SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 45
www.arpublication.org
Performance Analysis and Simulation of
OLSR Routing Protocol in MANET
Jogendra Kumar
Department of Computer Science & Engineering
G.B.Pant engineering College Pauri Garhwal Uttarakhand, India
jogendra.1986@gmail.com
Abstract
Mobile ad hoc network is a collection of wireless nodes that are communicate other
nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an
autonomous system that means no need for depaentd other nodes it have own capability
to handle and controlling all funcitionlity, to sending and receiving all information form
one device to other device. MANET has power full feature that controlling itself by
dynamic nature, multihop,low power and configuration of the system. In this paper we
analyzing, simulation and implements the TC messages and HELLO Message by MPR of
OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet
simulator to simulate and implement the performance of OLSR routing protocols takes
various performance metrics like hello message sent (HMS) , hello message received
(HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages
received on Constant Bit Rate (CBR) using random waypoint model. In this paper check
the performance OLSR routing protocol gives effective performance for lage networks.
Keywords: Ad-hoc Network, MANET, OLSR Routing Protocol, Qualnet 5.0.2
1. INTRODUCTION
An Ad-hoc network is a wireless network, which do not have a centralized and fixed
infrastructure. MANET is referred to as a wireless ad hoc network in which nodes are free
to move arbitrarily and mobile nodes can transmit and receive the traffic. Also mobile nodes
can act like routers by forwarding the neighbors traffic to the destination node as the
routers are multi-hop devices . MANET does not need base stations of wired infrastructure. The
mobile nodes in wireless network range can communicate with each other because it is a self
organized network. The mobile nodes form a network automatically without a fixed infrastructure
and central management. The mobile nodes have transmitters and receivers with smart antennas,
which enable the mobile nodes to communicate with each others. The topology of the network
changes every time by getting in and out of the mobile nodes in the network. In the beginning
MANET was designed for military use but now the MANET is used in many areas. Such as in
disaster hit areas, data collection in some region, in rescue missions, virtual classes and
conferences. This concept with ad hoc network makes the full name of mobile ad hoc network
(MANET). By growing the network, combined with the node mobility the challenges of self
configuration of the network become more evident. Security in MANET is a very critical and
important issue and many techniques were defined for the security of MANET. Mobile nodes in
the network waste much energy by joining in and out with connection to wireless
network. This connection and reconnection create energy limitation in the wireless network
[2][6][12][16][23]. OLSR routing protocol of mobile ad hoc network on random waypoint model
46
www.arpublication.org
using constant bit rate (CBR) from source to destination And also The effects of varying pause
time of the mobile nodes will be considered in our evaluation and will be kept constant in
all the scenarios.
2. OLSR (OPTIMIZATION LINK STATE ROUTING) IN MANET
OLSR [8] [18] [20] [24] is a proactive routing protocol stores and updates its routing table
information permanently. OLSR keeps track of routing table in order to provide a route if
needed or route all time available for communication. OLSR can be implemented in all ad hoc
networks due to its nature OLSR is called as proactive routing protocol. OLSR protocols all the
nodes in the network do not broadcast the route packets only Multipoint Relay (MPR) [15] [17]
[19] nodes can broadcast route packets. These MPR nodes can be selected in the neighbours of
source node in a network. Each node in the network keeps a list of MPR nodes information and
stores that information in routing table. This MPR selector is obtained from HELLO packets
sending between in neighbors nodes within range of that node only neighbors. These routes
are established before any source node intends to send a message to a particular
destination. Each and every node in the network keeps a routing table and update information
periodically. This is the reason the routing overhead for OLSR is minimum than other reactive
routing protocols and it provide a shortest route to the destination in the network. There is no
need to build the new routes, as the existing in use route does not increase enough routing
overhead because every node already builds. OLSR reduces the route discovery delay. The
HELLO messages contain the entire neighbor information store in routing table. This enables the
mobile node to have a table in which it has information about its entire multiple hop neighbors.
A node chooses minimal number of MPR nodes, when symmetric connections are made. It
broadcast topology control (TC)[17] [19] [23] messages with information about link status
at predetermined TC interval. TC messages also calculate the routing table’s information and
update periodically.
3. RELATED WORKS
J.kumar [11] proposed a MANET routing protocol in the OLSR were performance analyzed.
For 50 nodes In OLSR routing protocols, sending and receiving packet 95% and less than 2%
packets are wasted so that this protocol is best for large networks. In case of MPR selected nodes
gives TC Messages Generated at 90%, 85% TC Message Received and 80% TC Messages
Relayed so that designing and controlling messages in OLSR routing protocol almost 80%
. C. Perkins et al [3] proposed a MANET routing protocol in the OLSR were performance
analyzed. The performance of OLSR protocol through a network different size carried out
a comparative analysis of the performance and found it had better performance in all
aspects in a network. The performance of OLSR which can be achieved by Hello Traffic
Sent (bit/sec), Total TC message sent (TTCMS) and Total TC message forward (TTCMF),
Total hello message and TC traffic sent (bit/sec), Routing traffic received (pkt/s), Routing
traffic sent (pkt/s), MPR Count Using OPNET Modular simulation tool. Harmanpreet kaur et al
[9] proposed a MANET routing protocol OLSR performs best in terms of load and throughput.
GRP performs best in terms of delay and routing overhead. TORA is the worst choice when we
consider any of the four performance parameters. We can say that OLSR is best as compared to
GRP and TORA in all traffic volumes since it has maximum throughput using OPNET modeler
simulation tools. All the above works proposed several routing protocols to construct a route
performance on TC hello message. This paper checking the performance on large network of
OLSR routing protocol on Constant Bit Rate using new simulator Qualnet which gives faster
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 47
www.arpublication.org
performance and takes minimum time for execution the scenarios as compared to NS2, Glomosim
and OPNET modular.
4. SIMULATION PARAMETERS AND PERFORMANCE METRIC
4.1 SIMULATION PARAMETERS
Simulation Parameters Values
Dimension of space 1500m*1500m
Minimum velocity (v min) 0 m/s
Maximum velocity (v max) 10 m/s
No. of nodes 200
Simulation Time 1200 sec
Traffic Sources CBR
Item size 512 bytes
Source data pattern 4 packets/sec
Node Placement Strategy Random Waypoint Model
Routing Protocol OLSR Routing Protocol
Total Number of Simulation 1
Data Rate 2 Mbps
Channel Frequency 2.4 GHz
Antenna-Model Omnidirectional
PHY-Model PHY802.11b
Table 1 Simulation Parameters
4.2 PERFORMANCE METRIC
Hello Messages Received (HMR): Total number of Hello Messages Received by applying
CBR on nodes.
Hello Messages Sent (HMS): Total number of Hello Messages Sent by the node
TC Messages Received (TCHMR): Total number of TC Messages Received by applying CBR
on nodes
TC Messages Generated (TCMG): Total number of TC Messages Generated by applying
CBR on nodes
TC Messages Relayed (TCMR): Total number of TC Messages Relayed by applying CBR on
nodes.
4.3 SIMULATION TOOLS
Qualnet 5.0.2 [24] is an extended version of Glomosim. Glomosim simulator tools for
wireless network. Design scenarios and routing protocol in mobile ad-hoc network (MANET)
[1] [4] [5] [16] but Qualnet use for both wireless and wired network. Qualnet is more 10 times
powerful as compared to the glomosim because it’s taken less time for execution of the
scenarios, establish more nodes at the same time and taken the performance easily as compared
to Glomosim and NS2,opnet etc.
48
www.arpublication.org
4.4 NODES PALACEMENT AND ANIMATION VEIW OF OLSR
ROUTING PROTOCOLS
Figure 1. Showing Nodes Placement Scenarios of OLSR routing protocol for 50 nodes
In figure 1: We are describing the nodes placement strategies of random waypoint
model. In this model Random waypoint model for the different nodes randomly. We are taken
area 1500*1500 mm, wireless network which attached with all nodes randomly. OLSR routing
protocol use CBR apply for source node to destination node with constant speed. In this model
placing 200 nodes all nodes have constant speed and send packet 4 bit per sec. Overall execution
time of this scenarios is 1200 sec and data rate flow is 2 Mbps with channel frequency is 2.4
Ghz. We are taken omni-directional model for controlling both direction signals. Figure 4
showing the 50 nodes placement scenarios of OLSR. Figure 5 showing the execution view of the
scenarios.
4.5 SIMULATION VIEW OF OLSR ROUTING PROTOCOL
In figure 2: Showing the animation view of OLSR routing protocols scenarios using Qualnet
simulation tool and takes the performance of on the basis of performance metric like Hello
Messages Received, Hello Messages Sent, TC Messages Received, TC Messages Generated and
TC Messages Relayed.
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 49
www.arpublication.org
Figure 2. showing the simulation view of OLSR routing protocol for 200 nodes
5. SIMULATION RESULTS AND DISCUSSION OF OLSR ROUTING
PROTOCOLS
OLSR: Hello Messages Sent (HMS): In figure 3 showing the Hello Messages Sent by root
sending a hello messages broadcasting to all neighbors to attached nodes of OLSR routing
protocols its protocol reacted as a proactive routing protocols that have available all nodes for
communication to each other’s and maintain routing information periodically. In this figure
sent 15 packets at constant speed 4packet/sec at 50 nodes with constant speed by CBR.
Figure 3. Showing the performance result of OLSR: Hello Messages Sent Vs Nodes
OLSR: Hello Messages Received (HMR): In figure 4 showing that hello messages received
versus nodes. In case of LOSR routing sent packet at constant rate but receiving at different rate
due to some interference, mobility, signaling, fading. We have seen nodes 21, 69, 91, 120, 159,
182, 198 receiving 100% packets but at nodes 8, 34, 42, 74, 89, 107, 128, 152, 173, 190, 199
receiving minimum 40% packet received and all other nodes receiving packet approximately
50-80%. In overall scenarios all packet received not 100% but more packet receive as compare
to base paper nodes 21, 29 receiving 100% packets but at nodes 8, 49 receiving minimum 40%
packet received and all other nodes receiving packet approximately 50%.
50
www.arpublication.org
Figure 4. Showing the performance result of OLSR: Hello Messages Received Vs Nodes
OLSR: TC Messages Generated (TCMG): In figure 5 showing the performances of TC
messages Generated by MPR. MPR means multipoint relayed its selected hop. Hop means
counting numbers of path. MPR selected list of neighbor that are attached nodes that MPR have
all information related to the attached list of nodes like sending address, destination address,
secret code, MAC address, up to date information update periodically. In below figure showing
nodes 7, 39, 49, 74, 109, 136 and 172 TC messages generated because these nodes not selected
by MPR so that all these nodes not generated any information. In OLSR routing protocols TC
messages generated almost 97 % and less than 3 % not are generated by MPR but according to
base paper In OLSR routing protocols TC messages generated almost 95 % and less than 5 %
not are generated by MPR
Figure 5 . Showing the performance result of OLSR: TC Messages Generated Vs Nodes
OLSR: TC Messages Received (TCMR): In figure 6 showing the performances of TC messages
Received by MPR. In below figure showing nodes 7, 39, 49, 74, 109, 136 and 172 TC messages
generated but receiving packet because these nodes attached center so that these nodes have
some information related to the neighbors. From nodes 13, 78, 110, 144, 147, 152, 156, 181, 189
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 51
www.arpublication.org
received 100 % TC messages and nodes 1, 2 ,12, 29, 33, 45, 66, 68, 71, 72, 109, 111, 126, 166,
180, 182 and 194 receiving almost 88% and other nodes receiving less than 48 %.
Figure 6 . Showing the performance result of OLSR: TC Messages Received Vs Nodes
TC Messages Relayed (TCMR): In figure 7 showing the performances of TC messages Relayed
by MPR. From node 161 TC messages relayed 100 % TC messages and nodes 41, 64, 107, 123,
154 and 172 TC messages relayed almost 75% and other nodes relayed less than 15 % of TC
messages relayed.
Figure 7. Showing the performance result of OLSR: TC Messages Relayed Vs Nodes
5.1 COMPARATIVE PERFORMANCE ANALYSIS OF BASE PAPER
5.1.1 Combine performance result of OLSR( Hello Messages Sent and Hello Messages
received): In figure 8 showing combine performances of hello messages sent and hello
52
www.arpublication.org
messages received and nodes. According to this base paper figure gives performance 20 nodes
give 80% , 30 nodes gives 50-65 % and 50 nodes give 20-50%.but according to our paper give
better performance 35 nodes give 90% , 45 nodes gives 50-65 % and 30 nodes give 20-50%
Figure 8 . Showing the combine performance result of OLSR: Hello Messages Sent and Hello Messages
Received Vs Nodes
5.1.2 Combine performance result of OLSR(TC Messages Generated, TC Messages received
and TC Messages Relayed): In figure 9 showing the combine performances OLSR: TC
Messages Generated, TC Messages received and TC Messages Relayed and nodes. According
to base paper gives 20 nodes give 82% , 30 nodes gives 48-66 % and 50 nodes give 20-48%
but according to our paper give better performance 45 nodes give 91% , 35 nodes gives 52-67
% and 25 nodes give 24-50%
Figure 9. Showing the combine performance result of OLSR: TC Messages Generated, TC Messages
Received and TC Messages Relayed Vs Nodes
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 53
www.arpublication.org
6. CONCLUSIONS AND FUTURE WORKS
This paper discuss Mobile ad-hoc network (MANET), and check the performance of
optimization link state routing protocol on the basis of constant bit rate. The performance
checked on random waypoint model in which nodes are placed randomly. In OLSR routing
protocol is created hello messages sensing the neighboring nodes and list of MPR selection
nodes and TC hello messages controlling the route calculation and its information, maintain
routing information periodically, minimizing the broadcasting by MPR. In OLSR routing
protocols sending and receiving packet 98 % and less than 2% packet is wasted so that this
protocol is best for large network. In case of MPR selected nodes gives TC messages generated
92 %, 87 % TC message received and 88% TC messages relayed so that designing and
controlling messages in OLSR routing protocol almost 89% so that OLSR routing protocol
gives better performances in case of large network and small network due to proactive routing
nature protocols as compare to other proactive routing protocol in MANET. The future work is
checking the another routing protocol on different nodes placement strategies, energy
consumption, fixed bit rate, and variable bit rate on the basis on load applying and also
modification of existing routing protocol.
REFERENCES
[1]. A.B. Malany, V.R.S. Dhulipala, RM.Chandrasekaran, “Throughput and Delay Comparison of
MANET Routing Protocols” Intl. Journal OpenProblems Comp. Math., Vol. 2, No. 3, Sep
2009.
[2]. Alexander Klein,” Performance Comparison and Evaluation of AODV, OLSR, and SBR in
Mobile Ad-Hoc Networks” PP 571-575, 2008 IEEE.
[3]. C. Perkins, E.M. Royer, S.R. Das and M.K. Marina, ―Performance Comparison of Two On-
demand Routing Protocols for Ad Hoc Networks,ǁ IEEE Personal Communications, pp. 16-
28, Feb. 2001.
[4]. C.Siva Rammurty and B.S. Manoj, ”Ad hoc wireless networks architectures and protocols” ISBN
978-81-317-0688-6, 2011.
[5]. Dilpreet Kaur and Naresh Kumar,” Comparative Analysis of AODV, OLSR, TORA, DSR and
DSDV Routing Protocols in Mobile Ad-Hoc Networks”, I. J. Computer Network and Information
Security, 2013, 3, 39-46 Published Online March 2013 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijcnis.2013.03.05.
[6]. Elizabeth Royer, C.K. Toh, “A Review of Current Routing Protocols for Ad hoc mobile
Wireless Networks”, RFC 2409, IEEE Personal Communications 1999
[7]. G. Karthiga, J.Benitha Christinal,Jeban Chandir Moses,” Performance Analysis of Various Ad-
Hoc Routing Protocols in Multicast Environment”, ISSN : 2229-4333(Print) ISSN : 0976-
8491(Online) IJCST Vo l. 2, IS Su e 1, march 2011,pp 161-165.
[8]. Haas and M. Pearlman. The performance of query control scheme for the zone routing protocol.
ACM/IEEE Transactions on Networking, 9(4) pages 427-438, August 2001
[9]. Harmanpreet kaur and Jaswinder singh,” Performance comparison of OLSR, GRP and TORA
using OPNET”, International Journal of Advanced Research in Computer Science and Software
Engineering Volume 2, Issue 10, October 2012 ISSN: 2277 128X.
[10]. Hong, K. Xu, M. Gerla, “Scalable Routing Protocols for Mobile Ad-Hoc Networks” IEEE Network
Magazine, Volume-16, Issue-4, pages: 11–21.
[11]. Jogendra Kumar,” CBR Based Performance Analysis of OLSR Routing Protocol in MANETs”,
International Journal of Computer Science and Business Informatics IJCSBI.ORG, ISSN: 1694-
2108 | Vol. 3, No. 1. JULY 2013, pp:1-12
54
www.arpublication.org
[12]. Krishna Kumar Chandel, Sanjeev Sharma and Santosh Sahu,” Performance Analysis of Routing
Protocols Based on IPV4 and IPV6 for MANET”, International Journal of Computer Technology
and Electronics Engineering (IJCTEE) Volume 2, Issue 3, June 2012.
[13]. Kuldeep Vats, Monika Sachdeva, Krishan Saluja and Amit Rathee,” Simulation and Performance
Analysis of OLSR Routing Protocol Using OPNET”, International Journal of Advanced Research
in Computer Science and Software Engineering Volume 2, Issue 2, February 2012 ISSN: 2277
128X.
[14]. M Joa-Ng and I.-T. Lu, A Peer-to-Peer zone based two-level link state routing for mobile Ad Hoc
Networks, IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc
Networks, August 1999, pp.1415-1425.
[15]. M.K. J. Kumar, R.S. Rajesh, “Performance Analysis of MANET Routing Protocols in different
Mobility Models” IJCSNS International Journal of Computer Science and Network 22
Security, VOL.9 No.2, February 2009.
[16]. M.L Sharma, Noor Fatima, Rizvi Nipun Sharma, Anu Malhan and Swati Sharma, ”Performance
Evaluation of MANET Routing Protocols under CBR and FTP traffic classes “, Int. J. Comp.
Tech. Appl. Vol 2 (3), 393-400.
[17]. M.Sreerama Murty and M.Venkat Das,” Performance Evalution of MANET Routing protocols
using Reference Point Group Mobility and Random WayPoint Models”, International Journal of
Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011,pp 33-43.
[18]. Pearlman MR, Haas ZJ. ―Determining the optimal configuration for the zone routing protocol.ǁ
IEEE Journal on Selected Areas in Communications 1999; 17: 1395–1414.
[19]. S. A. Ade1
& P.A.Tijare2
,” Performance Comparison of AODV, DSDV, OLSR and DSR Routing
Protocols in Mobile Ad Hoc Networks”, International Journal of Information Technology and
Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548.
[20]. Syed Basha Shaik, S. P. Setty,” Performance Comparison of AODV, DSR and ANODR
for Grid Placement Model” International Journal of Computer Applications (0975 8887),
Volume 11, No.12, 6-9, 2010.
[21]. Thakore Mitesh C1,” Performance Analysis of AODV and OLSR Routing Protocol with Different
Topologies”, International Journal of Science and Research (IJSR), India Online ISSN: 2319-
7064, Volume 2 Issue 1, January 2013 www.ijsr.net
[22]. QualNet documentation,”QualNet 5.0 Model Library: Advanced
Wireless”;http://www.scalablenetworks.com/products/Qualnet/download.php#docs.
[23]. The Qualnet 5.0.2 simulator tools online available www.scalable-networks.com
[24]. Hong Jiang, 1994. “Performance Comparison of Three Routing Protocols for Ad Hoc Networks”,
Communications of the ACM, Vol. 37.
[25]. T. Clausen, P. Jacquet,”RFC 3626 Optimized Link State Routing Protocol (OLSR)" October 2003.
ACKNOWLEDGEMENTS
Jogendra Kumar thanks Dr. A.K. Swami Professor and Principal of G.B. Pant Engineering
College Pauri Garhwal Uttarakhand, INDIA, Dr. Sandipvijay Head of the Department
(HOD) and Professor of Electronic Communication & Engineering in DIT (Dehradun
Institute of Technology) Uttarakhand by recognized UTU (Uttarakhand Technology
University) Dehradun, Uttarakhand ,INDIA and also Thanks Mr. S.K Verma HOD CSED
G.B. Pant Engineering College Pauri Garhwal Uttarakhand, INDIA give me opportunity
and provided simulation tools Qualnet 5.0.2 to complete this article.
International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 55
www.arpublication.org
AUTHER PROFILE
Jogendra Kumar received his B.E degree in Computer Science & Engineering from
H.N.B Garhwal University Srinagar Uttarakhand (India) in G.B. Pant Engineering
College Pauri Garhwal, Uttarakhand, (India) 2008 and M.TECH (CSE) degree from UTU
University Dehradun Uttarakhand (India) in G.B. Pant Engineering College Pauri
Garhwal, Uttarakhand, (India) 2012 with Registration ID NO CSE1053545 and I am member of
International Association of Engineers (IAENG) (USA) ,member ID:121623, Internet Society
(USA), member ID: 77364 , International Association Of Computer Science And
Information Technology (IACSIT), member ID : 80344753 his research interest includes
mobile Ad Hoc Networks and Wireless Sensor Networks systems and also published various
research papers in leading international journal, Workshops, Seminar & conferences.

Contenu connexe

Tendances

AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...Ann Joseph
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.Editor IJMTER
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer ScienceTransweb Global Inc
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Sushant Kushwaha
 
Label distribution protocol
Label distribution protocolLabel distribution protocol
Label distribution protocolAtakan ATAK
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree ProtocolAtakan ATAK
 
Resource reservation protocol
Resource reservation protocolResource reservation protocol
Resource reservation protocolAtakan ATAK
 

Tendances (20)

Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Layer 3
Layer 3Layer 3
Layer 3
 
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
Routing
RoutingRouting
Routing
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Aodv slide final
Aodv slide finalAodv slide final
Aodv slide final
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
Label distribution protocol
Label distribution protocolLabel distribution protocol
Label distribution protocol
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Spaning Tree Protocol
Spaning Tree ProtocolSpaning Tree Protocol
Spaning Tree Protocol
 
Resource reservation protocol
Resource reservation protocolResource reservation protocol
Resource reservation protocol
 

Similaire à Performance Analysis and Simulation of OLSR Routing Protocol in MANET

ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETEswar Publications
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsIAEME Publication
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A comparative analysis on routing
A comparative analysis on routingA comparative analysis on routing
A comparative analysis on routingijcseit
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKijcseit
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKijcseit
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution vivek pratap singh
 

Similaire à Performance Analysis and Simulation of OLSR Routing Protocol in MANET (20)

Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Performance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANETPerformance Comparison of Different Mobility Model on Topology Managed MANET
Performance Comparison of Different Mobility Model on Topology Managed MANET
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocols
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
J0935461
J0935461J0935461
J0935461
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
A comparative analysis on routing
A comparative analysis on routingA comparative analysis on routing
A comparative analysis on routing
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Az26337342
Az26337342Az26337342
Az26337342
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 

Plus de ijcnac

Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...ijcnac
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESijcnac
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...ijcnac
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
 
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...ijcnac
 
BookyScholia: A Methodology for the Investigation of Expert Systems
BookyScholia: A Methodology for the  Investigation of Expert SystemsBookyScholia: A Methodology for the  Investigation of Expert Systems
BookyScholia: A Methodology for the Investigation of Expert Systemsijcnac
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transferijcnac
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...ijcnac
 
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...ijcnac
 

Plus de ijcnac (9)

Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...Designing Financial Information System Using Structured System Analysis and D...
Designing Financial Information System Using Structured System Analysis and D...
 
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGESEFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
EFFICIENT IMAGE COMPRESSION USING LAPLACIAN PYRAMIDAL FILTERS FOR EDGE IMAGES
 
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
A Comparative Analysis of the Performance of VoIP Traffic with Different Type...
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
The Escalating Nigeria National Security Challenge: Smart Objects and Interne...
 
BookyScholia: A Methodology for the Investigation of Expert Systems
BookyScholia: A Methodology for the  Investigation of Expert SystemsBookyScholia: A Methodology for the  Investigation of Expert Systems
BookyScholia: A Methodology for the Investigation of Expert Systems
 
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image TransferA Joint Encryption/Watermarking Algorithm for Secure Image Transfer
A Joint Encryption/Watermarking Algorithm for Secure Image Transfer
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
 
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
Study of Polarization Mode Dispersion in the Optical Digital Connection to Hi...
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Performance Analysis and Simulation of OLSR Routing Protocol in MANET

  • 1. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 45 www.arpublication.org Performance Analysis and Simulation of OLSR Routing Protocol in MANET Jogendra Kumar Department of Computer Science & Engineering G.B.Pant engineering College Pauri Garhwal Uttarakhand, India jogendra.1986@gmail.com Abstract Mobile ad hoc network is a collection of wireless nodes that are communicate other nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an autonomous system that means no need for depaentd other nodes it have own capability to handle and controlling all funcitionlity, to sending and receiving all information form one device to other device. MANET has power full feature that controlling itself by dynamic nature, multihop,low power and configuration of the system. In this paper we analyzing, simulation and implements the TC messages and HELLO Message by MPR of OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet simulator to simulate and implement the performance of OLSR routing protocols takes various performance metrics like hello message sent (HMS) , hello message received (HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages received on Constant Bit Rate (CBR) using random waypoint model. In this paper check the performance OLSR routing protocol gives effective performance for lage networks. Keywords: Ad-hoc Network, MANET, OLSR Routing Protocol, Qualnet 5.0.2 1. INTRODUCTION An Ad-hoc network is a wireless network, which do not have a centralized and fixed infrastructure. MANET is referred to as a wireless ad hoc network in which nodes are free to move arbitrarily and mobile nodes can transmit and receive the traffic. Also mobile nodes can act like routers by forwarding the neighbors traffic to the destination node as the routers are multi-hop devices . MANET does not need base stations of wired infrastructure. The mobile nodes in wireless network range can communicate with each other because it is a self organized network. The mobile nodes form a network automatically without a fixed infrastructure and central management. The mobile nodes have transmitters and receivers with smart antennas, which enable the mobile nodes to communicate with each others. The topology of the network changes every time by getting in and out of the mobile nodes in the network. In the beginning MANET was designed for military use but now the MANET is used in many areas. Such as in disaster hit areas, data collection in some region, in rescue missions, virtual classes and conferences. This concept with ad hoc network makes the full name of mobile ad hoc network (MANET). By growing the network, combined with the node mobility the challenges of self configuration of the network become more evident. Security in MANET is a very critical and important issue and many techniques were defined for the security of MANET. Mobile nodes in the network waste much energy by joining in and out with connection to wireless network. This connection and reconnection create energy limitation in the wireless network [2][6][12][16][23]. OLSR routing protocol of mobile ad hoc network on random waypoint model
  • 2. 46 www.arpublication.org using constant bit rate (CBR) from source to destination And also The effects of varying pause time of the mobile nodes will be considered in our evaluation and will be kept constant in all the scenarios. 2. OLSR (OPTIMIZATION LINK STATE ROUTING) IN MANET OLSR [8] [18] [20] [24] is a proactive routing protocol stores and updates its routing table information permanently. OLSR keeps track of routing table in order to provide a route if needed or route all time available for communication. OLSR can be implemented in all ad hoc networks due to its nature OLSR is called as proactive routing protocol. OLSR protocols all the nodes in the network do not broadcast the route packets only Multipoint Relay (MPR) [15] [17] [19] nodes can broadcast route packets. These MPR nodes can be selected in the neighbours of source node in a network. Each node in the network keeps a list of MPR nodes information and stores that information in routing table. This MPR selector is obtained from HELLO packets sending between in neighbors nodes within range of that node only neighbors. These routes are established before any source node intends to send a message to a particular destination. Each and every node in the network keeps a routing table and update information periodically. This is the reason the routing overhead for OLSR is minimum than other reactive routing protocols and it provide a shortest route to the destination in the network. There is no need to build the new routes, as the existing in use route does not increase enough routing overhead because every node already builds. OLSR reduces the route discovery delay. The HELLO messages contain the entire neighbor information store in routing table. This enables the mobile node to have a table in which it has information about its entire multiple hop neighbors. A node chooses minimal number of MPR nodes, when symmetric connections are made. It broadcast topology control (TC)[17] [19] [23] messages with information about link status at predetermined TC interval. TC messages also calculate the routing table’s information and update periodically. 3. RELATED WORKS J.kumar [11] proposed a MANET routing protocol in the OLSR were performance analyzed. For 50 nodes In OLSR routing protocols, sending and receiving packet 95% and less than 2% packets are wasted so that this protocol is best for large networks. In case of MPR selected nodes gives TC Messages Generated at 90%, 85% TC Message Received and 80% TC Messages Relayed so that designing and controlling messages in OLSR routing protocol almost 80% . C. Perkins et al [3] proposed a MANET routing protocol in the OLSR were performance analyzed. The performance of OLSR protocol through a network different size carried out a comparative analysis of the performance and found it had better performance in all aspects in a network. The performance of OLSR which can be achieved by Hello Traffic Sent (bit/sec), Total TC message sent (TTCMS) and Total TC message forward (TTCMF), Total hello message and TC traffic sent (bit/sec), Routing traffic received (pkt/s), Routing traffic sent (pkt/s), MPR Count Using OPNET Modular simulation tool. Harmanpreet kaur et al [9] proposed a MANET routing protocol OLSR performs best in terms of load and throughput. GRP performs best in terms of delay and routing overhead. TORA is the worst choice when we consider any of the four performance parameters. We can say that OLSR is best as compared to GRP and TORA in all traffic volumes since it has maximum throughput using OPNET modeler simulation tools. All the above works proposed several routing protocols to construct a route performance on TC hello message. This paper checking the performance on large network of OLSR routing protocol on Constant Bit Rate using new simulator Qualnet which gives faster
  • 3. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 47 www.arpublication.org performance and takes minimum time for execution the scenarios as compared to NS2, Glomosim and OPNET modular. 4. SIMULATION PARAMETERS AND PERFORMANCE METRIC 4.1 SIMULATION PARAMETERS Simulation Parameters Values Dimension of space 1500m*1500m Minimum velocity (v min) 0 m/s Maximum velocity (v max) 10 m/s No. of nodes 200 Simulation Time 1200 sec Traffic Sources CBR Item size 512 bytes Source data pattern 4 packets/sec Node Placement Strategy Random Waypoint Model Routing Protocol OLSR Routing Protocol Total Number of Simulation 1 Data Rate 2 Mbps Channel Frequency 2.4 GHz Antenna-Model Omnidirectional PHY-Model PHY802.11b Table 1 Simulation Parameters 4.2 PERFORMANCE METRIC Hello Messages Received (HMR): Total number of Hello Messages Received by applying CBR on nodes. Hello Messages Sent (HMS): Total number of Hello Messages Sent by the node TC Messages Received (TCHMR): Total number of TC Messages Received by applying CBR on nodes TC Messages Generated (TCMG): Total number of TC Messages Generated by applying CBR on nodes TC Messages Relayed (TCMR): Total number of TC Messages Relayed by applying CBR on nodes. 4.3 SIMULATION TOOLS Qualnet 5.0.2 [24] is an extended version of Glomosim. Glomosim simulator tools for wireless network. Design scenarios and routing protocol in mobile ad-hoc network (MANET) [1] [4] [5] [16] but Qualnet use for both wireless and wired network. Qualnet is more 10 times powerful as compared to the glomosim because it’s taken less time for execution of the scenarios, establish more nodes at the same time and taken the performance easily as compared to Glomosim and NS2,opnet etc.
  • 4. 48 www.arpublication.org 4.4 NODES PALACEMENT AND ANIMATION VEIW OF OLSR ROUTING PROTOCOLS Figure 1. Showing Nodes Placement Scenarios of OLSR routing protocol for 50 nodes In figure 1: We are describing the nodes placement strategies of random waypoint model. In this model Random waypoint model for the different nodes randomly. We are taken area 1500*1500 mm, wireless network which attached with all nodes randomly. OLSR routing protocol use CBR apply for source node to destination node with constant speed. In this model placing 200 nodes all nodes have constant speed and send packet 4 bit per sec. Overall execution time of this scenarios is 1200 sec and data rate flow is 2 Mbps with channel frequency is 2.4 Ghz. We are taken omni-directional model for controlling both direction signals. Figure 4 showing the 50 nodes placement scenarios of OLSR. Figure 5 showing the execution view of the scenarios. 4.5 SIMULATION VIEW OF OLSR ROUTING PROTOCOL In figure 2: Showing the animation view of OLSR routing protocols scenarios using Qualnet simulation tool and takes the performance of on the basis of performance metric like Hello Messages Received, Hello Messages Sent, TC Messages Received, TC Messages Generated and TC Messages Relayed.
  • 5. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 49 www.arpublication.org Figure 2. showing the simulation view of OLSR routing protocol for 200 nodes 5. SIMULATION RESULTS AND DISCUSSION OF OLSR ROUTING PROTOCOLS OLSR: Hello Messages Sent (HMS): In figure 3 showing the Hello Messages Sent by root sending a hello messages broadcasting to all neighbors to attached nodes of OLSR routing protocols its protocol reacted as a proactive routing protocols that have available all nodes for communication to each other’s and maintain routing information periodically. In this figure sent 15 packets at constant speed 4packet/sec at 50 nodes with constant speed by CBR. Figure 3. Showing the performance result of OLSR: Hello Messages Sent Vs Nodes OLSR: Hello Messages Received (HMR): In figure 4 showing that hello messages received versus nodes. In case of LOSR routing sent packet at constant rate but receiving at different rate due to some interference, mobility, signaling, fading. We have seen nodes 21, 69, 91, 120, 159, 182, 198 receiving 100% packets but at nodes 8, 34, 42, 74, 89, 107, 128, 152, 173, 190, 199 receiving minimum 40% packet received and all other nodes receiving packet approximately 50-80%. In overall scenarios all packet received not 100% but more packet receive as compare to base paper nodes 21, 29 receiving 100% packets but at nodes 8, 49 receiving minimum 40% packet received and all other nodes receiving packet approximately 50%.
  • 6. 50 www.arpublication.org Figure 4. Showing the performance result of OLSR: Hello Messages Received Vs Nodes OLSR: TC Messages Generated (TCMG): In figure 5 showing the performances of TC messages Generated by MPR. MPR means multipoint relayed its selected hop. Hop means counting numbers of path. MPR selected list of neighbor that are attached nodes that MPR have all information related to the attached list of nodes like sending address, destination address, secret code, MAC address, up to date information update periodically. In below figure showing nodes 7, 39, 49, 74, 109, 136 and 172 TC messages generated because these nodes not selected by MPR so that all these nodes not generated any information. In OLSR routing protocols TC messages generated almost 97 % and less than 3 % not are generated by MPR but according to base paper In OLSR routing protocols TC messages generated almost 95 % and less than 5 % not are generated by MPR Figure 5 . Showing the performance result of OLSR: TC Messages Generated Vs Nodes OLSR: TC Messages Received (TCMR): In figure 6 showing the performances of TC messages Received by MPR. In below figure showing nodes 7, 39, 49, 74, 109, 136 and 172 TC messages generated but receiving packet because these nodes attached center so that these nodes have some information related to the neighbors. From nodes 13, 78, 110, 144, 147, 152, 156, 181, 189
  • 7. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 51 www.arpublication.org received 100 % TC messages and nodes 1, 2 ,12, 29, 33, 45, 66, 68, 71, 72, 109, 111, 126, 166, 180, 182 and 194 receiving almost 88% and other nodes receiving less than 48 %. Figure 6 . Showing the performance result of OLSR: TC Messages Received Vs Nodes TC Messages Relayed (TCMR): In figure 7 showing the performances of TC messages Relayed by MPR. From node 161 TC messages relayed 100 % TC messages and nodes 41, 64, 107, 123, 154 and 172 TC messages relayed almost 75% and other nodes relayed less than 15 % of TC messages relayed. Figure 7. Showing the performance result of OLSR: TC Messages Relayed Vs Nodes 5.1 COMPARATIVE PERFORMANCE ANALYSIS OF BASE PAPER 5.1.1 Combine performance result of OLSR( Hello Messages Sent and Hello Messages received): In figure 8 showing combine performances of hello messages sent and hello
  • 8. 52 www.arpublication.org messages received and nodes. According to this base paper figure gives performance 20 nodes give 80% , 30 nodes gives 50-65 % and 50 nodes give 20-50%.but according to our paper give better performance 35 nodes give 90% , 45 nodes gives 50-65 % and 30 nodes give 20-50% Figure 8 . Showing the combine performance result of OLSR: Hello Messages Sent and Hello Messages Received Vs Nodes 5.1.2 Combine performance result of OLSR(TC Messages Generated, TC Messages received and TC Messages Relayed): In figure 9 showing the combine performances OLSR: TC Messages Generated, TC Messages received and TC Messages Relayed and nodes. According to base paper gives 20 nodes give 82% , 30 nodes gives 48-66 % and 50 nodes give 20-48% but according to our paper give better performance 45 nodes give 91% , 35 nodes gives 52-67 % and 25 nodes give 24-50% Figure 9. Showing the combine performance result of OLSR: TC Messages Generated, TC Messages Received and TC Messages Relayed Vs Nodes
  • 9. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 53 www.arpublication.org 6. CONCLUSIONS AND FUTURE WORKS This paper discuss Mobile ad-hoc network (MANET), and check the performance of optimization link state routing protocol on the basis of constant bit rate. The performance checked on random waypoint model in which nodes are placed randomly. In OLSR routing protocol is created hello messages sensing the neighboring nodes and list of MPR selection nodes and TC hello messages controlling the route calculation and its information, maintain routing information periodically, minimizing the broadcasting by MPR. In OLSR routing protocols sending and receiving packet 98 % and less than 2% packet is wasted so that this protocol is best for large network. In case of MPR selected nodes gives TC messages generated 92 %, 87 % TC message received and 88% TC messages relayed so that designing and controlling messages in OLSR routing protocol almost 89% so that OLSR routing protocol gives better performances in case of large network and small network due to proactive routing nature protocols as compare to other proactive routing protocol in MANET. The future work is checking the another routing protocol on different nodes placement strategies, energy consumption, fixed bit rate, and variable bit rate on the basis on load applying and also modification of existing routing protocol. REFERENCES [1]. A.B. Malany, V.R.S. Dhulipala, RM.Chandrasekaran, “Throughput and Delay Comparison of MANET Routing Protocols” Intl. Journal OpenProblems Comp. Math., Vol. 2, No. 3, Sep 2009. [2]. Alexander Klein,” Performance Comparison and Evaluation of AODV, OLSR, and SBR in Mobile Ad-Hoc Networks” PP 571-575, 2008 IEEE. [3]. C. Perkins, E.M. Royer, S.R. Das and M.K. Marina, ―Performance Comparison of Two On- demand Routing Protocols for Ad Hoc Networks,ǁ IEEE Personal Communications, pp. 16- 28, Feb. 2001. [4]. C.Siva Rammurty and B.S. Manoj, ”Ad hoc wireless networks architectures and protocols” ISBN 978-81-317-0688-6, 2011. [5]. Dilpreet Kaur and Naresh Kumar,” Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks”, I. J. Computer Network and Information Security, 2013, 3, 39-46 Published Online March 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2013.03.05. [6]. Elizabeth Royer, C.K. Toh, “A Review of Current Routing Protocols for Ad hoc mobile Wireless Networks”, RFC 2409, IEEE Personal Communications 1999 [7]. G. Karthiga, J.Benitha Christinal,Jeban Chandir Moses,” Performance Analysis of Various Ad- Hoc Routing Protocols in Multicast Environment”, ISSN : 2229-4333(Print) ISSN : 0976- 8491(Online) IJCST Vo l. 2, IS Su e 1, march 2011,pp 161-165. [8]. Haas and M. Pearlman. The performance of query control scheme for the zone routing protocol. ACM/IEEE Transactions on Networking, 9(4) pages 427-438, August 2001 [9]. Harmanpreet kaur and Jaswinder singh,” Performance comparison of OLSR, GRP and TORA using OPNET”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 10, October 2012 ISSN: 2277 128X. [10]. Hong, K. Xu, M. Gerla, “Scalable Routing Protocols for Mobile Ad-Hoc Networks” IEEE Network Magazine, Volume-16, Issue-4, pages: 11–21. [11]. Jogendra Kumar,” CBR Based Performance Analysis of OLSR Routing Protocol in MANETs”, International Journal of Computer Science and Business Informatics IJCSBI.ORG, ISSN: 1694- 2108 | Vol. 3, No. 1. JULY 2013, pp:1-12
  • 10. 54 www.arpublication.org [12]. Krishna Kumar Chandel, Sanjeev Sharma and Santosh Sahu,” Performance Analysis of Routing Protocols Based on IPV4 and IPV6 for MANET”, International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 2, Issue 3, June 2012. [13]. Kuldeep Vats, Monika Sachdeva, Krishan Saluja and Amit Rathee,” Simulation and Performance Analysis of OLSR Routing Protocol Using OPNET”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 2, February 2012 ISSN: 2277 128X. [14]. M Joa-Ng and I.-T. Lu, A Peer-to-Peer zone based two-level link state routing for mobile Ad Hoc Networks, IEEE Journal on Selected Areas in Communications, Special Issue on Ad-Hoc Networks, August 1999, pp.1415-1425. [15]. M.K. J. Kumar, R.S. Rajesh, “Performance Analysis of MANET Routing Protocols in different Mobility Models” IJCSNS International Journal of Computer Science and Network 22 Security, VOL.9 No.2, February 2009. [16]. M.L Sharma, Noor Fatima, Rizvi Nipun Sharma, Anu Malhan and Swati Sharma, ”Performance Evaluation of MANET Routing Protocols under CBR and FTP traffic classes “, Int. J. Comp. Tech. Appl. Vol 2 (3), 393-400. [17]. M.Sreerama Murty and M.Venkat Das,” Performance Evalution of MANET Routing protocols using Reference Point Group Mobility and Random WayPoint Models”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011,pp 33-43. [18]. Pearlman MR, Haas ZJ. ―Determining the optimal configuration for the zone routing protocol.ǁ IEEE Journal on Selected Areas in Communications 1999; 17: 1395–1414. [19]. S. A. Ade1 & P.A.Tijare2 ,” Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548. [20]. Syed Basha Shaik, S. P. Setty,” Performance Comparison of AODV, DSR and ANODR for Grid Placement Model” International Journal of Computer Applications (0975 8887), Volume 11, No.12, 6-9, 2010. [21]. Thakore Mitesh C1,” Performance Analysis of AODV and OLSR Routing Protocol with Different Topologies”, International Journal of Science and Research (IJSR), India Online ISSN: 2319- 7064, Volume 2 Issue 1, January 2013 www.ijsr.net [22]. QualNet documentation,”QualNet 5.0 Model Library: Advanced Wireless”;http://www.scalablenetworks.com/products/Qualnet/download.php#docs. [23]. The Qualnet 5.0.2 simulator tools online available www.scalable-networks.com [24]. Hong Jiang, 1994. “Performance Comparison of Three Routing Protocols for Ad Hoc Networks”, Communications of the ACM, Vol. 37. [25]. T. Clausen, P. Jacquet,”RFC 3626 Optimized Link State Routing Protocol (OLSR)" October 2003. ACKNOWLEDGEMENTS Jogendra Kumar thanks Dr. A.K. Swami Professor and Principal of G.B. Pant Engineering College Pauri Garhwal Uttarakhand, INDIA, Dr. Sandipvijay Head of the Department (HOD) and Professor of Electronic Communication & Engineering in DIT (Dehradun Institute of Technology) Uttarakhand by recognized UTU (Uttarakhand Technology University) Dehradun, Uttarakhand ,INDIA and also Thanks Mr. S.K Verma HOD CSED G.B. Pant Engineering College Pauri Garhwal Uttarakhand, INDIA give me opportunity and provided simulation tools Qualnet 5.0.2 to complete this article.
  • 11. International journal of Computer Networking and Communication (IJCNAC)Vol. 1, No. 1 (August 2013) 55 www.arpublication.org AUTHER PROFILE Jogendra Kumar received his B.E degree in Computer Science & Engineering from H.N.B Garhwal University Srinagar Uttarakhand (India) in G.B. Pant Engineering College Pauri Garhwal, Uttarakhand, (India) 2008 and M.TECH (CSE) degree from UTU University Dehradun Uttarakhand (India) in G.B. Pant Engineering College Pauri Garhwal, Uttarakhand, (India) 2012 with Registration ID NO CSE1053545 and I am member of International Association of Engineers (IAENG) (USA) ,member ID:121623, Internet Society (USA), member ID: 77364 , International Association Of Computer Science And Information Technology (IACSIT), member ID : 80344753 his research interest includes mobile Ad Hoc Networks and Wireless Sensor Networks systems and also published various research papers in leading international journal, Workshops, Seminar & conferences.