Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols

Size: px
Start display at page:

Download "Simulation and Performance Analysis Evaluation for Variant MANET Routing Protocols"

Transcription

1 Simulation and Performance Analysis Evaluation for Variant MANET Mrs. Assistant Lecturer, Technical College on Mosul, Mosul, Iraq, doi: /ijact.vol3. issue1.1 Abstract This paper first describes characteristics of Mobile Ad hoc Networks (MANETs), and ir Routing protocol, and second a mobile ad hoc network (MANET) which consists of set mobile wireless nodes (25, 50, 75, and 100) and one fixed wireless server are design using OPNET Modeler The performance of this network under different routing protocol is analyzed by three metrics: delay, network load and throughput. The comparison analysis will carry out about se protocols and in last conclusion shows which routing protocol is best one for mobile ad hoc networks. 1. Introduction Keywords: MANET,, OPNET, AODV, TORA, DSR MANET stands for Mobile Ad hoc Network is a dynamic distributed system of arbitrarily moving wireless devices with limited battery power [1][2]. It is a decentralized autonomous wireless system which consists of free nodes. It is also sometimes called a mobile mesh network, and is a self configurable wireless network. A MANET consists of mobile nodes, a router with multiple hosts and wireless communication devices. The wireless communication devices are transmitters, receivers and smart antennas. These antennas can vary in many types, while nodes can be eir fixed or mobile. Node types are: mobile phone, laptop, personal digital assistance, MP3 player and personal computer. These nodes can be located in cars, ships, airplanes as well as small personal electronic devices [3]. Nodes can connect to each or randomly as well as forming arbitrary topologies. Nodes mselves can act like a router. The topology may also change frequently. Each user of node has freedom to move while communicating. One node can take packet from or node and transmit it to its neighboring node[4]. The ability of self configuration of se nodes makes m more suitable for urgently required network connections. For example in disaster hit areas where re is no communication infrastructure, and it is necessary to quickly obtain a communication infrastructure. MANET is a fast solution in any disaster situation. MANET is a spontaneous network. It is useful when dealing with wireless devices in which some of devices are part of network only for duration of a communication session. The MANET working group (WG) within Internet Engineering Task Force (IETF) works specifically on developing IP routing protocols topologies. Interest in MANETs is due to promise of ubiquitous connectivity beyond that currently being provided by Internet. Firstly, MANETs are easily deployed allowing a plug-and-communicate method of networking. Secondly, MANETs need no infrastructure [5], eliminating need for an infrastructure and reducing cost of establishing network. Moreover, such networks can be useful in disaster recovery where re is not enough time or resources to install and configure an infrastructure. Thirdly, MANETs do not need central management. Hence, y are used in military operations where units are moving around battle field and a central unit cannot be used for synchronization [6]. Potential applications of MANETinclude mobile conferencing, emergency services, disaster recovery, and battlefield operations[7] MANET have a dynamic nature, and are ideal as y have a large number of applications. Quick deployment and minimal configuration of MANET makes m suitable to use in emergencies such as natural disasters. The growth of technology and increase in Wi-Fi capable laptops, mobile phones, MP3 players and or small portable devices has created a genuine reason for population of MANET [8]. Ad hoc networks have two forms; one is static ad hoc networks (SANET), and or is called mobile ad hoc network (MANET). Commercial implementation of ad hoc networks has become possible due to development of new technology such as [9]

2 A number of MANET routing protocols were proposed in last decade. These protocols can be classified according to routing strategy that y follow to find a path (route) to destination. These protocols perform variously depending on type of traffic, number of nodes, rate of mobility, etc [5].Simulations provide a valuable means to compare different protocols and study ir performance in terms of efficiency and robustness. Indeed, network simulation environments such as ns-2, GloMoSim, Qualnet, and Opnet are most commonly used tools for evaluating and comparing performance of mobile ad hoc network (MANET) protocols. OPNET Modeler is used in this paper. It is a network simulator developed at Massachusetts Institute of Technology that can model and simulate communication networks, devices, and protocols. OPNET Modeler is based on a series of hierarchical editors that directly parallel structure of actual networks and protocols. OPNET Modeler shows animations of simulation status and graphs of simulation results estimated in this study, while references number 15 use Ns-2 and self similarity traffic for evolution of MANET Routing protocols. 2. in MANETs Routing protocols in MANET are divided into four categories: proactive, reactive, hierarchical and geographic routing protocols [10]. The most popular ones are AODV, DSR (reactive), OLSR (proactive) and GRP (geographic).reactive protocols like DSR and AODV find routes only when requested and data need to be transmitted by source host using distance-vector routing algorithms. Proactive protocols like OLSR are table driven protocols and use link state routing algorithms. Geographic routing protocols use node position (i.e., geographic coordinates) for data forwarding [10]. A node forwards a packet with considering its neighbors and destination physical positions. In se protocols packets are sent to known geographic coordinates of destination nodes [11]. We will focus in this paper on following MANET routing protocols: 2.1. DSR Dynamic Source Routing (DSR) DSR is an entirely on-demand ad hoc network routing protocol composed of two parts: Route Discovery and Route Maintenance[12]Dynamic Source Routing (DSR) is a reactive protocol that discovers and maintains routes between nodes on demand [13]. It relies on two main mechanisms, Route Discovery and Route Maintenance. In order to discover a route between two nodes, DSR floods network with a Route Request packet. This packet is forwarded only once by each node after concatenating its own address to path. When targeted node receives Route Request, it piggybacks a Route Reply to sender and a route is established. Each time a packet follows an established route, each node has to ensure that link is reliable between itself and next node. DSR provides three successive steps to perform this maintenance: link layer acknowledgment, passive acknowledgment and network layer acknowledgment. If a route is broken, n node which detects failure sends (by piggybacking) a Route Error packet to original sender [14] OLSR (Optimized Link State Routing) OLSR is a proactive routing protocol and is also called a table driven protocol because it permanently stores and updates its routing table. OLSR keeps track of its routing table in order to provide a route if needed. OLSR can be implemented in any ad hoc network. Due to its nature, OLSR is called a proactive routing protocol [4]. Based on definition and use of dedicated nodes, y are called multipoint relays (MPRs). MPRs are selected nodes which forward broadcast packets during flooding process. This technique allows reduction of packet overhead as compared to a pure flooding mechanism, where every node retransmits packet when it receives first copy. In contrast with classic link state algorithm, partial link state information is distributed into network [15]

3 2.3. Ad Hoc on-demand Distance Vector Routing (AODV) AODV provides on-demand route discovery in mobile ad hoc networks [16]. Like most reactive routing protocols, route finding is based on a route discovery cycle involving a broadcast network search and a uncast reply containing discovered paths. Similar to DSDV, AODV relies on per-node sequence numbers for loop freedom and for ensuring selection of most recent routing path. AODV nodes maintain a route table in which next-hop routing information for destination nodes is stored. Each routing table entry has an associated lifetime value. If a route is not utilized within lifetime period, route expires. Orwise, each time route is used, lifetime period is updated so that route is not prematurely deleted [17]. When a source node has data packets to send to some destination, it first checks its route table to determine wher it already has a route to destination. If such a route exists, it can use that route for data packet transmissions. Orwise, it must initiate a route discovery procedure to find a route [17] Temporally Ordered Routing Algorithm (TORA) TORA is anor source-initiated on-demand routing protocol, built on concept of link reversal of Directed Acyclic Graph (ACG) [18]. In addition to being loop-free and bandwidth-efficient, TORA has property of being highly adaptive and quick in route repair during link failure, while providing multiple routes for any desired source/destination pair. These features make it especially suitable for large highly dynamic mobile ad hoc environments with dense populations of nodes. The limitation in TORA s applicability comes from its reliance on synchronized clocks. If a node does not have a GPS positioning system or some or external time source, or if time source fails, algorithm cannot be used [17]. TORA is designed to operate in a highly dynamic mobile networking environment. It is sourceinitiated and provides multiple routes for any desired source destination pair. The key design concept of TORA is localization of control messages to a very small set of nodes near occurrence of a topological change. To accomplish this, nodes need to maintain routing information about adjacent (one-hop) nodes. The protocol performs three basic functions: Route creation, Route maintenance and Route erasure [19] 3. Performance Parameters OPNET modeler supports different parameters for measurement performance evaluation of MANET network under different routing protocols. These parameters have different behaviors for overall network performance [8]. We evaluate three parameters in our study on overall network performance. These parameters are delay, network load, and throughput Delay The packet end-to-end delay is time from generation of a packet by source up to destination reception, so this is time that a packet takes to go across network. This time is expressed in seconds (sec) [8] Network Load Network load represents total load in bit/sec submitted to wireless LAN layers by all higher layers in all WLAN nodes of network [20]. When re is more traffic coming into network, and it is difficult for network to handle all this traffic it is called network load. An efficient network can easily cope with large traffic coming in, and to make best possible network, many techniques have been introduced [8]

4 3.3. Throughput Throughput: Representing total data traffic in bits/sec successfully received and forwarded to higher layer by WLAN MAC [21] 4. The Simulation Methodology The Optimized Network Engineering Tool (OPNET v14.5) software used for simulations implemented in this paper. The first step is to create and design network. Figure (1) showss simulation environment of one scenario containing 25 mobile nodes and one fixed WLAN server running GRP. We used MANET model library provided by version 14.5, wlan_wkstn_adv node model which represents a workstation with client-server applications running over TCP/IP and UDP/IP. The workstation supports one underlying WLAN connection at 1 Mbps, 2 Mbps, 5.5 Mbps, and 11 Mbps. we configure entire node in scenario to work with 5.5 Mbps. The network size is of 1500 x 1500 meters. After that IPv4 addressing was assigned to all nodes. We use The Rx Group Config node to speed up simulation time. This scenario is used to compute set of possible receivers that a node can communicate with, so all possible receivers that have a channel match with transmitter channel(s), and fall within distance and path loss thresholds are receivers that a node can communicate with. It is configured to eliminate all receivers that are over 1500 meters away. The "Application Config" node is used to specify applications using available application types. FTP application type was chosen to all nodes in network with multiple FTP sessions, and FTP was selected as traffic High Load. We ran four scenarios, for each type of routing protocol, in every scenario re were 25, 50, 75 and 100 mobile nodes. Alll attributes remained same except for number of nodes, which was increased. The routing protocol of network also changed. Each scenario was run for 30 minutes (simulation time). The MANET network under AODV, DSR, OLSR, GRP, and TORA were tested against three parameters i.e. delay, network load and throughput. Figure 1. Simulating 25 Nodes Results_ The First Scenario for MANET 25 Nodes Throughput Figure (2) shows WLAN throughput for first scenario. The peak value of throughput when number of nodes is 25 under OLSR is equal to bit/sec and it remains constant along simulation period, under GRP equal to bits/sec but value degrades to bit/sec and remains approximately constant along simulation period. Under AODV, throughput were 0 until minute 8 of simulation period n value changed to peak value equals to bit/sec but it didn t remain constant along simulation period. Under DSR value of throughput like AODV was 0 until 7 minutes of simulation period n value changed to peak value equal to bit/sec but it didn t remain constant along simulation period. Under TORA value of throughput was 0 until 7 minutes of simulation period n value changed to peak - 4 -

5 15133bit/sec but it didn t remain constant along simulation period. Figure (2) shows a good stable throughput for MANET running OLSR as routing protocol of network. Figure 2. Wireless LAN Throughput in bit/sec for MANET 25 Nodes Delay Figure (3) shows delay of WLAN for first scenario. The value of delay when number of nodes is 25 under OLSR is smallest value and is equal to seconds and remains constant along simulation period. Under GRP, peak value was equal to seconds and re were very slight changes in GRP delay to value seconds and remained constant along simulation period. Under AODV, peak value of delay was seconds and remained constant to this value along simulation period. Under TORA, peak value of delay was equal to seconds and ree was a change in this value equal to seconds and remaining constant along simulation period. Under DSR, delay was at 7 minutes, n re were slight changes in DSR delay to peak value which remained constant to this value along simulation period Load Figure 3. Time Average in Wireless LAN Delay in sec for MANET 25 Nodes Figure (4) shows load of WLAN for first scenario. The value of load when number of nodes is 25 under OLSR is largest value with a peak value equal to bit/sec and remaining constant along simulation period. Under GRP, value of load start with its peak value equal to bit/sec and starting to decrease along simulation period to reach value 4137 bit/sec which remains constant to this value along simulation period. Under AODV, load begins with its smallest value which is equal to 0 until minute 7 of simulation period n starts to increase to reach its peak value equal to 3034 bit/sec and remaining constant along simulation period. Under TORA, load begins with its smallest value which is equal to 1048 bit/sec until minute 7 of simulation period n starts to increase to reach its peak value which is equal to 2985 bit/sec and - 5 -

6 remains constant along simulation period, under load begins with its smallest value equals to 0 until minute 7 of simulation period n startss to increase to reach its peak value equals to 2404 bit/sec and remains constant along simulation period. Figure 4. Time Average in Wireless LAN Load in bit/sec for MANET 25 Nodes The Second scenario for MANET 50 nodes Throughput Figure (5) shows WLAN throughput for second scenario. The peak value of throughput when number of nodes is 50 under OLSR is equal to bit/sec and remains constant along simulation period, and comparing this value with value of throughput for 25 nodes we notice a difference between two values. The value for 50 nodes is higher than throughput for 25 nodes, and this is because of increase in number of nodes. Under GRP, peak value of throughput is equal to bits/sec comparing with 25 nodes re is increase with value. This is of course because of increase in number of nodes, but value degrades to bit/sec and remains approximately constant along simulation period. Under AODV throughput was 0 until minute 6 of simulation period n value changed to peak value to be equal to 8629 bit/sec and remained constant along simulation period. Under TORA, value of throughput was equal to 5538 at starting of simulation period n increased to value 8401 bit/sec and remained constant along simulation period. Under DSR, value of throughput was 0 until 7 minutes of simulation period n value changed to peak 3855bit/sec and remained constant along simulation period. This figure showed a good stable throughput for MANET running OLSR as routing protocol of network and increased of this value. Figure 5. WLAN Throughput in bit/sec for MANET 50 Nodes - 6 -

7 4.2.2 Delay Figure (6) shows delay metric of WLAN for second scenario. The value of delay when number of nodes is 50 under OLSR is smallest value and is equal to seconds and remains constant along simulation period, but a slight increase in delay is noticed comparing with 25 nodes. Under GRP peak value is equal to seconds and re are very slight changes in GRP delay to seconds but it remains constant along simulation period. Under AODV peak value of delay was seconds at 6 minutes of simulation period. There was a slight decrease in value of AODV delay to reach seconds and it remained constant to this value along simulation period. Under TORA, peak value of delay was equal to seconds and re was a change in this value to equal seconds. Under DSR delay was at minute 6, but re was an increase in DSR delay to peak value seconds. Figure 6. Time Average in Wireless LAN Delay in sec for MANET 50 Nodes Load Figure (7) shows load of WLAN for second scenario. The value of load when number of nodes is 50 under OLSR is largest value with a peak value equal to bit/sec and remaining constant for simulation period. Under GRP, value of load starts with its peak value equal to bit/sec and starting to decrease along simulation period to reach value 7760 bit/sec and remaining constant to this value along simulation period. Under AODV, load begin with its smallest value equal to 0 until minute 7 of simulation period n starting to increase to reach its peak value equal to 4983bit/sec. Under TORA, load begins with a value equal to 3644 bit/sec n starting to increase to reach its peak value equal to 5956 bit/sec. Under DSR load begins with its smallest value equal to 0 until minute 6 of simulation period n starting to increase to reach its peak value equal to 3605 bit/sec and remaining constant along simulation period. Under AODV, load begins with its smallest value equal to 0 until minute 6 of simulation period n starting to increase to reach its peak value equal to 5209 bit/sec and remaining constant along simulation period. Figure 7. Time Average in WLAN Load in bit/sec for MANET 50 Nodes - 7 -

8 4.3.. The Third Scenario for MANET 75 Nodes Throughput Figure (8) shows WLAN throughput for third scenario. The peak value of throughput when number of nodes is 75 is under OLSR and is equal to /sec (starting with value bit/sec) and remaining constant along simulation period. Comparing this value with value of throughput for 50 nodes, we notice differences between two values. The throughput value for 75 nodes is higher than throughput for 50 nodes, and this is because of increase in number of nodes. Under GRP throughputt starts with value bits/sec and decreases to value bit/sec comparing with 50 nodes re are increase with value and this is of course because of increase in number of nodes. Under AODV, throughput was 0 until minute 3 of simulation period n value changed to peak value equal to 2637 bit/sec. The value n kept increasing to reach value 23162bit/sec and remained constant along simulation period. Under TORA, value of throughput was equal to bit/sec at start of simulation period n increased to value bit/sec and remained constant along simulation period. Under DSR, value of throughput was 0 until 6 minute of simulation period n value changed to become 518 bit/sec and kept increasing to reach to its peak value 7009 bit/sec and remained constant along simulation period. This figure showed a good stable throughput for MANET running OLSR as a routing protocol for network. Figure 8. WLAN Throughput in bit/sec for MANET 75 Nodes Delay Figure (9) shows delay of WLAN for third scenario. The value of delay when number of nodes is 75 under OLSR is smallest value and is equal to seconds and remains constant along simulation period. Under GRP delay value starts with seconds, n re are slight changes in GRP delay to value seconds which remains constant along simulation period. Under AODV, peak value of delay was seconds at minute 3 of simulation period. There is a slight decrease in value of AODV delay to reach second and remaining constant to this value along simulation period. Under TORA peak value of delay was equal to seconds at beginning of simulation period and re were changes in this value to decreasee along simulation period to reach value second. Under DSR, delay was at minute 6 n increased in DSR delay to reach to peak value second

9 Figure 9. Time Average in WLAN Delay in sec for MANET 75 Nodes Load Figure (10) shows load of WLAN for third scenario. The value of load when number of nodes is 75 under OLSR is largest value starting with bit/sec to reach peak value equal to bit/sec and remaining constant along simulation period. Under GRP value of load starts with its peak value equal to bit/sec and starts to decrease along simulation period to reach value bit/sec and remains constant to this value along simulation period. Under AODV, load begins with its smallest value equals to 0 until minute 3 of simulation period n starts to increase to reach its peak value equal to 8840 bit/sec. Under TORA, load begins with value equal to 8266 bit/ /sec n starts to increase to reach its peak value equal to bit/sec. Under DSR, load begins with its smallest value equal to 0 until minute 6 of simulation period n starts to increase to reach its peak value equal to 8820 bit/sec. Under AODV, load begins with its smallest value equal to 0 until minute 3 of simulation period n starts to increase to reach it peak value equal to 8790 bit/sec and remaining constant along simulation period. Figure 10. Time average in WLAN Load in bit/sec for MANET 75 nodes The Fourth scenario for MANET 100 nodes Throughput Figure (11) shows WLAN throughput for fourth scenario. The peak value of throughput when number of nodes is 100 under OLSR is equal to /sec (starting with value bit/sec) and remains constant along simulation period. Comparing this value with value of throughputt for 75 nodes, we notice a difference between two values. The throughput value for 100 nodes is higher than throughput for 75 nodes. This is because of increase in number of nodes. Under GRP, throughput starts with value bits/sec and decreases to value bit/sec. Comparing with 75 nodes re was an increase with throughput value, and this of - 9 -

10 course, is becausee of increase in number of nodes. Under AODV, throughput was 0 until minute 2 of simulation period n value changed to peak value equal to 2416 bit/sec and keeps increasing to reach value of 45508bit/sec and remain constant along simulation period. Under TORA value of throughput was bit/sec at start of simulation period n increased to value of bit/sec and remained constant along simulation period. Under DSR, value of throughput was 0 until minute 3 of simulation period n value changed to 1371 bit/sec and kept increasing to reach its peak value 12286bit/sec and remain constant along simulation period. This figure showed a good stable throughput for MANET running OLSR as routing protocol of network. Figure 11. Wireless LAN Throughput in bit/sec for MANET 100 nodes Delay Figure (12) shows delay of WLAN for fourth scenario. The value of delay when number of nodes is 100 under OLSR is smallest value and equal to second and remains constant along simulation period. Under GRP delay value starts at second and n slightly changes in GRP delay to value second and remains constant along simulation period. Under AODV, peak value of delay was second at minute 3 of simulation period, and n re was a slight decrease in value of AODV delay to reach second and remain constant to this value along simulation period. Under TORA, peak value of delay equals to second at begging of simulation period and re was change in this value to decrease along simulation period to reach value second. Under DSR, delay was at.63minutes n re was an increase in DSR delay to reach peak value second Load Figure 12. Time average in WLAN delay in sec for MANET 100 nodes Figure (13) shows load of WLAN for fourth scenario. The value of load when number of nodes is 100 under OLSR is largest value starting with bit/ /sec to reach peak value equal to bit/ /sec and remaining constant along simulation period. Under GRP, value of load starts with its peak value equal to bit/sec and starting to decrease along simulation period to reach value bit/sec and remaining constant to this value along

11 simulation period. Under AODV, load begins with its smallest value equal to 0 until minute 2 of simulation period n starting to increase to reach its peak value equal to bit/sec. Under TORA, load begins with value equal to bit/sec n starting to increase to reach its peak value equal to bit/sec. Under DSR, load begins with its smallest value equal to 0 until minute 3 of simulation period n starting to increasee to reach it peak value equal to bit/sec. Figure 13. Time average in Wireless LAN Load in bit/sec for MANET 1000 nodes 5. Conclusionss The simulation study of our paper for MANET network under five routing protocols AODV, DSR OLSR, TORA and GRP were deployed using FTP traffic analyzing. We checked behavior of se protocols with respect to three performance metrics: delay, network load and throughput. Figures of 2 to 13 show behavior of MANET under all routing protocols for different numbers of mobile nodes. Obviously some routing protocols performed better than ors. From above analysis of routing protocols, OLSR outperforms fourth AODV, DSR, TORRA and GRP in both delay and throughput. 6. References [1] [2] [3] [4] [5] [6] [7] [8] M. Gerl and J.T. Tsai, Multicluster, mobile, multimedia radio network ACM Wireless Networks Vol 1, No3,ppp , 1995 Natarajan Meghanthan," A Simulation-based Performance Analysis of Multicast Routing in Mobile Ad hoc Networks",International Journal of Informationn Processing and Management (IJIPM),Volume 1, Number 1, July 2010 Xiaogeng Zhao, An Adaptive Approach for Optimized Opportunistic Routing Over Delay Tolerant Mobile Ad Hoc Networks, Computer Science Department, Rhodes University, PhD sis, December 2007 M. G. Kaosar, H. M. Asif, T R. Sheltami, A. S. H. Mahmoud. Simulation-Based Comparative Study of On Demand for MANET. International Conference on Wireless Networking and Mobile Computing (ICWNMC'05) Chennai, India. Vol. 1, pp , 2005 S. Lee, J. Hsu, R. Hayashida, M. Gerla, and R. Bagrodia, Selecting a Routing Strategy for Your Ad Hoc Network, Computer Communications, vol. 26, no. 7, pp , May C. E. Perkins and P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers, ACM SIGCOMM Computer Communication Review, Vol 24, Isse 4, pp , October 1994 Wesam Almobaideen, Khaled Hushaidan, Azzam Sleit, Mohammad Qatawneh," A Cluster-Based Approach for Supporting QoS in Mobile Ad Hoc Networks", International Journal of Digital Content Technology and its Applications(JDCTA). Volume 5, Number 1, January 2011 Sajjad Ali & Asad Ali, Performance Analysis of AODV, DSR and OLSR in MANET, department of Electrical Engineering with emphasis on Telecommunication, Blekinge Institute of Technology Sweden, MSc Thesis,

12 [9] Hassan, A.M. Youssef, M.I. Zahra, M.M, Evaluation of Ad Hoc in Real Simulation Environments,Computer Engineering and Systems, The 2006 International Conference on, pp , [10] Hossein Ashtiani, Mohsen Nikpour and Hamed Moradipour, A Comprehensive Evaluation of for Ordinary and Large-Scale Wireless MANETs, nas, pp IEEE International Conference on Networking, Architecture, and Storage, 2009 [11] C.Mbarushimana and A. Shahrabi, Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks, In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops AINAW '07, Vol. 2, pp , May 2007 [12] Mamoun Hussein Mamoun,"A Secure DSR Routing Protocol for MANET ", Journal of Convergence Information Technology,(JCIT),Volume 4, Number 1, March 2009,pp3-10 [13]. Johnson, D. Maltz, Y.-C. Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR) - Experimental RFC, IETF MANET Working Group. July Access Available from website: org/internet-drafts/draft-ietf-manet-dsr-10.txt [14] Stephane Maag, Cyril Grepet, Ana Cavalli, A formal validation methodology for MANET routing protocols based on nodes self similarity, Journal Computer Communications Vol. 31,Issue 4, pp , 5 March2008 [15] Maashri, A. and Ould-Khaoua, M., Performance analysis of MANET routing protocols in presence of self-similar traffic, In Proceedings of 31st IEEE Conference on Local Computer Networks, pp 14-16, November 2006, [16] Carlos Miguel,Tavares Calafate, Roman Garcia, Pietro Manzoni, Optimizing implementation of a MANET routing protocol in a heterogeneous environment, in Proceedings of Eighth IEEE International Symposium on Computers and Communication (ISCC 03).Vol. 1,pp ,2003 [17] C. E. Perkins and E. M. Royer, The Ad Hoc On-Demand Distance Vector Routing, In preceding of 2end IEEE Workshop on Mobile computing systems and Application,pp ,1999 [18] Stefano Basagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic, Mobile Ad Hoc Networking, Willey- IEEE Press. April 2004 [19] V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, in Proceedings of INFOCOM 97, Sixteenth Annual Joint Conference of IEEE Computer and Communications Societies., pp , April 1997 [20] Belding-Royer, E.M., and C.-K. Toh, A Review of Current for Ad Hoc Mobile Wireless Networks, IEEE Personal Communications Magazine, Vol.6, Issue 2, pp ,1999. [21] Bin Abd. Latif, S. Rashid, M.A. Alam, Profiling Delay and Throughput Characteristics of Interactive Multimedia Traffic over WLANs using OPNET, 21st International Conference on Advanced Information Networking and Applications Workshops ( AINAW '07),Vol. 2,pp ,

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of MANET Using Quality of Service Metrics Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,

More information

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj

More information

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network Ad Hoc and Wireless Mesh Networking Laura Marie Feeney lmfeeney@sics.se Datakommunikation III, HT 00 Overview Ad hoc and wireless mesh networks Ad hoc network (MANet) operates independently of network

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College

More information

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn: Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS 1 ALOK KUMAR JAGADEV, 2 BINOD KUMAR PATTANAYAK *, 3 AJIT KUMAR NAYAK, 4 MANOJRANJAN NAYAK Institute Of Technical Education And Research,

More information

Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET.

Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET. Adel Aneiba, Mohammed Melad Department of Computer Networks and Communication Faculty of Information Technology,

More information

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks Laura Marie Feeney Swedish Institute of Computer Science http://www.sics.se/~lmfeeney Overview mobile ad hoc networks routing protocols communication

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Survey of MANET based on Routing Protocols

Survey of MANET based on Routing Protocols Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing

More information

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 9, September 2015,

More information

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

Performance Comparison of AODV, DSDV and ZRP Routing Protocols Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department

More information

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET Latest Research Topics on MANET Routing Protocols Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET In this topic, the existing Route Repair method in AODV can be enhanced

More information

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2 CSE Department, SBSCET Ferozepur, Punjab Email: kanubala89@gmail.com 1, monika.sal@rediffmail.com 2 Abstract MANET stands

More information

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.487

More information

Scalable Routing Protocols for Mobile Ad Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks Helsinki University of Technology T-79.300 Postgraduate Course in Theoretical Computer Science Scalable Routing Protocols for Mobile Ad Hoc Networks Hafeth Hourani hafeth.hourani@nokia.com Contents Overview

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey

More information

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,

More information

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 399-404 International Research Publications House http://www. irphouse.com /ijict.htm Exhaustive

More information

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab

More information

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 777-781 777 Open Access Analysis on Privacy and Reliability of Ad Hoc Network-Based

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3,

More information

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig OLSR-L 1 2 3 4 2 ROULA OLSR OLSR ROULA ROULA OLSR OLSR-L Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig Kazuyoshi Soga, 1 Tomoya Takenaka, 2 Yoshiaki Terashima,

More information

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724 ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi OLSR Standards Emmanuel BACCELLI INRIA / Hitachi Main Topics Standardization of OSLR Where are we at? What are we dealing with? The IETF. The future of OLSR Standards and Concepts. Example: MANET WG (Mobile

More information

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.7, July 2010 219 Simulating AODV and DSDV For Adynamic Wireless Sensor Networks Fasee Ullah, Muhammad Amin and Hamid ul

More information

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS Puneet Mittal, Paramjeet Singh* and Shaveta Rani** Dept. of Computer Engg. Govt. Poly. College, Bathinda,

More information

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE 802.11S WIRELESS MESH NETWORK Aneri Fumtiwala 1, Himani Modi 2, Pinal Patel 3, Mrs.Payal T. Mahida 4 1,2,3,4 Department of Computer Science & Engineering

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

Sensitivity Analysis of EADARP Multicast Protocol

Sensitivity Analysis of EADARP Multicast Protocol www.ijcsi.org 273 Sensitivity Analysis of EADARP Multicast Protocol Dina Darwish Mutlimedia and Internet Department, International Academy for Engineering and Media Science 6 th October city, Egypt Abstract

More information

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS Juan Carlos García, Mari-Carmen Bañuls, Pablo Galdámez and Rubén Quintero Instituto Tecnológico de Informática, Universidad

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET D.Mithila 1, R.Revathy 2, Rozamber Marline 3, P.Sathiyanarayanan 4 4 Assistant professor, Department of Computer Science and Engineering, sathiyanarayanan89@gmail.com.

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks Renato Lo Cigno www.disi.unitn.it/locigno/teaching Part of this material (including some pictures) features and are freely reproduced from: Ian F.Akyildiz, Xudong Wang,Weilin Wang,

More information

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 6, November- December (ISSN 2278 5973) LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR

More information

Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)

Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt) Mobile Ad-Hoc Networks Part I Thomas Plagemann Based on presentation from Matthias Hollick (Technische Universität Darmstadt) Outline Part I: Introduction and Motivation Terminology, Basics and Applications

More information

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT by Yi Zhu A thesis submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of Master of Science

More information

Evaluating the performance of Mesh network protocols for disaster scenarios

Evaluating the performance of Mesh network protocols for disaster scenarios Evaluating the performance of Mesh network protocols for disaster scenarios Maggie Chimbwanda Supervisor: Professor I. M. Venter Co-Supervisor: Dr W. D. Tucker Contents Mesh network introduction Project

More information

Link-state protocols and Open Shortest Path First (OSPF)

Link-state protocols and Open Shortest Path First (OSPF) Fixed Internetworking Protocols and Networks Link-state protocols and Open Shortest Path First (OSPF) Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 0 ITIFN Objectives Describe the basic

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

A Consolidated Analysis of MANET Routing Protocols

A Consolidated Analysis of MANET Routing Protocols A Consolidated Analysis of MANET Routing Protocols Leelavathi School of IT, SEGI University leelavathiraj@segi.edu.my Raja Mohan School of IT, SEGI University rajamohanp@segi.edu.my Thinaharan.R School

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang

More information

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. GeoMAC: Geo-backoff based Co-operative MAC for V2V networks. Sanjit Kaul and Marco Gruteser WINLAB, Rutgers University. Ryokichi Onishi and Rama Vuyyuru Toyota InfoTechnology Center. ICVES 08 Sep 24 th

More information

Secure Ad-Hoc Routing Protocols

Secure Ad-Hoc Routing Protocols Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol

More information

The application trends to the real systems of an Ad hoc network. Susumu MATSUI

The application trends to the real systems of an Ad hoc network. Susumu MATSUI The application trends to the real systems of an Ad hoc network Susumu MATSUI 1980 1990 1990 2000 1 1980 1) 1990 2) 1997 IETF MANET(Mobile Adhoc Network) WG 3) 2003 12 4) 2000 5) 1 2 2.1 1 Topology Base

More information

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif Link Duration, Path Stability and Comparesion of MANET Routing Protcols Sanjay Kumar, Haresh Kumar and Zahid Yousif A Bachelor thesis submitted to the Department of Electrical Engineering COMSATS Institute

More information

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,

More information

MASTER THESIS. Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2

MASTER THESIS. Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2 2010-08-23 Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2 Author Salar Askar Zada THESIS PROJECT Master program in Computer science Abstract No infrastructure,

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS by Lee Kok Thong December 24 Thesis Advisor: Second Reader: Geoffrey Xie Su Wen

More information

ENSC 427: Communica1on Networks

ENSC 427: Communica1on Networks ENSC 427: Communica1on Networks Spring 2014 Final Project Presenta1on Performance of Mobile Ad- Hoc Network Rou9ng Protocols Project website: hbp://www.sfu.ca/~rtariq/proj.html Tariq Rizvi (rtariq@sfu.ca)

More information

Introduction to Mesh

Introduction to Mesh Introduction to Mesh ICTP School on Radio-based Computer Networking February 24 th 2005 Tomas B. Krag wire.less.dk What is Mesh? "A mesh network is a network that employs one of two connection arrangements,

More information

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J

More information

Optimal Multicast Routing in Ad Hoc Networks

Optimal Multicast Routing in Ad Hoc Networks Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting

More information

Keywords mobile ad hoc network, fading, interference, shadowing, QualNet 6.1.

Keywords mobile ad hoc network, fading, interference, shadowing, QualNet 6.1. Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effects of Shadowing,

More information

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Muhammad Irfan Rafique, Marco Porsch, Thomas Bauschert Chair for Communication Networks, TU Chemnitz irfan.rafique@etit.tu-chemnitz.de

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction 1.1Motivation The past five decades have seen surprising progress in computing and communication technologies that were stimulated by the presence of cheaper, faster, more reliable

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Interlayer routing issues for wireless networks

Interlayer routing issues for wireless networks NRL Cross-Layer Workshop Interlayer routing issues for wireless networks June 2, 2004 Tom Henderson Marcelo Albuquerque Phil Spagnolo Jae H. Kim Boeing Phantom Works 1 Report Documentation Page Form Approved

More information

ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM)

ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM) ON DEMAND CHANNEL ASSIGNMENT METHOD FOR CHANNEL DIVERSITY (ODCAM) ABSTRACT Sidi Ould CHEIKH Nouackchott University, Nouackchott, Mauritania The IEEE 802.11s Wireless Mesh Networks (WMN) is a new multi-hop

More information

第 XVII 部 災害時における情報通信基盤の開発

第 XVII 部 災害時における情報通信基盤の開発 XVII W I D E P R O J E C T 17 1 LifeLine Station (LLS) WG LifeLine Station (LLS) WG was launched in 2008 aiming for designing and developing an architecture of an information package for post-disaster

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network

Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network Navtej Singh Sandhu 1, Navdeep Kaur Sandhu 2, Ashwinder Singh 3 M.Tech Student 1 Guru Nanak Dev University Amritsar, Assistant

More information

Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN

Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN Rajinder Kaur Research Scholar, Department of ECE Shaheed Bhagat Singh State Technical Campus, Moga Road ABSTRACT Real implementation

More information

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks Analysis and Design of Link Metrics for Quality Routing PhD Thesis Defense by Nadeem JAVAID Dec 15, 2010 Thesis Director Prof. Karim DJOUANI Jury : Rapporteur B.J. VAN WYK Prof. Tshwane University of Technology

More information

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic

More information

CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS

CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS Jarmo V. E. Mölsä Communications Laboratory Helsinki University of Technology P.O. Box 3, FI-25 HUT, Finland email: jarmo.molsa@tkk.fi

More information

Keywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR.

Keywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR. Applications (IJERA) ISSN: 224-922 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.12-1 Performance Evaluation Of Congestion Control Tcp Variants In Vanet Using Omnet++ Ravinder Kaur*, Gurpreet

More information

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005 Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Plenary Talk at: Jack H. Winters September 13, 2005 jwinters@motia.com 12/05/03 Slide 1 1 Outline Service Limitations Smart Antennas

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)

More information

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks

Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks 2009 First International Conference on Networks & Communications Semiring Pruning for Information Dissemination in Mobile Ad Hoc Networks Kiran K. Somasundaram, John S. Baras Institute of Systems Research

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

Resource Optimization in Video Transmission Using Manet for Defence

Resource Optimization in Video Transmission Using Manet for Defence European Journal of Applied Sciences 9 (2): 57-61, 2017 ISSN 2079-2077 IDOSI Publications, 2017 DOI: 10.5829/idosi.ejas.2017.57.61 Resource Optimization in Video Transmission Using Manet for Defence 1

More information

Introduction to Local and Wide Area Networks

Introduction to Local and Wide Area Networks Introduction to Local and Wide Area Networks Lecturers Amnach Khawne Jirasak Sittigorn Chapter 1 1 Routing Protocols and Concepts Chapter 10 : Link-State Routing Protocols Chapter 11 : OSPF Chapter 1 2

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

AN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS

AN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS AN AUTONOMOUS SIMULATION BASED SYSTEM FOR ROBOTIC SERVICES IN PARTIALLY KNOWN ENVIRONMENTS Eva Cipi, PhD in Computer Engineering University of Vlora, Albania Abstract This paper is focused on presenting

More information

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs This full tet paper was peer reviewed at the direction of IEEE Communications Society subject matter eperts for publication in the ICC 27 proceedings. Modeling Hop Length Distributions for Reactive Routing

More information

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

A REVIEW OF AD-HOC NETWORK

A REVIEW OF AD-HOC NETWORK A REVIEW OF AD-HOC NETWORK Dr. N. Elamathi Asst. Professor, Dept.of Computer Science Trinity college for Women, Namakkal Dt., Tamilnadu, India ABSTRACT ---- This paper focus on the study of Ad hoc network

More information

IEEE based Wireless Mesh Network Testbed

IEEE based Wireless Mesh Network Testbed IEEE 802.11-based Wireless Mesh Network Testbed Heecheol Song, Bong Chan Kim, Jae Young Lee, and Hwang Soo Lee Division of Electrical Engineering, School of EECS, KAIST 373-1, Guseong-dong, Yuseong-gu,

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

Capacity Enhancement in Wireless Networks using Directional Antennas

Capacity Enhancement in Wireless Networks using Directional Antennas Capacity Enhancement in Wireless Networks using Directional Antennas Sedat Atmaca, Celal Ceken, and Ismail Erturk Abstract One of the biggest drawbacks of the wireless environment is the limited bandwidth.

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

Fault-tolerant Coverage in Dense Wireless Sensor Networks

Fault-tolerant Coverage in Dense Wireless Sensor Networks Fault-tolerant Coverage in Dense Wireless Sensor Networks Akshaye Dhawan and Magdalena Parks Department of Mathematics and Computer Science, Ursinus College, 610 E Main Street, Collegeville, PA, USA {adhawan,

More information

SCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks. V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala

SCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks. V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala SCAM: Scenario-based Clustering Algorithm for Mobile Ad Hoc networks V. S. Anitha & M. P. Sebastian National Institute of Technology Calicut Kerala 07.01.2009 Contents Introduction Related works Design

More information