SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 1 (May. - Jun. 2013), PP 51-55
www.iosrjournals.org
www.iosrjournals.org 51 | Page
Review paper on performance analysis of AODV, DSDV, OLSR
on the basis of packet delivery
Ramandeep Kaur ( M. Tech Student), Chandan Sharma (Ph.D. Candidate),
Shri Guru Granth Sahib World University, Fatehgarh Sahib, India
Punjab Technical University, Jalandhar, India(pb.)
Abstract- The field of Adhoc Network has gained an important part of the interest of researchers and become
very popular in last few years. Adhoc network can operate without fixed infrastructure and can survive rapid
changes in the network topology. They can be studied formally as graphs in which the set of edges varies in
time. In this paper, we analyse the performance of three protocols AODV, DSDV OLSR. The performance of
proposed networks are evaluated in terms of packet delivery ratio with the help of NS-3 simulator. In this paper,
OLSR shows better performance over the other two protocols, that is DSDV and AODV.
Keywords: AODV, DSDV, OLSR and NS-3
I. Introduction
A wireless ad hoc network is a decentralized type of wireless network. The network is ad hoc because
it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed
(infrastructure) wireless networks [2]. Instead, each node participates in routing by forwarding data for other
nodes, and so the determination of which nodes forward data is made dynamically based on the network
connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding the data.
An ad hoc network typically refers to any set of networks where all devices have equal status on a
network and are free to associate with any other ad hoc network devices in link range. Very often, ad hoc
network refers to a mode of operation of IEEE 802.11 wireless networks. The ad hoc routing protocols can be
divided into two classes: table-driven and on-demand routing, on the basis of when and how the routes are
discovered. In table-driven routing protocols, consistent and up-to date routing information to all nodes is
maintained at each node, whereas in on-demand routing the routes are created only when desired by the source
host. We discuss current table-driven protocols as well as on-demand protocols.
Fig 1. Adhoc networking model
In section 2, we review the mostly used wireless ad hoc protocols. In Section 3, we present the
performance metrics of our simulation. Section 4 described the simulation environment, Section 5 performance
comparison of the protocols. We draw our conclusions in Section 6. Future work in section 7.
II. Adhoc Routing Protocols
Routing protocols in MANETs are classified into three different categories according to their functionality
A. Reactive protocols
B. Proactive protocols
C. Hybrid protocols
Review paper on performance analysis of AODV, DSDV, OLSR on the
www.iosrjournals.org 52 | Page
Fig. 2 Classification of routing protocols
A. Reactive Protocols
Reactive protocols are also known as On-demand driven reactive protocols. These Protocols do not
initiate route discovery by themselves, until or unless a source node request to find a route. That„s why these
protocols are called reactive protocols. These protocols setup routes when demanded [4], [3]. When a node
wants to communicate with another node in the network, and the source node does not have a route to the node
it wants to communicate with, reactive routing protocols will establish a route for the source to destination node.
Normally reactive protocols
 Don„t find route until demanded
 Uses flooding technique to propagate the query, to find the destination ―On-Demand‖.
 Do not consume bandwidth for sending information.
 They consume bandwidth only, when the node start transmitting the data to the destination node.
Some of the most used on demand routing protocols are DSR [5], [6], AODV [4], [12] and Admission Control
enabled On demand Routing Protocol( ACOR).
B. Proactive Protocols
Proactive routing protocols work as the other way around as compared to Reactive routing protocols.
These protocols constantly maintain update-to-date topology of the network. Every node in the network knows
about the other node in advance, in other words the whole network is known to all the nodes making that
network. All the routing information is usually kept in tables. Whenever there is a change in the network
topology, these tables are updated according to the change. The nodes exchange topology information with each
other; they can have route information any time when they needed. Some of the existing proactive routing
protocols are DSDV [7], OLSR [8] and Wireless Routing Protocol (WRP).
C. Hybrid Protocols
Hybrid protocols exploit the strengths of both reactive and proactive protocols, and combine them
together to get better results. The network is divided into zones, and use different protocols in two different
zones i.e. one protocol is used within zone, and the other protocol is used between them. Zone Routing Protocol
(ZRP) is the example of Hybrid Routing Protocol. ZRP uses proactive mechanism for route establishment
within the nodes neighbourhood, and for communication amongst the neighbourhood it takes the advantage of
reactive protocols. These local neighbourhoods are known as zones, and the protocol is named for the same
reason as zone routing protocol. Each zone can have different size and each node may be within multiple
overlapping zones. The size of zone is given by radius of length P, where P is number of hops to the perimeter
of the zone [9]. Some of the existing hybrid protocols are ZRP [10], TORA [11] and Hazed Sighted Link State
Routing Protocol (HSLS).
Dsdv- Destination Sequenced Distance Vector (DSDV) is a Proactive routing protocol that solves the major
problem associated with the Distance Vector routing of wired. The DSDV protocol requires each mobile station
to advertise, to each of its current neighbours, its own routing table (for instance, by broadcasting its entries).
The entries in this list may change fairly dynamically over time, so the advertisement must be made often
enough to ensure that every mobile computer can almost always locate every other mobile computer. In
addition, each mobile computer agrees to relay data packets to other computers upon request. At all instants, the
DSDV protocol guarantees loop-free paths to each destination [1].
AODV- AODV offers low network utilization and uses destination sequence number to ensure loop freedom. It
is a reactive protocol implying that it requests a route when needed and it does not maintain routes for those
nodes that do not actively
Review paper on performance analysis of AODV, DSDV, OLSR on the
www.iosrjournals.org 53 | Page
participate in a communication. An important feature of AODV is that it uses a destination sequence number,
which corresponds to a destination node that was requested by a routing sender node. The destination itself
provides the number along with the route it has to take to reach from the request sender node up to the
destination. If there are multiple routes from a request sender to a destination, the sender takes the route with a
higher sequence number. This ensures that the ad hoc network protocol remains loop-free [1].
OLSR- Optimized Link State Routing (OLSR) is a link state routing protocol. OLSR is an adoption of
conventional routing protocols to work in an ad hoc network on top of IMEP.
The novel attribute of OLSR is its ability to track and use multipoint relays. The idea of multipoint relays is to
minimize the flooding of broadcast messages in the network by reducing/optimizing duplicate retransmissio-
-ns in the same region. Each node in the network selects a set of nodes in its neighbourhood that will retransmit
its broadcast packets. This set of selected neighbor nodes is called the multipoint relays of that node. Each node
selects its multipoint relay set in a manner to cover all the nodes that are two hops away from it. The neighbors
that are not in the multipoint relay set still receive and process broadcast packets, but do not retransmit them
[13].
III. Performance Metrics
We evaluated key performance metrics for three different applications using AODV, DSDV, OLSR
protocols. The parameters used for wifi performance evalution is packet delivery ratio (packet send and
received).
IV. Simulation
Our protocol evaluation are based on the simulation using NS-3 simulator. The simulation runs for 600
simulated seconds, of which the first 50 nodes are used for start up time. The number of nodes are 50. Nodes
move according to Radom Waypoint Mobility Model with speed of 20 m/s and no pause time within a
300*1500 region. The wifi is in adhoc mode with a 2 Mb/s rate (802.11b) and a friss loss model. The transmit
power is set to 7.5 dBm. There are 10 source/sink data pairs sending UDP data at an application rate of 2.048
kb/s each. This is typically done at a rate of 4 64 –byte packet per second. Application data is started at a
random time between 50 and 51 seconds and continues to the end of the simulation.
V. Performance Comparison Of The Protocols
Fig. 3 shows the packet delivery ratio of DSDV. Fig. 4 shows the graph between packet received and received
rate of AODV. Fig. 5 shows the graph of OLSR for packet delivery ratio. The output results gives us graphs on
packet delivery for each protocols. From these three protocols OLSR shows better performance than DSDV and
AODV. Although OLSR does not perform at the beginning but after 50 seconds it does well, it sent and received
the packets. In DSDV, the packets are dropping. The received rate is very much low or very much high. AODV
shows average performance throughout the simulation. AODV shows better results than DSDV. This means
DSDV shows worst performance than AODV and OLSR.
simulator NS-3
Protocols studied AODV,DSDV,OLSR
Simulation time 600
Simulation area 300*1500
Transmit power 7.5 dBm
Node movement
model
Random Waypoint
speed 20 m/s
Bandwidth 2 Mb/s
Table. 1 Simulation parameters
Review paper on performance analysis of AODV, DSDV, OLSR on the
www.iosrjournals.org 54 | Page
Fig. 3 Packet delivery for DSDV
Fig. 4 Packet delivery for AODV
Fig. 5 Packet delivery for OLSR
VI. Conclusion
In this paper, NS-3 simulator has been used, we evaluated the performance of widely used ad hoc
network routing protocols. The simulation characteristics used in this research that is packet delivery. It is very
important for performance evaluation of any networking protocol. In this paper we compare three protocols
AODV, DSDV, OLSR. We simulated each protocol for adhoc network for 50 nodes. We run simulation for 600
seconds normally the AODV considered to be better on other protocols but here in case of wifi, OLSR shows
better performance as compared to DSDVand AODV in context to packet delivery status.
VII. Future Work
In the future, It is possible to change the mobility and density of the network by directly modifying the
speed and the number of nodes. It is also possible to change the characteristics of the network by changing the
transmit power (as power increases, the impact of mobility decreases and the effective density increases). Other
new protocols performance could be studied.
References
[1] Kumar Manoj, Parmanand, S.C. Sharma & S.P. Singh,“ Peformance of QoS Parameter in Wireless Ad hoc Network(IEEE
802.11b)”, October 2009.
[2] Priti Garg, Asma Tuteja, “Comparative Performance Analysis of Two Ad-hoc Routing Protocols”,International Conference on
Network and Electronics Engineering IPCSIT vol.11, 2011.
[3] C.M barushimana, A.Shahrabi, Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad-Hoc
Networks, Workshop on Advance Information Networking and Application, Vol. 2, May, 2003, pp. 679-684,.
[4] C.E.Perkins and E.M.Royer, Ad-Hoc On Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop on Mobile
Computing Systems and Applications, Feb, 1999, pp.90-100
[5] Md. Golam Kaosar, Hafiz M. Asif, Tarek R. Sheltami, Ashraf S.Hasan Mahmoud, Simulation-Based Comparative Study of On
Demand Routing Protocols for MANET, International Conference on Wireless Networking and Mobile Computing, Vol. 1,
December 2005, pp. 201 – 206.
[6] D. Johnson and D, Maltz, Dynamic source routing in ad hoc wireless networks, 1996.
Review paper on performance analysis of AODV, DSDV, OLSR on the
www.iosrjournals.org 55 | Page
[7] Perkins, Charles E. and Bhagwat, Pravin, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile
Computers, 1994
[8] T. Clausen and P. Jaqcquet, Optimized Link State Routing (OLSR) Protocol, RFC 3626, IETF Networking Group, October 2003.
[9] Jan Schaumann, Analysis of the Zone Routing Protocol December 2002.
[10] Z. J. Hass and M. R. Pearlman, Zone Routing Protocol (ZRP), Internet draft available at www.ietf.org, November 1997.
[11] V. Park and S. Corson, Temporally Ordered Routing Algorithm (TORA) Version 1, Functional specification, IETF Internet draft,
December, 1998.
[12] Kuppusamy, P., Thirunavukkarasu, K. and Kalaavathi, B. , A study and comparison of OLSR, AODV and TORA routing protocols
in ad hoc networks, 3rd International Conference on Electronics Computer Technology (ICECT), 2011.
[13] Anna Hac, “Mobile Telecommunications protocols for data networks”, John Wiley & Sons Ltd, The Atrium, Southern Gate,
Chichester,West Sussex PO19 8SQ, England.

Contenu connexe

Tendances

Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyIOSR Journals
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
 
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...CSCJournals
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluationijwmn
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 

Tendances (16)

Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Ba...
 
O26087092
O26087092O26087092
O26087092
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
J0935461
J0935461J0935461
J0935461
 

En vedette

Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationApproximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationIOSR Journals
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsIOSR Journals
 
Domestic Solar - Aero - Hydro Power Generation System
Domestic Solar - Aero - Hydro Power Generation SystemDomestic Solar - Aero - Hydro Power Generation System
Domestic Solar - Aero - Hydro Power Generation SystemIOSR Journals
 
Adaptability of Distribution Automation System to Electric Power Quality Moni...
Adaptability of Distribution Automation System to Electric Power Quality Moni...Adaptability of Distribution Automation System to Electric Power Quality Moni...
Adaptability of Distribution Automation System to Electric Power Quality Moni...IOSR Journals
 
Smart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemSmart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemIOSR Journals
 
College Collaboration Portal with Training and Placement
College Collaboration Portal with Training and PlacementCollege Collaboration Portal with Training and Placement
College Collaboration Portal with Training and PlacementIOSR Journals
 
Multidirectional Product Support System for Decision Making In Textile Indust...
Multidirectional Product Support System for Decision Making In Textile Indust...Multidirectional Product Support System for Decision Making In Textile Indust...
Multidirectional Product Support System for Decision Making In Textile Indust...IOSR Journals
 
Matlab Based Analysis of 3-Ø Self-Excited Induction Generator with Nonlinear ...
Matlab Based Analysis of 3-Ø Self-Excited Induction Generator with Nonlinear ...Matlab Based Analysis of 3-Ø Self-Excited Induction Generator with Nonlinear ...
Matlab Based Analysis of 3-Ø Self-Excited Induction Generator with Nonlinear ...IOSR Journals
 
A Study on Growth of Hotel Industry in Goa
A Study on Growth of Hotel Industry in GoaA Study on Growth of Hotel Industry in Goa
A Study on Growth of Hotel Industry in GoaIOSR Journals
 
Lossless LZW Data Compression Algorithm on CUDA
Lossless LZW Data Compression Algorithm on CUDALossless LZW Data Compression Algorithm on CUDA
Lossless LZW Data Compression Algorithm on CUDAIOSR Journals
 
Medical Image Processing in Nuclear Medicine and Bone Arthroplasty
Medical Image Processing in Nuclear Medicine and Bone ArthroplastyMedical Image Processing in Nuclear Medicine and Bone Arthroplasty
Medical Image Processing in Nuclear Medicine and Bone ArthroplastyIOSR Journals
 
Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...
Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...
Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...IOSR Journals
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesIOSR Journals
 
Study of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudStudy of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudIOSR Journals
 
Discovering Frequent Patterns with New Mining Procedure
Discovering Frequent Patterns with New Mining ProcedureDiscovering Frequent Patterns with New Mining Procedure
Discovering Frequent Patterns with New Mining ProcedureIOSR Journals
 
Economic Load Dispatch Optimization of Six Interconnected Generating Units Us...
Economic Load Dispatch Optimization of Six Interconnected Generating Units Us...Economic Load Dispatch Optimization of Six Interconnected Generating Units Us...
Economic Load Dispatch Optimization of Six Interconnected Generating Units Us...IOSR Journals
 

En vedette (20)

Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta IntegrationApproximating Source Accuracy Using Dublicate Records in Da-ta Integration
Approximating Source Accuracy Using Dublicate Records in Da-ta Integration
 
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in OrganizationsA Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
A Robust Approach for Detecting Data Leakage and Data Leaker in Organizations
 
Domestic Solar - Aero - Hydro Power Generation System
Domestic Solar - Aero - Hydro Power Generation SystemDomestic Solar - Aero - Hydro Power Generation System
Domestic Solar - Aero - Hydro Power Generation System
 
Adaptability of Distribution Automation System to Electric Power Quality Moni...
Adaptability of Distribution Automation System to Electric Power Quality Moni...Adaptability of Distribution Automation System to Electric Power Quality Moni...
Adaptability of Distribution Automation System to Electric Power Quality Moni...
 
Smart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemSmart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating System
 
College Collaboration Portal with Training and Placement
College Collaboration Portal with Training and PlacementCollege Collaboration Portal with Training and Placement
College Collaboration Portal with Training and Placement
 
Multidirectional Product Support System for Decision Making In Textile Indust...
Multidirectional Product Support System for Decision Making In Textile Indust...Multidirectional Product Support System for Decision Making In Textile Indust...
Multidirectional Product Support System for Decision Making In Textile Indust...
 
I0154957
I0154957I0154957
I0154957
 
N0171595105
N0171595105N0171595105
N0171595105
 
Matlab Based Analysis of 3-Ø Self-Excited Induction Generator with Nonlinear ...
Matlab Based Analysis of 3-Ø Self-Excited Induction Generator with Nonlinear ...Matlab Based Analysis of 3-Ø Self-Excited Induction Generator with Nonlinear ...
Matlab Based Analysis of 3-Ø Self-Excited Induction Generator with Nonlinear ...
 
A Study on Growth of Hotel Industry in Goa
A Study on Growth of Hotel Industry in GoaA Study on Growth of Hotel Industry in Goa
A Study on Growth of Hotel Industry in Goa
 
Lossless LZW Data Compression Algorithm on CUDA
Lossless LZW Data Compression Algorithm on CUDALossless LZW Data Compression Algorithm on CUDA
Lossless LZW Data Compression Algorithm on CUDA
 
Medical Image Processing in Nuclear Medicine and Bone Arthroplasty
Medical Image Processing in Nuclear Medicine and Bone ArthroplastyMedical Image Processing in Nuclear Medicine and Bone Arthroplasty
Medical Image Processing in Nuclear Medicine and Bone Arthroplasty
 
Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...
Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...
Torque Profiles of Asymmetrically Wound Six-Phase Induction Motor (AWSP-IM) u...
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking Sites
 
Study of SaaS and its Application in Cloud
Study of SaaS and its Application in CloudStudy of SaaS and its Application in Cloud
Study of SaaS and its Application in Cloud
 
Discovering Frequent Patterns with New Mining Procedure
Discovering Frequent Patterns with New Mining ProcedureDiscovering Frequent Patterns with New Mining Procedure
Discovering Frequent Patterns with New Mining Procedure
 
B01110814
B01110814B01110814
B01110814
 
D0161926
D0161926D0161926
D0161926
 
Economic Load Dispatch Optimization of Six Interconnected Generating Units Us...
Economic Load Dispatch Optimization of Six Interconnected Generating Units Us...Economic Load Dispatch Optimization of Six Interconnected Generating Units Us...
Economic Load Dispatch Optimization of Six Interconnected Generating Units Us...
 

Similaire à H01115155

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
 

Similaire à H01115155 (20)

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
K017426872
K017426872K017426872
K017426872
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
En33838844
En33838844En33838844
En33838844
 
Az26337342
Az26337342Az26337342
Az26337342
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

H01115155

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 1 (May. - Jun. 2013), PP 51-55 www.iosrjournals.org www.iosrjournals.org 51 | Page Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery Ramandeep Kaur ( M. Tech Student), Chandan Sharma (Ph.D. Candidate), Shri Guru Granth Sahib World University, Fatehgarh Sahib, India Punjab Technical University, Jalandhar, India(pb.) Abstract- The field of Adhoc Network has gained an important part of the interest of researchers and become very popular in last few years. Adhoc network can operate without fixed infrastructure and can survive rapid changes in the network topology. They can be studied formally as graphs in which the set of edges varies in time. In this paper, we analyse the performance of three protocols AODV, DSDV OLSR. The performance of proposed networks are evaluated in terms of packet delivery ratio with the help of NS-3 simulator. In this paper, OLSR shows better performance over the other two protocols, that is DSDV and AODV. Keywords: AODV, DSDV, OLSR and NS-3 I. Introduction A wireless ad hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks [2]. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding the data. An ad hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other ad hoc network devices in link range. Very often, ad hoc network refers to a mode of operation of IEEE 802.11 wireless networks. The ad hoc routing protocols can be divided into two classes: table-driven and on-demand routing, on the basis of when and how the routes are discovered. In table-driven routing protocols, consistent and up-to date routing information to all nodes is maintained at each node, whereas in on-demand routing the routes are created only when desired by the source host. We discuss current table-driven protocols as well as on-demand protocols. Fig 1. Adhoc networking model In section 2, we review the mostly used wireless ad hoc protocols. In Section 3, we present the performance metrics of our simulation. Section 4 described the simulation environment, Section 5 performance comparison of the protocols. We draw our conclusions in Section 6. Future work in section 7. II. Adhoc Routing Protocols Routing protocols in MANETs are classified into three different categories according to their functionality A. Reactive protocols B. Proactive protocols C. Hybrid protocols
  • 2. Review paper on performance analysis of AODV, DSDV, OLSR on the www.iosrjournals.org 52 | Page Fig. 2 Classification of routing protocols A. Reactive Protocols Reactive protocols are also known as On-demand driven reactive protocols. These Protocols do not initiate route discovery by themselves, until or unless a source node request to find a route. That„s why these protocols are called reactive protocols. These protocols setup routes when demanded [4], [3]. When a node wants to communicate with another node in the network, and the source node does not have a route to the node it wants to communicate with, reactive routing protocols will establish a route for the source to destination node. Normally reactive protocols  Don„t find route until demanded  Uses flooding technique to propagate the query, to find the destination ―On-Demand‖.  Do not consume bandwidth for sending information.  They consume bandwidth only, when the node start transmitting the data to the destination node. Some of the most used on demand routing protocols are DSR [5], [6], AODV [4], [12] and Admission Control enabled On demand Routing Protocol( ACOR). B. Proactive Protocols Proactive routing protocols work as the other way around as compared to Reactive routing protocols. These protocols constantly maintain update-to-date topology of the network. Every node in the network knows about the other node in advance, in other words the whole network is known to all the nodes making that network. All the routing information is usually kept in tables. Whenever there is a change in the network topology, these tables are updated according to the change. The nodes exchange topology information with each other; they can have route information any time when they needed. Some of the existing proactive routing protocols are DSDV [7], OLSR [8] and Wireless Routing Protocol (WRP). C. Hybrid Protocols Hybrid protocols exploit the strengths of both reactive and proactive protocols, and combine them together to get better results. The network is divided into zones, and use different protocols in two different zones i.e. one protocol is used within zone, and the other protocol is used between them. Zone Routing Protocol (ZRP) is the example of Hybrid Routing Protocol. ZRP uses proactive mechanism for route establishment within the nodes neighbourhood, and for communication amongst the neighbourhood it takes the advantage of reactive protocols. These local neighbourhoods are known as zones, and the protocol is named for the same reason as zone routing protocol. Each zone can have different size and each node may be within multiple overlapping zones. The size of zone is given by radius of length P, where P is number of hops to the perimeter of the zone [9]. Some of the existing hybrid protocols are ZRP [10], TORA [11] and Hazed Sighted Link State Routing Protocol (HSLS). Dsdv- Destination Sequenced Distance Vector (DSDV) is a Proactive routing protocol that solves the major problem associated with the Distance Vector routing of wired. The DSDV protocol requires each mobile station to advertise, to each of its current neighbours, its own routing table (for instance, by broadcasting its entries). The entries in this list may change fairly dynamically over time, so the advertisement must be made often enough to ensure that every mobile computer can almost always locate every other mobile computer. In addition, each mobile computer agrees to relay data packets to other computers upon request. At all instants, the DSDV protocol guarantees loop-free paths to each destination [1]. AODV- AODV offers low network utilization and uses destination sequence number to ensure loop freedom. It is a reactive protocol implying that it requests a route when needed and it does not maintain routes for those nodes that do not actively
  • 3. Review paper on performance analysis of AODV, DSDV, OLSR on the www.iosrjournals.org 53 | Page participate in a communication. An important feature of AODV is that it uses a destination sequence number, which corresponds to a destination node that was requested by a routing sender node. The destination itself provides the number along with the route it has to take to reach from the request sender node up to the destination. If there are multiple routes from a request sender to a destination, the sender takes the route with a higher sequence number. This ensures that the ad hoc network protocol remains loop-free [1]. OLSR- Optimized Link State Routing (OLSR) is a link state routing protocol. OLSR is an adoption of conventional routing protocols to work in an ad hoc network on top of IMEP. The novel attribute of OLSR is its ability to track and use multipoint relays. The idea of multipoint relays is to minimize the flooding of broadcast messages in the network by reducing/optimizing duplicate retransmissio- -ns in the same region. Each node in the network selects a set of nodes in its neighbourhood that will retransmit its broadcast packets. This set of selected neighbor nodes is called the multipoint relays of that node. Each node selects its multipoint relay set in a manner to cover all the nodes that are two hops away from it. The neighbors that are not in the multipoint relay set still receive and process broadcast packets, but do not retransmit them [13]. III. Performance Metrics We evaluated key performance metrics for three different applications using AODV, DSDV, OLSR protocols. The parameters used for wifi performance evalution is packet delivery ratio (packet send and received). IV. Simulation Our protocol evaluation are based on the simulation using NS-3 simulator. The simulation runs for 600 simulated seconds, of which the first 50 nodes are used for start up time. The number of nodes are 50. Nodes move according to Radom Waypoint Mobility Model with speed of 20 m/s and no pause time within a 300*1500 region. The wifi is in adhoc mode with a 2 Mb/s rate (802.11b) and a friss loss model. The transmit power is set to 7.5 dBm. There are 10 source/sink data pairs sending UDP data at an application rate of 2.048 kb/s each. This is typically done at a rate of 4 64 –byte packet per second. Application data is started at a random time between 50 and 51 seconds and continues to the end of the simulation. V. Performance Comparison Of The Protocols Fig. 3 shows the packet delivery ratio of DSDV. Fig. 4 shows the graph between packet received and received rate of AODV. Fig. 5 shows the graph of OLSR for packet delivery ratio. The output results gives us graphs on packet delivery for each protocols. From these three protocols OLSR shows better performance than DSDV and AODV. Although OLSR does not perform at the beginning but after 50 seconds it does well, it sent and received the packets. In DSDV, the packets are dropping. The received rate is very much low or very much high. AODV shows average performance throughout the simulation. AODV shows better results than DSDV. This means DSDV shows worst performance than AODV and OLSR. simulator NS-3 Protocols studied AODV,DSDV,OLSR Simulation time 600 Simulation area 300*1500 Transmit power 7.5 dBm Node movement model Random Waypoint speed 20 m/s Bandwidth 2 Mb/s Table. 1 Simulation parameters
  • 4. Review paper on performance analysis of AODV, DSDV, OLSR on the www.iosrjournals.org 54 | Page Fig. 3 Packet delivery for DSDV Fig. 4 Packet delivery for AODV Fig. 5 Packet delivery for OLSR VI. Conclusion In this paper, NS-3 simulator has been used, we evaluated the performance of widely used ad hoc network routing protocols. The simulation characteristics used in this research that is packet delivery. It is very important for performance evaluation of any networking protocol. In this paper we compare three protocols AODV, DSDV, OLSR. We simulated each protocol for adhoc network for 50 nodes. We run simulation for 600 seconds normally the AODV considered to be better on other protocols but here in case of wifi, OLSR shows better performance as compared to DSDVand AODV in context to packet delivery status. VII. Future Work In the future, It is possible to change the mobility and density of the network by directly modifying the speed and the number of nodes. It is also possible to change the characteristics of the network by changing the transmit power (as power increases, the impact of mobility decreases and the effective density increases). Other new protocols performance could be studied. References [1] Kumar Manoj, Parmanand, S.C. Sharma & S.P. Singh,“ Peformance of QoS Parameter in Wireless Ad hoc Network(IEEE 802.11b)”, October 2009. [2] Priti Garg, Asma Tuteja, “Comparative Performance Analysis of Two Ad-hoc Routing Protocols”,International Conference on Network and Electronics Engineering IPCSIT vol.11, 2011. [3] C.M barushimana, A.Shahrabi, Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad-Hoc Networks, Workshop on Advance Information Networking and Application, Vol. 2, May, 2003, pp. 679-684,. [4] C.E.Perkins and E.M.Royer, Ad-Hoc On Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, Feb, 1999, pp.90-100 [5] Md. Golam Kaosar, Hafiz M. Asif, Tarek R. Sheltami, Ashraf S.Hasan Mahmoud, Simulation-Based Comparative Study of On Demand Routing Protocols for MANET, International Conference on Wireless Networking and Mobile Computing, Vol. 1, December 2005, pp. 201 – 206. [6] D. Johnson and D, Maltz, Dynamic source routing in ad hoc wireless networks, 1996.
  • 5. Review paper on performance analysis of AODV, DSDV, OLSR on the www.iosrjournals.org 55 | Page [7] Perkins, Charles E. and Bhagwat, Pravin, Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, 1994 [8] T. Clausen and P. Jaqcquet, Optimized Link State Routing (OLSR) Protocol, RFC 3626, IETF Networking Group, October 2003. [9] Jan Schaumann, Analysis of the Zone Routing Protocol December 2002. [10] Z. J. Hass and M. R. Pearlman, Zone Routing Protocol (ZRP), Internet draft available at www.ietf.org, November 1997. [11] V. Park and S. Corson, Temporally Ordered Routing Algorithm (TORA) Version 1, Functional specification, IETF Internet draft, December, 1998. [12] Kuppusamy, P., Thirunavukkarasu, K. and Kalaavathi, B. , A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks, 3rd International Conference on Electronics Computer Technology (ICECT), 2011. [13] Anna Hac, “Mobile Telecommunications protocols for data networks”, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester,West Sussex PO19 8SQ, England.