbps 0kbps AODV 51 9600 380 5 0 0 71 21000 750 10 0 25 101 22000 1150 25000 270 16000 31 50 50 1 0 0 DSR 51 85 85 3 0 10 71 21000 750 10 0 25 101 800 2300 52000 1800 18000 31 500 55 0.35 --No-- --No-- 51 2500 110 0.44 --No-- --No-- OLSR 71 7200 175 0.5 --No-- --No-- 101 18000 300 0.62 --No-- --No-- 121 31500 400 0.7 --No-- --No-- 131 38500 450 0.74 --No-- --No-- Table 5.1.1: Data analysis from Simulation results 5.2 EFFECT OF MOBILITY OF NODES From the results it is clear that in AODV as the speed of the nodes increases throughput reduces and so that initially there delay is larger as initially throughput is same and due to movement of nodes new route formation take place so that there overhead of route request message cause delay in packet transmission, so that initially delay increases but after that throughput reduces due to movement of node and delay also reduces. Similarly performance of OLSR also degraded as the speed of nodes increases and at high speeds very sharp change in speed take place, delay is not much affected by speed as the time passes delay reduces as throughput also reduces and much of the data is dropped. In both AODV and OLSR load is lower as compared to the throughput. But in case of DSR for the same traffic throughput is much lower with respect to load, this is due to DSR feel congested channel as it maintains maintain large cache (route information table) to store transmission data, frequent changes due to high mobility need to periodically updating and so that delay increases but also more nodes become in communication range and multipath channel of outdated or state route information in forwarding packet increases, so that its throughput also increase as speed increases but although it is lower with respect to the OLSR & AODV. Below color codes are given. 74
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME October- Figure 5.2.1: Throughput comparison of OLSR Figure 5.2.2: Delay comparison of OLSR Figure 5.2.3 Throughput comparison of AODV 5.2.3: 75
  • 9. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME Figure 5.2.4: Delay comparison of AODV Figure 5.2.5: Throughput comparison of DSR Figure 5.2.6: Delay comparison of DSR At lower speed performance of OLSR is better while at higher speed performance of AODV is better in terms of delay and throughput. 5.3 EFFECT OF INCREASING TRAFFIC From the results it is clear that in case of OLSR delay is much lower as compared to DSR & AODV. As the traffic increases throughput increases but large traffic cause increase in collision count & so that reduction in throughput. Data analysis from simulation results is shown in Table 5.1.3.1. From the results it is also clear that OLSR is less sensitive to increase in traffic, it can handle large traffic as compared to AODV. 76
  • 10. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October December (2012), © IAEME October- Figure 5.3.1: Throughput comparison of OLSR Figure 5.3.2 Delay comparison of OLSR 5.3.2: Figure 5.3.3 Throughput comparison of AODV 5.3.3: 77
  • 11. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME Figure 5.3.4: Delay comparison of AODV Figure 5.3.5: Throughput comparison of DSR Figure 5.3.6: Delay comparison of DSR 78
  • 12. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME Inter Through Load Delay Data Dropped Data dropped arrival -put (kbps) (milisec) Bufferoverflow Retry threshold Time(s (kbps) (kbps) (kbps) ec) 10 6000 250 10 --No-- --No-- 2 17000 500 10 --No-- --No-- AODV 0.4 14000 1100 19 --No-- --No-- 0.08 13000 1800 21 --No-- --No-- 0.02 12000 2800 21 2100 1500 10 6600 200 0.5 0 0.005 2 6600 250 0.5 0 0.010 OLSR 0.4 6900 500 0.6 280 10 0.08 7400 1200 1.9 1000 1150 0.02 2000 3200 16 2000 1250 10 30 2 10 0 0.010 2 70 55 10 0 0.010 DSR 0.4 700 2200 35000 1800 10.2 0.08 750 3900 32000 3200 12 0.02 780 8200 30000 7800 12 Table 5.3.1: Data analysis from Simulation results 5.4 MANET NETWORK DESIGN FOR TRAFFIC MONITORING APPLICATION FOR FTP SERVICE As shown in figure data dropped take place when inter arrival time is 1s and in case of 2s, 3s &4s very negligible amount of data dropped take place so that throughput is lower in case of 1s. We analyze the results for two routing protocol AODV & OLSR for same traffic. From the final results we get that OLSR perform better & having no data dropped, but due to mobility routing overhead cause reduction in throughput. Although OLSR perform better, but for high speeds as we discuss later that performance much degraded in OLSR with respect to AODV. Inter-arrival time 1 sec 2 sec 3 sec 4 sec Color code Figure 5.4.1: Throughput comparison of FTP (AODV) 79
  • 13. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME Figure 5.4.2: Delay comparison of FTP (AODV) Figure 5.4.3: Throughput comparison of FTP (OLSR) Figure 5.4.4: Delay comparison of FTP (OLSR) 80
  • 14. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME FTP AODV OLSR THROUGHPUT 5800kbps 4200kbps 8000kbps 2900kbps 7000kbps 2400kbps 6200kbps 2100kbps DATA DROPPED 50kbps 0kbps (BUFFER OVERFLOW) 0.5kbps 0kbps 0.1kbps 0kbps 0.005kbps 0kbps DELAY 1000ms 6ms 11ms 1.8ms 7ms 1.2ms 5ms 1ms Table 5.4.1: Data analysis of different services From the results it is clear that for self-similar traffic Ftp Service performs better than Http Service both in terms of delay and data dropped. Ftp with OLSR is best for application but throughput is better for AODV so that we prefer OLSR with FTP service for real time applications and for non-real time application we prefer AODV. 6. CONCLUSION & FUTURE SCOPE From the complete analysis of results it is clear that for real time operations OLSR performance is best while in terms of throughput AODV perform best but non-real time applications. So for traffic monitoring application we can use AODV while in battlefield application OLSR perform better. Results also show that FTP has larger delay but higher throughput so we use it for traffic monitoring application. In our research work we end the work with the idea of MANET design for rural area for internet connectivity. In future we can design a real model of MANET based internet for rural areas; we also analyze the network performance of this network & compare performance for different services. In future we can also design MANET network by using WI-Max technology IEEE 802.16, which has another important qualities which improve the performance of MANET network. 81
  • 15. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME REFERENCES [1]. Patrick Sondi, DhavyGantsou and Sylvain Lecomte, “Mobile Ad Hoc Network-Based Monitoring Of Battlefields Or Rescue Operations In Urban Scenarios”, UKSim Fourth European Modelling Symposium on Computer Modelling and Simulation, pages pp 408-413, IEEE 2010. [2]. Zahian Ismail, Rosilah Hassan, “Effects of Packet Size on AODV Routing Protocol Implementation in Homogeneous and Heterogeneous MANET”, 2011 Third International Conference on Computational Intelligence, Modelling& Simulation, pages pp 351-356, IEEE 2011. [3]. MostafaFazeli, HasanVaziri, “Assessment Of Throughput Performance Under OPNET Modeler Simulation Tools In Mobile Ad Hoc Networks (MANET’s)”, 2011 Third International Conference on Computational Intelligence, Communication Systems and Networks,pages pp 328-331, IEEE 2011. [4]. Ashish Shrestha, FiratTekiner, “On MANET Routing Protocols for Mobility and Scalability” 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, pages pp 451-456, IEEE 2009. [5]. R.K.Nadesh , D.Sumathy, M. B. BenjulaAnbu Malar, “Performance Analysis Of MANET (WLAN) Using Different Routing Protocols In Multi Service Environments-An Quantitative Study”, Int. J. Advanced Networking and Applications Volume: 03, Issue: 02, Pages:1076- 1079 (2011) [6]. Al-Maashri, A. and Ould-Khaoua, M. (2006) “Performance Analysis Of MANET Routing Protocols in the presence of Self-Similar Traffic” , Proceedings of the 31st IEEE Conference on Local Computer Networks,2006, 14-16 November 2006, pages pp. 801-807, Tampa, Florida, USA. [7]. Yi Wang, Hairong Chen, Xinyu Yang and Deyun Zhang, “Cluster Based Location-Aware Routing Protocol For Large Scale Heterogeneous Manet”, Second International Multisymposium on Computer and Computational Science, Computer Society pages pp 366- 373, IEEE (2007). [8]. EmadAboelela, “Computer Networks A System Approach, Edition-3 ,Networks Simulation Experiment Mannual”, University of Massachusetts Dartmouth ,2003. [9]. Theodore S.Rappaport “Wireless Communications Principles and Practice” pearson publication, second edition, 2010. [10]. Jochen Schiller “Mobile Communications” Pearson publication, second edition, 2009. [11]. Dharma Prakash Agarwal, Qing-An zeng “Introduction to wireless and mobile systems” THOMSON Vikas publishing House, 2003. [12]. Ashish Shrestha, Firat Tekiner, “On MANET Routing Protocols for Mobility and Scalability”, International Conference on Parallel and Distributed Computing, Applications and Technologies, 2009, pages pp. 451-456, IEEE, 2009. [13]. Beauchamp, K. G.; “Computer Communications - 2nd ed.” - Chapman and Hall, 1990. – 0412370700 [14]. Comer, Douglas; “Computer Networks and Internets: with Internet Applications - 3rd ed.”, Prentice Hall, Upper Saddle River, N.J., 2001. – 013091449. [15]. Loay Abusalah, Ashfaq Khokhar, and Mohsen Guizani – A Survey of Secure Mobile Ad Hoc Routing Protocols, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, FOURTH QUARTER 2008. 82
  • 16. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME [16]. Luc Hogie; Pascal Bouvry; Frederic Guinand – “An Overview of MANETs Simulation”; Elsevier B.V.; 2006. [17]. Mackenzie, Lewis; “Communications and Networks.” -: McGraw-Hill, London, 1998. – 0077092732 [18]. Murthy, C. Siva Ram; “Ad Hoc Wireless Networks: Architectures and Protocols.” - : Prentice Hall PTR, Upper Saddle River, N.J., 2004 - 013147023x [19]. Na Wu (1999) QoS - Driven Routing and Resource Scheduling In Wired and Wireless Networks, UMI, Bell & Howell Information and Learning, 300 Nor1h Zeeb Road, Ann Arbor, MI 48108-1346 USA -800- 521-0600 [20]. Odom, Wendell, Tom Knott; “Networking basics CCNA 1 companion” -: Cisco, Indianapolis, Ind., 2006. – 1587131641 [21]. Peterson, Larry L. & Bruce S. Davie; “Computer Networks: A systems approach - 3rd ed.”, Morgan Kaufmann, San Francisco, Calif.; London 2003. [22]. R.K.Nadesh , D.Sumathy, M. B. Benjula Anbu Malar, “Performance Analysis of MANET (WLAN) Using Different Routing Protocols in Multi service Environments-An Quantitative Study”, Int. J. Advanced Networking and Applications Volume: 03, Issue: 02, Pages pp:1076-1079 (2011) [23]. Sondi, p.; Gantsou,D.; Lecomte, S.;, “Performance Evaluation Of Multimedia Application over an OLSR-Based Mobile Ad-Hoc Network using OPNET” Computer Modelling & Simulation (UKSim), 12th international conference, 2010. 83