SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications
                  (IJERA)            ISSN: 2248-9622      www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1538-1543
    Evaluation Of Low Cost Wireless Network Protocol For Rural
            Villages Based On 802.11KT MAC Protocol
                                  V.K.Taksande1, Dr.K.D.Kulat2
                      1
                          Department of Electronics & Communication , Nagpur University
                                Priyadarshini Indira Gandhi College of Engineering
                             2
                               Department of Electronics & Computer , VNIT Nagpur


Abstract
         802.11KT MAC protocol is a modified                temporary network topologies, allowing people and
wireless network protocol independent on topology           devices to seamlessly communicate without any pre-
of nodes that aims to provide low-cost broadband            existing communication architecture. Each node in the
wireless network for rural regions. Nodes in this           network also acts as a router, forwarding data packets
protocol communicate using long-distance point to-          for other nodes. A central challenge in the design of
point wireless links that are established using             ad hoc networks is the development of dynamic
antenna. For the rural areas like villages, 802.11          routing protocols that can efficiently find routes
MAC protocol plays a important role for                     between two communicating nodes. The goal is to
networking because of its cost, which is very low as        carry out a systematic performance & comparative
compared to the other networking. Moreover the              study of 802.11 MAC & our modified MAC protocol
MAC protocol provides higher rate of data                   i.e.802.11KT protocol for Random scenario topology
transfer. This paper is subjected to comprehensive          for ad hoc networks in rural villages. Moreover
performance analysis between IEEE 802.11 MAC                performance analysis & comparative study is based on
protocol and our modified MAC 802.11KT                      varying mobility of nodes in the Mobile Ad Hoc
protocol with AODV routing protocol in random               Network in Random topology within area of rural
topology     using    Network      Simulator-2(NS-          village. The rest of the paper is organized as follows:
2).Various important performance metric such as             The work contributed in this area is provided in
Total packet generated, Total packet received               section II. The AODV, 802.11 MAC protocol &
Total dropped packets, Average end to end delay,            802.11KT MAC protocol description is summarized
Packet Delivery Ratio Vs. Mobility of node are              in section III. The simulation environment and
investigated. Protocols are simulated using NS-2            performance metrics are described in Section IV .The
simulator. It is observed that modified MAC                 simulation results and observation are described in
802.11KT protocol outperform IEEE 802.11 MAC                section V and the conclusion is presented in section
protocol and it is suitable as low cost wireless            VI.
network protocol for rural villages.
                                                            RELATED WORK
Keywords       -   AODV,,       IEEE    802.11,    NS-2               A Several researchers have done the
Simulation.                                                 qualitative and quantitative analysis of Ad Hoc
                                                            Routing Protocols by means of different performance
INTRODUCTION                                                metrics. They have used different simulators for this
          Rural networks exist in population areas with     purpose. Rafi U Zamam et.al [1] studied & compared
very low paying capacity. Hence a very important            the performance of DSDV, AODV and DSR routing
requirement for these networks is to minimize the           protocols for ad hoc networks using NS-2 simulations.
infrastructure costs. The cost of laying wire to rural      In this paper, author observed that the competitive
areas is prohibitively expensive and this is also true of   reactive routing protocols, AODV and DSR,
traditional wide area wireless technologies such as         both show better performance than the other in terms
cellular networks and upcoming technologies like            of certain metrics. It is still difficult to
IEEE 802.16 Wi-Max. Recent technologies has                 determine which of them has overall better
demonstrated an alternative approach by building            performance in MANET. Vahid Garousi et.al [2]
rural wireless network prototypes using IEEE 802.11         studied an analysis of network traffic in ad-hoc
equipment. IEEE 802.11 equipment is highly                  networks based on the DSDV protocol with an
commoditized and goes a long way. We have consider          emphasis on mobility and communication patterns of
the principal of mobile ad-hoc network for all types of     the nodes. In this paper, he observed that simulations
topology.A Mobile Ad hoc Networks represents a              measured the ability of DSDV routing protocol to
system of wireless mobile nodes that can freely and         react to multi-hop ad-hoc network topology changes
dynamically self-organize into arbitrary and                in terms of scene size, mobile nodes movement,
                                                            number of connections among nodes, and also the
                                                            amount of data each mobile node transmits. Das,S.R.,



                                                                                                  1538 | P a g e
V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications
                  (IJERA)            ISSN: 2248-9622      www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1538-1543
Perkins,C.E. et.al [4] studied & compared the             routes to each other, AODV does not play a role.
performance of DSDV, AODV and DSR routing                 Same as DSR, the Protocol is also composed of route
protocols for ad hoc networks using NS-2 simulations.     discovery and route maintenance. The protocol uses
In this paper, they observed that DSDV uses the           different messages to discover and maintain links such
proactive table-driven routing strategy while both        as ROUTE REQUEST, ROUTE REPLY and ROUTE
AODV and DSR use the reactive on-demand routing           ERROR. This message types are received via UDP,
strategy. Both AODV and DSR perform better under          and normal IP header processing applies. AODV uses
high mobility simulations than DSDV. High mobility        a destination sequence number for each route entry.
results in frequent link failures and the overhead        The destination sequence number is created by the
involved in updating all the nodes with the new           destination for any route information it sends to
routing information as in DSDV is much more than          requesting nodes. Using destination sequence numbers
that involved AODV and DSR, where the routes are          ensures loop freedom and allows knowing which of
created as and when required. Chao,C-M. et.al [5]         several routes is fresher. Given the choice between
studied the performance comparison based on packet        two routes to a destination, a requesting node always
delivery fraction and normalized routing load. In the     selects the one with the greatest sequence number.
future, extensive complex simulations could be            When a node wants to find a route to another one, it
carried out in gain a more in-depth performance           broadcast a ROUTE REQUEST to all nodes in the
analysis of the ad hoc routing protocols. This would      network until either the destination is reached or
include delay of data packet delivery and performance     another node is found with a fresh enough route to the
comparison on location-based ad hoc routing               destination.
protocols.                                                          Fresh enough route is a valid route entry for
                                                          the destination whose associated sequence number is
DESCRIPTION OF THE PROTOCOLS                              at least as great as that contained in the ROUTE
        This section briefly describe the key features    REQUEST. Then a ROUTE REPLY is sent back to
of 802.11 protocol, AODV protocol & modified              the source and the discovered route is made available.
802.11KT MAC protocol that being studied in this          For route maintenance, nodes that are part of an active
paper..                                                   route may offer connectivity information by
                                                          broadcasting periodically local Hello messages
A)       IEEE 802.11 Mac Protocol                         (special ROUTE REPLY message) to its immediate
         The basic access method in the IEEE 802.11       neighbors. If Hello messages stop arriving from a
MAC protocol is DCF, which is based on carrier sense      neighbor beyond some given time threshold, the
multiple access with collision avoidance (CSMA/CA).       connection is assumed to be lost. When a node detects
Before starting a transmission, each node performs a      that a route to a neighbor node is not valid it removes
backoff procedure, with the backoff timer uniformly       the routing entry and sends a ROUTE ERROR
chosen from [0, CW − 1] in terms of time slots, where     message to neighbors that are active and use the route.
CW is the current contention window. When the             This is possible by maintaining active neighbors lists.
backoff timer reaches zero, the node transmits a          This procedure is repeated at nodes that receive
DATA packet. If the receiver successfully receives the    ROUTE ERROR messages. A source that receives a
packet, it acknowledges the packet by sending an          ROUTE ERROR can reinitiate a ROUTE REQUEST
acknowledgment (ACK). If no ACK is received               message.
within a specified period, the packet is considered
lost; so the transmitter will double the size of CW,      C) MAC 802.11KT protocol
choose a new backoff timer, and start the above                    The MAC 802.11KT protocol modifies the
process again. When the transmission of a packet fails    IEEE 802.11 RTS/CTS handshake on transmitter
for a maximum number of times, the packet is              (RTS) and receiver (CTS), respectively. This protocol
dropped. To avoid collisions of long packets, the short   modifies IEEE 802.11 for various inter frame space,
request to send/clear to send (RTS/CTS) frames can        contention window for minimum and maximum size
be employed. Note that the IEEE 802.11 MAC also           to obtain high system throughput and small end to end
incorporates an optional access method called PCF,        delay. This protocol modifies the security mechanism,
which is only usable in infrastructure network            power management mechanism, synchronization
configurations and is not supported in most current       mechanism, association and reassociation mechanism
wireless cards. In addition, it may result in poor        of nodes with access point. It also modifies
performance as shown in [24] and [27].                    management information base required for network
                                                          management purpose for external entities. Our goals is
 B) Ad Hoc On-Demand Distance Vector                      to obtain the maximum throughput, less numbers of
      (AODV)                                              data packets dropped, high packet delivery ratio and
         AODV is a distance vector type routing. It       small end to end delay by the 802.11KT protocol as
does not require nodes to maintain routes to              compared to that of the conventional 802.11 system.
destination that are not actively used. As long as the    Numerical evaluation of the proposed analysis
endpoints of a communication connection have valid        framework indicates that the 802.11KT protocol



                                                                                                1539 | P a g e
V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications
                  (IJERA)            ISSN: 2248-9622      www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1538-1543
system can provide a significant increase in
throughput and decrease in end to end delay for any        C. Performance Metrics
type of topology in MANET. Hence it is very much                    While analysing IEEE 802.11 MAC protocol
suitable as low cost wireless protocol in rural villages   and 802.11KT MAC with random topology, we
for communication.                                         focused on performance metrics such as Generated
                                                           Packets vs. No. of nodes, Received Packets Vs. no. of
SIMULATION ENVIRONMENT                                     nodes, Packet delivery ratio Vs. no. of nodes, Total
A. Simulation Model                                        dropped packets Vs. no. of nodes, Average end to end
         This section have given the emphasis for the      delay Vs. No. of nodes.
simulation of performance of IEEE 802.11 MAC
protocol and 802.11KT MAC protocol with AODV as            SIMULATION RESULTS &
routing protocol varying the mobility of mobile nodes.     OBESRVATION
The simulations have been performed using network                    The simulation results are shown in the
simulator NS-2 [12]. The network simulator ns-2 is         following section in the form of line graphs. The
discrete event simulation software for network             performance of IEEE 802.11 MAC and 802.11KT
simulations which means it simulates events such as        MAC protocol are done based on the mobility of the
sending, receiving, forwarding and dropping packets.       node. The perform matrix consists of parameters like
The latest version, ns-allinone-2.34, supports             Total packets generated, Packets dropped, Packets
simulation for routing protocols for ad hoc wireless       Delivery ratio & Average End to End delay,. “Fig. 2”
networks such as AODV, TORA, DSDV, and DSR.                shows the creation of 50 numbers of mobile nodes in
Ns-2 is written in C++ programming language and            rural village in random topology. “Fig.3” highlights
Object Tool Common Language (OTCL). Although               the movement of nodes in the rural village with the
ns-2.34 can be built on various platforms, we chose a      mobility of 5 m/s. It is observed that the nodes are
Linux platform [FEDORA 7] for this paper, as Linux         communicating with each other. There is best
offers a number of programming development tools           synchronisation between nodes.
that can be used along with the simulation process. To
run a simulation with ns-2.34, we have written the
simulation script in OTCL, got the simulation results
in an output trace file. The performance metrics are
calculated using AWK file and the result graphically
visualized. Ns-2 also offers a visual representation of
the simulated network by tracing nodes movements
and events and writing them in a network animator
(NAM) file.

B. Simulation Parameters
         We consider a network of nodes placing
within a 2200m X 500m area. The performances of
IEEE 802.11 MAC and 802.11KT MAC are evaluated
by keeping the network payload constant and varying
the mobility of mobile nodes. Table 1 shows the
simulation parameters used in this valuation.
                     TABLE 1
   PARAMETERS VALUES FOR SIMULATION
                                                           Fig 2. 50 numbers of nodes in rural village in random
                                                                                Topology
                      Simulation Parameters
Simulator                  ns-2.34
MAC Protocols               802.11,802.11KT
Simulation duration        150 seconds
Simulation area            2200 m x 500 m
Number of nodes            50
Transmission range         250 m
Movement model             Random topology
Routing Protocol           AODV
Maximum speed              5,10,15,20,25,30m/s
Packet rate                4 packets/sec
Traffic type               CBR (UDP)
Data payload               512 bytes/packet



                                                                                                1540 | P a g e
V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications
                  (IJERA)            ISSN: 2248-9622      www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1538-1543
                                                        “Fig.5” illustrate data packet communication between
                                                        nodes at mobility at 15 m/s in rural village area. It
                                                        represent that at this mobility, nodes are maintaining
                                                        synchronisation between them. “Fig.6” highlights
                                                        movement of mobile nodes with mobility of 20 m/s
                                                        rural area. It illustrate that at high mobility, nodes are
                                                        changing their position with proper coordination
                                                        between them. There is a perfect synchronisation and
                                                        communication between them. “Fig. 7” illustrate the
                                                        position of various node reached with a mobility of 25
                                                        m/s. It highlights those nodes able to communicate
                                                        with each other with minimum data packets dropped.




         Fig 3. Mobility of nodes with 5 m/s




                                                                  Fig 6. Mobility of nodes with 20 m/s


            Fig 4. Mobility of nodes with 10 m/s

“Fig. 4” highlights movement of nodes with mobility
of 10 m/s in rural village .Nodes are aligning at new
position with better communication between them.




                                                                    Fig. 7. Mobility of nodes with 25 m/s




          Fig 5. Mobility of nodes with 15 m/s




                                                                                                1541 | P a g e
V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications
                  (IJERA)            ISSN: 2248-9622      www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1538-1543




                                                                  Fig 10. Total Dropped Packets Vs. Mobility

                                                             Fig.10 highlights the relative performance of IEEE
                                                             802.11 MAC protocols and 802.11KT MAC protocol
         Fig. 8. Mobility of nodes with 30 m/s               for Total Dropped Packet with mobility of nodes.
                                                             From figure it is observed that 802.11KT MAC
 “Fig. 8” illustrates the final position of location of 50   protocol provides better synchronisation between
nodes in rural village area with a mobility movement         nodes than IEEE 802.11 MAC. Therefore, there is less
of 30 m/s. At such high mobility (approximately 90           numbers of data packet loss for 802.11KT MAC
Km/hr.),mobile nodes are maintaining proper                  protocol. This helps in providing better redundancy of
synchronisation with minimum numbers of data                 information transmission between nodes of rural
packet dropped, minimum end to end delay and high            village area and complete information is
packet delivery ratio i.e. high throughput.                  communicated between them. Fig.11 highlights the
                                                             relative performance of IEEE 802.11 MAC protocol
                                                             and 802.11KT MAC protocol for Packet Delivery
                                                             Ratio with mobility of nodes. From figure it is
                                                             observed that 802.11KT protocol have better
                                                             performance over IEEE 802.11 MAC protocols in
                                                             term of Packet Delivery Ratio. 802.11KT MAC
                                                             protocol have better synchronisation between nodes,
                                                             dropped less number of data packets and delivered
                                                             more data packets to the destination than IEEE
                                                             802.11 MAC protocols.Hence,802.11KT protocol
                                                             have more throughput of system network than IEEE
                                                             802.11 MAC protocol.


      Fig 9.Total Generated Packets vs. Mobility

“Fig. 9” highlights the relative performances of IEEE
802.11 MAC protocol and 802.11KT MAC protocol
for Generated Packets with varying mobility of nodes.
From figure it is observed that data packet required to
transfer information from source to destination is
small for 802.11KT MAC protocol than IEEE 802.11
MAC protocol. This saves considerable amount of
power of transmitter.




                                                                        Fig.11. Packet Delivery Ratio Vs. numbers
                                                             of nodes




                                                                                                   1542 | P a g e
V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications
                  (IJERA)            ISSN: 2248-9622      www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1538-1543
                                                                Simulator) Package, University of Waterloo,
                                                                Fall 2001.
                                                          [3]   C.E. Perkins & P. Bhagwat, “Highly
                                                                Dynamic       Destination    Sequence-Vector
                                                                Routing (DSDV) for Mobile Computers”,
                                                                Computer Communication Review, 24(4),
                                                                1994, 234-244.
                                                          [4]   Das,S.R., Perkins,C.E., and Royer,E.M.
                                                                (2000). Performance       Comparison of Two
                                                                On Demand Routing Protocols for Ad Hoc
                                                                Networks.      IEEE      INFOCOM       2000.
                                                                Nineteenth Annual Joint Conference of the
                                                                IEEE Computer and Communications
                                                                Societies, pp.3-12.
        Fig.12. End to End delay Vs. Mobility             [5]   Chao,C-M., Sheu,J-P.,and Hu,C-T. (2003).
                                                                Energy- Conserving Grid Routing Protocol in
         Fig.12 highlights the relative performance of          Mobile Ad Hoc              Networks. IEEE
802.11KT protocol and IEEE 802.11 MAC protocol                  Proceedings of the 2003 International
for Average End To End delay with mobility of nodes.            Conference      on     Parallel   Processing
From figure it is observed that 802.11KT MAC                    (ICPP’03).
protocol have better performance over IEEE 802.11          [6] Park,S.M., Ko,Y.B., and Kim,J.H. (2003).
MAC protocol in terms of Average End To End delay.              Disconnected Operation Service in Mobile
Beacon frame of 802.11KT MAC protocol provides                  Grid Computing. Graduate School of
efficient synchronization than IEEE 802.11 MAC                  Information and Communication, Ajou
between nodes. This result in better data transfer with         University, South Korea.
minimum time required and improves the end to end         [7]   Perkins,C.E., Royer,E.M., Das,S.R., and
delay.                                                          Marina,M.K.           (2001).    Performance
                                                                Comparison of Two On-Demand Routing
CONCLUSION                                                      Protocols for Ad Hoc Networks. IEEE
          The work presented in this paper gave an              Personal Communications, 16-28.
overview of relative performance comparison of            [8]   Perkins,C.E., and Bhagwat.P. (1994). Highly
available IEEE 802.11 MAC protocol and 802.11KT                 Dynamic Destination-Sequenced Distance-
MAC protocol for rural village area in random                   Vector Routing         (DSDV) for Mobile
topology. Simulation performance analysis indicate              Computers. ACM, pp.234 – 244.
that 802.11KT MAC protocol have better                    [9]   Phan,T., Huang,L. and Dulan,C. (2002)
performance than IEEE 802.11 MAC in terms of                    Challenge: Integrating      Mobile Wireless
Total Data Packets generated, Total Packet Dropped,             Devices Into the Computational Grid. ACM ,
Packet Delivery Ratio and End to End delay                      pp. 271-278.
parameters with mobility of node. 802.11KT MAC            [10] Irving,M., Taylor.G., and Hobson.P. (2004).
protocol have better synchronization mechanism,                 Plug in to Grid Computing. IEEE Power &
efficient link layer recovery mechanism, less numbers           Energy Magazine, March/April, pp.40-44.
of collision and less inter link interference than IEEE   [11] Kaneda,K., Taura,K., and Yonezawa,A.,
802.11 MAC. Therefore the dominant cost of                      (2004). Routing and Resource Discovery in
constructing a wireless network based on 802.11KT               Phoenix Grid-Enabled Message Passing
MAC protocol will be less to provide better wireless            Library. IEEE International Symposium on
services to rural villages to enhance communication of          Cluster Computing and the Grid, pp. 670-
rural areas.                                                    671.
                                                          [12] Rajsbaum,S. (2002). Distributed Computing
REFERENCES                                                      Research Issues In Grid Computing. ACM
  [1]    Mr.Rafi U Zamam “An Efficient DSDV                     SIGACT News Distibuted Computing
         Routing Protocol for Wireless Mobile Ad                Column 8, pp.50-67.
         Hoc         Networks         and         its      [13] Roy,N., Das.S.K., Basu.K., and Kumar.M.
         PerformanceComparison                                  (2005). Enhancing Availability of Grid
                                                                Computational Services to Ubiquitous
         http://www.computer.org/portal/web/csdl/doi
                                                                Computing Applications. Proceedings of the
         /10.1109/EMS.2008.11”
  [2]    Vahid Garousi, Simulating Network traffic in           19th IEEE International Parallel and
         Multi-hop Wireless Ad Hoc Networks based               Distributed       Processing      Symposium
         on DSDV (Destination Sequenced Distance                (IPDPS’05), pp.1-10.
         Vector) protocol using NS (Network                [15] The NS2 Manual, 2005.




                                                                                            1543 | P a g e

Mais conteúdo relacionado

Mais procurados

Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...IJECEIAES
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 
Dsr aodv performance
Dsr aodv performanceDsr aodv performance
Dsr aodv performanceGilles Samba
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 

Mais procurados (17)

Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
A02100108
A02100108A02100108
A02100108
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 
Dsr aodv performance
Dsr aodv performanceDsr aodv performance
Dsr aodv performance
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 

Destaque

Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitudeWith Company
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Destaque (8)

Unitate didaktikoa
Unitate didaktikoaUnitate didaktikoa
Unitate didaktikoa
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Semelhante a Evaluation of Low Cost Wireless Network Protocols

PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET Journal
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 

Semelhante a Evaluation of Low Cost Wireless Network Protocols (20)

Bt25420424
Bt25420424Bt25420424
Bt25420424
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
Kr2518691873
Kr2518691873Kr2518691873
Kr2518691873
 
Az26337342
Az26337342Az26337342
Az26337342
 
Gi3112131218
Gi3112131218Gi3112131218
Gi3112131218
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 

Evaluation of Low Cost Wireless Network Protocols

  • 1. V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1538-1543 Evaluation Of Low Cost Wireless Network Protocol For Rural Villages Based On 802.11KT MAC Protocol V.K.Taksande1, Dr.K.D.Kulat2 1 Department of Electronics & Communication , Nagpur University Priyadarshini Indira Gandhi College of Engineering 2 Department of Electronics & Computer , VNIT Nagpur Abstract 802.11KT MAC protocol is a modified temporary network topologies, allowing people and wireless network protocol independent on topology devices to seamlessly communicate without any pre- of nodes that aims to provide low-cost broadband existing communication architecture. Each node in the wireless network for rural regions. Nodes in this network also acts as a router, forwarding data packets protocol communicate using long-distance point to- for other nodes. A central challenge in the design of point wireless links that are established using ad hoc networks is the development of dynamic antenna. For the rural areas like villages, 802.11 routing protocols that can efficiently find routes MAC protocol plays a important role for between two communicating nodes. The goal is to networking because of its cost, which is very low as carry out a systematic performance & comparative compared to the other networking. Moreover the study of 802.11 MAC & our modified MAC protocol MAC protocol provides higher rate of data i.e.802.11KT protocol for Random scenario topology transfer. This paper is subjected to comprehensive for ad hoc networks in rural villages. Moreover performance analysis between IEEE 802.11 MAC performance analysis & comparative study is based on protocol and our modified MAC 802.11KT varying mobility of nodes in the Mobile Ad Hoc protocol with AODV routing protocol in random Network in Random topology within area of rural topology using Network Simulator-2(NS- village. The rest of the paper is organized as follows: 2).Various important performance metric such as The work contributed in this area is provided in Total packet generated, Total packet received section II. The AODV, 802.11 MAC protocol & Total dropped packets, Average end to end delay, 802.11KT MAC protocol description is summarized Packet Delivery Ratio Vs. Mobility of node are in section III. The simulation environment and investigated. Protocols are simulated using NS-2 performance metrics are described in Section IV .The simulator. It is observed that modified MAC simulation results and observation are described in 802.11KT protocol outperform IEEE 802.11 MAC section V and the conclusion is presented in section protocol and it is suitable as low cost wireless VI. network protocol for rural villages. RELATED WORK Keywords - AODV,, IEEE 802.11, NS-2 A Several researchers have done the Simulation. qualitative and quantitative analysis of Ad Hoc Routing Protocols by means of different performance INTRODUCTION metrics. They have used different simulators for this Rural networks exist in population areas with purpose. Rafi U Zamam et.al [1] studied & compared very low paying capacity. Hence a very important the performance of DSDV, AODV and DSR routing requirement for these networks is to minimize the protocols for ad hoc networks using NS-2 simulations. infrastructure costs. The cost of laying wire to rural In this paper, author observed that the competitive areas is prohibitively expensive and this is also true of reactive routing protocols, AODV and DSR, traditional wide area wireless technologies such as both show better performance than the other in terms cellular networks and upcoming technologies like of certain metrics. It is still difficult to IEEE 802.16 Wi-Max. Recent technologies has determine which of them has overall better demonstrated an alternative approach by building performance in MANET. Vahid Garousi et.al [2] rural wireless network prototypes using IEEE 802.11 studied an analysis of network traffic in ad-hoc equipment. IEEE 802.11 equipment is highly networks based on the DSDV protocol with an commoditized and goes a long way. We have consider emphasis on mobility and communication patterns of the principal of mobile ad-hoc network for all types of the nodes. In this paper, he observed that simulations topology.A Mobile Ad hoc Networks represents a measured the ability of DSDV routing protocol to system of wireless mobile nodes that can freely and react to multi-hop ad-hoc network topology changes dynamically self-organize into arbitrary and in terms of scene size, mobile nodes movement, number of connections among nodes, and also the amount of data each mobile node transmits. Das,S.R., 1538 | P a g e
  • 2. V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1538-1543 Perkins,C.E. et.al [4] studied & compared the routes to each other, AODV does not play a role. performance of DSDV, AODV and DSR routing Same as DSR, the Protocol is also composed of route protocols for ad hoc networks using NS-2 simulations. discovery and route maintenance. The protocol uses In this paper, they observed that DSDV uses the different messages to discover and maintain links such proactive table-driven routing strategy while both as ROUTE REQUEST, ROUTE REPLY and ROUTE AODV and DSR use the reactive on-demand routing ERROR. This message types are received via UDP, strategy. Both AODV and DSR perform better under and normal IP header processing applies. AODV uses high mobility simulations than DSDV. High mobility a destination sequence number for each route entry. results in frequent link failures and the overhead The destination sequence number is created by the involved in updating all the nodes with the new destination for any route information it sends to routing information as in DSDV is much more than requesting nodes. Using destination sequence numbers that involved AODV and DSR, where the routes are ensures loop freedom and allows knowing which of created as and when required. Chao,C-M. et.al [5] several routes is fresher. Given the choice between studied the performance comparison based on packet two routes to a destination, a requesting node always delivery fraction and normalized routing load. In the selects the one with the greatest sequence number. future, extensive complex simulations could be When a node wants to find a route to another one, it carried out in gain a more in-depth performance broadcast a ROUTE REQUEST to all nodes in the analysis of the ad hoc routing protocols. This would network until either the destination is reached or include delay of data packet delivery and performance another node is found with a fresh enough route to the comparison on location-based ad hoc routing destination. protocols. Fresh enough route is a valid route entry for the destination whose associated sequence number is DESCRIPTION OF THE PROTOCOLS at least as great as that contained in the ROUTE This section briefly describe the key features REQUEST. Then a ROUTE REPLY is sent back to of 802.11 protocol, AODV protocol & modified the source and the discovered route is made available. 802.11KT MAC protocol that being studied in this For route maintenance, nodes that are part of an active paper.. route may offer connectivity information by broadcasting periodically local Hello messages A) IEEE 802.11 Mac Protocol (special ROUTE REPLY message) to its immediate The basic access method in the IEEE 802.11 neighbors. If Hello messages stop arriving from a MAC protocol is DCF, which is based on carrier sense neighbor beyond some given time threshold, the multiple access with collision avoidance (CSMA/CA). connection is assumed to be lost. When a node detects Before starting a transmission, each node performs a that a route to a neighbor node is not valid it removes backoff procedure, with the backoff timer uniformly the routing entry and sends a ROUTE ERROR chosen from [0, CW − 1] in terms of time slots, where message to neighbors that are active and use the route. CW is the current contention window. When the This is possible by maintaining active neighbors lists. backoff timer reaches zero, the node transmits a This procedure is repeated at nodes that receive DATA packet. If the receiver successfully receives the ROUTE ERROR messages. A source that receives a packet, it acknowledges the packet by sending an ROUTE ERROR can reinitiate a ROUTE REQUEST acknowledgment (ACK). If no ACK is received message. within a specified period, the packet is considered lost; so the transmitter will double the size of CW, C) MAC 802.11KT protocol choose a new backoff timer, and start the above The MAC 802.11KT protocol modifies the process again. When the transmission of a packet fails IEEE 802.11 RTS/CTS handshake on transmitter for a maximum number of times, the packet is (RTS) and receiver (CTS), respectively. This protocol dropped. To avoid collisions of long packets, the short modifies IEEE 802.11 for various inter frame space, request to send/clear to send (RTS/CTS) frames can contention window for minimum and maximum size be employed. Note that the IEEE 802.11 MAC also to obtain high system throughput and small end to end incorporates an optional access method called PCF, delay. This protocol modifies the security mechanism, which is only usable in infrastructure network power management mechanism, synchronization configurations and is not supported in most current mechanism, association and reassociation mechanism wireless cards. In addition, it may result in poor of nodes with access point. It also modifies performance as shown in [24] and [27]. management information base required for network management purpose for external entities. Our goals is B) Ad Hoc On-Demand Distance Vector to obtain the maximum throughput, less numbers of (AODV) data packets dropped, high packet delivery ratio and AODV is a distance vector type routing. It small end to end delay by the 802.11KT protocol as does not require nodes to maintain routes to compared to that of the conventional 802.11 system. destination that are not actively used. As long as the Numerical evaluation of the proposed analysis endpoints of a communication connection have valid framework indicates that the 802.11KT protocol 1539 | P a g e
  • 3. V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1538-1543 system can provide a significant increase in throughput and decrease in end to end delay for any C. Performance Metrics type of topology in MANET. Hence it is very much While analysing IEEE 802.11 MAC protocol suitable as low cost wireless protocol in rural villages and 802.11KT MAC with random topology, we for communication. focused on performance metrics such as Generated Packets vs. No. of nodes, Received Packets Vs. no. of SIMULATION ENVIRONMENT nodes, Packet delivery ratio Vs. no. of nodes, Total A. Simulation Model dropped packets Vs. no. of nodes, Average end to end This section have given the emphasis for the delay Vs. No. of nodes. simulation of performance of IEEE 802.11 MAC protocol and 802.11KT MAC protocol with AODV as SIMULATION RESULTS & routing protocol varying the mobility of mobile nodes. OBESRVATION The simulations have been performed using network The simulation results are shown in the simulator NS-2 [12]. The network simulator ns-2 is following section in the form of line graphs. The discrete event simulation software for network performance of IEEE 802.11 MAC and 802.11KT simulations which means it simulates events such as MAC protocol are done based on the mobility of the sending, receiving, forwarding and dropping packets. node. The perform matrix consists of parameters like The latest version, ns-allinone-2.34, supports Total packets generated, Packets dropped, Packets simulation for routing protocols for ad hoc wireless Delivery ratio & Average End to End delay,. “Fig. 2” networks such as AODV, TORA, DSDV, and DSR. shows the creation of 50 numbers of mobile nodes in Ns-2 is written in C++ programming language and rural village in random topology. “Fig.3” highlights Object Tool Common Language (OTCL). Although the movement of nodes in the rural village with the ns-2.34 can be built on various platforms, we chose a mobility of 5 m/s. It is observed that the nodes are Linux platform [FEDORA 7] for this paper, as Linux communicating with each other. There is best offers a number of programming development tools synchronisation between nodes. that can be used along with the simulation process. To run a simulation with ns-2.34, we have written the simulation script in OTCL, got the simulation results in an output trace file. The performance metrics are calculated using AWK file and the result graphically visualized. Ns-2 also offers a visual representation of the simulated network by tracing nodes movements and events and writing them in a network animator (NAM) file. B. Simulation Parameters We consider a network of nodes placing within a 2200m X 500m area. The performances of IEEE 802.11 MAC and 802.11KT MAC are evaluated by keeping the network payload constant and varying the mobility of mobile nodes. Table 1 shows the simulation parameters used in this valuation. TABLE 1 PARAMETERS VALUES FOR SIMULATION Fig 2. 50 numbers of nodes in rural village in random Topology Simulation Parameters Simulator ns-2.34 MAC Protocols 802.11,802.11KT Simulation duration 150 seconds Simulation area 2200 m x 500 m Number of nodes 50 Transmission range 250 m Movement model Random topology Routing Protocol AODV Maximum speed 5,10,15,20,25,30m/s Packet rate 4 packets/sec Traffic type CBR (UDP) Data payload 512 bytes/packet 1540 | P a g e
  • 4. V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1538-1543 “Fig.5” illustrate data packet communication between nodes at mobility at 15 m/s in rural village area. It represent that at this mobility, nodes are maintaining synchronisation between them. “Fig.6” highlights movement of mobile nodes with mobility of 20 m/s rural area. It illustrate that at high mobility, nodes are changing their position with proper coordination between them. There is a perfect synchronisation and communication between them. “Fig. 7” illustrate the position of various node reached with a mobility of 25 m/s. It highlights those nodes able to communicate with each other with minimum data packets dropped. Fig 3. Mobility of nodes with 5 m/s Fig 6. Mobility of nodes with 20 m/s Fig 4. Mobility of nodes with 10 m/s “Fig. 4” highlights movement of nodes with mobility of 10 m/s in rural village .Nodes are aligning at new position with better communication between them. Fig. 7. Mobility of nodes with 25 m/s Fig 5. Mobility of nodes with 15 m/s 1541 | P a g e
  • 5. V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1538-1543 Fig 10. Total Dropped Packets Vs. Mobility Fig.10 highlights the relative performance of IEEE 802.11 MAC protocols and 802.11KT MAC protocol Fig. 8. Mobility of nodes with 30 m/s for Total Dropped Packet with mobility of nodes. From figure it is observed that 802.11KT MAC “Fig. 8” illustrates the final position of location of 50 protocol provides better synchronisation between nodes in rural village area with a mobility movement nodes than IEEE 802.11 MAC. Therefore, there is less of 30 m/s. At such high mobility (approximately 90 numbers of data packet loss for 802.11KT MAC Km/hr.),mobile nodes are maintaining proper protocol. This helps in providing better redundancy of synchronisation with minimum numbers of data information transmission between nodes of rural packet dropped, minimum end to end delay and high village area and complete information is packet delivery ratio i.e. high throughput. communicated between them. Fig.11 highlights the relative performance of IEEE 802.11 MAC protocol and 802.11KT MAC protocol for Packet Delivery Ratio with mobility of nodes. From figure it is observed that 802.11KT protocol have better performance over IEEE 802.11 MAC protocols in term of Packet Delivery Ratio. 802.11KT MAC protocol have better synchronisation between nodes, dropped less number of data packets and delivered more data packets to the destination than IEEE 802.11 MAC protocols.Hence,802.11KT protocol have more throughput of system network than IEEE 802.11 MAC protocol. Fig 9.Total Generated Packets vs. Mobility “Fig. 9” highlights the relative performances of IEEE 802.11 MAC protocol and 802.11KT MAC protocol for Generated Packets with varying mobility of nodes. From figure it is observed that data packet required to transfer information from source to destination is small for 802.11KT MAC protocol than IEEE 802.11 MAC protocol. This saves considerable amount of power of transmitter. Fig.11. Packet Delivery Ratio Vs. numbers of nodes 1542 | P a g e
  • 6. V.K.Taksande, Dr.K.D.Kulat / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1538-1543 Simulator) Package, University of Waterloo, Fall 2001. [3] C.E. Perkins & P. Bhagwat, “Highly Dynamic Destination Sequence-Vector Routing (DSDV) for Mobile Computers”, Computer Communication Review, 24(4), 1994, 234-244. [4] Das,S.R., Perkins,C.E., and Royer,E.M. (2000). Performance Comparison of Two On Demand Routing Protocols for Ad Hoc Networks. IEEE INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, pp.3-12. Fig.12. End to End delay Vs. Mobility [5] Chao,C-M., Sheu,J-P.,and Hu,C-T. (2003). Energy- Conserving Grid Routing Protocol in Fig.12 highlights the relative performance of Mobile Ad Hoc Networks. IEEE 802.11KT protocol and IEEE 802.11 MAC protocol Proceedings of the 2003 International for Average End To End delay with mobility of nodes. Conference on Parallel Processing From figure it is observed that 802.11KT MAC (ICPP’03). protocol have better performance over IEEE 802.11 [6] Park,S.M., Ko,Y.B., and Kim,J.H. (2003). MAC protocol in terms of Average End To End delay. Disconnected Operation Service in Mobile Beacon frame of 802.11KT MAC protocol provides Grid Computing. Graduate School of efficient synchronization than IEEE 802.11 MAC Information and Communication, Ajou between nodes. This result in better data transfer with University, South Korea. minimum time required and improves the end to end [7] Perkins,C.E., Royer,E.M., Das,S.R., and delay. Marina,M.K. (2001). Performance Comparison of Two On-Demand Routing CONCLUSION Protocols for Ad Hoc Networks. IEEE The work presented in this paper gave an Personal Communications, 16-28. overview of relative performance comparison of [8] Perkins,C.E., and Bhagwat.P. (1994). Highly available IEEE 802.11 MAC protocol and 802.11KT Dynamic Destination-Sequenced Distance- MAC protocol for rural village area in random Vector Routing (DSDV) for Mobile topology. Simulation performance analysis indicate Computers. ACM, pp.234 – 244. that 802.11KT MAC protocol have better [9] Phan,T., Huang,L. and Dulan,C. (2002) performance than IEEE 802.11 MAC in terms of Challenge: Integrating Mobile Wireless Total Data Packets generated, Total Packet Dropped, Devices Into the Computational Grid. ACM , Packet Delivery Ratio and End to End delay pp. 271-278. parameters with mobility of node. 802.11KT MAC [10] Irving,M., Taylor.G., and Hobson.P. (2004). protocol have better synchronization mechanism, Plug in to Grid Computing. IEEE Power & efficient link layer recovery mechanism, less numbers Energy Magazine, March/April, pp.40-44. of collision and less inter link interference than IEEE [11] Kaneda,K., Taura,K., and Yonezawa,A., 802.11 MAC. Therefore the dominant cost of (2004). Routing and Resource Discovery in constructing a wireless network based on 802.11KT Phoenix Grid-Enabled Message Passing MAC protocol will be less to provide better wireless Library. IEEE International Symposium on services to rural villages to enhance communication of Cluster Computing and the Grid, pp. 670- rural areas. 671. [12] Rajsbaum,S. (2002). Distributed Computing REFERENCES Research Issues In Grid Computing. ACM [1] Mr.Rafi U Zamam “An Efficient DSDV SIGACT News Distibuted Computing Routing Protocol for Wireless Mobile Ad Column 8, pp.50-67. Hoc Networks and its [13] Roy,N., Das.S.K., Basu.K., and Kumar.M. PerformanceComparison (2005). Enhancing Availability of Grid Computational Services to Ubiquitous http://www.computer.org/portal/web/csdl/doi Computing Applications. Proceedings of the /10.1109/EMS.2008.11” [2] Vahid Garousi, Simulating Network traffic in 19th IEEE International Parallel and Multi-hop Wireless Ad Hoc Networks based Distributed Processing Symposium on DSDV (Destination Sequenced Distance (IPDPS’05), pp.1-10. Vector) protocol using NS (Network [15] The NS2 Manual, 2005. 1543 | P a g e