SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Ankur Sharma et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Experimental Analysis of OLSR Routing Protocol and
Performance Evaluation Using NS-2 Simulator
Ankur Sharma1, Er. Rakesh Kumar2
1

(Department of Computer Science and Engineering, Sant Baba Bhag Singh Institute of Engineering &
Technology-Punjab Technical University, India)
2
(Department of Information Technology, Sant Baba Bhag Singh Institute of Engineering & TechnologyPunjab Technical University, India)

ABSTRACT
Mobile ad hoc networks (MANETs) is a collection of wireless moving nodes which communicate with each
other and exchange data without any fixed base station or without the need of any kind of wired backbone
network. These design characteristics make routing in wireless network a critical issue as routing protocols
adopted in wireless network is completely different from wired network in which a backbone router determines
the routing path. In this paper we discussed a OLSR routing protocol for routing path determination as well as
we measured the various performance oriented parameters using NS2 simulator. During the research
implementations, we also use trace graph, a open source tool for generation of graphs of various statistics such as
end to end delay, jitter, throughput etc. This study presents the sequence of steps which highlight the adoption of
OLSR routing based on the number of nodes and statistics generated in simulation environment.
Keywords – MANET, OLSR, NS2, Throughput, Delay, Packet Delivery Ratio

I.

INTRODUCTION

A Mobile Ad-Hoc Network (MANET) [1] is
the network which contains the mobile nodes which
send and receive packets from other nodes through a
wireless link as there is no dedicated fixed link
between wireless nodes. They can communicate each
other directly or with the help of a node which is
acting a router between wireless nodes. There is no
pre-existing infrastructure or dedicated base station in
case of wireless network. Due to mobility of nodes,
network topology of MANET may change
dynamically without turning to any existing
centralized administration [2].
Though wireless systems have existed since
the 1980’s it is only in recent times that wireless
systems have started to make inroads into all aspects
of human life. Mobile Ad Hoc Networks (MANETs)
are advanced wireless communication networks.
Mobile Ad hoc Network is an autonomous system of
mobile nodes connected by wireless links. Each node
operates as an end system and a router for all other
nodes in the network. A mobile Ad hoc Network is a
self configuring network of mobile routers connected
by wireless links –the union of which forms an
arbitrary topology. An Ad hoc network is often
defined as an “infrastructure less” network means
that a network without the usual routing
infrastructure, link fixed routers and routing
backbones. [3]
1.1 Properties of MANET Network
Wireless ad hoc networks are formed by a
group of mobile users or devices spread over a
www.ijera.com

certain geographical area. The user or devices
forming network “nodes”. The service area of the ad
hoc network is the whole geographical area where
nodes are distributed. As mobile ad hoc networks are
self organized networks communication in ad-hoc
networks can generate data for any other node in the
networks. The multi hop support makes
communication between nodes outside the direct
range of each other possible.
1.2 Some Issues in MANET Network
An ad hoc network is a dynamic type of
network with similarities and great differences to its
parent fixed communication network. The properties
of an ad hoc network will define its shortcomings and
highlight security challenges [4] [5] [6] [7] [8] [9].An
ad hoc networks, is a spontaneous, self created
network which cannot rely on a fixed network
infrastructure, and by definition does not. A fixed
entity structure such as a base station or central
administration is crucial for security mechanisms.
The trusted third party member who is expected in
traditional networks often defines security services;
the absence of such a control entity introduces new
opportunities for security attacks on the network. The
network instead of relying on a central administrator
for network and security service, the network relies
upon the nodes for these duties in a self-organized
manner. Connectivity is a problem in ad hoc
networks as networks are created spontaneously and
nodes are mobile. Therefore connectivity between the
nodes is sporadic. In ad hoc networks nodes may
have no prior relationships with other nodes within
676 | P a g e
Ankur Sharma et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681
the network. Prior acquaintance between nodes can
be seen as pre-trust relationships between nodes. It
cannot be assumed that pair wise secrets exist
between nodes. Physical vulnerability is a major
problem in Mobile adhoc network. Mobile node
capture or compromised nodes are of higher
probability in ad hoc networks than in traditional
wired networks with stationary hosts. Lack of
Resources is a problem with a network which has no
central administrator to perform network and security
tasks, and rather relies upon nodes to accomplish
such services. This creates a heavy burden upon
nodes to perform their own tasks as well as network
tasks therefore nodes will have limited resources
compared to fixed wired nodes. Threats or attacks
upon the network come from entities known as
adversaries, these may include insider and outsider
nodes that maliciously attack or threaten the network
or the secrecy of the networks content.
1.3 Objectives of this study
During
this
research
study
and
implementation, our main objective was to study the
working of OLSR routing protocol and then to
measure and analyse the performance of reactive
routing protocols in mobile ad hoc network. Keeping
this main objective in mind the following objectives
are stated:
 Study the various routing protocols and detailed
study of OLSR dynamic routing protocol.
 Implementation in simulation environment with
varied number of mobile nodes.
 Analytical study and measurement of the
performance of OLSR routing.
The remainder of this paper is organized as
follows – the next section gives the details about the
routing protocols and its classification. In Section 2
describes in detail about reactive routing protocols
and its various types and follow it with brief specifics
of implementation in section 3. Section 4 consists the
conclusion of the research work.

II.

www.ijera.com

2.1 The routing protocol for MANET is classified
as [13]:
 Table driven (proactive ) routing protocol
 On-demand (reactive) routing protocol
 Hybrid routing protocol
Table Driven routing protocol:
The table driven approach is very similar to
the connectionless approach where there is no
dedicated mechanism when and how frequently the
packets should be forwarded and when that route is
desired for sending of packets. It completely relies on
the underlying protocol in communication [11]. Here,
a route to every other node in ad hoc network is
always available, regardless of whether or not it is
needed.
On-demand driven routing protocols:
These protocols try to eliminate the
conventional routing tables and consequently reduce
the need for updating these tables to track changes in
the network topology. In the On-Demand approach,
when a node desires a route to a new destination, it
will have to wait until such a route can be discovered
i.e. routes are discovered whenever a source node
have packets to send [10] [11] and maintain it until
either the route is no longer desired or it becomes
inaccessible, and finally remove it by route deletion
procedure.

CLASSIFICATION OF ROUTING
PROTOCOL IN MANET NETWORK

In network infrastructure, the network layer
also known as IP layer is playing the biggest roles,
thereby also called backbone of the communication
network. In case of wired network, the network nodes
are communicating with each other through the
dedicated wired link whereas in case of MANET
moving node is to successfully transmit data packets
from the source to the destination without any kind of
fixed or dedicated links between them. Therefore,
efficient routing of packets is a primary MANET
challenge. On the basis of routing information update
mechanism routing protocol for ad-hoc wireless
network can be classified into three categories [10]
[11] Fig. 1 shows basic classification of routing
protocol:

www.ijera.com

Figure 1: Classification of Routing Protocols in
Mobile Ad-hoc Networks

Hybrid routing protocol:
Both of the routing protocols known as
proactive and reactive protocol are working best in
different scenarios [10] [12], hybrid method uses
both. These protocols combine the best good features
of reactive and proactive protocol. It is used to find a
balance between both protocols. Proactive operations
are restricted to small domain, whereas, reactive
protocols are used for locating nodes outside those
domains. Examples of hybrid protocols are:


Zone Routing Protocol, (ZRP)
677 | P a g e
Ankur Sharma et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681


Wireless Ad hoc Routing Protocol, (WARP)

2.2 Tools and Techniques used:
NS-2 Simulator
NS (version 2) is an object-oriented, discrete event
driven network simulator developed at UC Berkely
written in C++ and OTcl (Tcl script language with
Object-oriented extensions). It implements network
protocols such as TCP and UPD, traffic source
behavior such as FTP, Telnet, Web, CBR and VBR,
router queue management mechanism such as Drop
Tail, RED and CBQ, routing algorithms such as
Dijkstra, and more. NS also implements multicasting
and some of the MAC layer protocols for LAN
simulations [14].
Trace graph:
Trace graph is third party software helps in
plotting the graphs for NS2 and other networking
simulation softwares. Trace graph when opened, it
opens 3 windows [15]
 one window to select the trace file (.tr) that was
created by NS2 (depending on the size of the
trace file, the processing time also varies)
 Second window is the main window in which
you can see the graphs for various performance
characteristics like throughput, End to End
Delay, jitter, etc in 2D and 3D facility. Even it
can plot the histograms too.
 Third window is nothing but the Simulation
Information Windows, that you can see the
packet loss, packet delivery; end to end delay for
the total network, information about the
intermediate nodes, source and destination
nodes.
Process adopted during the implementation:
Following diagram depict the process of the
implementation. For problem stated above as
implementation of OLSR routing protocol using NS2,
we have created the ubuntu Linux based environment
on which we had installed the required packages such
tracegraph, ns2 etc.

Figure: Process of Implementation

III.

PERFORMANCE EVALUATION AND
RESULTS



Simulation Parameters: Following table depict
the various simulation parameters


www.ijera.com

www.ijera.com

Simulation Parameters
Values
Network Type
Mobile Ad Hoc
Connection Pattern
Radio-propagation
Packet size
512 bytes
Duration
50s
Connection Type
CBR/UDP
Simulation Area ( sq.m)
600
No. of Nodes
5,10,15,25,30
Table 1: Simulation Parameters

IV.

RESULTS AND ANALYSIS

During the course of implementation of this
research, an attempt was made to compare the
performances of OLSR routing protocol based on
various node scenarios and positions under the same
simulation environment. For all the simulations, the
same movement models were used, the numbers of
traffic sources are varied, the maximum speed of the
nodes was set to 20m/s and the packet size is fixed to
512 bytes. The area of simulation is 600 sq.m
For the experimental significance, here we
only discuss the experimental results of simulation of
5 nodes only. The simulations environment is the
same for other nodes of 10,15,25,30 no. of nodes.
The diversity of the experiments is more as we
increase the number of nodes in a simulation
environment.

Figure 2: Simulation of 10, 15, 25 and 30 nodes
Figure 3 depicts the OLSR simulation
environment with 10, 15, 25 and 30 numbers of
nodes as well as Sending and Receiving Packets. We
have depicted only the few simulation environment
but we have made the simulation for large number of
nodes such 100,200 etc. Our main motivation is to
study the impact of number of nodes on overall
performances of the OLSR routing protocols because
with the increase of number of nodes in a wireless
network also increase the congestions, noise in the
network.
Figure 4 depicts the throughput of sending
packets with respect to total simulation time in 10
nodes simulation environment. Total simulation time
is 50 sec, we have run the simulation script which
implements the OLSR routing protocol for a period
of 50 seconds.
Similarly as throughput of sending packets
vs simulation times has been depicted above, figure 5
678 | P a g e
Ankur Sharma et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681

www.ijera.com

represent the Throughput of receiving packets during
the simulation time. X-axis represents the total
simulation time and Y-axis represents the throughput
obtained during that simulation time. As we have run
the simulation for a complete duration of 50 seconds.
The throughput or network throughput is the average
rate of successful message delivery over a
communication channel.

Figure5: End-to-End delay: Cumulative Distribution

Figure 3: Throughput of sent packets vs Simulation
time in 10 nodes

Similarly figure 5 depict the cumulative
distribution of end to end delay describes the
probability that a real-valued random variable X with
a given probability distribution will be found at a
value less than or equal to x. In the case of a
continuous, it gives the area under the probability
density function from minus infinity to x. Cumulative
distribution functions are also used to specify the
distribution of multivariate random variables.

This data may be delivered over a physical
or logical link, or pass through a certain network
node. The throughput is usually measured in bits per
second (bit/s or bps), and sometimes in data
packets per second or data packets per time slot.
The system throughput or aggregate throughput is the
sum of the data rates that are delivered to all
terminals in a network.

Figure6: Jitter sent on all nodes

Figure 4: End to End delay: Frequency Distribution
Figure 4 depicts the frequency distribution
of end to end delay. In statistics, a frequency
distribution is an arrangement of the values that one
or more variables take in a sample. Each entry in the
table contains the frequency or count of the
occurrences of values within a particular group or
interval, and in this way, the table summarizes
the distribution of values in the sample [13]

www.ijera.com

679 | P a g e
Ankur Sharma et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681
V.

Figure7: Jitter received on all nodes

In the above figures, we have only displayed the
results graph for 10 nodes in simulation
enviornments, similarly we can show results for other
simulation enviornment of 15,25, 20 number of
nodes. Our scope of the research was to study the
performaces of the OLSR routing protocol by varying
the number of nodes in simulations. During the
course of this research study, we have found the
following findings:
 Congestion increases with the increase of
number of wireless nodes.
 As we increase the number of nodes for
performing the simulation of OLSR protocol,
number of sent and delivered packet changes,
which in turn changes the throughput and avg.
end to end delay.

www.ijera.com

CONCLUSION

In this work we evaluated the four
performance measurement of OLSR routing protocol
i.e. packets sent and received, jitter, end-to-end delay,
throughput, cumulative and frequency distribution of
sent and received packets with different number of
nodes. OLSR routing protocol was simulated with
5,10,15,25 and 30 nodes moving randomly in an area
of within the network range 600 sq m. The
performance of OLSR protocol through a network
different size carried out a comparative analysis of
the performance and found it had better performance
in all aspects in a network.
From results reported above, we concluded
that as we increase the number of nodes for
performing the simulation of OLSR protocol, number
of sent and delivered packet changes, which in turn
changes the throughput and avg. end to end delay.
The OLSR protocol is the better solution for high
mobility condition. The OLSR protocol is more
efficient in networks with high density and highly
sporadic traffic. But the best situation is when there
are a large number of hosts. OLSR requires that it
continuously has some bandwidth in order to receive
the topology update messages.
In future, utilizing these performances we
can design such a protocol that can be suitably
provide data integrity as well as data delivery in
highly random mobility network better QoS
applications. In our research study, we have
considered a packet of data of 512 bytes and
minimum packet size is 48 bytes but in multimedia
application, we should have packet bigger. So, our
future work will consist of studying multimedia
traffic on this protocol and queue management, as
well as finding a solution for supporting different
data stream.

VI.
Figure8: Avg End to end delay

www.ijera.com

ACKNOWLEDGEMENTS

During the course of this research work and
implementations, we would like to thank Er. Rakesh
Kumar, Assistant professor for his support and
extremely useful guidance. Without his guidance it
was not possible to carry out this kind of research.

REFERENCES
[1]

[2]

[3]

J.Macker,“mobile ad hoc Networking
(MANET): routing protocol performance
issues and Evaluation considerations“.IETF
RFC 2501, January 1999.
Amendeep verma,” A study of performance
comparision of simulation ad-hoc network
routing protocol” IJCTA vol 2 (3), 565-569.
M.UMA AND DR.G.PADMAVATHI, A
COMPARATIVE
STUDY
AND
PERFORMANCE EVALUATION OF
REACTIVE QUALITY OF SERVICE
ROUTING PROTOCOLS IN MOBILE
ADHOC
NETWORKS,
Journal
of

680 | P a g e
Ankur Sharma et al. Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681

[4]

[5]

[6]
[7]

[8]

[9]

[10]
[11]

[12]

[13]
[14]
[15]

[16]
[17]

[18]

[19]

Theoretical and Applied Information
Technology
S.Capkun, L.Buttyan and J.-P. Hubaux, “
Self-organised Public- Key Management for
Mobile
Ad-Hoc
network”,
IEEE
transcations on Mobile Computing , Vol.2 ,
pp. 52-64,2003.
Z.
J.
Haas,
J.Deng,
B.
Liang,
P.Papadimitratos and S. Sajama, “Wireless
Ad-Hoc Networks” in Encyclopedia Of
Telecommunications. John Willey, 2002.
Z.Lidong and H. Zygmunt “ Secuting AdHoc Networks” Cornell University,1999.
S. William, cryptography and network
security (2nd ed): principles and practice:
Prentice-Hall,Inc., 1999
N.B.Salem, L. Buttyan, J-P. Hubaux, and
M.Jakobsson, “Node Cooperation in Hybrid
Adhoc Networks,” IEEE Transactions on
Mobile Computing, 2005.
L.Eschenauer and V.D.Gligor, “A Key
Management Scheme for Distributed Sensor
Networks,” proc. 9th ACM Conf. on
Computer and Communication Security (
ACM CCS’02), 2002.
Anju Gill et al, Comparative Analysis of
Routing in MANET, ijarcsse. Vol.2, issue 7.
C. Siva Ram Murthy and B.S Manoj, Mobile
Ad Hoc Networks- Architectures &
Protocols, Pearson Education, New Delhi,
2004.
G. Jayakumar and G. Ganapathy,
“Performance Comparison of Mobile Adhoc
Network
Routing
Protocol,”
International Journal of Computer Science
and Network Security (IJCSNS), vol.7,
No.11, pp. 77-84, November 2007.
An introduction to NS2-Giovanni Perbellini
http://nsnam.com/2012/09/tracegraphgraphing-software-to-plot.html
Xiaoyan Hong, Kaixin Xu, and Mario Gerla,
scalable routing protocols for mobile ad hoc
networks. 2002
en.wikipedia.org/wiki/Frequency_distributio
n
S. Gowrishankar et al, “Scenario based
Performance Analysis of AODV and OLSR
inMobile Ad hoc Networks”, Proceedings
of the 24th South East Asia Regional
Computer Conference, November 18-19,
2007, Bangkok, Thailand
[C. Perkins, E. B. Royer and S. Das (2003),
“Ad hoc On-Demand Distance Vector
(AODV) Routing”, RFC 3561, IETF
Network Working Group, July.
T. Clausen and P. Jacquet (2003),
“Optimized Link State Routing Protocol
(OLSR)”, RFC 3262, IETF Network
Working Group, October 2003

www.ijera.com

[20]

[21]
[22]

[23]

[24]

[25]

[26]

[27]

[28]

[29]

www.ijera.com

T.H. Clausen,et al,”The optimized link state
routing protocol evaluating through
experiments and simulation”,mindpass
center for distributed system,Aalborg
university ,Denmark.
T. Clause .et al,”Optimized link state routing
protocol”,i.etf.org/rfc3626.txt,oct. 2003
P. Jacquet et al,”Optimized Link State
routing protocol”,draft –ieff-olsr-04.txtwork in progress,march 2001.
P. Jacqual et al,”performance analysis of
OLSR multi port relay flooding in two adhoc wireless network model”INRIA.
C.K
Toh,”Ad-Hoc
mobile
wireless
network”, Prentice Hall PTR 2002; ISBN 0130078179.
C.E.Perkins,”Ad-hoc
Networkings”,Addison-wesley 2001,ISBN
0-20130976-9.
H.Zhou,”A survey on routing protocol in
MANET”,technical
report:MS0-CSE-0308,mar,2003.
A.N.Al-Khwildi, et al,”An efficient routing
protocol
for
wireless
ad-hoc
network”,SETIT 2007.
A.Zaballas
et.al,”Ad
hoc
routingperformance study using OPNET
modeler”,
university
Ramon
Liull,
Barcelona (Spain)
Charles E. Perkins et.al,”Ad-hoc on demand
distance vector (AODV) Routing”, draftleft-aodv-08.txt-work in progress,march
2001.

681 | P a g e

Mais conteúdo relacionado

Mais procurados

Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
IAEME Publication
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
 

Mais procurados (20)

Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
Md ux mza5mtg=14
Md ux mza5mtg=14Md ux mza5mtg=14
Md ux mza5mtg=14
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
 
E0942531
E0942531E0942531
E0942531
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
011001010 a
011001010 a011001010 a
011001010 a
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
Dynamic cluster based adaptive gateway discovery mechanisms in an integrated ...
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETVARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANET
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Mesh network ‫‬
Mesh network ‫‬Mesh network ‫‬
Mesh network ‫‬
 

Destaque

Destaque (20)

Eb35725731
Eb35725731Eb35725731
Eb35725731
 
Eg35750753
Eg35750753Eg35750753
Eg35750753
 
Gn3511531161
Gn3511531161Gn3511531161
Gn3511531161
 
Eo35798805
Eo35798805Eo35798805
Eo35798805
 
Eu35845853
Eu35845853Eu35845853
Eu35845853
 
Ex35863868
Ex35863868Ex35863868
Ex35863868
 
Ej35767774
Ej35767774Ej35767774
Ej35767774
 
El35782786
El35782786El35782786
El35782786
 
Fl35967977
Fl35967977Fl35967977
Fl35967977
 
Gv3512031207
Gv3512031207Gv3512031207
Gv3512031207
 
Fv3510271037
Fv3510271037Fv3510271037
Fv3510271037
 
Gt3511931198
Gt3511931198Gt3511931198
Gt3511931198
 
Ge3510911102
Ge3510911102Ge3510911102
Ge3510911102
 
Ed35736740
Ed35736740Ed35736740
Ed35736740
 
Ec35732735
Ec35732735Ec35732735
Ec35732735
 
Dt35682686
Dt35682686Dt35682686
Dt35682686
 
Ef35745749
Ef35745749Ef35745749
Ef35745749
 
Dq35655671
Dq35655671Dq35655671
Dq35655671
 
Dy35710714
Dy35710714Dy35710714
Dy35710714
 
Ee35741744
Ee35741744Ee35741744
Ee35741744
 

Semelhante a Ds35676681

Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
ijwmn
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ijwmn
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
ijasuc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
jake henry
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
ijceronline
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn
 

Semelhante a Ds35676681 (20)

A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANET
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
ANALYZING THE IMPACT OF EAVES ON ENERGY CONSUMPTION OF AODV ROUTING PROTOCOL ...
 
eaodv
eaodveaodv
eaodv
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
Aodv
AodvAodv
Aodv
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET) Thesis on Mobile Ad-hoc Network (MANET)
Thesis on Mobile Ad-hoc Network (MANET)
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Ds35676681

  • 1. Ankur Sharma et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Experimental Analysis of OLSR Routing Protocol and Performance Evaluation Using NS-2 Simulator Ankur Sharma1, Er. Rakesh Kumar2 1 (Department of Computer Science and Engineering, Sant Baba Bhag Singh Institute of Engineering & Technology-Punjab Technical University, India) 2 (Department of Information Technology, Sant Baba Bhag Singh Institute of Engineering & TechnologyPunjab Technical University, India) ABSTRACT Mobile ad hoc networks (MANETs) is a collection of wireless moving nodes which communicate with each other and exchange data without any fixed base station or without the need of any kind of wired backbone network. These design characteristics make routing in wireless network a critical issue as routing protocols adopted in wireless network is completely different from wired network in which a backbone router determines the routing path. In this paper we discussed a OLSR routing protocol for routing path determination as well as we measured the various performance oriented parameters using NS2 simulator. During the research implementations, we also use trace graph, a open source tool for generation of graphs of various statistics such as end to end delay, jitter, throughput etc. This study presents the sequence of steps which highlight the adoption of OLSR routing based on the number of nodes and statistics generated in simulation environment. Keywords – MANET, OLSR, NS2, Throughput, Delay, Packet Delivery Ratio I. INTRODUCTION A Mobile Ad-Hoc Network (MANET) [1] is the network which contains the mobile nodes which send and receive packets from other nodes through a wireless link as there is no dedicated fixed link between wireless nodes. They can communicate each other directly or with the help of a node which is acting a router between wireless nodes. There is no pre-existing infrastructure or dedicated base station in case of wireless network. Due to mobility of nodes, network topology of MANET may change dynamically without turning to any existing centralized administration [2]. Though wireless systems have existed since the 1980’s it is only in recent times that wireless systems have started to make inroads into all aspects of human life. Mobile Ad Hoc Networks (MANETs) are advanced wireless communication networks. Mobile Ad hoc Network is an autonomous system of mobile nodes connected by wireless links. Each node operates as an end system and a router for all other nodes in the network. A mobile Ad hoc Network is a self configuring network of mobile routers connected by wireless links –the union of which forms an arbitrary topology. An Ad hoc network is often defined as an “infrastructure less” network means that a network without the usual routing infrastructure, link fixed routers and routing backbones. [3] 1.1 Properties of MANET Network Wireless ad hoc networks are formed by a group of mobile users or devices spread over a www.ijera.com certain geographical area. The user or devices forming network “nodes”. The service area of the ad hoc network is the whole geographical area where nodes are distributed. As mobile ad hoc networks are self organized networks communication in ad-hoc networks can generate data for any other node in the networks. The multi hop support makes communication between nodes outside the direct range of each other possible. 1.2 Some Issues in MANET Network An ad hoc network is a dynamic type of network with similarities and great differences to its parent fixed communication network. The properties of an ad hoc network will define its shortcomings and highlight security challenges [4] [5] [6] [7] [8] [9].An ad hoc networks, is a spontaneous, self created network which cannot rely on a fixed network infrastructure, and by definition does not. A fixed entity structure such as a base station or central administration is crucial for security mechanisms. The trusted third party member who is expected in traditional networks often defines security services; the absence of such a control entity introduces new opportunities for security attacks on the network. The network instead of relying on a central administrator for network and security service, the network relies upon the nodes for these duties in a self-organized manner. Connectivity is a problem in ad hoc networks as networks are created spontaneously and nodes are mobile. Therefore connectivity between the nodes is sporadic. In ad hoc networks nodes may have no prior relationships with other nodes within 676 | P a g e
  • 2. Ankur Sharma et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681 the network. Prior acquaintance between nodes can be seen as pre-trust relationships between nodes. It cannot be assumed that pair wise secrets exist between nodes. Physical vulnerability is a major problem in Mobile adhoc network. Mobile node capture or compromised nodes are of higher probability in ad hoc networks than in traditional wired networks with stationary hosts. Lack of Resources is a problem with a network which has no central administrator to perform network and security tasks, and rather relies upon nodes to accomplish such services. This creates a heavy burden upon nodes to perform their own tasks as well as network tasks therefore nodes will have limited resources compared to fixed wired nodes. Threats or attacks upon the network come from entities known as adversaries, these may include insider and outsider nodes that maliciously attack or threaten the network or the secrecy of the networks content. 1.3 Objectives of this study During this research study and implementation, our main objective was to study the working of OLSR routing protocol and then to measure and analyse the performance of reactive routing protocols in mobile ad hoc network. Keeping this main objective in mind the following objectives are stated:  Study the various routing protocols and detailed study of OLSR dynamic routing protocol.  Implementation in simulation environment with varied number of mobile nodes.  Analytical study and measurement of the performance of OLSR routing. The remainder of this paper is organized as follows – the next section gives the details about the routing protocols and its classification. In Section 2 describes in detail about reactive routing protocols and its various types and follow it with brief specifics of implementation in section 3. Section 4 consists the conclusion of the research work. II. www.ijera.com 2.1 The routing protocol for MANET is classified as [13]:  Table driven (proactive ) routing protocol  On-demand (reactive) routing protocol  Hybrid routing protocol Table Driven routing protocol: The table driven approach is very similar to the connectionless approach where there is no dedicated mechanism when and how frequently the packets should be forwarded and when that route is desired for sending of packets. It completely relies on the underlying protocol in communication [11]. Here, a route to every other node in ad hoc network is always available, regardless of whether or not it is needed. On-demand driven routing protocols: These protocols try to eliminate the conventional routing tables and consequently reduce the need for updating these tables to track changes in the network topology. In the On-Demand approach, when a node desires a route to a new destination, it will have to wait until such a route can be discovered i.e. routes are discovered whenever a source node have packets to send [10] [11] and maintain it until either the route is no longer desired or it becomes inaccessible, and finally remove it by route deletion procedure. CLASSIFICATION OF ROUTING PROTOCOL IN MANET NETWORK In network infrastructure, the network layer also known as IP layer is playing the biggest roles, thereby also called backbone of the communication network. In case of wired network, the network nodes are communicating with each other through the dedicated wired link whereas in case of MANET moving node is to successfully transmit data packets from the source to the destination without any kind of fixed or dedicated links between them. Therefore, efficient routing of packets is a primary MANET challenge. On the basis of routing information update mechanism routing protocol for ad-hoc wireless network can be classified into three categories [10] [11] Fig. 1 shows basic classification of routing protocol: www.ijera.com Figure 1: Classification of Routing Protocols in Mobile Ad-hoc Networks Hybrid routing protocol: Both of the routing protocols known as proactive and reactive protocol are working best in different scenarios [10] [12], hybrid method uses both. These protocols combine the best good features of reactive and proactive protocol. It is used to find a balance between both protocols. Proactive operations are restricted to small domain, whereas, reactive protocols are used for locating nodes outside those domains. Examples of hybrid protocols are:  Zone Routing Protocol, (ZRP) 677 | P a g e
  • 3. Ankur Sharma et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681  Wireless Ad hoc Routing Protocol, (WARP) 2.2 Tools and Techniques used: NS-2 Simulator NS (version 2) is an object-oriented, discrete event driven network simulator developed at UC Berkely written in C++ and OTcl (Tcl script language with Object-oriented extensions). It implements network protocols such as TCP and UPD, traffic source behavior such as FTP, Telnet, Web, CBR and VBR, router queue management mechanism such as Drop Tail, RED and CBQ, routing algorithms such as Dijkstra, and more. NS also implements multicasting and some of the MAC layer protocols for LAN simulations [14]. Trace graph: Trace graph is third party software helps in plotting the graphs for NS2 and other networking simulation softwares. Trace graph when opened, it opens 3 windows [15]  one window to select the trace file (.tr) that was created by NS2 (depending on the size of the trace file, the processing time also varies)  Second window is the main window in which you can see the graphs for various performance characteristics like throughput, End to End Delay, jitter, etc in 2D and 3D facility. Even it can plot the histograms too.  Third window is nothing but the Simulation Information Windows, that you can see the packet loss, packet delivery; end to end delay for the total network, information about the intermediate nodes, source and destination nodes. Process adopted during the implementation: Following diagram depict the process of the implementation. For problem stated above as implementation of OLSR routing protocol using NS2, we have created the ubuntu Linux based environment on which we had installed the required packages such tracegraph, ns2 etc. Figure: Process of Implementation III. PERFORMANCE EVALUATION AND RESULTS  Simulation Parameters: Following table depict the various simulation parameters  www.ijera.com www.ijera.com Simulation Parameters Values Network Type Mobile Ad Hoc Connection Pattern Radio-propagation Packet size 512 bytes Duration 50s Connection Type CBR/UDP Simulation Area ( sq.m) 600 No. of Nodes 5,10,15,25,30 Table 1: Simulation Parameters IV. RESULTS AND ANALYSIS During the course of implementation of this research, an attempt was made to compare the performances of OLSR routing protocol based on various node scenarios and positions under the same simulation environment. For all the simulations, the same movement models were used, the numbers of traffic sources are varied, the maximum speed of the nodes was set to 20m/s and the packet size is fixed to 512 bytes. The area of simulation is 600 sq.m For the experimental significance, here we only discuss the experimental results of simulation of 5 nodes only. The simulations environment is the same for other nodes of 10,15,25,30 no. of nodes. The diversity of the experiments is more as we increase the number of nodes in a simulation environment. Figure 2: Simulation of 10, 15, 25 and 30 nodes Figure 3 depicts the OLSR simulation environment with 10, 15, 25 and 30 numbers of nodes as well as Sending and Receiving Packets. We have depicted only the few simulation environment but we have made the simulation for large number of nodes such 100,200 etc. Our main motivation is to study the impact of number of nodes on overall performances of the OLSR routing protocols because with the increase of number of nodes in a wireless network also increase the congestions, noise in the network. Figure 4 depicts the throughput of sending packets with respect to total simulation time in 10 nodes simulation environment. Total simulation time is 50 sec, we have run the simulation script which implements the OLSR routing protocol for a period of 50 seconds. Similarly as throughput of sending packets vs simulation times has been depicted above, figure 5 678 | P a g e
  • 4. Ankur Sharma et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681 www.ijera.com represent the Throughput of receiving packets during the simulation time. X-axis represents the total simulation time and Y-axis represents the throughput obtained during that simulation time. As we have run the simulation for a complete duration of 50 seconds. The throughput or network throughput is the average rate of successful message delivery over a communication channel. Figure5: End-to-End delay: Cumulative Distribution Figure 3: Throughput of sent packets vs Simulation time in 10 nodes Similarly figure 5 depict the cumulative distribution of end to end delay describes the probability that a real-valued random variable X with a given probability distribution will be found at a value less than or equal to x. In the case of a continuous, it gives the area under the probability density function from minus infinity to x. Cumulative distribution functions are also used to specify the distribution of multivariate random variables. This data may be delivered over a physical or logical link, or pass through a certain network node. The throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second or data packets per time slot. The system throughput or aggregate throughput is the sum of the data rates that are delivered to all terminals in a network. Figure6: Jitter sent on all nodes Figure 4: End to End delay: Frequency Distribution Figure 4 depicts the frequency distribution of end to end delay. In statistics, a frequency distribution is an arrangement of the values that one or more variables take in a sample. Each entry in the table contains the frequency or count of the occurrences of values within a particular group or interval, and in this way, the table summarizes the distribution of values in the sample [13] www.ijera.com 679 | P a g e
  • 5. Ankur Sharma et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681 V. Figure7: Jitter received on all nodes In the above figures, we have only displayed the results graph for 10 nodes in simulation enviornments, similarly we can show results for other simulation enviornment of 15,25, 20 number of nodes. Our scope of the research was to study the performaces of the OLSR routing protocol by varying the number of nodes in simulations. During the course of this research study, we have found the following findings:  Congestion increases with the increase of number of wireless nodes.  As we increase the number of nodes for performing the simulation of OLSR protocol, number of sent and delivered packet changes, which in turn changes the throughput and avg. end to end delay. www.ijera.com CONCLUSION In this work we evaluated the four performance measurement of OLSR routing protocol i.e. packets sent and received, jitter, end-to-end delay, throughput, cumulative and frequency distribution of sent and received packets with different number of nodes. OLSR routing protocol was simulated with 5,10,15,25 and 30 nodes moving randomly in an area of within the network range 600 sq m. The performance of OLSR protocol through a network different size carried out a comparative analysis of the performance and found it had better performance in all aspects in a network. From results reported above, we concluded that as we increase the number of nodes for performing the simulation of OLSR protocol, number of sent and delivered packet changes, which in turn changes the throughput and avg. end to end delay. The OLSR protocol is the better solution for high mobility condition. The OLSR protocol is more efficient in networks with high density and highly sporadic traffic. But the best situation is when there are a large number of hosts. OLSR requires that it continuously has some bandwidth in order to receive the topology update messages. In future, utilizing these performances we can design such a protocol that can be suitably provide data integrity as well as data delivery in highly random mobility network better QoS applications. In our research study, we have considered a packet of data of 512 bytes and minimum packet size is 48 bytes but in multimedia application, we should have packet bigger. So, our future work will consist of studying multimedia traffic on this protocol and queue management, as well as finding a solution for supporting different data stream. VI. Figure8: Avg End to end delay www.ijera.com ACKNOWLEDGEMENTS During the course of this research work and implementations, we would like to thank Er. Rakesh Kumar, Assistant professor for his support and extremely useful guidance. Without his guidance it was not possible to carry out this kind of research. REFERENCES [1] [2] [3] J.Macker,“mobile ad hoc Networking (MANET): routing protocol performance issues and Evaluation considerations“.IETF RFC 2501, January 1999. Amendeep verma,” A study of performance comparision of simulation ad-hoc network routing protocol” IJCTA vol 2 (3), 565-569. M.UMA AND DR.G.PADMAVATHI, A COMPARATIVE STUDY AND PERFORMANCE EVALUATION OF REACTIVE QUALITY OF SERVICE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS, Journal of 680 | P a g e
  • 6. Ankur Sharma et al. Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.676-681 [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] Theoretical and Applied Information Technology S.Capkun, L.Buttyan and J.-P. Hubaux, “ Self-organised Public- Key Management for Mobile Ad-Hoc network”, IEEE transcations on Mobile Computing , Vol.2 , pp. 52-64,2003. Z. J. Haas, J.Deng, B. Liang, P.Papadimitratos and S. Sajama, “Wireless Ad-Hoc Networks” in Encyclopedia Of Telecommunications. John Willey, 2002. Z.Lidong and H. Zygmunt “ Secuting AdHoc Networks” Cornell University,1999. S. William, cryptography and network security (2nd ed): principles and practice: Prentice-Hall,Inc., 1999 N.B.Salem, L. Buttyan, J-P. Hubaux, and M.Jakobsson, “Node Cooperation in Hybrid Adhoc Networks,” IEEE Transactions on Mobile Computing, 2005. L.Eschenauer and V.D.Gligor, “A Key Management Scheme for Distributed Sensor Networks,” proc. 9th ACM Conf. on Computer and Communication Security ( ACM CCS’02), 2002. Anju Gill et al, Comparative Analysis of Routing in MANET, ijarcsse. Vol.2, issue 7. C. Siva Ram Murthy and B.S Manoj, Mobile Ad Hoc Networks- Architectures & Protocols, Pearson Education, New Delhi, 2004. G. Jayakumar and G. Ganapathy, “Performance Comparison of Mobile Adhoc Network Routing Protocol,” International Journal of Computer Science and Network Security (IJCSNS), vol.7, No.11, pp. 77-84, November 2007. An introduction to NS2-Giovanni Perbellini http://nsnam.com/2012/09/tracegraphgraphing-software-to-plot.html Xiaoyan Hong, Kaixin Xu, and Mario Gerla, scalable routing protocols for mobile ad hoc networks. 2002 en.wikipedia.org/wiki/Frequency_distributio n S. Gowrishankar et al, “Scenario based Performance Analysis of AODV and OLSR inMobile Ad hoc Networks”, Proceedings of the 24th South East Asia Regional Computer Conference, November 18-19, 2007, Bangkok, Thailand [C. Perkins, E. B. Royer and S. Das (2003), “Ad hoc On-Demand Distance Vector (AODV) Routing”, RFC 3561, IETF Network Working Group, July. T. Clausen and P. Jacquet (2003), “Optimized Link State Routing Protocol (OLSR)”, RFC 3262, IETF Network Working Group, October 2003 www.ijera.com [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] www.ijera.com T.H. Clausen,et al,”The optimized link state routing protocol evaluating through experiments and simulation”,mindpass center for distributed system,Aalborg university ,Denmark. T. Clause .et al,”Optimized link state routing protocol”,i.etf.org/rfc3626.txt,oct. 2003 P. Jacquet et al,”Optimized Link State routing protocol”,draft –ieff-olsr-04.txtwork in progress,march 2001. P. Jacqual et al,”performance analysis of OLSR multi port relay flooding in two adhoc wireless network model”INRIA. C.K Toh,”Ad-Hoc mobile wireless network”, Prentice Hall PTR 2002; ISBN 0130078179. C.E.Perkins,”Ad-hoc Networkings”,Addison-wesley 2001,ISBN 0-20130976-9. H.Zhou,”A survey on routing protocol in MANET”,technical report:MS0-CSE-0308,mar,2003. A.N.Al-Khwildi, et al,”An efficient routing protocol for wireless ad-hoc network”,SETIT 2007. A.Zaballas et.al,”Ad hoc routingperformance study using OPNET modeler”, university Ramon Liull, Barcelona (Spain) Charles E. Perkins et.al,”Ad-hoc on demand distance vector (AODV) Routing”, draftleft-aodv-08.txt-work in progress,march 2001. 681 | P a g e