SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2297
www.ijarcet.org
Performance Analysis of Various Application Protocols for MANET
Dr. Ravi Sindal
Associate Professor IET DAVV,
Indore M.P. India
Nidhi Jaiswal
M.E. Student IET DAVV
Indore M.P. India
Abstract—A mobile ad hoc network (MANET) consists of
mobile wireless nodes. The communication between these
mobile nodes is carried without any centralized control. The
ease of deployment and the infrastructure less nature of
Mobile Ad Hoc Networks (MANET) make them highly
desirable for present day multi media communications. In this
paper we analyze the performance of TCP/IP based
application protocol (HTTP, FTP) via increasing number of
nodes and observing its effect on parameters like throughput,
network load, media access delay and traffic received.
Network simulation tool is OPNET Modeler (Ver. 14.5).
Keywords—Ad-hoc,MANET,FTP,HTTP,OPNET.
I. INTRODUCTION
Ad-hoc, namely,Ad Hoc mode is a short-term wireless
network fremework which locates two or more wireless net
adapters without using any acess point.One of good features of
such networks is the flexibility and can be deployed very
easily. Thus it is suitable for the emergency situation. But on
the other side it is also very difficult to handle the operation of
ad hoc networks. Each node is responsible to handle its
operation[5].
MANET stands for Mobile Ad hoc Network. It is a robust
infrastructureless wireless network. A MANET can be formed
either by mobile nodes or by both fixed and mobile nodes.
Nodes randomly associate with each other forming arbitrary
topologies. They act as both routers and hosts. The ability of
mobile routers to self-configure makes this technology
suitable for provisioning communication to, for instance,
disaster-hit areas where there is no communication
infrastructure, conferences, or in emergency search and rescue
operations where a network connection is urgently required.
Figure-1 Mobile Ad-Hoc Network
The need for mobility in wireless networks necessitated the
formation of the MANET working group within The Internet
Engineering Task Force (IETF) for developing consistent IP
routing protocols for both static and dynamic topologies. [6]
For any communication network it must be able to
tranposrt user traffic twards its targeted destination.the
communiaction performance of a network can effect the
satsfaction level of the users.The ability to send information at
high level speeds demanda low end-to-end delay. In addition
user would like to trasmit a variety of information, such as
data audio and video.An ad hoc network is not useful if it
cannot offer acceptable communication services. Given the
dynamics of the network topology, the underlying protocols
must be able to cope with these dynamics efficientrly while at
the same time yeilding good communication peformance.
II. APPLICATIONS
Applications are the predominant sources of traffic in the
network. It is the traffic generated by applications that loads
the network, makes demands on the bandwidth and the
underlying network technology, and creates load on the
servers. For the optimum performance of an application, you
must ensure that the network and server infrastructure are
designed to meet the requirements of the application.
Likewise, it is necessary to design applications so that they
minimize their impact on network and server resources. To do
this, it is necessary to first create an accurate model of the
application.
To be an accurate representation of the application, an
application model should have the same traffic characteristics
in terms of the size of the packets generated, the rate at which
they are generated, the transport protocol over which it runs
(e.g., TCP, UDP, fiber channel, etc.), the number of
simultaneous connections, timeouts, retransmissions, failure
and recovery and so on. Together these characteristics create a
run time traffic pattern of the application.
Each application has its unique traffic pattern, or signature,
and therefore creates its characteristic load on the network and
servers. Thus, the concept of application modeling is to
capture the traffic pattern of the applications of interest.[1]
III. STANDERD APPLICATIONS
Depending on their underlying networks, application
architectures may differ. Standard network applications are
implemented in a two-tier architecture in which the client
issues a request and a server or client receives the request and
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2298
www.ijarcet.org
returns a response. This request-response exchange typically
happens within one "conversation" between the client and the
server, or between a client and another client. In this chapter,
we use the term "conversation" to represent a sequence of
activity between a client and a server within the context of a
given application. A conversation includes a pattern of data
exchanges, typically defined in a statistical manner that
repeats over time. [1]
Figure-2 Application Architecture
IV.FTP
File transfer and access in a computer network is viewed to be
an important function .In a distributed network environment,
there are diskless machine that have little or no file storage
ability. Such device can create, store, and update files to a
remotely connected file sever, which is another machine but
equipped with large storage and processing capability .There
are also cases where remote storage is used to archive data.
FTP is one of the earliest versions of file transfer software.
FTP uses TCP to ensure reliable transfer of file data. Although
this sounds simple, in actuality it is complex. Not only will a
TCP connection be established prior to data transfer but also
the need for authorization checks, naming and representation
among heterogeneous machines. FTP client need to apply a
valid login name and password to perform file transfer /access
operation.
FTP is interactive in that the user can enter specific commands
to store and retrieve files, large file transfer are supported by
FTP and timer is used to close a session if the connection is
inactive after some time prior’s be able to support FTP over an
ad hoc wireless network is attractive and desirable. There is no
need for transfer of floppy disk from one host to another. The
transfer of bits can be done over the-air, in a mutihop fashion
[4].
V.HTTP
Web access is getting more and more popular these days
with the arrival of the internet. The web server allows one to
advertise information to other User can download information
(video and audio clips, text files etc) into there local machines.
To ensure that web access and services can be supported in
ad hoc networks, an ad hoc mobile host is configured to be a
web server. The client then access a specific web page stored at
the web server, which is several wireless hops away. The client
is running a web browser and by specifying the HTTP address
of the specific web site, an underlying connection is established
from the client to the server [4].
VI. SIMULATION SCENARIO.
The research is carried out using direct event simulation
software known as OPNET (Optimized Network Engineering
Tool) Modeler version 14.5. It is one off the most widely used
commercial simulator based on Microsoft Windows platform
.the simulation focus on the performance of application
protocol in mobile ad hoc network therefore six simulation
scenario with no of node combination are considered. The
nodes are randomly placed within certain gap from each other
in 1000x1000m campus environment. The constant ftp, http
traffic was generated in the network i.e. user define via
Application and Profile Configuration. Every node in the
network was configured to execute AODV. The simulation
time was set to 120s [8].
Figure-3 MANET Topology
A) Traffic Flow Parameters
Traffic was generated in the network explicitly by
configuring user defined application and profile definition
1) Application Configuration
A heavier application traffic flow in the topology was
generated which each node will be processing from the
respective application traffic generated was as FTP-high load,
HTTP-Heavy browsing.
2) Profile Configuration
The Profile configuration for each application was defined as
Operation Mode: Serial (Ordered) and Start Time: application
start time was set to constant 5 seconds of time period.
3) Mobility Configuration
The Mobility configuration for whole network is set to random
way point with a constant speed of 10 meter/second.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2299
www.ijarcet.org
4) DES Configuration Parameter
The DES simulation criterion was run for total time of 120
seconds. The overall simulation monitored within the
following criteria:
 Duration: 2 minutes (120 seconds)
 Seed: 128
 Update Interval: 500000 events( This specifies how
often simulation calculates event/second data)
 Simulation kernel: Optimized (‘optimized’ kernel was
chosen because it run faster than the remaining other
two simulation kernels).[9]
TABLE 1 SIMULATION PARAMETER
PARAMETER VALUE
Number of nodes 3,5,10
Simulation time 10 second
Campus network size 1000m*1000m
Application FTP, HTTP
Start time offset 5 second
Duration 120 second
Mobility model Random way point
Speed 10 meter/second
Start time 5 second
VII. PERFORMANCE METRICS
This work focuses on three performance metrics which
are quantitatively measured. The performance metrics are
important to measure the performance and activities that
are running on Opnet simulation. These metrics are
Traffic Received (bytes/sec): Average bytes per second
forwarded to the HTTP/FTP applications by the transport
layers in the network.
Load (bits/sec): Represents the total load (in bits/sec)
submitted to wireless LAN layers by all higher layers in all
WLAN nodes of the network.
Media Access Delay (sec): Represents the global statistic for
the total of queuing and contention delays of the data,
management, delayed Block-ACK and Block-ACK Request
frames transmitted by all WLAN MACs in the network. For
each frame, this delay is calculated as the duration from the
time when it is inserted into the transmission queue, which is
arrival time for higher layer data packets and creation time for
all other frames types, until the time when the frame is sent to
the physical layer for the first time. Hence, it also includes the
period for the successful RTS/CTS exchange, if this exchange
is used prior to the transmission of that frame. Similarly, it
may also include multiple numbers of backoff periods, if the
MAC is 802.11e-capable and the initial transmission of the
frame is delayed due to one or more internal collisions [1].
VIII. RESULTS AND ANALYSIS
The simulation results are shown below in the form of graphs.
Graphs show each parameter variation when number of node
varies.
Results for File Transfer Protocol
Figure-4 Traffic Received (bytes/sec)
Figure-4 Represents average bytes per second forwarded to
the FTP applications by the transport layers in the network. As
the number of node for the network is increases the Traffic
Received (bytes/sec) decreases.
Figure-5 Loads (bits/sec)
Figure-5 Represents the total load (in bits/sec) submitted to
wireless LAN layers by all higher layers in all WLAN nodes
of the network. As the number of node for the network is
increases the Load (bits/sec) for the network increases.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2300
www.ijarcet.org
Figure-6 Media Access Delay
Figure-6 Represents the global statistic for the total of
queuing and contention delays of the data, management,
delayed Block-ACK and Block-ACK Request frames
transmitted by all WLAN MACs in the network. As the
number of node for the network increases the Media
Access delay (sec) for the network increases.
Results for Hypertext Transfer Protocol
Figure-7 Traffic Received (bytes/sec)
Figure-7 Represents average bytes per second forwarded to
the HTTP applications by the transport layers in the network.
As the number of node for the network is increases there is not
any linear variation of Traffic Received (bytes/sec).
Figure-8 Loads (bits/sec)
Figure-8 Represents the total load (in bits/sec) submitted to
wireless LAN layers by all higher layers in all WLAN nodes
of the network. As the number of node for the network is
increases the Load (bits/sec) increases.
Figure -9 Media Access Delay
Figure-9 Represents the global statistic for the total of queuing
and contention delays of the data, management, delayed Block-
ACK and Block-ACK Request frames transmitted by all
WLAN MACs in the network. As the number of node for the
network increases the Media Access delay (sec) for the
network increases
IX. CONCLUSION
This paper we analyze the slandered application protocol.
The considerable observation is, simulation results agree with
expected results based on theoretical analysis. Mobile ad-hoc
networks are wireless networks that use multi-hop instead of
static networks infrastructure to provide network connectivity.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 7, July 2013
2301
www.ijarcet.org
From the experimental results we conclude that increase in the
number of nodes will cause increase in media access delay and
network load. Same way we can also analyze other application
such as Voice, Video, Email and remote login.
REFERENCES
1. www.opnet.com
2. Emad Aboelela, Network Simulation Experimental
Manual Second Edition pp 118-129.
3. C.K.Toh “Ad Hoc Mobile Wireless Networks
Protocols and Systems” Pearson Edition pp.137
140.
4. Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specification, Tech. Rep. 802.11.
(1999) IEEE Network.
5. Rajesh Kumar Chakrawarti, Madhulika “A QoS-
based Measurement of DSR and TORA Reactive
Routing Protocols in MANET” International Journal of
Advanced Research in Computer Engineering & Technology
Volume 1, Issue 3,May 2012 pp 80-84.
6. R. Misra and C.R. Mandal, “Performance comparison
of AODV/DSR on-demand routing protocols for ad
hoc Networks in constrained situation” ICPWC
International Conference, IEEE, 2005, pp. 86 – 89.
7. R. Cheng, H. Lin, “A Cross-layer Design for TCP
End-to-End Performance Improvement in multi-hop
Wireless Networks”, ELSEVIER, Computer
communication Vol.31, issue 14, pp. 3145-3152, Sep.
2008.
8. Sunil kumar, Jyotsana Sengupta “AODV and OLSR
Protocol for Wireless Ad-hoc and Mesh Networks.

Mais conteúdo relacionado

Mais procurados

Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...IJCNCJournal
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6Ramesh Babu
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...Tal Lavian Ph.D.
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networkingArdit Meti
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsIOSR Journals
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDEditor IJCATR
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
C10 support for-mobility
C10 support for-mobilityC10 support for-mobility
C10 support for-mobilityRio Nguyen
 
Artigo: Multilayer Networks: An Architecture Framework
Artigo: Multilayer Networks: An Architecture FrameworkArtigo: Multilayer Networks: An Architecture Framework
Artigo: Multilayer Networks: An Architecture FrameworkDiogo Oliveira
 
On the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksOn the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksjournalBEEI
 

Mais procurados (20)

Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...
 
K010426371
K010426371K010426371
K010426371
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...An extensible, programmable, commercial-grade platform for internet service a...
An extensible, programmable, commercial-grade platform for internet service a...
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
 
my project publication
my project publicationmy project publication
my project publication
 
Final_Report
Final_ReportFinal_Report
Final_Report
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
A survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SDA survey of service Discovery Architecture of MANET with AODV-SD
A survey of service Discovery Architecture of MANET with AODV-SD
 
Isys20261 lecture 06
Isys20261 lecture 06Isys20261 lecture 06
Isys20261 lecture 06
 
H010524049
H010524049H010524049
H010524049
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
middleware
middlewaremiddleware
middleware
 
C10 support for-mobility
C10 support for-mobilityC10 support for-mobility
C10 support for-mobility
 
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
A NETWORK DATA AND COMMUNICATION ANALYSIS BASED COMBINED APPROACH TO IMPROVE ...
 
Artigo: Multilayer Networks: An Architecture Framework
Artigo: Multilayer Networks: An Architecture FrameworkArtigo: Multilayer Networks: An Architecture Framework
Artigo: Multilayer Networks: An Architecture Framework
 
On the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksOn the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networks
 

Destaque

Cici flour mill
Cici flour millCici flour mill
Cici flour millCici Guo
 
Blended Learning
Blended LearningBlended Learning
Blended Learningaperdue15
 
How to Create Configurable Product with Necessary Attribute(s) in Magento 2
How to Create Configurable Product with Necessary Attribute(s) in Magento 2How to Create Configurable Product with Necessary Attribute(s) in Magento 2
How to Create Configurable Product with Necessary Attribute(s) in Magento 2Store Manager for Magento
 
Arte japones
Arte japonesArte japones
Arte japonesluisjaban
 
Surindra Auto Industries, Ludhiana, Tractor Linkage Parts
Surindra Auto Industries, Ludhiana, Tractor Linkage PartsSurindra Auto Industries, Ludhiana, Tractor Linkage Parts
Surindra Auto Industries, Ludhiana, Tractor Linkage PartsIndiaMART InterMESH Limited
 
Alfabetizacion digital
Alfabetizacion digitalAlfabetizacion digital
Alfabetizacion digitalBrekarior
 
Navegação e Arquitetura de Informação
Navegação e Arquitetura de InformaçãoNavegação e Arquitetura de Informação
Navegação e Arquitetura de InformaçãoLuiz Agner
 
Development and Evaluation of High Loading oral dissolving film of aspirin an...
Development and Evaluation of High Loading oral dissolving film of aspirin an...Development and Evaluation of High Loading oral dissolving film of aspirin an...
Development and Evaluation of High Loading oral dissolving film of aspirin an...Dhaval shah
 
Holiday Slide PDF
Holiday Slide PDFHoliday Slide PDF
Holiday Slide PDFmketterman1
 

Destaque (17)

Wendy power point1
Wendy power point1Wendy power point1
Wendy power point1
 
Hjki
HjkiHjki
Hjki
 
Prospects
ProspectsProspects
Prospects
 
projecten MW
projecten MWprojecten MW
projecten MW
 
Cici flour mill
Cici flour millCici flour mill
Cici flour mill
 
Final Report
Final ReportFinal Report
Final Report
 
Blended Learning
Blended LearningBlended Learning
Blended Learning
 
Distributors
DistributorsDistributors
Distributors
 
How to Create Configurable Product with Necessary Attribute(s) in Magento 2
How to Create Configurable Product with Necessary Attribute(s) in Magento 2How to Create Configurable Product with Necessary Attribute(s) in Magento 2
How to Create Configurable Product with Necessary Attribute(s) in Magento 2
 
Arte japones
Arte japonesArte japones
Arte japones
 
Carta sociale
Carta socialeCarta sociale
Carta sociale
 
Surindra Auto Industries, Ludhiana, Tractor Linkage Parts
Surindra Auto Industries, Ludhiana, Tractor Linkage PartsSurindra Auto Industries, Ludhiana, Tractor Linkage Parts
Surindra Auto Industries, Ludhiana, Tractor Linkage Parts
 
Alfabetizacion digital
Alfabetizacion digitalAlfabetizacion digital
Alfabetizacion digital
 
Soil Remediation_SVE
Soil Remediation_SVESoil Remediation_SVE
Soil Remediation_SVE
 
Navegação e Arquitetura de Informação
Navegação e Arquitetura de InformaçãoNavegação e Arquitetura de Informação
Navegação e Arquitetura de Informação
 
Development and Evaluation of High Loading oral dissolving film of aspirin an...
Development and Evaluation of High Loading oral dissolving film of aspirin an...Development and Evaluation of High Loading oral dissolving film of aspirin an...
Development and Evaluation of High Loading oral dissolving film of aspirin an...
 
Holiday Slide PDF
Holiday Slide PDFHoliday Slide PDF
Holiday Slide PDF
 

Semelhante a Ijarcet vol-2-issue-7-2297-2301

A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingTal Lavian Ph.D.
 
ADAPTIVE An Object-Oriented Framework for Flexible and Adaptive Communicatio...
ADAPTIVE  An Object-Oriented Framework for Flexible and Adaptive Communicatio...ADAPTIVE  An Object-Oriented Framework for Flexible and Adaptive Communicatio...
ADAPTIVE An Object-Oriented Framework for Flexible and Adaptive Communicatio...Sara Parker
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Makhdoom Waseem Hashmi
 
chapter-15-networking-concepts.pdf
chapter-15-networking-concepts.pdfchapter-15-networking-concepts.pdf
chapter-15-networking-concepts.pdfstudy material
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...IRJET Journal
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 

Semelhante a Ijarcet vol-2-issue-7-2297-2301 (20)

A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
Edge device multi-unicasting for video streaming
Edge device multi-unicasting for video streamingEdge device multi-unicasting for video streaming
Edge device multi-unicasting for video streaming
 
1720 1724
1720 17241720 1724
1720 1724
 
1720 1724
1720 17241720 1724
1720 1724
 
ADAPTIVE An Object-Oriented Framework for Flexible and Adaptive Communicatio...
ADAPTIVE  An Object-Oriented Framework for Flexible and Adaptive Communicatio...ADAPTIVE  An Object-Oriented Framework for Flexible and Adaptive Communicatio...
ADAPTIVE An Object-Oriented Framework for Flexible and Adaptive Communicatio...
 
Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...Ns 2 based simulation environment for performance evaluation of umts architec...
Ns 2 based simulation environment for performance evaluation of umts architec...
 
chapter-15-networking-concepts.pdf
chapter-15-networking-concepts.pdfchapter-15-networking-concepts.pdf
chapter-15-networking-concepts.pdf
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
395 401
395 401395 401
395 401
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
82 87
82 8782 87
82 87
 

Mais de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Mais de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Último

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Último (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Ijarcet vol-2-issue-7-2297-2301

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2297 www.ijarcet.org Performance Analysis of Various Application Protocols for MANET Dr. Ravi Sindal Associate Professor IET DAVV, Indore M.P. India Nidhi Jaiswal M.E. Student IET DAVV Indore M.P. India Abstract—A mobile ad hoc network (MANET) consists of mobile wireless nodes. The communication between these mobile nodes is carried without any centralized control. The ease of deployment and the infrastructure less nature of Mobile Ad Hoc Networks (MANET) make them highly desirable for present day multi media communications. In this paper we analyze the performance of TCP/IP based application protocol (HTTP, FTP) via increasing number of nodes and observing its effect on parameters like throughput, network load, media access delay and traffic received. Network simulation tool is OPNET Modeler (Ver. 14.5). Keywords—Ad-hoc,MANET,FTP,HTTP,OPNET. I. INTRODUCTION Ad-hoc, namely,Ad Hoc mode is a short-term wireless network fremework which locates two or more wireless net adapters without using any acess point.One of good features of such networks is the flexibility and can be deployed very easily. Thus it is suitable for the emergency situation. But on the other side it is also very difficult to handle the operation of ad hoc networks. Each node is responsible to handle its operation[5]. MANET stands for Mobile Ad hoc Network. It is a robust infrastructureless wireless network. A MANET can be formed either by mobile nodes or by both fixed and mobile nodes. Nodes randomly associate with each other forming arbitrary topologies. They act as both routers and hosts. The ability of mobile routers to self-configure makes this technology suitable for provisioning communication to, for instance, disaster-hit areas where there is no communication infrastructure, conferences, or in emergency search and rescue operations where a network connection is urgently required. Figure-1 Mobile Ad-Hoc Network The need for mobility in wireless networks necessitated the formation of the MANET working group within The Internet Engineering Task Force (IETF) for developing consistent IP routing protocols for both static and dynamic topologies. [6] For any communication network it must be able to tranposrt user traffic twards its targeted destination.the communiaction performance of a network can effect the satsfaction level of the users.The ability to send information at high level speeds demanda low end-to-end delay. In addition user would like to trasmit a variety of information, such as data audio and video.An ad hoc network is not useful if it cannot offer acceptable communication services. Given the dynamics of the network topology, the underlying protocols must be able to cope with these dynamics efficientrly while at the same time yeilding good communication peformance. II. APPLICATIONS Applications are the predominant sources of traffic in the network. It is the traffic generated by applications that loads the network, makes demands on the bandwidth and the underlying network technology, and creates load on the servers. For the optimum performance of an application, you must ensure that the network and server infrastructure are designed to meet the requirements of the application. Likewise, it is necessary to design applications so that they minimize their impact on network and server resources. To do this, it is necessary to first create an accurate model of the application. To be an accurate representation of the application, an application model should have the same traffic characteristics in terms of the size of the packets generated, the rate at which they are generated, the transport protocol over which it runs (e.g., TCP, UDP, fiber channel, etc.), the number of simultaneous connections, timeouts, retransmissions, failure and recovery and so on. Together these characteristics create a run time traffic pattern of the application. Each application has its unique traffic pattern, or signature, and therefore creates its characteristic load on the network and servers. Thus, the concept of application modeling is to capture the traffic pattern of the applications of interest.[1] III. STANDERD APPLICATIONS Depending on their underlying networks, application architectures may differ. Standard network applications are implemented in a two-tier architecture in which the client issues a request and a server or client receives the request and
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2298 www.ijarcet.org returns a response. This request-response exchange typically happens within one "conversation" between the client and the server, or between a client and another client. In this chapter, we use the term "conversation" to represent a sequence of activity between a client and a server within the context of a given application. A conversation includes a pattern of data exchanges, typically defined in a statistical manner that repeats over time. [1] Figure-2 Application Architecture IV.FTP File transfer and access in a computer network is viewed to be an important function .In a distributed network environment, there are diskless machine that have little or no file storage ability. Such device can create, store, and update files to a remotely connected file sever, which is another machine but equipped with large storage and processing capability .There are also cases where remote storage is used to archive data. FTP is one of the earliest versions of file transfer software. FTP uses TCP to ensure reliable transfer of file data. Although this sounds simple, in actuality it is complex. Not only will a TCP connection be established prior to data transfer but also the need for authorization checks, naming and representation among heterogeneous machines. FTP client need to apply a valid login name and password to perform file transfer /access operation. FTP is interactive in that the user can enter specific commands to store and retrieve files, large file transfer are supported by FTP and timer is used to close a session if the connection is inactive after some time prior’s be able to support FTP over an ad hoc wireless network is attractive and desirable. There is no need for transfer of floppy disk from one host to another. The transfer of bits can be done over the-air, in a mutihop fashion [4]. V.HTTP Web access is getting more and more popular these days with the arrival of the internet. The web server allows one to advertise information to other User can download information (video and audio clips, text files etc) into there local machines. To ensure that web access and services can be supported in ad hoc networks, an ad hoc mobile host is configured to be a web server. The client then access a specific web page stored at the web server, which is several wireless hops away. The client is running a web browser and by specifying the HTTP address of the specific web site, an underlying connection is established from the client to the server [4]. VI. SIMULATION SCENARIO. The research is carried out using direct event simulation software known as OPNET (Optimized Network Engineering Tool) Modeler version 14.5. It is one off the most widely used commercial simulator based on Microsoft Windows platform .the simulation focus on the performance of application protocol in mobile ad hoc network therefore six simulation scenario with no of node combination are considered. The nodes are randomly placed within certain gap from each other in 1000x1000m campus environment. The constant ftp, http traffic was generated in the network i.e. user define via Application and Profile Configuration. Every node in the network was configured to execute AODV. The simulation time was set to 120s [8]. Figure-3 MANET Topology A) Traffic Flow Parameters Traffic was generated in the network explicitly by configuring user defined application and profile definition 1) Application Configuration A heavier application traffic flow in the topology was generated which each node will be processing from the respective application traffic generated was as FTP-high load, HTTP-Heavy browsing. 2) Profile Configuration The Profile configuration for each application was defined as Operation Mode: Serial (Ordered) and Start Time: application start time was set to constant 5 seconds of time period. 3) Mobility Configuration The Mobility configuration for whole network is set to random way point with a constant speed of 10 meter/second.
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2299 www.ijarcet.org 4) DES Configuration Parameter The DES simulation criterion was run for total time of 120 seconds. The overall simulation monitored within the following criteria:  Duration: 2 minutes (120 seconds)  Seed: 128  Update Interval: 500000 events( This specifies how often simulation calculates event/second data)  Simulation kernel: Optimized (‘optimized’ kernel was chosen because it run faster than the remaining other two simulation kernels).[9] TABLE 1 SIMULATION PARAMETER PARAMETER VALUE Number of nodes 3,5,10 Simulation time 10 second Campus network size 1000m*1000m Application FTP, HTTP Start time offset 5 second Duration 120 second Mobility model Random way point Speed 10 meter/second Start time 5 second VII. PERFORMANCE METRICS This work focuses on three performance metrics which are quantitatively measured. The performance metrics are important to measure the performance and activities that are running on Opnet simulation. These metrics are Traffic Received (bytes/sec): Average bytes per second forwarded to the HTTP/FTP applications by the transport layers in the network. Load (bits/sec): Represents the total load (in bits/sec) submitted to wireless LAN layers by all higher layers in all WLAN nodes of the network. Media Access Delay (sec): Represents the global statistic for the total of queuing and contention delays of the data, management, delayed Block-ACK and Block-ACK Request frames transmitted by all WLAN MACs in the network. For each frame, this delay is calculated as the duration from the time when it is inserted into the transmission queue, which is arrival time for higher layer data packets and creation time for all other frames types, until the time when the frame is sent to the physical layer for the first time. Hence, it also includes the period for the successful RTS/CTS exchange, if this exchange is used prior to the transmission of that frame. Similarly, it may also include multiple numbers of backoff periods, if the MAC is 802.11e-capable and the initial transmission of the frame is delayed due to one or more internal collisions [1]. VIII. RESULTS AND ANALYSIS The simulation results are shown below in the form of graphs. Graphs show each parameter variation when number of node varies. Results for File Transfer Protocol Figure-4 Traffic Received (bytes/sec) Figure-4 Represents average bytes per second forwarded to the FTP applications by the transport layers in the network. As the number of node for the network is increases the Traffic Received (bytes/sec) decreases. Figure-5 Loads (bits/sec) Figure-5 Represents the total load (in bits/sec) submitted to wireless LAN layers by all higher layers in all WLAN nodes of the network. As the number of node for the network is increases the Load (bits/sec) for the network increases.
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2300 www.ijarcet.org Figure-6 Media Access Delay Figure-6 Represents the global statistic for the total of queuing and contention delays of the data, management, delayed Block-ACK and Block-ACK Request frames transmitted by all WLAN MACs in the network. As the number of node for the network increases the Media Access delay (sec) for the network increases. Results for Hypertext Transfer Protocol Figure-7 Traffic Received (bytes/sec) Figure-7 Represents average bytes per second forwarded to the HTTP applications by the transport layers in the network. As the number of node for the network is increases there is not any linear variation of Traffic Received (bytes/sec). Figure-8 Loads (bits/sec) Figure-8 Represents the total load (in bits/sec) submitted to wireless LAN layers by all higher layers in all WLAN nodes of the network. As the number of node for the network is increases the Load (bits/sec) increases. Figure -9 Media Access Delay Figure-9 Represents the global statistic for the total of queuing and contention delays of the data, management, delayed Block- ACK and Block-ACK Request frames transmitted by all WLAN MACs in the network. As the number of node for the network increases the Media Access delay (sec) for the network increases IX. CONCLUSION This paper we analyze the slandered application protocol. The considerable observation is, simulation results agree with expected results based on theoretical analysis. Mobile ad-hoc networks are wireless networks that use multi-hop instead of static networks infrastructure to provide network connectivity.
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013 2301 www.ijarcet.org From the experimental results we conclude that increase in the number of nodes will cause increase in media access delay and network load. Same way we can also analyze other application such as Voice, Video, Email and remote login. REFERENCES 1. www.opnet.com 2. Emad Aboelela, Network Simulation Experimental Manual Second Edition pp 118-129. 3. C.K.Toh “Ad Hoc Mobile Wireless Networks Protocols and Systems” Pearson Edition pp.137 140. 4. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, Tech. Rep. 802.11. (1999) IEEE Network. 5. Rajesh Kumar Chakrawarti, Madhulika “A QoS- based Measurement of DSR and TORA Reactive Routing Protocols in MANET” International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3,May 2012 pp 80-84. 6. R. Misra and C.R. Mandal, “Performance comparison of AODV/DSR on-demand routing protocols for ad hoc Networks in constrained situation” ICPWC International Conference, IEEE, 2005, pp. 86 – 89. 7. R. Cheng, H. Lin, “A Cross-layer Design for TCP End-to-End Performance Improvement in multi-hop Wireless Networks”, ELSEVIER, Computer communication Vol.31, issue 14, pp. 3145-3152, Sep. 2008. 8. Sunil kumar, Jyotsana Sengupta “AODV and OLSR Protocol for Wireless Ad-hoc and Mesh Networks.