SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 9, Issue 12 (February 2014), PP. 30-33
30
Design and Simulation of Wireless Ad Hoc Network Using NS2
Simulator
Lokhande S.N.1
,Dr. khamitkar S.D.2
1
Assistance Professor, School of Computational Sciences, S.R.T.M. University, Nanded
2
Associate Professor, School of Computational Sciences, S.R.T.M. University, Nanded
Abstract:- Networks that support the ad hoc architecture are typically called wireless ad hoc networks or
mobile ad hoc networks (MANET) these two terms are used interchangeably. Such networks are typically
assumed to be self-forming and self healing. This research paper aims to simulate the wireless ad hoc network
using NS2 simulator. We simulate the network which uses AODV as routing protocol and finds the network
parameter values and the performance of the AODV protocol is measured.
Keywords:- AODV, Ad Hoc network, NS2 simulator,AWK,Throughput
I. INTRODUCTION
In the recent years, wireless technology has got popularity and usage, thus opening new fields of
applications in the domain of networking. The wireless networks may categorize as infrastructure based and
infrastructure less network. In infrastructure based networks the mobile nodes are communicated with the help
of common access point. Where as in infrastructure less network the mobile nodes are communicated
cooperatively with each other, where the participating nodes do not rely on any existing network infrastructure
such networks are known as wireless ad hoc networks. In wireless ad hoc networks each node is functions as
node as well as router.
Ad hoc networks have a wide array of military and commercial applications. They are ideal in
situations where installing an infrastructure network is not possible or when the purpose of the network is too
transient or even for the reason that the previous infrastructure network was destroyed.
II. WIRELESS AD HOC NETWORKS
In the past few years, a new wireless architecture has been introduced that does not rely on any fixed
infrastructure. In this architecture, all nodes may be mobile and no nodes play any special role. One example of
this architecture is the “ad hoc” mode architecture of 802.11, in this architecture, 802.11 nodes do not rely on
access points to communicate with each other. In fact, nodes reach other nodes they need to communicate with
using their neighbors. Nodes that are close to each other discover their neighbors. When a node needs to
communicate with another node, it sends the traffic to its neighbors and the neighbors pass it along to wards
their neighbors and soon. This repeats until the destination of the traffic is reached. Such architecture requires
that every node in the network play the role of a router by being able to determine the paths that packets need to
take in order to reach their destinations.
Networks that support the ad hoc architecture are typically called wireless ad hoc networks or mobile
ad hoc networks (MANET) these two terms are used interchangeably [1]. Such networks are typically assumed
to be self-forming and self healing. This is because the typical applications of such networks require nodes to
form networks quickly without any human intervention. Given the wireless links and mobility of nodes, it is
possible that nodes may lose connectivity to some other nodes. This can happen if the nodes move out of each
other’s transmission range. As a result, it is possible for portions of the network to split from other portions of
the network. In some applications it is also possible that some nodes may get completely disconnected from the
other nodes, run out of battery, or be destroyed. For these reasons, nodes in a ad hoc networks cannot be
congaed to play any special role either in the way nodes communicate or in the way of providing
communication services. This leads to a symmetric architecture where each node shares all the responsibilities.
The network needs to be able to reconfigure itself quickly to deal with the disappearance or reappearance of any
node and continue operating efficiently without any human intervention [2]. Routing in such networks is
particularly challenging because typical routing protocols do not operate efficiently in the presence of frequent
movements, intermittent connectivity, network splits and joins. In typical routing protocols such events generate
a large amount of overhead and require a significant amount of time to reach stability after some of those events.
Design and Simulation of Wireless Ad Hoc Network Using NS2 Simulator
31
III. APPLICATIONS OF AD HOC NETWORKS
Ad hoc networks are very well suited for many situations, in which an infrastructure network can’t be
built or it is impossible to build an infrastructure. The interest of ad hoc networks increases rapidly in recent
year, because ad hoc supports mobility and freedom in the networks. Data can be exchanged without cable,
access point, or portable memory space. This section briefly explains some of applications of ad hoc networks.
Nowadays computers and phones manufacturers implement ad hoc technology to their products.
Tactical Networks: -Military communication automated system.
Entertainment:- Multi users games, Robotics pets.
Emergency Services: - Disaster recovery, Earth quakes.
Sensor Network: -Earth activities, Remote weather for sensors.
IV. NS2 SIMULATOR
Network Simulator version 2 widely known as NS-2 is a discrete event driven network simulation tool
for simulation of network to study the dynamic nature of network [3]. It is an open source solution implemented
in C++ and Otcl programming languages at UCB (University Of Carolina Berkley).NS-2 provides highly
modular platform for simulation of wired as well as wireless networks. NS-2 supports different network
components, protocols like TCP,UDP,FTP and traffic sources like CBR etc. Results of the simulations are
provided with in a trace files that contains the entire occurred event during the simulation. The output of
simulation is visualized through Nam (Network Animator).
Otcl/Tcl is a scripting language with very simple syntaxes which allows fast development. Otcl in NS-2
is used to specify the parameters for simulated networks like node, links, protocols, topography and so on. C++
objects oriented language is used for byte manipulation, packet processing and implementation of new algorithm
or protocol in NS-2. Otcl and C++ interact with each other through TCL/C++ interface called as TclCl
V. AODV PROTOCOL
Ad-hoc On Demand Distance Vector: AODV is a distance vector type routing. It does not require
nodes to maintain routes to destinations that are not actively used. As long as the endpoints of a communication
connection have valid routes to each other, AODV does not play a role. The protocol uses different messages to
discover and maintain links: Route Requests (RREQs), Route Replies (RREPs), and Route Errors(RERRs).
These message types are received via UDP, and normal IP header processing applies. AODV uses a destination
sequence number for each route entry[4]. The destination sequence number is created by the destination for any
information it sends to request nodes. Using destination sequence numbers ensures loop freedom and allows
knowing which of several routes is fresher. Given the choice between two routes to a destination, a requesting
node always selects the one with the greatest sequence number.
When a node wants to find a route to another one, it broadcasts a RREQ to all the network till either the
destination is reached or another node is found with a fresh enough route to the destination (a fresh enough route
is a valid route entry for destination whose associated sequence number is at least as great as that contained in
the RREQs). Then a RREQ is sent back to the source and the discovered route is made available. Nodes that are
part of an active route may offer connectivity information by broadcasting periodically local Hello messages
(special RREQ messages) to its immediate neighbors. If Hello messages stop arriving from a neighbor beyond
some given time threshold, the connection is assumed to be lost. When a node detects that a route to a neighbor
node is not valid it removes the routing entry and send a REER message to neighbors that are active and use the
route; this is possible by maintaining active neighbor lists. This procedure is repeated at nodes that receive
REER messages. A source that receives an REER can re initiate a RREQ message. AODV does not allow
handling unidirectional links [4].
VI. SIMULATION SCENARIO
We simulate the wireless ad hoc network using NS2 simulator version 2.35 having following
parameters. Simulation process and results analysis first of all, to set the topology and the configuration of nodes
properties, and also properties of MAC layer for some address type, protocol type, channel type, simulation time
and transmission way of wireless.
In our simulation, we used topography size 1000 m x 800 m, number of wireless nodes 15 nodes with
maximum moving speed 8 m/s. We did the Simulation for 1000 sec. with maximum 6 connections at a time
allowing UDP traffic. The network simulation parameters we have used for our simulation purpose shown in the
following table I.
Design and Simulation of Wireless Ad Hoc Network Using NS2 Simulator
32
Table I : Simulation Parameters
NETWORK
PARAMETERS
VALUES
No. of nodes 15
Topography area 1000 m X 800 m
Connection Type UDP
Source Traffic CBR
Pay Load 512
Routing protocol AODV
Simulation Time 1000 Sec.
No.of active
connections
6
Network Simulator NS2- 2.35
Some important NS2 commands used for the simulation are as follows[5]
a. set ns [new Simulator] - Creates a new simulator object
b. create-god $par(nn) - Creates the GOD (General Operations Director)
c. set topo [new Topography] - Creates and configure topography
d. $ns node-config - Used to specify nodes configuration parameters
e. $node_(0) set X, set Y, set Z - Sets nodes X,Y and Z co ordinates
f. set agent [new Agent/UDP] - Create new TCP source Agent
g. set app [new Application/Traffic/CBR] - Creates new application Agent (CBR)
The paper analyzes the simulation result of AODV protocol in Ad hoc network. A Tcl script is written in NS2 for
simulation of network model. When this Tcl script is executed it creates two files trace file and Nam file. The Nam
file is used to visualize simulated network, where as trace file store different events statistics such as each
individual packets arrival time, departs or is dropped , information about protocol agent ,traffic agent , source and
destination nodes address etc., which can be used to measure a protocol performance. Different tools [5] are
available for the extracting and analysis of required data from trace file such as grep, Awk, sed, Perl. We wrote
AWK script to extract the required statistical data of trace file. Following figure 1 show the output of Nam
(Network animator).
Fig. 1: Snapshot of Simulated Network
VII. PERFORMANCE METRICS
The performance of the protocols depends on various inter-relating metrics [6]. Which plays important
role in analytical observation of the protocol. Following are the some important parameters which we are selected
to study the performance of AODV protocols in this simulation study.
1]Packet delivery ratio: Packet delivery ratio is defined as the ratio of data packets received by the destinations
to those generated by the sources. Mathematically, it can be defined as:
PDR= RSize/SSize
Design and Simulation of Wireless Ad Hoc Network Using NS2 Simulator
33
Where, RSize is the sum of data packets received by the each destination and SSize is the sum of data packets
generated by the each source.
2] Packet Drop (Loss) Ratio: Packet loss occurs when one or more packets of data traveling across a computer
network fail to reach their destination.
3] Throughput: It is defined as the total number of packets delivered over the total simulation time.
Mathematically, it can be defined as:
Throughput = N/T
Where N is the number of bits received successfully by all destinations and T is simulation time.
VIII. EXPERIMENTAL RESULTS
When the simulation setup is completed, we run the network simulator, which creates two files one is
Nam, which visualizes and animates the network. Other file is a trace file, which captures all the events that
happened in the simulated network. To extract the data from the trace file we write the AWK script. Data
obtained from AWK script is used to find different parameters which includes packet sent, packet received,
packet dropped, for CBR traffic flow. This is used to find PDR, DPR and Throughput, which are used to
measure the performance of AODV protocol. Following table II shows the evaluated data of trace file which
includes packet sent, packet received, packet dropped for CBR .
Table II : Values of Performance Metrics
Node Link Sent
Packets
Received
Packets
Total no.of
Dropped Packets
N0 - N1 87391 63910 23231
N2 - N3 97344 71204 25640
N6 - N8 76563 55558 20655
N10- N11 102266 69553 31713
N12- N13 94063 68380 24683
N14 - N7 76563 55658 20655
Total 534190 384263 146577
The above values of parameters are used to evaluate the performance of network
PDR = Total received packets / Total Sent packets
=384263/534190 = 0.71
Throughput = 534190/1000 = 534.19 kbps
IX. CONCLUSION
As the objective of this research paper is to simulate the wireless network using network simulator NS2
and to measure the performance of this network using AODV as routing protocol. To measure the performance
of AODV we select different performance matrix. The values are obtained from the trace file generated by NS2.
Using the AWK script the data is processed and is used to measure the performance of AODV protocol. As
above results shows that packet delivery ration of AODV protocol is 0.71 and throughput is about 534.19 kbps.
REFERENCES
[1]. C.Siva Ram Murthy and B.S.Manoj “Ad Hoc Wireless Networks Architectures and Protocols , 2nd
edition , Pearson Education.
[2]. Andera Goldsmith “Wireless Communication”,Cambridge University Press.
[3]. NS2, link: www.isi.edu/nsnam/ns/tutorial ,accessed on Dec.2013.
[4]. C.E. Perkins, E. Belding-Royer, and Das “Ad hoc On demand Distance Vector(AODV) routing” ,,
IETF Internet Draft, MANET working group, Jan. 2004.
[5]. Kevin Fall and Kannan Varadhan, “The NS manual”, May 2010
[6]. Eitan Altman and Tania Jimenez, “Network Simulator for beginners”,

More Related Content

What's hot

Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTPerformance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTRavi Teja P
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...eSAT Publishing House
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...ijsrd.com
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkIJNSA Journal
 

What's hot (19)

Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECTPerformance Analysis of AODV and DSDV - FINAL YEAR PROJECT
Performance Analysis of AODV and DSDV - FINAL YEAR PROJECT
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...
 
F04503057062
F04503057062F04503057062
F04503057062
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
Ac24204209
Ac24204209Ac24204209
Ac24204209
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
4 5 marks importnt question dcn
4 5 marks importnt question dcn4 5 marks importnt question dcn
4 5 marks importnt question dcn
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
Kw2418391845
Kw2418391845Kw2418391845
Kw2418391845
 
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...Performance Analysis of Malicious Node in the Different Routing Algorithms in...
Performance Analysis of Malicious Node in the Different Routing Algorithms in...
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 
A QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc NetworkA QoS Based MAC Protocol For Wireless Ad-hoc Network
A QoS Based MAC Protocol For Wireless Ad-hoc Network
 

Similar to International Journal of Engineering Research and Development

Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Ambreen Zafar
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Dr Sandeep Kumar Poonia
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsIAEME Publication
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 

Similar to International Journal of Engineering Research and Development (20)

Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Evaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocolsEvaluating the performance of manet routing protocols
Evaluating the performance of manet routing protocols
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
Manet algo
Manet algoManet algo
Manet algo
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
eaodv
eaodveaodv
eaodv
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 9, Issue 12 (February 2014), PP. 30-33 30 Design and Simulation of Wireless Ad Hoc Network Using NS2 Simulator Lokhande S.N.1 ,Dr. khamitkar S.D.2 1 Assistance Professor, School of Computational Sciences, S.R.T.M. University, Nanded 2 Associate Professor, School of Computational Sciences, S.R.T.M. University, Nanded Abstract:- Networks that support the ad hoc architecture are typically called wireless ad hoc networks or mobile ad hoc networks (MANET) these two terms are used interchangeably. Such networks are typically assumed to be self-forming and self healing. This research paper aims to simulate the wireless ad hoc network using NS2 simulator. We simulate the network which uses AODV as routing protocol and finds the network parameter values and the performance of the AODV protocol is measured. Keywords:- AODV, Ad Hoc network, NS2 simulator,AWK,Throughput I. INTRODUCTION In the recent years, wireless technology has got popularity and usage, thus opening new fields of applications in the domain of networking. The wireless networks may categorize as infrastructure based and infrastructure less network. In infrastructure based networks the mobile nodes are communicated with the help of common access point. Where as in infrastructure less network the mobile nodes are communicated cooperatively with each other, where the participating nodes do not rely on any existing network infrastructure such networks are known as wireless ad hoc networks. In wireless ad hoc networks each node is functions as node as well as router. Ad hoc networks have a wide array of military and commercial applications. They are ideal in situations where installing an infrastructure network is not possible or when the purpose of the network is too transient or even for the reason that the previous infrastructure network was destroyed. II. WIRELESS AD HOC NETWORKS In the past few years, a new wireless architecture has been introduced that does not rely on any fixed infrastructure. In this architecture, all nodes may be mobile and no nodes play any special role. One example of this architecture is the “ad hoc” mode architecture of 802.11, in this architecture, 802.11 nodes do not rely on access points to communicate with each other. In fact, nodes reach other nodes they need to communicate with using their neighbors. Nodes that are close to each other discover their neighbors. When a node needs to communicate with another node, it sends the traffic to its neighbors and the neighbors pass it along to wards their neighbors and soon. This repeats until the destination of the traffic is reached. Such architecture requires that every node in the network play the role of a router by being able to determine the paths that packets need to take in order to reach their destinations. Networks that support the ad hoc architecture are typically called wireless ad hoc networks or mobile ad hoc networks (MANET) these two terms are used interchangeably [1]. Such networks are typically assumed to be self-forming and self healing. This is because the typical applications of such networks require nodes to form networks quickly without any human intervention. Given the wireless links and mobility of nodes, it is possible that nodes may lose connectivity to some other nodes. This can happen if the nodes move out of each other’s transmission range. As a result, it is possible for portions of the network to split from other portions of the network. In some applications it is also possible that some nodes may get completely disconnected from the other nodes, run out of battery, or be destroyed. For these reasons, nodes in a ad hoc networks cannot be congaed to play any special role either in the way nodes communicate or in the way of providing communication services. This leads to a symmetric architecture where each node shares all the responsibilities. The network needs to be able to reconfigure itself quickly to deal with the disappearance or reappearance of any node and continue operating efficiently without any human intervention [2]. Routing in such networks is particularly challenging because typical routing protocols do not operate efficiently in the presence of frequent movements, intermittent connectivity, network splits and joins. In typical routing protocols such events generate a large amount of overhead and require a significant amount of time to reach stability after some of those events.
  • 2. Design and Simulation of Wireless Ad Hoc Network Using NS2 Simulator 31 III. APPLICATIONS OF AD HOC NETWORKS Ad hoc networks are very well suited for many situations, in which an infrastructure network can’t be built or it is impossible to build an infrastructure. The interest of ad hoc networks increases rapidly in recent year, because ad hoc supports mobility and freedom in the networks. Data can be exchanged without cable, access point, or portable memory space. This section briefly explains some of applications of ad hoc networks. Nowadays computers and phones manufacturers implement ad hoc technology to their products. Tactical Networks: -Military communication automated system. Entertainment:- Multi users games, Robotics pets. Emergency Services: - Disaster recovery, Earth quakes. Sensor Network: -Earth activities, Remote weather for sensors. IV. NS2 SIMULATOR Network Simulator version 2 widely known as NS-2 is a discrete event driven network simulation tool for simulation of network to study the dynamic nature of network [3]. It is an open source solution implemented in C++ and Otcl programming languages at UCB (University Of Carolina Berkley).NS-2 provides highly modular platform for simulation of wired as well as wireless networks. NS-2 supports different network components, protocols like TCP,UDP,FTP and traffic sources like CBR etc. Results of the simulations are provided with in a trace files that contains the entire occurred event during the simulation. The output of simulation is visualized through Nam (Network Animator). Otcl/Tcl is a scripting language with very simple syntaxes which allows fast development. Otcl in NS-2 is used to specify the parameters for simulated networks like node, links, protocols, topography and so on. C++ objects oriented language is used for byte manipulation, packet processing and implementation of new algorithm or protocol in NS-2. Otcl and C++ interact with each other through TCL/C++ interface called as TclCl V. AODV PROTOCOL Ad-hoc On Demand Distance Vector: AODV is a distance vector type routing. It does not require nodes to maintain routes to destinations that are not actively used. As long as the endpoints of a communication connection have valid routes to each other, AODV does not play a role. The protocol uses different messages to discover and maintain links: Route Requests (RREQs), Route Replies (RREPs), and Route Errors(RERRs). These message types are received via UDP, and normal IP header processing applies. AODV uses a destination sequence number for each route entry[4]. The destination sequence number is created by the destination for any information it sends to request nodes. Using destination sequence numbers ensures loop freedom and allows knowing which of several routes is fresher. Given the choice between two routes to a destination, a requesting node always selects the one with the greatest sequence number. When a node wants to find a route to another one, it broadcasts a RREQ to all the network till either the destination is reached or another node is found with a fresh enough route to the destination (a fresh enough route is a valid route entry for destination whose associated sequence number is at least as great as that contained in the RREQs). Then a RREQ is sent back to the source and the discovered route is made available. Nodes that are part of an active route may offer connectivity information by broadcasting periodically local Hello messages (special RREQ messages) to its immediate neighbors. If Hello messages stop arriving from a neighbor beyond some given time threshold, the connection is assumed to be lost. When a node detects that a route to a neighbor node is not valid it removes the routing entry and send a REER message to neighbors that are active and use the route; this is possible by maintaining active neighbor lists. This procedure is repeated at nodes that receive REER messages. A source that receives an REER can re initiate a RREQ message. AODV does not allow handling unidirectional links [4]. VI. SIMULATION SCENARIO We simulate the wireless ad hoc network using NS2 simulator version 2.35 having following parameters. Simulation process and results analysis first of all, to set the topology and the configuration of nodes properties, and also properties of MAC layer for some address type, protocol type, channel type, simulation time and transmission way of wireless. In our simulation, we used topography size 1000 m x 800 m, number of wireless nodes 15 nodes with maximum moving speed 8 m/s. We did the Simulation for 1000 sec. with maximum 6 connections at a time allowing UDP traffic. The network simulation parameters we have used for our simulation purpose shown in the following table I.
  • 3. Design and Simulation of Wireless Ad Hoc Network Using NS2 Simulator 32 Table I : Simulation Parameters NETWORK PARAMETERS VALUES No. of nodes 15 Topography area 1000 m X 800 m Connection Type UDP Source Traffic CBR Pay Load 512 Routing protocol AODV Simulation Time 1000 Sec. No.of active connections 6 Network Simulator NS2- 2.35 Some important NS2 commands used for the simulation are as follows[5] a. set ns [new Simulator] - Creates a new simulator object b. create-god $par(nn) - Creates the GOD (General Operations Director) c. set topo [new Topography] - Creates and configure topography d. $ns node-config - Used to specify nodes configuration parameters e. $node_(0) set X, set Y, set Z - Sets nodes X,Y and Z co ordinates f. set agent [new Agent/UDP] - Create new TCP source Agent g. set app [new Application/Traffic/CBR] - Creates new application Agent (CBR) The paper analyzes the simulation result of AODV protocol in Ad hoc network. A Tcl script is written in NS2 for simulation of network model. When this Tcl script is executed it creates two files trace file and Nam file. The Nam file is used to visualize simulated network, where as trace file store different events statistics such as each individual packets arrival time, departs or is dropped , information about protocol agent ,traffic agent , source and destination nodes address etc., which can be used to measure a protocol performance. Different tools [5] are available for the extracting and analysis of required data from trace file such as grep, Awk, sed, Perl. We wrote AWK script to extract the required statistical data of trace file. Following figure 1 show the output of Nam (Network animator). Fig. 1: Snapshot of Simulated Network VII. PERFORMANCE METRICS The performance of the protocols depends on various inter-relating metrics [6]. Which plays important role in analytical observation of the protocol. Following are the some important parameters which we are selected to study the performance of AODV protocols in this simulation study. 1]Packet delivery ratio: Packet delivery ratio is defined as the ratio of data packets received by the destinations to those generated by the sources. Mathematically, it can be defined as: PDR= RSize/SSize
  • 4. Design and Simulation of Wireless Ad Hoc Network Using NS2 Simulator 33 Where, RSize is the sum of data packets received by the each destination and SSize is the sum of data packets generated by the each source. 2] Packet Drop (Loss) Ratio: Packet loss occurs when one or more packets of data traveling across a computer network fail to reach their destination. 3] Throughput: It is defined as the total number of packets delivered over the total simulation time. Mathematically, it can be defined as: Throughput = N/T Where N is the number of bits received successfully by all destinations and T is simulation time. VIII. EXPERIMENTAL RESULTS When the simulation setup is completed, we run the network simulator, which creates two files one is Nam, which visualizes and animates the network. Other file is a trace file, which captures all the events that happened in the simulated network. To extract the data from the trace file we write the AWK script. Data obtained from AWK script is used to find different parameters which includes packet sent, packet received, packet dropped, for CBR traffic flow. This is used to find PDR, DPR and Throughput, which are used to measure the performance of AODV protocol. Following table II shows the evaluated data of trace file which includes packet sent, packet received, packet dropped for CBR . Table II : Values of Performance Metrics Node Link Sent Packets Received Packets Total no.of Dropped Packets N0 - N1 87391 63910 23231 N2 - N3 97344 71204 25640 N6 - N8 76563 55558 20655 N10- N11 102266 69553 31713 N12- N13 94063 68380 24683 N14 - N7 76563 55658 20655 Total 534190 384263 146577 The above values of parameters are used to evaluate the performance of network PDR = Total received packets / Total Sent packets =384263/534190 = 0.71 Throughput = 534190/1000 = 534.19 kbps IX. CONCLUSION As the objective of this research paper is to simulate the wireless network using network simulator NS2 and to measure the performance of this network using AODV as routing protocol. To measure the performance of AODV we select different performance matrix. The values are obtained from the trace file generated by NS2. Using the AWK script the data is processed and is used to measure the performance of AODV protocol. As above results shows that packet delivery ration of AODV protocol is 0.71 and throughput is about 534.19 kbps. REFERENCES [1]. C.Siva Ram Murthy and B.S.Manoj “Ad Hoc Wireless Networks Architectures and Protocols , 2nd edition , Pearson Education. [2]. Andera Goldsmith “Wireless Communication”,Cambridge University Press. [3]. NS2, link: www.isi.edu/nsnam/ns/tutorial ,accessed on Dec.2013. [4]. C.E. Perkins, E. Belding-Royer, and Das “Ad hoc On demand Distance Vector(AODV) routing” ,, IETF Internet Draft, MANET working group, Jan. 2004. [5]. Kevin Fall and Kannan Varadhan, “The NS manual”, May 2010 [6]. Eitan Altman and Tania Jimenez, “Network Simulator for beginners”,