SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 760
PERFORMANCE EVALUATION OF VARIOUS TYPES OF NODES IN
MANET WITH DSR ROUTING PROTOCOLS
Puneet Mittal1
, Paramjeet Singh2
, Shaveta Rani3
1
Dept. of Computer Engg, Govt. Polytechnic College, Bathinda, Punjab, India
2, 3
Dept. of Computer Science and Engg, GZS PTU Campus, Bathinda, Punjab, India
engg.puneet@yahoo.co.in, param2009@yahoo.com, garg_shavy@yahoo.com
Abstract
Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices
cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops,
wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like
static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the
performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data
Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load.
Keywords: MANET, Peak Value, Protocol, Trajectory.
-----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
In mobile ad-hoc network (MANET) is a collection of mobile
nodes and any node can disappear or join anytime at any
location in the network. Manet has multi-hop commutation
capability. There is no centralized administration and no
dedicated routers or other network infrastructures to support
the nodes. Any node can be a sender or receiver as well as a
router and they can forward the data packets to another node.
In these types of networks each node works as an independent
router. MANET is a fast growing area of research [1].
A Wireless Network transmits data from node to node by
using a central base station (Access Point). There are two
types of wireless network: (1) Standalone Architecture in
which all devices are directly communicating with each other
in peer to peer communication node. (2) Centrally Co-
ordinated Architecture in which all devices are connected with
the help of access point. MANET is one of the types of Ad
hoc network in which of wireless nodes (connected by
wireless links) that performing a dynamically network without
using any established infrastructure or centralized
administration. It can be setup anywhere and anytime with
free to move randomly and act as router.
In MANET, protocols are classification into three categories:
(1) Proactive protocols or table driven provide fast response
to topology changes by continuously monitoring topology
changes and disseminating the related information as needed
over the network [2] like Optimized Link State Routing
(OLSR), Destination-Sequenced Distance-Vector (DSDV)
Routing Algorithm, Wireless Routing Protocol (WRP), Global
State Routing (GSR), Fisheye State Routing (FSR),
Hierarchical State Routing (HSR), Zone-based Hierarchical
Link State Routing Protocol (ZHLS). (2) Reactive routing or
on demand protocols such as Ad hoc in demand distance
vector (AODV), find the route only when there is data to be
transmitted as a result, generate low control traffic and routing
overhead. Dynamic Source routing protocol (DSR), each data
packet contains complete routing information to reach its
dissemination and each node uses caching technology to
maintain route information. (3) Hybrid protocol could be
derived from the two previous ones, containing the advantages
of both the protocols.
Among all on-demand routing protocols DSR is straight
forward, simple, and recently a lot of modifications and
improvements are going on in this protocol. Some are
introducing security and power issues and many other
concepts. Therefore we are closely examining the protocol and
its performance under various working conditions using
simulation techniques. This paper is organized as follows. In
sec. 2, we describe the Dynamic routing protocol (DSR) in
MANET. Sec 3, gives various parameters traffic loads in
MANET. In sec 4, simulation environment in OPNET
SIMULATOR 14.5 is given. Sec 5 shows the results and
discussion about the performance of various nodes in MANET
by using DSR protocol. Conclusion is given in Sec 6.
2. DYNAMIC ROUTING PROTOCOLS IN MANET
DSR is also a reactive routing protocol. It uses the concept of
source routing [3]. In source routing the sender knows all hop-
by-hop routes to the destination. All the routes are stored in
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 761
the route cache. When a node attempts to send a data packet to
a destination it does not know the route. In DSR each node
maintains a route cache with route entries which are
continuously updated. The advantage of DRS is that no
periodic routing packets are required. It is used to updates its
route caches by finding new routes [4]. DSR has also the
capability to handle unidirectional links. The sender of the
packets selects and controls the route used for its own packets,
which also supports features such as load balancing. All routes
used are guaranteed to be free of loops as the sender can avoid
duplicate hops in the selected routes. The following sections
introduce state machines that implement a simple DSR routing
protocol without caching. There are basically 4 separate state
machines to implement that each handles one of the following
events [5]:
1. SENDING DATA: When a node wants to send data
and data message is triggered as a send request then the
next hop has be determined. A route request has to be
broadcast to discover a route to the destination node.
After receiving the route reply from the destination
node the actual data message can be transmitted via the
newly discovered.
Fig 1: Flow Chart Sending Activity Diagram
2. INCOMING ROUTE REQUEST MESSAGE: When
a route request message is received by a node, several
tasks have to be done depending on the content of the
received message. Firstly, it is checked whether the
message was already processed earlier by this node. If
yes, the request is simply discarded and no action is
taken. If the route request is addressed to the receiving
node, a route reply message has to be created and
replied to the request’s sender. In all other cases the
route request’s node list is extended by the own node
ID and broadcasted to all neighboring nodes.
Fig 2: Flow Chart of Route Request
3. INCOMING ROUTE REPLY MESSAGE: In case a
route reply message is received there are two cases: The
receiving node is the destination of the message or it is
an intermediate node on the route between sender and
destination. If it is the destination node the data
transmission that caused the route discovery can be
accomplished. In case the route reply is received by an
intermediate node, it is forwarded to the next node in
the reply’s node list.
Fig 3: Flow Chart of Route Reply
4. INCOMING DATA MESSAGE: If the data message
is addressed to the receiving node (it is the last hop of
the route) the payload can be handed to the upper layer
to be processed by any application. The routing
mechanism has finished. If not, the next hop is
determined from the data message’s node list and the
packet is forwarded to this node.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 762
Fig 4: Flow Chart of Data Message
DSR contains 2 phases:
2.1 Route Discovery (Find A Path)
If sender node has in his route cache a route to the destination
node, this route is immediately used. If not, the route
discovery protocol is started:
Step 1: sender node sends a route request packet by
flooding the network. Each route request packet contains:
route record, initiator address, request ID
Step 2: if the route discovery is successful the initiating host
receives a route reply packet.
Step 3: when any host receives a route request packet, it
processes the request accounting to the following steps.
a) If <initiator address, request id> is found I
this host then discards the route request
packet.
b) If this host’s address is already listed in the
route record discard the route request
packet.
c) If the target of the request matches this
host’s address return a copy of this route
in a route reply packet to the initiator.
d) Otherwise, append this host’s address to the
route record and re-broadcast the request.
After getting the route reply the sender send the data to the
destination.
2.2 Route Maintenance
In DSR every node is responsible for confirming that the next
hop in the source route receives the packet. Also each packet
is only forwarded once by a node (hop-by-hop routing). If a
packet can’t be received by a node, it is retransmitted up to
some maximum number of times until a confirmation is
received from the next hop. Only if retransmission results in a
failure, a Route Error message is sent to the initiator that can
remove that source route from its route cache. So the initiator
can check his route cache for another route to the target. If
there is no route in the cache, a route request packet is
broadcasted.
Fig 5: Example of DSR protocol
Step 1: if node C does not receive an acknowledgement form
node D after some number of requests, it returns a Route Error
to the initiator A.
Step 2: As soon as node receives the Route Error message, it
deletes the broken-link-route from its cache. If A has another
route to E, it sends the packet immediately using this new
route.
Step 3: Otherwise the initiator A is starting the Route
Discovery process again.
3. VARIOUS PARAMETERS IN TRAFFIC LOADS
Table 1 shows the various simulation parameters.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 763
All these parameters help us to evaluate the best routing
protocol between them. All the parameters that have taken
play a very vital role to judge or evaluate the performance of
the wireless network. In this paper we can use Data Dropped
(Retry Threshold Exceeded), Load, Media access delay and
Network Load Parameters to evaluate the performance of
various nodes in Manet.
4. SIMULATION ENVIROMENT
Several researchers have done the qualitative and quantative
analysis of ad hoc routing protocol by means of different
performance metrics. They have used different simulators for
this purpose which is one of several tools provided from the
OPNET Technologies suite. For undertake the experimental
evaluation, the most recently available version, namely
OPNET MODELER 14.5 has been adopted in our study
OPNET is one of the most extensively used commercial
simulators based on Microsoft Windows Platform, which
incorporates most of the MANET routing parameters
compared to other commercial simulators available [6]. The
network entities used during the design of the network model
are wireless server, application configuration, profile
configuration, mobility configuration and workstations
(nodes).
Table 2: Simulation parameters
Fig 6: Environment Scenario of 10 Fixed Nodes
In this Scenario, mobile nodes are fixed and work as static
nodes..
Fig 7: Environment Scenario of 10 Dynamic Mobile Nodes
Dynamic Mobile nodes are free to move arbitrarily which is
typically multi-hop. It may change randomly and rapidly at
unpredictable times. It consist of both bidirectional and
unidirectional links.
SIMULATION
PARAMETER
VALUE
Simulator OPNET MODELER 14.5
Area 200m
Network Size 10 nodes
Protocol DSR
Mobility Model Random Way Point
Traffic Type FTP
Simulation Time 10 (Min)
Address Mode IPv4
Inter Repetition time Exponential (4)
Route Expiry Time 300 Sec
Buffer Expiry time 30 Sec
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 764
Fig 8: Environment Scenario of 10 Mobile Nodes with Vector
Trajectory
A trajectory is defined as the path of a point moving with time.
The trajectory obtained through visual tracking is important to
many further analyses as they provide compact records of
motion and characterize behaviour of each mobile. A key
function of the vector system is the identification of mobile
type. When the type is identified then this vector measure is
compared with entries in a database and the best fit is
determined to be the specific mobile type.
5. RESULTS AND DISCUSSION
5.1 File Transfer Protocols (FTP) Load
5.1.1 Data Dropped (Retry Threshold Exceeded)
(Bits/Sec)
Fig 9: Comparison of DSR with static nodes, dynamic nodes
and trajectory nodes for Data Dropped (Retry Threshold
Exceeded)(Bits/Sec) in FTP Load
In figure 9, X-axis denotes time which is in minutes and Y-
axis denotes data rate which is in bits/sec. It shows that the
average peak value of Data Dropped (Retry Threshold
Exceeded) is almost 606.896552 bits/sec for Static Nodes/
Fixed Nodes, 404.597701 bits/sec for Dynamic nodes and
414.528736 bits/sec for Dynamic nodes with Trajectory. After
10 minutes, it gradually drops as time progress and reaches to
almost 176 bits/sec for Static Nodes / Fixed Nodes, 117.33333
bits/sec for Dynamic Nodes and 123.09333 bits/sec for
Dynamic nodes with Trajectory.
5.2 Load (Bit/sec)
Fig 10: Comparison of DSR with static nodes, dynamic nodes
and trajectory nodes for Load (Bits/Sec) in FTP Load
In figure 10, X-axis denotes time which is in minutes and Y-
axis denotes data rate which is in bits/sec. It shows that the
average peak value of Load is almost 606.896552 bits/sec for
Static Nodes/ Fixed Nodes, 404.597701 bits/sec for Dynamic
nodes and 414.528736 bits/sec for Dynamic nodes with
Trajectory. After 10 minutes, it gradually drops as time
progress and reaches to almost 176 bits/sec for Static Nodes /
Fixed Nodes, 117.33333 bits/sec for Dynamic Nodes and
123.09333 bits/sec for Dynamic nodes with Trajectory.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 765
5.3 Media Access Delay (Sec)
Fig 11: Comparison of DSR with static nodes, dynamic
nodes and trajectory nodes for Media Access Delay (Sec) in
FTP Load
In figure 11, X-axis denotes time in minutes and Y-axis is
denotes the time in seconds. It shows that the average peak
value of Media access delay is almost 0.006626 seconds for
Static Nodes/ Fixed Nodes, 0.003571 seconds for Dynamic
nodes and 0.001047 seconds for Dynamic nodes with
Trajectory. After 10 minutes, it gradually drops as time
progress and reaches to almost 0.003949 seconds for Static
Nodes / Fixed Nodes, 0.002187 seconds for Dynamic Nodes
and 0.000608 seconds for Dynamic nodes with Trajectory.
5.4 Network Load (bits/sec)
Fig 12: Comparison of DSR with static nodes, dynamic nodes
and trajectory nodes for Network Load (Bits/Sec) in FTP Load
In figure 12, X-axis denotes time which is in minutes and Y-
axis denotes data rate which is in bits/sec. It shows that the
average peak value of Network Load is almost 55.17241379
bits/sec for Static Nodes/ Fixed Nodes, 36.7816092 bits/sec
for Dynamic nodes and 46.71264368 bits/sec for Dynamic
nodes with Trajectory. After 10 minutes, it gradually drops as
time progress and reaches to almost 16 bits/sec for Static
Nodes / Fixed Nodes, 10.66667 bits/sec for Dynamic Nodes
and 5.866667 bits/sec for Dynamic nodes with Trajectory.
Table 2 shows numeric values of various parameters taken
into consideration for FTP load in Static nodes, Dynamic
Nodes and Dynamic nodes with Trajectory in MANET by
using Dynamic Routing Protocol. It gives the performance
comparison of 3 Scenario: Static nodes, Dynamic Nodes and
Dynamic nodes with Trajectory in MANET in terms of Data
Dropped (Retry Threshold Exceeded), Load, Media access
delay and Network Load for FTP load.
Table 3: Values of various parameters corresponding to 3 Scenario: Static nodes, Dynamic Nodes and Dynamic nodes with Trajectory
in MANET
Parameters
DSR PROTOCOL
Static Nodes Dynamic Nodes
Dynamic Nodes with
Trajectory
Peak value Drop value Peak value Drop value Peak value Drop value
Data dropped (retry threshold
exceeded) (bits/sec)
606.89 176 404.59 117.33 414.52 123.09
Load (bits/sec) 606.89 176 404.59 117.33 414.52 123.09
Media Access Delay (Sec) 0.0066 0.0039 0.0035 0.0021 0.0010 0.0006
Network Load (bits/sec) 55.17 16 36.78 10.66 46.71 5.86
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 766
As shown in Table 2, Static Nodes performs better than
Dynamic Nodes and Dynamic Nodes with trajectory for Data
dropped (Retry Threshold exceeded), Load, media Access
Delay and Network Load. In overall Static Nodes performs
better because it is easy to maintain and update the network
than Dynamic nodes and dynamic nodes with Trajectory. In
Static nodes network everything is done with the permission
by network administration authority but in Dynamic every
node is free to move or disappear/join. In dynamic network it
is difficult to find any node location and also to maintain and
update the network.
CONCLUSIONS
In this paper, we performed the comparison between three
Scenarios: Static nodes, Dynamic Nodes and Dynamic nodes
with Trajectory in MANET with traffic loads FTP in terms of
Data dropped (Retry Threshold exceeded), Load, media
Access Delay and Network Load. The results are taken in
tabular form as well as graphical form by using OPNET
Simulator 14.5. The results show that which Nodes performs
better than another corresponding to FTP traffic load with
DSR Protocol and some important parameters.
REFERENCES
[1]. Prasanna Padmanabhan, Le Gruenwald, Anita vallur,
Mohammed Atiquzzaman, “A Survey of data replication
techniques for mobile ad hoc network databases” , The
University of Oklahoma, School of Computer Science,
Norman, OK 73019, USA, The VLDB Journal Springer
(2008) 17:1143-1164.
[2]. Hui Xu, Student Member, IEEE, Xianren Wu, Member,
IEEE, Hamid R. Sadjapour, Senior Member, IEEE, and J.J.
Garcai-Luna-Aceve, Fellow, IEEE, ACM, “ A Unified
Analysis of Routing Protocls in MANETs”. (2010)
[3]. Gurleen Kaur Walia and Charanjit Singh, “Node Density
based performance Analysis of two Reactive Routing
Protocols in Mobile Adhoc Networks”, UCOE Department,
Punjabi University, Patiala.(2011).
[4]. Parulpreet Singh, Ekta Barkhodia and Gurleen Kaur Wali,
“Evaluation of various Traffic loads in MANET with DSR
routing protocol through use of OPNET Simulator”,
Department of Electronics & Communication, LPU,
Phagwara Punjab, India. (May 2012).
[5]. Ad hoc and sensor networks, University of Paderborn,
Computer Networks Group, 19 June 2007.
[6]. Zhi Ang Eu, NUS Graduate School for integrative
sciences and Engineering, National University of Singapore
and Hwee-Pink Tan, Winston K. G. Seah Networking
Protocols Department, Institute for infocomm Research,
A*STAR, “Routing and Relay Node Placement in Wireless
Sensor Networks Powered by Ambient Energy Harvesting”.
BIOGRAPHIES:
Puneet Mittal received B.Tech (CSE) form
Punjab Technical University in 2007 and
currently pursuing M.Tech (CSE) form Giani
Zail Singh Punjab Technical University
Campus, Bathinda. She is currently working
as Lecturer Computer Engg Department, Govt. Polytechnic
College, Bathinda. Her research area is Adhoc Networks
routing protocols MANET.
Paramjeet Singh reveived PhD from BITS,
Pilani in 2009, M.S (Software System) form
BITS, Pilani in 2002 and B.Tech (CSE) from
Sant Longowal Institute of Engineering &
Technology, Longowal in 1998. He is
currently working as Assistant Professor C.S.E Department,
Giani Zail Singh Punjab Technical University Campus,
Bathinda. His research area is Networking, Software Systems
and Computer Graphics. He has to her contribution
International Journals : 11, National Journals : 02,
International Conerences : 12 and National Conferences
: 30.
Shaveta Rani reveived PhD from BITS, Pilani
in 2009, M.S (Software System) form BITS,
Pilani in 2002 and B.Tech (CSE) from Sant
Longowal Institute of Engineering &
Technology, Longowal in 1998. She is
currently working as Assistant Professor C.S.E
Department, Giani Zail Singh Punjab Technical
University Campus, Bathinda. Her research area is
Internetworking, Image Processing and Software Systems She
has to her contribution International Journals : 11, National
Journals : 02, International Conerences : 12 and National
Conferences : 29.

Contenu connexe

Tendances

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
KhushbooGupta145
 

Tendances (17)

Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Performance Comparison and Analysis of Preemptive-DSR and TORA
Performance Comparison and Analysis of Preemptive-DSR and TORA Performance Comparison and Analysis of Preemptive-DSR and TORA
Performance Comparison and Analysis of Preemptive-DSR and TORA
 
En33838844
En33838844En33838844
En33838844
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
A41040105
A41040105A41040105
A41040105
 
As33259263
As33259263As33259263
As33259263
 

En vedette

Gis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionsGis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regions
eSAT Publishing House
 

En vedette (20)

Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advanced
 
Smart analysis of most build multistoried rcc building of gulbarga region
Smart analysis of most build multistoried rcc building of gulbarga regionSmart analysis of most build multistoried rcc building of gulbarga region
Smart analysis of most build multistoried rcc building of gulbarga region
 
Applications of dampers for vibration control of
Applications of dampers for vibration control ofApplications of dampers for vibration control of
Applications of dampers for vibration control of
 
Limnological studies related to physico chemical
Limnological studies related to physico chemicalLimnological studies related to physico chemical
Limnological studies related to physico chemical
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Assessment of industrial byproducts as permeable reactive barriers for landfi...
Assessment of industrial byproducts as permeable reactive barriers for landfi...Assessment of industrial byproducts as permeable reactive barriers for landfi...
Assessment of industrial byproducts as permeable reactive barriers for landfi...
 
Properties of fa l g hollow masonry blocks
Properties of fa l g hollow masonry blocksProperties of fa l g hollow masonry blocks
Properties of fa l g hollow masonry blocks
 
Gis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionsGis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regions
 
A novel predicate for active region merging in automatic image segmentation
A novel predicate for active region merging in automatic image segmentationA novel predicate for active region merging in automatic image segmentation
A novel predicate for active region merging in automatic image segmentation
 
Portable wireless traffic light system (pwtls)
Portable wireless traffic light system (pwtls)Portable wireless traffic light system (pwtls)
Portable wireless traffic light system (pwtls)
 
Effect of naoh mercerisation on the cross linking of
Effect of naoh mercerisation on the cross linking ofEffect of naoh mercerisation on the cross linking of
Effect of naoh mercerisation on the cross linking of
 
Stabilizationsolidification of iron ore mine tailings
Stabilizationsolidification of iron ore mine tailingsStabilizationsolidification of iron ore mine tailings
Stabilizationsolidification of iron ore mine tailings
 
Smart phone as a cloud server machine computing
Smart phone as a cloud server machine computingSmart phone as a cloud server machine computing
Smart phone as a cloud server machine computing
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
Igbt based on vector control of induction motor drive
Igbt based on vector control of induction motor driveIgbt based on vector control of induction motor drive
Igbt based on vector control of induction motor drive
 
Survey on software remodularization techniques
Survey on software remodularization techniquesSurvey on software remodularization techniques
Survey on software remodularization techniques
 
Cyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal areaCyclone disaster on housing and coastal area
Cyclone disaster on housing and coastal area
 
Noise tolerant color image segmentation using support vector machine
Noise tolerant color image segmentation using support vector machineNoise tolerant color image segmentation using support vector machine
Noise tolerant color image segmentation using support vector machine
 
Power spectrum sequence analysis of rheumatic
Power spectrum sequence analysis of rheumaticPower spectrum sequence analysis of rheumatic
Power spectrum sequence analysis of rheumatic
 
Effect of tip clearance on performance of a
Effect of tip clearance on performance of aEffect of tip clearance on performance of a
Effect of tip clearance on performance of a
 

Similaire à Performance evaluation of various types of nodes in

Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
IJRAT
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 

Similaire à Performance evaluation of various types of nodes in (20)

Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
 
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A ReviewIRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
Prevention of denial of service attack on dynamic source routingvanet protocol
Prevention of denial of service attack on dynamic source routingvanet protocolPrevention of denial of service attack on dynamic source routingvanet protocol
Prevention of denial of service attack on dynamic source routingvanet protocol
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
J0935461
J0935461J0935461
J0935461
 
E41022938
E41022938E41022938
E41022938
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
 
Be31390392
Be31390392Be31390392
Be31390392
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 
G343741
G343741G343741
G343741
 
G343741
G343741G343741
G343741
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 

Dernier (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

Performance evaluation of various types of nodes in

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 760 PERFORMANCE EVALUATION OF VARIOUS TYPES OF NODES IN MANET WITH DSR ROUTING PROTOCOLS Puneet Mittal1 , Paramjeet Singh2 , Shaveta Rani3 1 Dept. of Computer Engg, Govt. Polytechnic College, Bathinda, Punjab, India 2, 3 Dept. of Computer Science and Engg, GZS PTU Campus, Bathinda, Punjab, India engg.puneet@yahoo.co.in, param2009@yahoo.com, garg_shavy@yahoo.com Abstract Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops, wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load. Keywords: MANET, Peak Value, Protocol, Trajectory. -----------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION In mobile ad-hoc network (MANET) is a collection of mobile nodes and any node can disappear or join anytime at any location in the network. Manet has multi-hop commutation capability. There is no centralized administration and no dedicated routers or other network infrastructures to support the nodes. Any node can be a sender or receiver as well as a router and they can forward the data packets to another node. In these types of networks each node works as an independent router. MANET is a fast growing area of research [1]. A Wireless Network transmits data from node to node by using a central base station (Access Point). There are two types of wireless network: (1) Standalone Architecture in which all devices are directly communicating with each other in peer to peer communication node. (2) Centrally Co- ordinated Architecture in which all devices are connected with the help of access point. MANET is one of the types of Ad hoc network in which of wireless nodes (connected by wireless links) that performing a dynamically network without using any established infrastructure or centralized administration. It can be setup anywhere and anytime with free to move randomly and act as router. In MANET, protocols are classification into three categories: (1) Proactive protocols or table driven provide fast response to topology changes by continuously monitoring topology changes and disseminating the related information as needed over the network [2] like Optimized Link State Routing (OLSR), Destination-Sequenced Distance-Vector (DSDV) Routing Algorithm, Wireless Routing Protocol (WRP), Global State Routing (GSR), Fisheye State Routing (FSR), Hierarchical State Routing (HSR), Zone-based Hierarchical Link State Routing Protocol (ZHLS). (2) Reactive routing or on demand protocols such as Ad hoc in demand distance vector (AODV), find the route only when there is data to be transmitted as a result, generate low control traffic and routing overhead. Dynamic Source routing protocol (DSR), each data packet contains complete routing information to reach its dissemination and each node uses caching technology to maintain route information. (3) Hybrid protocol could be derived from the two previous ones, containing the advantages of both the protocols. Among all on-demand routing protocols DSR is straight forward, simple, and recently a lot of modifications and improvements are going on in this protocol. Some are introducing security and power issues and many other concepts. Therefore we are closely examining the protocol and its performance under various working conditions using simulation techniques. This paper is organized as follows. In sec. 2, we describe the Dynamic routing protocol (DSR) in MANET. Sec 3, gives various parameters traffic loads in MANET. In sec 4, simulation environment in OPNET SIMULATOR 14.5 is given. Sec 5 shows the results and discussion about the performance of various nodes in MANET by using DSR protocol. Conclusion is given in Sec 6. 2. DYNAMIC ROUTING PROTOCOLS IN MANET DSR is also a reactive routing protocol. It uses the concept of source routing [3]. In source routing the sender knows all hop- by-hop routes to the destination. All the routes are stored in
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 761 the route cache. When a node attempts to send a data packet to a destination it does not know the route. In DSR each node maintains a route cache with route entries which are continuously updated. The advantage of DRS is that no periodic routing packets are required. It is used to updates its route caches by finding new routes [4]. DSR has also the capability to handle unidirectional links. The sender of the packets selects and controls the route used for its own packets, which also supports features such as load balancing. All routes used are guaranteed to be free of loops as the sender can avoid duplicate hops in the selected routes. The following sections introduce state machines that implement a simple DSR routing protocol without caching. There are basically 4 separate state machines to implement that each handles one of the following events [5]: 1. SENDING DATA: When a node wants to send data and data message is triggered as a send request then the next hop has be determined. A route request has to be broadcast to discover a route to the destination node. After receiving the route reply from the destination node the actual data message can be transmitted via the newly discovered. Fig 1: Flow Chart Sending Activity Diagram 2. INCOMING ROUTE REQUEST MESSAGE: When a route request message is received by a node, several tasks have to be done depending on the content of the received message. Firstly, it is checked whether the message was already processed earlier by this node. If yes, the request is simply discarded and no action is taken. If the route request is addressed to the receiving node, a route reply message has to be created and replied to the request’s sender. In all other cases the route request’s node list is extended by the own node ID and broadcasted to all neighboring nodes. Fig 2: Flow Chart of Route Request 3. INCOMING ROUTE REPLY MESSAGE: In case a route reply message is received there are two cases: The receiving node is the destination of the message or it is an intermediate node on the route between sender and destination. If it is the destination node the data transmission that caused the route discovery can be accomplished. In case the route reply is received by an intermediate node, it is forwarded to the next node in the reply’s node list. Fig 3: Flow Chart of Route Reply 4. INCOMING DATA MESSAGE: If the data message is addressed to the receiving node (it is the last hop of the route) the payload can be handed to the upper layer to be processed by any application. The routing mechanism has finished. If not, the next hop is determined from the data message’s node list and the packet is forwarded to this node.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 762 Fig 4: Flow Chart of Data Message DSR contains 2 phases: 2.1 Route Discovery (Find A Path) If sender node has in his route cache a route to the destination node, this route is immediately used. If not, the route discovery protocol is started: Step 1: sender node sends a route request packet by flooding the network. Each route request packet contains: route record, initiator address, request ID Step 2: if the route discovery is successful the initiating host receives a route reply packet. Step 3: when any host receives a route request packet, it processes the request accounting to the following steps. a) If <initiator address, request id> is found I this host then discards the route request packet. b) If this host’s address is already listed in the route record discard the route request packet. c) If the target of the request matches this host’s address return a copy of this route in a route reply packet to the initiator. d) Otherwise, append this host’s address to the route record and re-broadcast the request. After getting the route reply the sender send the data to the destination. 2.2 Route Maintenance In DSR every node is responsible for confirming that the next hop in the source route receives the packet. Also each packet is only forwarded once by a node (hop-by-hop routing). If a packet can’t be received by a node, it is retransmitted up to some maximum number of times until a confirmation is received from the next hop. Only if retransmission results in a failure, a Route Error message is sent to the initiator that can remove that source route from its route cache. So the initiator can check his route cache for another route to the target. If there is no route in the cache, a route request packet is broadcasted. Fig 5: Example of DSR protocol Step 1: if node C does not receive an acknowledgement form node D after some number of requests, it returns a Route Error to the initiator A. Step 2: As soon as node receives the Route Error message, it deletes the broken-link-route from its cache. If A has another route to E, it sends the packet immediately using this new route. Step 3: Otherwise the initiator A is starting the Route Discovery process again. 3. VARIOUS PARAMETERS IN TRAFFIC LOADS Table 1 shows the various simulation parameters.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 763 All these parameters help us to evaluate the best routing protocol between them. All the parameters that have taken play a very vital role to judge or evaluate the performance of the wireless network. In this paper we can use Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load Parameters to evaluate the performance of various nodes in Manet. 4. SIMULATION ENVIROMENT Several researchers have done the qualitative and quantative analysis of ad hoc routing protocol by means of different performance metrics. They have used different simulators for this purpose which is one of several tools provided from the OPNET Technologies suite. For undertake the experimental evaluation, the most recently available version, namely OPNET MODELER 14.5 has been adopted in our study OPNET is one of the most extensively used commercial simulators based on Microsoft Windows Platform, which incorporates most of the MANET routing parameters compared to other commercial simulators available [6]. The network entities used during the design of the network model are wireless server, application configuration, profile configuration, mobility configuration and workstations (nodes). Table 2: Simulation parameters Fig 6: Environment Scenario of 10 Fixed Nodes In this Scenario, mobile nodes are fixed and work as static nodes.. Fig 7: Environment Scenario of 10 Dynamic Mobile Nodes Dynamic Mobile nodes are free to move arbitrarily which is typically multi-hop. It may change randomly and rapidly at unpredictable times. It consist of both bidirectional and unidirectional links. SIMULATION PARAMETER VALUE Simulator OPNET MODELER 14.5 Area 200m Network Size 10 nodes Protocol DSR Mobility Model Random Way Point Traffic Type FTP Simulation Time 10 (Min) Address Mode IPv4 Inter Repetition time Exponential (4) Route Expiry Time 300 Sec Buffer Expiry time 30 Sec
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 764 Fig 8: Environment Scenario of 10 Mobile Nodes with Vector Trajectory A trajectory is defined as the path of a point moving with time. The trajectory obtained through visual tracking is important to many further analyses as they provide compact records of motion and characterize behaviour of each mobile. A key function of the vector system is the identification of mobile type. When the type is identified then this vector measure is compared with entries in a database and the best fit is determined to be the specific mobile type. 5. RESULTS AND DISCUSSION 5.1 File Transfer Protocols (FTP) Load 5.1.1 Data Dropped (Retry Threshold Exceeded) (Bits/Sec) Fig 9: Comparison of DSR with static nodes, dynamic nodes and trajectory nodes for Data Dropped (Retry Threshold Exceeded)(Bits/Sec) in FTP Load In figure 9, X-axis denotes time which is in minutes and Y- axis denotes data rate which is in bits/sec. It shows that the average peak value of Data Dropped (Retry Threshold Exceeded) is almost 606.896552 bits/sec for Static Nodes/ Fixed Nodes, 404.597701 bits/sec for Dynamic nodes and 414.528736 bits/sec for Dynamic nodes with Trajectory. After 10 minutes, it gradually drops as time progress and reaches to almost 176 bits/sec for Static Nodes / Fixed Nodes, 117.33333 bits/sec for Dynamic Nodes and 123.09333 bits/sec for Dynamic nodes with Trajectory. 5.2 Load (Bit/sec) Fig 10: Comparison of DSR with static nodes, dynamic nodes and trajectory nodes for Load (Bits/Sec) in FTP Load In figure 10, X-axis denotes time which is in minutes and Y- axis denotes data rate which is in bits/sec. It shows that the average peak value of Load is almost 606.896552 bits/sec for Static Nodes/ Fixed Nodes, 404.597701 bits/sec for Dynamic nodes and 414.528736 bits/sec for Dynamic nodes with Trajectory. After 10 minutes, it gradually drops as time progress and reaches to almost 176 bits/sec for Static Nodes / Fixed Nodes, 117.33333 bits/sec for Dynamic Nodes and 123.09333 bits/sec for Dynamic nodes with Trajectory.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 765 5.3 Media Access Delay (Sec) Fig 11: Comparison of DSR with static nodes, dynamic nodes and trajectory nodes for Media Access Delay (Sec) in FTP Load In figure 11, X-axis denotes time in minutes and Y-axis is denotes the time in seconds. It shows that the average peak value of Media access delay is almost 0.006626 seconds for Static Nodes/ Fixed Nodes, 0.003571 seconds for Dynamic nodes and 0.001047 seconds for Dynamic nodes with Trajectory. After 10 minutes, it gradually drops as time progress and reaches to almost 0.003949 seconds for Static Nodes / Fixed Nodes, 0.002187 seconds for Dynamic Nodes and 0.000608 seconds for Dynamic nodes with Trajectory. 5.4 Network Load (bits/sec) Fig 12: Comparison of DSR with static nodes, dynamic nodes and trajectory nodes for Network Load (Bits/Sec) in FTP Load In figure 12, X-axis denotes time which is in minutes and Y- axis denotes data rate which is in bits/sec. It shows that the average peak value of Network Load is almost 55.17241379 bits/sec for Static Nodes/ Fixed Nodes, 36.7816092 bits/sec for Dynamic nodes and 46.71264368 bits/sec for Dynamic nodes with Trajectory. After 10 minutes, it gradually drops as time progress and reaches to almost 16 bits/sec for Static Nodes / Fixed Nodes, 10.66667 bits/sec for Dynamic Nodes and 5.866667 bits/sec for Dynamic nodes with Trajectory. Table 2 shows numeric values of various parameters taken into consideration for FTP load in Static nodes, Dynamic Nodes and Dynamic nodes with Trajectory in MANET by using Dynamic Routing Protocol. It gives the performance comparison of 3 Scenario: Static nodes, Dynamic Nodes and Dynamic nodes with Trajectory in MANET in terms of Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load for FTP load. Table 3: Values of various parameters corresponding to 3 Scenario: Static nodes, Dynamic Nodes and Dynamic nodes with Trajectory in MANET Parameters DSR PROTOCOL Static Nodes Dynamic Nodes Dynamic Nodes with Trajectory Peak value Drop value Peak value Drop value Peak value Drop value Data dropped (retry threshold exceeded) (bits/sec) 606.89 176 404.59 117.33 414.52 123.09 Load (bits/sec) 606.89 176 404.59 117.33 414.52 123.09 Media Access Delay (Sec) 0.0066 0.0039 0.0035 0.0021 0.0010 0.0006 Network Load (bits/sec) 55.17 16 36.78 10.66 46.71 5.86
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 12 | Dec-2013, Available @ http://www.ijret.org 766 As shown in Table 2, Static Nodes performs better than Dynamic Nodes and Dynamic Nodes with trajectory for Data dropped (Retry Threshold exceeded), Load, media Access Delay and Network Load. In overall Static Nodes performs better because it is easy to maintain and update the network than Dynamic nodes and dynamic nodes with Trajectory. In Static nodes network everything is done with the permission by network administration authority but in Dynamic every node is free to move or disappear/join. In dynamic network it is difficult to find any node location and also to maintain and update the network. CONCLUSIONS In this paper, we performed the comparison between three Scenarios: Static nodes, Dynamic Nodes and Dynamic nodes with Trajectory in MANET with traffic loads FTP in terms of Data dropped (Retry Threshold exceeded), Load, media Access Delay and Network Load. The results are taken in tabular form as well as graphical form by using OPNET Simulator 14.5. The results show that which Nodes performs better than another corresponding to FTP traffic load with DSR Protocol and some important parameters. REFERENCES [1]. Prasanna Padmanabhan, Le Gruenwald, Anita vallur, Mohammed Atiquzzaman, “A Survey of data replication techniques for mobile ad hoc network databases” , The University of Oklahoma, School of Computer Science, Norman, OK 73019, USA, The VLDB Journal Springer (2008) 17:1143-1164. [2]. Hui Xu, Student Member, IEEE, Xianren Wu, Member, IEEE, Hamid R. Sadjapour, Senior Member, IEEE, and J.J. Garcai-Luna-Aceve, Fellow, IEEE, ACM, “ A Unified Analysis of Routing Protocls in MANETs”. (2010) [3]. Gurleen Kaur Walia and Charanjit Singh, “Node Density based performance Analysis of two Reactive Routing Protocols in Mobile Adhoc Networks”, UCOE Department, Punjabi University, Patiala.(2011). [4]. Parulpreet Singh, Ekta Barkhodia and Gurleen Kaur Wali, “Evaluation of various Traffic loads in MANET with DSR routing protocol through use of OPNET Simulator”, Department of Electronics & Communication, LPU, Phagwara Punjab, India. (May 2012). [5]. Ad hoc and sensor networks, University of Paderborn, Computer Networks Group, 19 June 2007. [6]. Zhi Ang Eu, NUS Graduate School for integrative sciences and Engineering, National University of Singapore and Hwee-Pink Tan, Winston K. G. Seah Networking Protocols Department, Institute for infocomm Research, A*STAR, “Routing and Relay Node Placement in Wireless Sensor Networks Powered by Ambient Energy Harvesting”. BIOGRAPHIES: Puneet Mittal received B.Tech (CSE) form Punjab Technical University in 2007 and currently pursuing M.Tech (CSE) form Giani Zail Singh Punjab Technical University Campus, Bathinda. She is currently working as Lecturer Computer Engg Department, Govt. Polytechnic College, Bathinda. Her research area is Adhoc Networks routing protocols MANET. Paramjeet Singh reveived PhD from BITS, Pilani in 2009, M.S (Software System) form BITS, Pilani in 2002 and B.Tech (CSE) from Sant Longowal Institute of Engineering & Technology, Longowal in 1998. He is currently working as Assistant Professor C.S.E Department, Giani Zail Singh Punjab Technical University Campus, Bathinda. His research area is Networking, Software Systems and Computer Graphics. He has to her contribution International Journals : 11, National Journals : 02, International Conerences : 12 and National Conferences : 30. Shaveta Rani reveived PhD from BITS, Pilani in 2009, M.S (Software System) form BITS, Pilani in 2002 and B.Tech (CSE) from Sant Longowal Institute of Engineering & Technology, Longowal in 1998. She is currently working as Assistant Professor C.S.E Department, Giani Zail Singh Punjab Technical University Campus, Bathinda. Her research area is Internetworking, Image Processing and Software Systems She has to her contribution International Journals : 11, National Journals : 02, International Conerences : 12 and National Conferences : 29.