SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 114
Analysis of Random Based Mobility Model Using TCP Traffic for AODV
and DSDV MANET’s Routing Protocols
Narendra Kumar1
Amit Mishra2
1
Student 2
Professor
1,2
Department of Computer Science & Engineering
1
Jodhpur institute of engg & technology, Jodhpur
Abstract— In Mobile Ad hoc network (MANETS), no fixed
infrastructure is available. Different wireless hosts are free
to move from one location to another without any
centralized administration, so, the topology changes rapidly
or unpredictably. Every node operates as router as well as an
end system. Routing in MANETs has been a challenging
task ever since the wireless networks came into existence.
The major reason for this is continues changes in network
topology because of high degree of node mobility. The
MANET routing protocols have mainly two classes:
Proactive routing (or table-driven routing) protocols and
Reactive routing (or on-demand routing) protocols. In this
paper, we have analyzed various Random based mobility
models: Random Waypoint model, Random Walk model,
Random Direction model and Probabilistic Random Walk
model using AODV and DSDV protocols in Network
Simulator (NS 2.35). The performance comparison of
MANET mobility models have been analyzed by varying
number of nodes using traffic TCP. The comparative
conclusions are drawn on the basis of various performance
metrics such as: Routing Overhead (packets), Packet
Delivery Fraction (%), Normalized Routing Load,
Average End-to-End Delay (milliseconds) and Packet Loss
(%).
Key words: Mobile Ad hoc, AODV, DSDV, TCP, routing
overhead, packet delivery fraction, End-to-End delay,
normalized routing load
I. INTRODUCTION
Wireless technology came into existence since the 1970s
and is getting more advancement every day. Because of
unlimited use of internet at present, the wireless technology
has reached new heights. Today we see two kinds of
wireless networks. The first one which is a wireless network
built on-top of a wired network and thus creates a reliable
infrastructure wireless network. The wireless nodes also
connected to the wired network and these nodes are
connected to base stations. An example of this is the cellular
phone networks where a phone connects to the base-station
with the best signal quality.
The second type of wireless technology is where no
infrastructure [1] exists at all except the participating mobile
nodes. This is called an infrastructure less wireless network
or an Ad hoc network. The word Ad hoc means something
which is not fixed or not organized i.e. dynamic. Recent
advancements such as Bluetooth introduced a fresh type of
Wireless systems which is frequently known as
mobile Ad-hoc networks.
A MANET is an autonomous group of mobile
users that communicate over reasonably slow wireless links.
The network topology may vary rapidly and unpredictably
over time because the nodes are mobile. The network is
decentralized where all network activity; including
discovering the topology and delivering messages must be
executed by the nodes themselves. Hence routing
functionality will have to be incorporated into the mobile
nodes. Mobile ad hoc network is a collection of independent
mobile nodes that can communicate to each other via radio
waves. The mobile nodes can directly communicate to those
nodes that are in radio range of each other, whereas others
nodes need the help of intermediate nodes to route their
packets. These networks are fully distributed, and can work
at any place without the aid of any infrastructure. This
property makes these networks highly robust.
In late 1980, within the Internet [1] Engineering
Task Force (IETF) a Mobile Ad hoc Networking (MANET)
Working Group was formed to standardize the protocols,
functional specification, and to develop a routing framework
for IP-based protocols in ad hoc networks. There are a
number of protocols that have been developed since then,
basically classified as Proactive/Table Driven and
Reactive/On- demand Driven routing protocols, with their
respective advantages and disadvantages, but currently there
does not exist any standard for ad hoc network routing
protocol and the work is still in progress. Therefore, routing
is one of the most important issues for an ad hoc network to
make their existence in the present world and prove to be
divine for generations to come. The area of ad hoc
networking has been receiving increasing attention among
researchers in recent years. The work presented in this thesis
is expected to provide useful input to the routing mechanism
in ad hoc Networks.
II. PROTOCOL DESCRIPTIONS
A. Ad hoc On Demand Distance Vector (AODV)
AODV routing algorithm is a source initiated, on demand
driven, routing protocol. Since the routing is “on demand”, a
route is only traced when a source node wants to establish
communication with a specific destination. The route
remains established as long as it is needed for further
communication. Furthermore, another feature of AODV is
its use of a “destination sequence number” for every route
entry. This number is included in the RREQ (Route
Request) of any node that desires to send data. These
numbers are used to ensure the “freshness” of routing
information. For instance, a requesting node always chooses
the route with the greatest sequence number to communicate
with its destination node. Once a fresh path is found, a
RREP (Route Reply) is sent back to the requesting node.
AODV also has the necessary mechanism to inform network
nodes of any possible link break that might have occurred in
the network.
B. Destination Sequenced Distance Vector (DSDV)
The Destination Sequenced distance vector routing protocol
is a proactive routing protocol which is a medications of
Analysis of Random Based Mobility Model Using TCP Traffic for AODV and DSDV MANET’s Routing Protocols
(IJSRD/Vol. 2/Issue 07/2014/0027)
All rights reserved by www.ijsrd.com 115
conventional Bellman-Ford routing algorithm. This protocol
adds a new attribute, sequence number, to each route table
entry at each node. Routing table is maintained at each node
and with this table; node transmits the packets to other
nodes in the network. This protocol was motivated for the
use of data exchange along changing and arbitrary paths of
interconnection which may not be close to any base station.
III. SIMULATIONS
Both routing techniques were simulated in the same
environment using Network Simulator (ns-2). Both AODV
and DSDV were tested by the traffic i.e. TCP. The
algorithms were tested using 50 nodes. The simulation area
is 1000m by 1000m where the nodes location changes
randomly. The connection used at a time is 30. Speed of
nodes varies from 1m/s to 10m/s. by using TCP traffic we
calculate performance of these two protocols for different
random based mobility model. i.e.:
 Random Waypoint (RWP)
 Random walk (RW)
 Random direction (RD)
 Prob. Random Walk (PRW)
IV. SIMULATION RESULT
The results of our simulation will be presented in this
section. First we will discuss the results of both AODV &
DSDV protocol for different matrices and after that we
make the comparison between the two protocols.
A. Scenario
In this scenario, we have used AODV and DSDV protocols
along with mobility models, named as, Random Waypoint
Model, Random Walk Model, Random Direction and
Probabilistic Random Walk Model and traffic types as TCP
and CBR. The Maximum Speed of the node is fixed at 1.5
m/s. The size of the data packet taken in this simulation is
512 bytes. The size of the simulation area is decided as 200
meter × 200 meter. Simulation process will run for duration
of 900 seconds. The pause time for every node before
changing direction and speed is taken as 10 seconds. The
Number of Nodes is varying from 10 to 50. The limit to the
maximum connections between different nodes is fixed up
to 60% of total no. of nodes.
Based on Figure 6.6, we concludes that at low
network load, Random walk model is having minimum
routing overhead while at high network load, Random
Waypoint model is generating minimum overhead packets.
Probabilistic Random Walk Model is generating highest
routing overhead when A model is good for communication.
All models show that the Routing Overhead is increased
when the number of nodes is increasing. Figure 6.7
indicates that Random Waypoint model is generating
minimum routing packets when the number of nodes is less
for DSDV protocol whereas Random Walk models is
generating lowest routing overhead at high network load.
Initially, Prob. Random Walk and Random Walk generates
highest number of overhead packets for less no. of nodes.
Figure 6.8 shows that Packet Delivery Fraction is
decreasing significantly for every mobility model as the
number of nodes are increasing. For AODV protocol, at
both network loads i.e. low and high, Random Walk model
performs better with highest packet delivery fraction while
Analysis of Random Based Mobility Model Using TCP Traffic for AODV and DSDV MANET’s Routing Protocols
(IJSRD/Vol. 2/Issue 07/2014/0027)
All rights reserved by www.ijsrd.com 116
Prob. Random Walk is having minimum packet delivery to
destination. From figure 6.9 we concludes that for DSDV
protocol with TCP traffic, Packet Delivery Fraction is
decreasing significantly with the increase in the number of
nodes. Random Walk model is better for lesser number of
nodes while Random Direction is best for higher number of
nodes. Prob. Random Walk model is again showing its poor
performance for delivering data packets successfully to the
destination.
Figure 6.10 show that initially all the mobility
models are generating almost same normalized routing loads
at low network load. But for higher number of nodes,
Random Waypoint model is generating minimum routing
load whereas Random Walk and Prob. Random Walk
models are generating highest normalized routing packets.
Figure 6.11 indicates that for DSDV protocol, Random
Walk model is generating minimum normalized routing load
at low and high network loads. While Random Waypoint
model is showing poor performance by generating higher
routing load at higher traffic.
Figure 6.12 shows that End-to-End Delay is
increasing significantly for every mobility models with the
increase in number of nodes. For AODV protocol with TCP
traffic, Random Direction model is providing minimum
delay at low network load while Prob. Random Walk is
providing minimum delay for sending data from one node to
another at higher network load. Random Waypoint model is
providing highest delay.
From figure 6.13, we conclude that Prob. Random Walk
model is providing minimum delay at low number of nodes.
Random Walk model provide maximum delay up to 40
nodes. If we increase further the number of nodes then
Random Waypoint model is taking more time to transfer
packets to destination. At this point, Random Direction
model is having minimum delay as compared to other
models.
Figure 6.14 indicates that Random Walk model is
having minimum packet loss at both network loads. Prob.
Random Walk has highest packet loss for low and high
traffics. Figure 6.15, it shows that for DSDV protocol at low
and high traffic conditions, Prob. Random Walk model is
having more percentage of packet loss. During 30 nodes to
40 nodes, every model is having almost same packet loss. In
this case, Random Walk model is better for low network
load while Random Direction model is better at high
network loads.
V. COMPARISON & CONCLUSION
The comparison of both Protocols for different random
access method is shown in following of table:
In both Protocol i.e. AODV & DSDV Random
Walk model have the best performance as the Random Walk
model have better result shown in table.
VI. FUTURE WORK
In this paper four Random mobility models have been
compared using AODV and DSDV protocols. This work can
be extended on the following aspects:
 Investigation of other MANET mobility models
using different protocols under different types of
Analysis of Random Based Mobility Model Using TCP Traffic for AODV and DSDV MANET’s Routing Protocols
(IJSRD/Vol. 2/Issue 07/2014/0027)
All rights reserved by www.ijsrd.com 117
traffic like CBR.
 Different number of nodes and different node
speeds.
REFERENCES
[1] E.M. Royer & C.E. Perkins, An Implementation
Study of the AODV Routing Protocol, Proceedings
of the IEEE Wireless Communications and
Networking Conference, Chicago, IL, September
2000
[2] B. C. Lesiuk, Routing in Ad Hoc Networks of
Mobile Hosts, Available Online:
http://phantom.me.uvic.ca/clesiuk/thesis/reports/ad
hoc/ adhoc.html#E16E2
[3] Andrea Goldsmith; Wireless Communications;
Cambridge University Press, 2005.
[4] Bing Lin and I. Chlamtac; Wireless and Mobile
Network Architectures; Wiley, 2000. [5] S.K.
Sarkar, T.G. Basawaraju and C Puttamadappa;
Ad hoc Mobile Wireless Networks: Principles,
Protocols and Applications; AuerbachPublications,
pp. 1, 2008.
[5] C.E. Perkins, E.M. Royer & S. Das, Ad Hoc On
Demand Distance Vector (AODV) Routing, IETF
Internet draft, draft-ietf-manet-aodv-08.txt, March
2001
[6] C.E. Perkins & E.M. Royer, Ad-hoc On-Demand
Distance Vector Routing, Proceedings of the 2nd
IEEE Workshop on Mobile Computing Systems
and Applications, New Orleans, LA, February
1999, pp. 90- 100
[7] E.M. Royer & C.K. Toh, A Review of Current
Routing Protocols for Ad-Hoc Mobile Wireless
Networks, IEEE Personal Communications
Magazine, April 1999, pp. 46-55.
[8] D. Comer, Internetworking with TCP/IP Volume 1
(Prentice Hall, 2000)

Contenu connexe

Tendances

Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manetAlexander Decker
 
A comparative analysis on routing
A comparative analysis on routingA comparative analysis on routing
A comparative analysis on routingijcseit
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetyatin1988
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 

Tendances (17)

Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
H01115155
H01115155H01115155
H01115155
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
A comparative analysis on routing
A comparative analysis on routingA comparative analysis on routing
A comparative analysis on routing
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 

Similaire à Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET`s Routing Protocols

A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKijcseit
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKijcseit
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETIOSRJECE
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetIOSR Journals
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...IJECEIAES
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyIOSR Journals
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKIJCSIT Journal
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 

Similaire à Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET`s Routing Protocols (20)

A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
K017426872
K017426872K017426872
K017426872
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
J011137479
J011137479J011137479
J011137479
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
An Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANETAn Even Data-Distribution Protocolfor Highly Dynamic VANET
An Even Data-Distribution Protocolfor Highly Dynamic VANET
 
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in QualnetNetwork Lifetime Analysis of Routing Protocols of Short Network in Qualnet
Network Lifetime Analysis of Routing Protocols of Short Network in Qualnet
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
 
eaodv
eaodveaodv
eaodv
 
A41040105
A41040105A41040105
A41040105
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORKANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
ANALYSIS OF ROUTING PROTOCOLS IN WIRELESS MESH NETWORK
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 

Plus de ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

Plus de ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Dernier

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Dernier (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET`s Routing Protocols

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 07, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 114 Analysis of Random Based Mobility Model Using TCP Traffic for AODV and DSDV MANET’s Routing Protocols Narendra Kumar1 Amit Mishra2 1 Student 2 Professor 1,2 Department of Computer Science & Engineering 1 Jodhpur institute of engg & technology, Jodhpur Abstract— In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%). Key words: Mobile Ad hoc, AODV, DSDV, TCP, routing overhead, packet delivery fraction, End-to-End delay, normalized routing load I. INTRODUCTION Wireless technology came into existence since the 1970s and is getting more advancement every day. Because of unlimited use of internet at present, the wireless technology has reached new heights. Today we see two kinds of wireless networks. The first one which is a wireless network built on-top of a wired network and thus creates a reliable infrastructure wireless network. The wireless nodes also connected to the wired network and these nodes are connected to base stations. An example of this is the cellular phone networks where a phone connects to the base-station with the best signal quality. The second type of wireless technology is where no infrastructure [1] exists at all except the participating mobile nodes. This is called an infrastructure less wireless network or an Ad hoc network. The word Ad hoc means something which is not fixed or not organized i.e. dynamic. Recent advancements such as Bluetooth introduced a fresh type of Wireless systems which is frequently known as mobile Ad-hoc networks. A MANET is an autonomous group of mobile users that communicate over reasonably slow wireless links. The network topology may vary rapidly and unpredictably over time because the nodes are mobile. The network is decentralized where all network activity; including discovering the topology and delivering messages must be executed by the nodes themselves. Hence routing functionality will have to be incorporated into the mobile nodes. Mobile ad hoc network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes can directly communicate to those nodes that are in radio range of each other, whereas others nodes need the help of intermediate nodes to route their packets. These networks are fully distributed, and can work at any place without the aid of any infrastructure. This property makes these networks highly robust. In late 1980, within the Internet [1] Engineering Task Force (IETF) a Mobile Ad hoc Networking (MANET) Working Group was formed to standardize the protocols, functional specification, and to develop a routing framework for IP-based protocols in ad hoc networks. There are a number of protocols that have been developed since then, basically classified as Proactive/Table Driven and Reactive/On- demand Driven routing protocols, with their respective advantages and disadvantages, but currently there does not exist any standard for ad hoc network routing protocol and the work is still in progress. Therefore, routing is one of the most important issues for an ad hoc network to make their existence in the present world and prove to be divine for generations to come. The area of ad hoc networking has been receiving increasing attention among researchers in recent years. The work presented in this thesis is expected to provide useful input to the routing mechanism in ad hoc Networks. II. PROTOCOL DESCRIPTIONS A. Ad hoc On Demand Distance Vector (AODV) AODV routing algorithm is a source initiated, on demand driven, routing protocol. Since the routing is “on demand”, a route is only traced when a source node wants to establish communication with a specific destination. The route remains established as long as it is needed for further communication. Furthermore, another feature of AODV is its use of a “destination sequence number” for every route entry. This number is included in the RREQ (Route Request) of any node that desires to send data. These numbers are used to ensure the “freshness” of routing information. For instance, a requesting node always chooses the route with the greatest sequence number to communicate with its destination node. Once a fresh path is found, a RREP (Route Reply) is sent back to the requesting node. AODV also has the necessary mechanism to inform network nodes of any possible link break that might have occurred in the network. B. Destination Sequenced Distance Vector (DSDV) The Destination Sequenced distance vector routing protocol is a proactive routing protocol which is a medications of
  • 2. Analysis of Random Based Mobility Model Using TCP Traffic for AODV and DSDV MANET’s Routing Protocols (IJSRD/Vol. 2/Issue 07/2014/0027) All rights reserved by www.ijsrd.com 115 conventional Bellman-Ford routing algorithm. This protocol adds a new attribute, sequence number, to each route table entry at each node. Routing table is maintained at each node and with this table; node transmits the packets to other nodes in the network. This protocol was motivated for the use of data exchange along changing and arbitrary paths of interconnection which may not be close to any base station. III. SIMULATIONS Both routing techniques were simulated in the same environment using Network Simulator (ns-2). Both AODV and DSDV were tested by the traffic i.e. TCP. The algorithms were tested using 50 nodes. The simulation area is 1000m by 1000m where the nodes location changes randomly. The connection used at a time is 30. Speed of nodes varies from 1m/s to 10m/s. by using TCP traffic we calculate performance of these two protocols for different random based mobility model. i.e.:  Random Waypoint (RWP)  Random walk (RW)  Random direction (RD)  Prob. Random Walk (PRW) IV. SIMULATION RESULT The results of our simulation will be presented in this section. First we will discuss the results of both AODV & DSDV protocol for different matrices and after that we make the comparison between the two protocols. A. Scenario In this scenario, we have used AODV and DSDV protocols along with mobility models, named as, Random Waypoint Model, Random Walk Model, Random Direction and Probabilistic Random Walk Model and traffic types as TCP and CBR. The Maximum Speed of the node is fixed at 1.5 m/s. The size of the data packet taken in this simulation is 512 bytes. The size of the simulation area is decided as 200 meter × 200 meter. Simulation process will run for duration of 900 seconds. The pause time for every node before changing direction and speed is taken as 10 seconds. The Number of Nodes is varying from 10 to 50. The limit to the maximum connections between different nodes is fixed up to 60% of total no. of nodes. Based on Figure 6.6, we concludes that at low network load, Random walk model is having minimum routing overhead while at high network load, Random Waypoint model is generating minimum overhead packets. Probabilistic Random Walk Model is generating highest routing overhead when A model is good for communication. All models show that the Routing Overhead is increased when the number of nodes is increasing. Figure 6.7 indicates that Random Waypoint model is generating minimum routing packets when the number of nodes is less for DSDV protocol whereas Random Walk models is generating lowest routing overhead at high network load. Initially, Prob. Random Walk and Random Walk generates highest number of overhead packets for less no. of nodes. Figure 6.8 shows that Packet Delivery Fraction is decreasing significantly for every mobility model as the number of nodes are increasing. For AODV protocol, at both network loads i.e. low and high, Random Walk model performs better with highest packet delivery fraction while
  • 3. Analysis of Random Based Mobility Model Using TCP Traffic for AODV and DSDV MANET’s Routing Protocols (IJSRD/Vol. 2/Issue 07/2014/0027) All rights reserved by www.ijsrd.com 116 Prob. Random Walk is having minimum packet delivery to destination. From figure 6.9 we concludes that for DSDV protocol with TCP traffic, Packet Delivery Fraction is decreasing significantly with the increase in the number of nodes. Random Walk model is better for lesser number of nodes while Random Direction is best for higher number of nodes. Prob. Random Walk model is again showing its poor performance for delivering data packets successfully to the destination. Figure 6.10 show that initially all the mobility models are generating almost same normalized routing loads at low network load. But for higher number of nodes, Random Waypoint model is generating minimum routing load whereas Random Walk and Prob. Random Walk models are generating highest normalized routing packets. Figure 6.11 indicates that for DSDV protocol, Random Walk model is generating minimum normalized routing load at low and high network loads. While Random Waypoint model is showing poor performance by generating higher routing load at higher traffic. Figure 6.12 shows that End-to-End Delay is increasing significantly for every mobility models with the increase in number of nodes. For AODV protocol with TCP traffic, Random Direction model is providing minimum delay at low network load while Prob. Random Walk is providing minimum delay for sending data from one node to another at higher network load. Random Waypoint model is providing highest delay. From figure 6.13, we conclude that Prob. Random Walk model is providing minimum delay at low number of nodes. Random Walk model provide maximum delay up to 40 nodes. If we increase further the number of nodes then Random Waypoint model is taking more time to transfer packets to destination. At this point, Random Direction model is having minimum delay as compared to other models. Figure 6.14 indicates that Random Walk model is having minimum packet loss at both network loads. Prob. Random Walk has highest packet loss for low and high traffics. Figure 6.15, it shows that for DSDV protocol at low and high traffic conditions, Prob. Random Walk model is having more percentage of packet loss. During 30 nodes to 40 nodes, every model is having almost same packet loss. In this case, Random Walk model is better for low network load while Random Direction model is better at high network loads. V. COMPARISON & CONCLUSION The comparison of both Protocols for different random access method is shown in following of table: In both Protocol i.e. AODV & DSDV Random Walk model have the best performance as the Random Walk model have better result shown in table. VI. FUTURE WORK In this paper four Random mobility models have been compared using AODV and DSDV protocols. This work can be extended on the following aspects:  Investigation of other MANET mobility models using different protocols under different types of
  • 4. Analysis of Random Based Mobility Model Using TCP Traffic for AODV and DSDV MANET’s Routing Protocols (IJSRD/Vol. 2/Issue 07/2014/0027) All rights reserved by www.ijsrd.com 117 traffic like CBR.  Different number of nodes and different node speeds. REFERENCES [1] E.M. Royer & C.E. Perkins, An Implementation Study of the AODV Routing Protocol, Proceedings of the IEEE Wireless Communications and Networking Conference, Chicago, IL, September 2000 [2] B. C. Lesiuk, Routing in Ad Hoc Networks of Mobile Hosts, Available Online: http://phantom.me.uvic.ca/clesiuk/thesis/reports/ad hoc/ adhoc.html#E16E2 [3] Andrea Goldsmith; Wireless Communications; Cambridge University Press, 2005. [4] Bing Lin and I. Chlamtac; Wireless and Mobile Network Architectures; Wiley, 2000. [5] S.K. Sarkar, T.G. Basawaraju and C Puttamadappa; Ad hoc Mobile Wireless Networks: Principles, Protocols and Applications; AuerbachPublications, pp. 1, 2008. [5] C.E. Perkins, E.M. Royer & S. Das, Ad Hoc On Demand Distance Vector (AODV) Routing, IETF Internet draft, draft-ietf-manet-aodv-08.txt, March 2001 [6] C.E. Perkins & E.M. Royer, Ad-hoc On-Demand Distance Vector Routing, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90- 100 [7] E.M. Royer & C.K. Toh, A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks, IEEE Personal Communications Magazine, April 1999, pp. 46-55. [8] D. Comer, Internetworking with TCP/IP Volume 1 (Prentice Hall, 2000)