SlideShare uma empresa Scribd logo
1 de 28
Computer Science Department
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK
WITH MEDICAL DATA
Prepared by:
ISMAIL H-MOFTAH ELDABAR
Supervised by:
Professor Zakaria Suliman Zubi
 Ad Hoc wireless network that without any central controlling
authority, which is a collection of mobile nodes that are dynamically
and arbitrarily located in such a manner that the interconnections
between nodes are capable of changing on a continual basis, so nodes
cooperate to route a packet.
 Limited bandwidth of throughput and low delay in high density nodes
are tow characteristics of Ad Hoc wireless network.
 The purpose of the routing protocols is to discover rapid changes of
the topology in such a way that intermediate nodes can act as routers
to forward packets on behalf of the communicating pair .
 Route construction should be done with a minimum of overhead and
bandwidth consumption. In configuration, topology management
issues are even more important in the context of Ad Hoc wireless
networks.
2

12/15/13

2
What is the wireless network?

3

12/15/13

3
What is the wireless network?
Ad Hoc Wireless network is used in many applications such as healthcare,
military, environmental, home automation, farming, surveillance security and
traffic control. It normally consists of hundreds or thousands of nodes each
capable to work as router, processing, and transmitting environmental
information.
However, an Ad Hoc Wireless network consists of nodes which could also
have a fixed location or randomly deployed to monitor the environment, certain
physical phenomena or to detect and track certain objects in an area of work.
Ad Hoc Wireless networks are useful in the wide world which has static
network structure that required by infrastructure network.
In Ad Hoc Wireless network any communication between nodes always
requires routing over multi-hop paths between the source node and the
destination node to self-organize and form a network over different links. 12/15/13
4

4
Infrastructure Mode using a central device, called a wireless access point. All
wireless nodes can be connect to Ethernet network through this access point.

5

12/15/13
Ad Hoc Mode is a collection of mobile nodes in communication without using
infrastructure.

6

12/15/13
Obstacles,
Noise,
Interference and
 Fading.
which will reduce throughput and increase time delay for the data flow.
 The links typically have less bandwidth than a wired network.
Each node in an Ad Hoc wireless network node functions as both a host and
a router, and the control of the network is circulated among the nodes.
7

12/15/13
Find the most suitable Ad Hoc routing protocol for the designed network.
Evaluate three most popularly used routing protocols.
 Ad Hoc On Demand Distance Vector (AODV),
 Optimized Link State Routing Protocol (OLSR) and
 Temporally-Ordered Routing Algorithm (TORA).
 Build a network connected to a server via a wireless in OpNet simulater.
The evaluation will be conducted in terms of throughput and delay of these
protocols.
8

12/15/13
Study

Protocol

(Hsu J.Bhatia 2003)
Performance of mobile
ad hoc networking
routing protocols in
realistic scenarios

(Vahid 2006)
Performance
Comparison of
Routing Protocols for
Mobile Ad Hoc
Networks

Simulator

Metrics

Conclusion

AODV,OLSR, QualNet
DSR and ZRP

Packet delivery
ratio, latency
and jitter of
data packets

AODV is overall
better as
compared to
other.

DSDV,
TORA, DSR
and AODV

Weighted Path
Optimality,
Network’s Load
Deviation,
Average end-toend delay,
Jitter.

DSDV is best in
Path Optimality,
DSDV and AODV
in delay, DSR in
load balancing
and DSDV in
jitter.

Ns-2
CBR traffic
source,
movement
model
based on
pause time
9

12/15/13
Study

Protocol

Simulator

Metrics

Conclusion

(Rahman 2010)
A Simulation Based
Performance
Comparison of
Routing Protocol on
Mobile Ad-hoc
Network
(Anuj K 2010)
Performance
analysis of AODV,
DSR & TORA
Routing Protocols

AODV,
DYMO, ZRP
and OLSR

Qualnet 4.5
CBR traffic
source, two-ray
propagation
path loss model,
mobility based
on pause time
NS-2

Packet
Delivery
Fraction,
Average Endto-end delay,
Jitter and
Throughput
average Endto-End delay
and packet
delivery ratio

DYMO best in PDF,
OLSR and ZRP
good in average
end to end delay,
ZRP better than
others in
throughput
TORA is suitable
for operation in
large mobile
networks having
dense population
of nodes.

AODV, DSR
and TORA

10

12/15/13
(Classification of Ad Hoc routing protocols (Nadia 2009
11

12/15/13
12

12/15/13
AODV uses three control messages to obtain and maintain routes:
Route Request (RREQ)

Route Reply (RREP)

Route Request (RREQ ) and Route Replay (RREP( message (Jian Wu 2007)

Route Error (RERR)
If a node is unable to forward packet, it generates a RERR
message. When the originator node receives the RERR, it initiates
a new route discovery for the given route.
13

12/15/13
Optimized Link State Routing (OLSR)
HELLO
TC - Topology Control
MID - Multiple Interface Declaration

14
)MPR and normal flooding (Mohamed 2011

multipoint relays (MPRs)
to minimize the number of
control messages flooding
in the network.

12/15/13
Temporary Ordered Routing Algorithm (TORA)

Re-establishing route on failure link 5-7.
The new reference level is node5

Height of each node updated a result of message

15

12/15/13
Optimized Link State Routing (OLSR)
OLSR employs multipoint relays (MPRs) to minimize the number of control messages
flooding in the network. Each node chooses a subset of its one hop neighbors (MPRs)
in such a way that these MPRs will cover all two-hop away neighbors. Hence,
messages are only flooded through MPRs, and not to all nodes. Flooding through
multipoint relays (MPRs) reduce the number of duplicate transmissions.

16
(MPR and normal flooding (Mohamed 2011

12/15/13
Three control messages are defined to provide this functionality:
HELLO
HELLO messages are exchanged between neighbours only, and diffuse
information about the one hop neighbours of a node.
Two hop neighbourhood can be discovered, and further, the MPRs of the given
node can be chosen.
The MPRs chosen by a node is further marked in the following HELLO messages
broadcasted by that node.
TC - Topology Control
All nodes chosen as MPR will transmit TC messages.
The TC messages contain the address of the node generating the message, as
well as the list of nodes that has chosen the given node as MPR.
TC messages are further flooded using the MPRs, disseminating network
topology information to all the nodes in the OLSR network.
MID - Multiple Interface Declaration
The MID message is broadcasted by nodes running OLSR on more
than one
network interface.
17
12/15/13
Temporary Ordered Routing Algorithm (TORA)
TORA maintains multiple routes to the destination when topology changes
frequently. It consists of link reversal of the Directed Acyclic Graph (ACG). It uses
Internet MANET Encapsulation Protocol (IMEP) for link status and neighbour
connectivity sensing. IMEP provide reliable, in-order delivery of all routing control
messages from a node to all of its neighbours, and notification to the routing
protocol whenever a link neighbours is created or broken.

18

12/15/13
Temporary Ordered Routing Algorithm (TORA)
As TORA is for multihop networks which is considered to minimize the
communication overhead associated with adapting to network topological changes
by localization of algorithmic reaction. Moreover, it is bandwidth efficient and highly
adaptive and quick in route repair during link failure figure2.8 and providing multiple
routes to destination node in wireless networks.
Re-establishing route on failure link 5-7.
The new reference level is node5

Height of each node updated a result of message

19

12/15/13
We will choose two criteria which derived for QoS as follows:
Throughput:
the ratio of successfully transmitted of total amount of data receiver actually
receives from sender by bits divided by the time taken by receiver to obtain the
last packet by second for the entire network; this includes all routing data and
user data (Rahman 2010).
Delay:
The time elapsed between the creation of a packet at its source and its
destruction at the destination, measured in seconds (Singla 2009). The packet
end-to-end delay is the time of generation of a packet by the source up to the
destination reception. So this is the time that a packet takes to go across the
network. This time is expressed in sec (Jha 2010).
20

12/15/13
The purpose of this project is to research methods of transmitting real time
data from a number of dynamic nodes in hospital environment.
1000m× 1000m indoor.
50-100 mobile workstations
 wireless network server

21

12/15/13
The model parameters that will use in the experiments are summarized
Parameter

Value

Simulator

OpNet Modeler 14.0

Number of wireless Nodes

50-100 mobile workstations and one mobile Server

Ad Hoc Routing Protocols

AODV, OLSR and TORA

Time of simulation

1800 seconds (30 minutes)

Simulation area

Indoor, 1000m x 1000 meters

Transmission range

30-90 m

Physical Characteristics

IEEE 802.11g

Data rate

54 Mbps

Applications

HTTP, FTP, DATABASE, EMAIL and PRINT.

Metrics

Throughput and Delay
22

12/15/13
Application

Attributes

The Describe

Selection
File Transfer Protocol enables file transfers and
1

FTP

1,048,576 byte

downloads between nodes.

(8Megabits)
Hypertext

2

Heavy browsing
HTTP

307,200 byte

application

Transfer
protocol

Protocol (HTTP)
foundation

is
of

an
data

communication for the World wide web.

(2.34Megabits)
Electronic mail is a method of exchanging
3

Email

2,000 byte
(0.02Megabits)

messages from an author to one or more
recipients. Modern Email operates across the
internet or other computer network.

23

12/15/13
Application

Attributes

The Describe

Selection
A database is an organized collection of data. A
database

system implies

that

the

data

is

managed to some level of quality (measured in
4

Database

32,76byte

terms of accuracy, availability, usability, and

(0.25 megabits)

resilience) and this in turn often implies the use
of a general-purpose database management
system (DBMS).

Color (Min 3,000Print out job submission on paper.

Max 9,000,000) byte
5

Print

(0.023 – 68.7
megabits)
24

12/15/13
Flow chart of OpNet

Create Network

Network
configuration

Run Simulation

View results

25
Test Result Analysis

12/15/13
Five main Scenarios for each network design (50-100 nodes)
Each scenario has one service for all nodes in our network designed.
Scenario 1: FTP on all workstations and the server.
Scenario 2: HTTP on all workstations and the server.
Scenario 3: EMAIL on all workstations and the server.
Scenario 4: DATABASE on all workstations and the server.
Scenario 5: PRINT on all workstations and the server.
Each scenario we will apply 3 routing protocols:
Ad Hoc On-Demand Distance Vector (AODV),
Optimized Link State Routing Protocol (OLSR) and
Temporally-Ordered Routing Algorithm (TORA).
26

12/15/13
Simulation can be defined to show the eventual real behavior of the selected
system model, and it is a comprehensive set of tools with all the components for
custom network modeling and simulation. In this paper, an effort has been made
to perform a simulation model for ad hoc wireless network to monitor the
performance metrics of the network in different scenarios, and focus on the
comparison of data obtained by using OpNet modeler, also, the result obtained
from these different scenarios while a route recognized between source and
destination matchup is maintained as long as desirable by the source with
routing protocols selected.
27

12/15/13
o
a nk y
.Th

u

ns
?Questio

Preparation: Ismail .H.Moftah Eldabar
Supervised by: Professor Zakaria Suliman Zubi

28

12/15/13

Mais conteúdo relacionado

Mais procurados

Computer networks comparison of aodv and olsr in ad hoc networks
Computer networks   comparison of aodv and olsr in ad hoc networksComputer networks   comparison of aodv and olsr in ad hoc networks
Computer networks comparison of aodv and olsr in ad hoc networksAli Haider
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDr Praveen Jain
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorialtritv
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Networkmdfarhanh1
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 

Mais procurados (20)

Computer networks comparison of aodv and olsr in ad hoc networks
Computer networks   comparison of aodv and olsr in ad hoc networksComputer networks   comparison of aodv and olsr in ad hoc networks
Computer networks comparison of aodv and olsr in ad hoc networks
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
Wmn Tutorial
Wmn TutorialWmn Tutorial
Wmn Tutorial
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 

Destaque

Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Zakaria Zubi
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Zakaria Zubi
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended DatabasesZakaria Zubi
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification Zakaria Zubi
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
 

Destaque (6)

Edi text
Edi textEdi text
Edi text
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended Databases
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification
 
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime PatternUsing Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
 

Semelhante a Comparison of Routing Protocols for Ad Hoc Wireless Networks with Medical Data

Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetIAEME Publication
 

Semelhante a Comparison of Routing Protocols for Ad Hoc Wireless Networks with Medical Data (20)

J0935461
J0935461J0935461
J0935461
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
O26087092
O26087092O26087092
O26087092
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
K017426872
K017426872K017426872
K017426872
 
E010322531
E010322531E010322531
E010322531
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 

Mais de Zakaria Zubi

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...Zakaria Zubi
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understandingZakaria Zubi
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesZakaria Zubi
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposesZakaria Zubi
 

Mais de Zakaria Zubi (7)

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understanding
 
Model
ModelModel
Model
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital images
 
Deep Web mining
Deep Web miningDeep Web mining
Deep Web mining
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Comparison of Routing Protocols for Ad Hoc Wireless Networks with Medical Data

  • 1. Computer Science Department COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Prepared by: ISMAIL H-MOFTAH ELDABAR Supervised by: Professor Zakaria Suliman Zubi
  • 2.  Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.  Limited bandwidth of throughput and low delay in high density nodes are tow characteristics of Ad Hoc wireless network.  The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .  Route construction should be done with a minimum of overhead and bandwidth consumption. In configuration, topology management issues are even more important in the context of Ad Hoc wireless networks. 2 12/15/13 2
  • 3. What is the wireless network? 3 12/15/13 3
  • 4. What is the wireless network? Ad Hoc Wireless network is used in many applications such as healthcare, military, environmental, home automation, farming, surveillance security and traffic control. It normally consists of hundreds or thousands of nodes each capable to work as router, processing, and transmitting environmental information. However, an Ad Hoc Wireless network consists of nodes which could also have a fixed location or randomly deployed to monitor the environment, certain physical phenomena or to detect and track certain objects in an area of work. Ad Hoc Wireless networks are useful in the wide world which has static network structure that required by infrastructure network. In Ad Hoc Wireless network any communication between nodes always requires routing over multi-hop paths between the source node and the destination node to self-organize and form a network over different links. 12/15/13 4 4
  • 5. Infrastructure Mode using a central device, called a wireless access point. All wireless nodes can be connect to Ethernet network through this access point. 5 12/15/13
  • 6. Ad Hoc Mode is a collection of mobile nodes in communication without using infrastructure. 6 12/15/13
  • 7. Obstacles, Noise, Interference and  Fading. which will reduce throughput and increase time delay for the data flow.  The links typically have less bandwidth than a wired network. Each node in an Ad Hoc wireless network node functions as both a host and a router, and the control of the network is circulated among the nodes. 7 12/15/13
  • 8. Find the most suitable Ad Hoc routing protocol for the designed network. Evaluate three most popularly used routing protocols.  Ad Hoc On Demand Distance Vector (AODV),  Optimized Link State Routing Protocol (OLSR) and  Temporally-Ordered Routing Algorithm (TORA).  Build a network connected to a server via a wireless in OpNet simulater. The evaluation will be conducted in terms of throughput and delay of these protocols. 8 12/15/13
  • 9. Study Protocol (Hsu J.Bhatia 2003) Performance of mobile ad hoc networking routing protocols in realistic scenarios (Vahid 2006) Performance Comparison of Routing Protocols for Mobile Ad Hoc Networks Simulator Metrics Conclusion AODV,OLSR, QualNet DSR and ZRP Packet delivery ratio, latency and jitter of data packets AODV is overall better as compared to other. DSDV, TORA, DSR and AODV Weighted Path Optimality, Network’s Load Deviation, Average end-toend delay, Jitter. DSDV is best in Path Optimality, DSDV and AODV in delay, DSR in load balancing and DSDV in jitter. Ns-2 CBR traffic source, movement model based on pause time 9 12/15/13
  • 10. Study Protocol Simulator Metrics Conclusion (Rahman 2010) A Simulation Based Performance Comparison of Routing Protocol on Mobile Ad-hoc Network (Anuj K 2010) Performance analysis of AODV, DSR & TORA Routing Protocols AODV, DYMO, ZRP and OLSR Qualnet 4.5 CBR traffic source, two-ray propagation path loss model, mobility based on pause time NS-2 Packet Delivery Fraction, Average Endto-end delay, Jitter and Throughput average Endto-End delay and packet delivery ratio DYMO best in PDF, OLSR and ZRP good in average end to end delay, ZRP better than others in throughput TORA is suitable for operation in large mobile networks having dense population of nodes. AODV, DSR and TORA 10 12/15/13
  • 11. (Classification of Ad Hoc routing protocols (Nadia 2009 11 12/15/13
  • 13. AODV uses three control messages to obtain and maintain routes: Route Request (RREQ) Route Reply (RREP) Route Request (RREQ ) and Route Replay (RREP( message (Jian Wu 2007) Route Error (RERR) If a node is unable to forward packet, it generates a RERR message. When the originator node receives the RERR, it initiates a new route discovery for the given route. 13 12/15/13
  • 14. Optimized Link State Routing (OLSR) HELLO TC - Topology Control MID - Multiple Interface Declaration 14 )MPR and normal flooding (Mohamed 2011 multipoint relays (MPRs) to minimize the number of control messages flooding in the network. 12/15/13
  • 15. Temporary Ordered Routing Algorithm (TORA) Re-establishing route on failure link 5-7. The new reference level is node5 Height of each node updated a result of message 15 12/15/13
  • 16. Optimized Link State Routing (OLSR) OLSR employs multipoint relays (MPRs) to minimize the number of control messages flooding in the network. Each node chooses a subset of its one hop neighbors (MPRs) in such a way that these MPRs will cover all two-hop away neighbors. Hence, messages are only flooded through MPRs, and not to all nodes. Flooding through multipoint relays (MPRs) reduce the number of duplicate transmissions. 16 (MPR and normal flooding (Mohamed 2011 12/15/13
  • 17. Three control messages are defined to provide this functionality: HELLO HELLO messages are exchanged between neighbours only, and diffuse information about the one hop neighbours of a node. Two hop neighbourhood can be discovered, and further, the MPRs of the given node can be chosen. The MPRs chosen by a node is further marked in the following HELLO messages broadcasted by that node. TC - Topology Control All nodes chosen as MPR will transmit TC messages. The TC messages contain the address of the node generating the message, as well as the list of nodes that has chosen the given node as MPR. TC messages are further flooded using the MPRs, disseminating network topology information to all the nodes in the OLSR network. MID - Multiple Interface Declaration The MID message is broadcasted by nodes running OLSR on more than one network interface. 17 12/15/13
  • 18. Temporary Ordered Routing Algorithm (TORA) TORA maintains multiple routes to the destination when topology changes frequently. It consists of link reversal of the Directed Acyclic Graph (ACG). It uses Internet MANET Encapsulation Protocol (IMEP) for link status and neighbour connectivity sensing. IMEP provide reliable, in-order delivery of all routing control messages from a node to all of its neighbours, and notification to the routing protocol whenever a link neighbours is created or broken. 18 12/15/13
  • 19. Temporary Ordered Routing Algorithm (TORA) As TORA is for multihop networks which is considered to minimize the communication overhead associated with adapting to network topological changes by localization of algorithmic reaction. Moreover, it is bandwidth efficient and highly adaptive and quick in route repair during link failure figure2.8 and providing multiple routes to destination node in wireless networks. Re-establishing route on failure link 5-7. The new reference level is node5 Height of each node updated a result of message 19 12/15/13
  • 20. We will choose two criteria which derived for QoS as follows: Throughput: the ratio of successfully transmitted of total amount of data receiver actually receives from sender by bits divided by the time taken by receiver to obtain the last packet by second for the entire network; this includes all routing data and user data (Rahman 2010). Delay: The time elapsed between the creation of a packet at its source and its destruction at the destination, measured in seconds (Singla 2009). The packet end-to-end delay is the time of generation of a packet by the source up to the destination reception. So this is the time that a packet takes to go across the network. This time is expressed in sec (Jha 2010). 20 12/15/13
  • 21. The purpose of this project is to research methods of transmitting real time data from a number of dynamic nodes in hospital environment. 1000m× 1000m indoor. 50-100 mobile workstations  wireless network server 21 12/15/13
  • 22. The model parameters that will use in the experiments are summarized Parameter Value Simulator OpNet Modeler 14.0 Number of wireless Nodes 50-100 mobile workstations and one mobile Server Ad Hoc Routing Protocols AODV, OLSR and TORA Time of simulation 1800 seconds (30 minutes) Simulation area Indoor, 1000m x 1000 meters Transmission range 30-90 m Physical Characteristics IEEE 802.11g Data rate 54 Mbps Applications HTTP, FTP, DATABASE, EMAIL and PRINT. Metrics Throughput and Delay 22 12/15/13
  • 23. Application Attributes The Describe Selection File Transfer Protocol enables file transfers and 1 FTP 1,048,576 byte downloads between nodes. (8Megabits) Hypertext 2 Heavy browsing HTTP 307,200 byte application Transfer protocol Protocol (HTTP) foundation is of an data communication for the World wide web. (2.34Megabits) Electronic mail is a method of exchanging 3 Email 2,000 byte (0.02Megabits) messages from an author to one or more recipients. Modern Email operates across the internet or other computer network. 23 12/15/13
  • 24. Application Attributes The Describe Selection A database is an organized collection of data. A database system implies that the data is managed to some level of quality (measured in 4 Database 32,76byte terms of accuracy, availability, usability, and (0.25 megabits) resilience) and this in turn often implies the use of a general-purpose database management system (DBMS). Color (Min 3,000Print out job submission on paper. Max 9,000,000) byte 5 Print (0.023 – 68.7 megabits) 24 12/15/13
  • 25. Flow chart of OpNet Create Network Network configuration Run Simulation View results 25 Test Result Analysis 12/15/13
  • 26. Five main Scenarios for each network design (50-100 nodes) Each scenario has one service for all nodes in our network designed. Scenario 1: FTP on all workstations and the server. Scenario 2: HTTP on all workstations and the server. Scenario 3: EMAIL on all workstations and the server. Scenario 4: DATABASE on all workstations and the server. Scenario 5: PRINT on all workstations and the server. Each scenario we will apply 3 routing protocols: Ad Hoc On-Demand Distance Vector (AODV), Optimized Link State Routing Protocol (OLSR) and Temporally-Ordered Routing Algorithm (TORA). 26 12/15/13
  • 27. Simulation can be defined to show the eventual real behavior of the selected system model, and it is a comprehensive set of tools with all the components for custom network modeling and simulation. In this paper, an effort has been made to perform a simulation model for ad hoc wireless network to monitor the performance metrics of the network in different scenarios, and focus on the comparison of data obtained by using OpNet modeler, also, the result obtained from these different scenarios while a route recognized between source and destination matchup is maintained as long as desirable by the source with routing protocols selected. 27 12/15/13
  • 28. o a nk y .Th u ns ?Questio Preparation: Ismail .H.Moftah Eldabar Supervised by: Professor Zakaria Suliman Zubi 28 12/15/13