SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
A SIMULATION BASED PERFORMANCE EVALUATION 
OF AODV, R-AODV AND PHR-AODV ROUTING 
PROTOCOLS FOR MOBILE AD HOC NETWORKS 
Pravanjan Das1, Sumant Kumar Mohapatra2 and Biswa Ranjan Swain3 
1Ericsson India Global Services Pvt. Ltd., Salt Lake, Kolkata, India 
2Trident Academy of Technology, Bhubaneswar, Odisha 
3Trident Academy of Technology, Bhubaneswar, Odisha 
ABSTRACT 
Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure 
and un-accessibility to the trusted servers. The performance of various MANET routing protocols is 
significantly affected due to frequently changing network topology, confined network resources and 
security of data packets. In this paper, a simulation based performance comparison of one of the most 
commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance 
Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based 
Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of 
performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based 
simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet 
delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node 
energy for data transmission. 
KEYWORDS 
MANET, AODV, R-AODV, PHR-AODV, packet delivery fraction, latency. 
1. INTRODUCTION 
A group of mobile nodes made a MANET[1]. They form a network for information exchange. 
For this information exchange, they never use the central authority as well as existing fixed 
network infrastructure. This upcoming technology creates new research opportunities and 
dynamic challenges for different topology of the network, bandwidth limitation, node’s battery 
capacity improvement and multi-hop communication. 
The routes are updated at regular intervals with respect to their requirement in proactive routing 
but routes are determined only when there is a need to transmit a data packet in reactive routing. 
Single path routing protocols [1-2] and multipath routing protocols [3-5] are classified on the 
basis of number of routes computed between source and destination. 
The area of discussion in this paper is based on AODV [2], a single path routing protocol and its 
multipath versions, R-AODV and PHR-AODV routing protocols. AODV is both on-demand and 
destination initiated, that means routes are established from destination only on demand [1]. But 
the problem in such kind of single path routing is the increased latency and packet loss due to 
DOI : 10.5121/ijwmn.2014.6514 165
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
dynamic nature of the routing environment. Unnecessary bandwidth consumption due to periodic 
beacons also affects the performance of AODV. 
Besides, the performance of AODV is significantly affected due to the loss of single unicasted 
route reply (RREP) packets. The drastically altering environment prevents the RREP packet from 
getting delivered to the source node. As a result the source node starts rediscovery process, which 
in turn increases both consumed energy and communication delay. The Reverse-AODV (R-AODV) 
[6], broadcasts the route reply packet throughout the network instead of unicasting it. 
This process generates multiple discovered partial or full disjoint paths at the source node. It also 
ensures both successful route discovery and data packet delivery reducing path fail correction 
messages. 
Protecting network activity from intrusion of malicious nodes and enhancing the data security are 
the important issues of Mobile Ad hoc networks. Sometimes the performance of R-AODV 
routing protocol gets significantly affected due to the activity of these active malicious nodes. So 
PHR-AODV [11], builds multipath to destination and adaptively hops between the available paths 
for transmission of data packets. As a result load distribution arises and it ensures that the nodes 
do not get depleted of energy which in turn increases the network lifetime. 
In this paper, a significant amount of network parameters and energy related parameters have 
been considered in order to compare the above mentioned routing protocols. The graphs obtained 
are based on multiple readings and later averaging for a single plot point. The simulation 
environment considered in this paper is highly dynamic (lesser pause time and higher nodes 
speed) and the simulation software used is network simulator (NS-2). 
166 
2. OVERVIEW OF ROUTING PROTOCOLS 
This section briefly describes AODV, R-AODV and PHR-AODV routing protocols. 
2.1. AODV Routing Protocol 
The Ad hoc On-Demand Distance Vector (AODV) [1-2] is a destination initiated routing protocol 
that maintains the sequence number concept for loop free routing and initiates the route discovery 
process on demand, hence has the combined features of DSDV and DSR respectively. The entire 
working principle of AODV can be covered under two important phases: Route Discovery and 
Route Maintenance. 
The node disseminates and avoids repeated processing of RREQ packets at nodes by matching the 
source IP address and RREQ ID pair of the packet with nodes stored information. A RREP packet 
is generated by a node if it is itself the destination node or it has an active route to the destination. 
The destination node unicasts the RREP packet back towards the source node along the reverse 
path. 
Another route error known as RERR message initiates and defects a link break for for the next 
hop of an active route in it’s routing table but it is not attempting for any other local repairing. As 
a decision the RERR message which is received looks for an another route from it’s routing table. 
2.2. R-AODV Routing Protocol 
The Reverse AODV (R-AODV) [6], an optimized AODV routing protocol uses a reverse route 
discovery methodology in order to avoid RREP packet loss. R-AODV prevents a large number of
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
retransmissions of RREQ packets which in turn reduces the congestion in the network and 
enhances the delivery ratio [7]. 
From the RREQ packet transmission point of view, both AODV and R 
role. The RREQ packet format of 
receives the first RREQ packet, a reverse route request (R 
broadcasted to its neighbour nodes within its transmission range. The R 
given in Table 1. 
Type 
smission R-AODV play the same 
R-AODV is same as that of AODV. When the destination node 
The source node starts packet transmission after receiving the first R 
late arrived R-RREQ packets are saved for future use. 
received R-RREQ packet is not a source node. Then the R 
nodes. After receiving the packet , it adds in a new path with a different hop or with the same next 
hop. This is totally depends upon a sequence number which is greater or less [7][9]. 
Figure1. R 
Figure 1 shows the flooding of R 
node. So along with the primary path D 
node such as D-5-6-7-8-S, D-9-11 
2.3. PHR-AODV Routing Protocol 
PHR-AODV [11] contains no permanent routes in nodes routing table. It is an extension of R 
AODV routing protocol which prevents loss of data packets by active malicious node and 
distributes load uniformly among the nodes. 
The processing of RREQ and R-of 
R-AODV and PHR-AODV are same. 
its neighbour nodes, it simply builds partial node 
R-RREQ) packet is initiated and 
R-RREQ packet format is 
Table1. R-RREQ Message Format [6] 
Reserved Hop Count 
Broadcast ID 
Destination IP address 
Destination Sequence Number 
Source IP address 
Reply Time 
R-RREQ message whereas the 
A forward route entry is created if the node 
R-RREQ is broadcasted to it’s neighbour 
R-RREQ from Destination to Source Node 
R-RREQ packet by the destination node in order to find the source 
D-3-2-1-S, a number of paths might be built at the source 
11-12-13-S. 
-RREQ packets is same as that of R-AODV. The packet formats 
When the source node receives R-RREQ packets from 
node-disjoint paths. After receiving al 
167 
acket R-AODV 
all the node-
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
disjoint paths within the timeout period, source node hops between different paths (based on the 
ascending order of their hop count values) while sending data packets to the destination node. 
During this communication of data packets, if a parti 
from the list. The source node reinitiates the route discovery when no paths remain in the list. 
Figure 2 shows the node disjoint paths discovered between source and destination node. 
Figure2. 
particular path fails then that path is eliminated 
Hopping of Paths at Source Node 
PHR-AODV provides an effective and analytic method to estimate the security of the network 
[11]. The probability of active malicious node Pm is given as: 
Pm = (Nrp * Nm) / Ntotal 
(1) 
Where Nrp is the number of nodes in routing path, Ntotal is the number of all nodes in network, 
Nm is the Number of malicious nodes (2 malicious nodes are considered in this paper) and Np is 
the number of paths from a source to a destination. The malicious node intrusion 
Pi = Pm / Np 
e (2) 
3. SIMULATION AND PERFORMANCE EVALUATION 
rate is given by 
This section explained the simulation model and their performance metrics. This also describes 
the results which are analysed from the simulation. 
3.1. Simulation Model 
In this section, the network simulator-simulator 
2 is used. It supports for simulating a multi-hop wireless ad 
hoc environment completed with physical, data link and medium access control layer models. The 
table-2 and 3 shows the simulation paramet 
parameters and energy parameters respectively. 
168 
cular ad-hoc
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
169 
Table 2. Energy Parameters [7][9] 
Parameters Values 
Routing Protocol AODV,R-AODV,PHR-AODV 
Number of Nodes 20,30,40,50,60,70 
Area of Terrain 1500 m X 1500 m 
Total time for simulation 100.0 sec 
Type of Traffic CBR 
Size of Packet 512 bytes 
Maximum speed of Nodes 2,5,10,15,20 m/s 
Bandwidth 2.0Mbps 
Transmission Range 250 m 
Transmission Rate 4 Packets/sec 
No of flows 10 
Frequency Band 2.4 GHz 
Pause Time 5 sec 
Propagation type Propagation/TwoRayGround 
Antenna Antenna/OmniAntenna 
Queue Type Queue/DropTail/PriQueue 
Queue Length 50 
MAC type Mac/802_11b 
Mobility Model Random Waypoint 
Table 3:Simulation Parameters 
3.2. Performance Metrics 
Parameters Values 
Receiving Power 1.0 watt 
Transmitting Power 1.4 watt 
Idle Power 0.83 watt 
Sleep Power 0.13 watt 
Transition Power 0.2 watt 
Nodes’ Initial Energy 300 Joules 
The following performance metrics [6-10] are considered for the simulation: 
• Packet Delivery Fraction: It is the ratio of data packets received at the destination to those 
generated by the source. 
• Average End-to-End Delay: It is the time interval between Transmitting packet and 
Receiving packet, which is a summation of isolation of data packets during route discovery, 
retransmission delays at the MAC and queuing at the interface queue. 
• Routing Overhead: It is the sum of all control packets transmitted/received during route 
discovery and route maintenance. 
• Average Energy Consumed: It is the mean value of energy consumed by a node during the 
whole simulation process. 
• Intrusion Rate: It is the percentage of intrusion instances present in the test set.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
170 
3.3. Results and Discussions 
The packet delivery fraction and average end-to-end delay of R-AODV characterisation are 
shown in figure 3 and 4. It is very obvious that above two factors improved as compared to other 
two protocols due to R-AODV utilises multiple recent routes at the source node which are fresh 
enough. Also the routing overhead of R-AODV is much larger than AODV which is clearly 
shown in figure 5 because R-AODV broadcasts route reply packets whereas it is unicasted in 
AODV. 
Figure 3. Packet Delivery Fraction varying Number of Nodes 
Figure 4. Average End-to-End Delay varying Number of Nodes
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
171 
Figure 5. Control Overhead varying Number of Nodes 
From Figure 6 and 7 it is clear that R-AODV completely outperforms AODV and PHR-AODV 
when performance is considered by varying Nodes Maximum Speed due to that R-AODV uses a 
number of multiple invented routes with high consistency to switch over the rapid topology 
changes due to higher nodes speed, which reduces the delay of communication which arises due 
to successful delivery of data packets. 
Figure 6. Packet Delivery Fraction vs. Nodes Max. Speed
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
172 
Figure 7. Average End-to-End Delay varying Nodes Max. Speed 
Figure 8. Average Energy Consumed varying Number of Nodes 
The average consumed energy for R-AODV is lesser than AODV and PHR-AODV is clearly 
illustrated in figure(8). This will effective even if it has transmitted larger number of control 
packets than others. The reason is that the R-AODV uses fewer hops in the chosen paths to route 
the data packets[8]. As a result for a longer period R-AODV increases the survival of the nodes in 
the network.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
173 
Figure 9. Intrusion Rate varying Number of Nodes 
The two malicious nodes which are described in this paper, their intrusion rate decreases 
depending upon the number of nodes increases in case of PHR_AODV. Further the intrusion rate 
decreases as the probability of active malicious nodes decreases. 
4. CONCLUSIONS 
An extensive analytic model and a simulation study have been conducted to evaluate the 
performance of AODV, R-AODV and PHR-AODV using NS-2.The above simulation analysis 
raise a conclusion that the performance of R-AODV in terms average end-to-delay, average 
energy consumption and packet delivery fraction totally dominates both AODV and PHR-AODV 
.This is happened in high mobility scenarios at a cost of higher routing overhead. It can also be 
seen that in case of PHR-AODV, the intrusion rate of malicious nodes decreases with increase in 
number of nodes. 
ACKNOWLEDGEMENTS 
The authors would like to thank everyone, just everyone! 
REFERENCES 
[1] Elizabeth M. Royer and Chai-Keong Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile 
Wireless Networks," IEEE Personal Communications, Vol. 6, No. 2, pp. 46-55, April 1999. 
[2] C.E. Perkins and E. M. Royer, “Ad hoc on-demand distance vector routing” in Proc. WMCSA, New 
Orleans, LA, pp. 90–100, Feb. 1999. 
[3] M. K. Marina and S. R. Das “On-Demand Multi Path Distance Vector Routing in Ad Hoc 
Networks” in Proc. ICNP 2001, pp. 14– 23, Nov. 2001. 
[4] A. Nasipuri and S. R. Das, “On-Demand Multipath Routing for Mobile Ad Hoc Networks” Proc. ICCN 
1999, pp. 64–70, Oct. 1999. 
[5] Tarique, M., Tepe, E., Sasan Adibi, and Shervin Erfani, “Survey of multipath routing protocols 
for Mobile Ad-hoc networks”, Journal of Network and Computer Applications, 32:1125-1143, 2009. 
[6] Chonggun Kim, Elmurod Talipov and Byoungchul Ahn, "A Reverse AODV Routing Protocol in Ad 
Hoc Mobile Networks," LNCS 4097, pp. 522-531, 2006.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 
[7] Pravanjan Das and Upena D Dalal, “A Comparative Analysis of AODV and R- AODV Routing 
Protocols in MANETS”, International Journal of Computer Applications 72(21):1-5, June 
2013. 
[8] Khafaei Taleb and Khafaie Behzad, “The Effect of Number of Hops per Path on Remind Energy in 
MANETs Routing Protocols,” International Journal of Computer Applications vol. 43, no. 24, pp. 23- 
28, April 2012. 
[9] Humaira Nishat, Vamsi Krishna K, D.Srinivasa Rao and Shakeel Ahmed, “Performance Evaluation of 
On-Demand Routing Protocols AODV and Modified AODV (R-AODV) in MANETS,” International 
Journal of Distributed and Parallel Systems, vol. 2, no. 1, January 2011. 
[10] Talipov, Elmurod, Donxue Jin, Jaeyoun Jung, Ilkhyu Ha, YoungJun Choi, and Chonggun Kim. "Path 
hopping based on reverse AODV for security." Management of Convergence Networks and Services, 
pp. 574-577. Springer Berlin Heidelberg, 2006. 
174 
[11] “The Network Simulator – NS-2”, available at http://www.isi.edu/nsnam/ns, 2004. 
Authors 
Sumant Ku Mohapatra was born in Bhubaneswar, Orissa, India . He received t he 
B.Tech degree from ITER, Bhubaneswar, India in 2002 & M.Tech(Electronics & 
Instrumentation Engg) from GIET, BPUT, Odisha in 2011. Currently he is working in 
Trident Academy of Technology, B.P.U.T, Bhubaneswar, Odisha, India as an Assistant 
Professor. His research interest are in signal and image processing ,optical fiber 
communication and wireless communication. 
Pravanjan Das was born in the Cuttack district, Odisha, India . He received the B.Tech 
degree from TAT, Bhubaneswar, India in 2010 & M.Tech(Communication Systems) from 
SVNIT,Surat,Gujrat in 2013. Currently he is working in Ericsson India Global Services 
Pvt. Ltd, Salt Lake, Kolkata, India as Researcher. His research interest are in signal 
processing , and wireless communication. 
Biswa Ranjan Swain was born in the Cuttack district, Odisha, India . He received the 
B.Tech degree from SIET, Dhenkanal, India in 2006 & M.Tech(Electronics & 
Telecommunication Engg.) from IIT Kharagpur, Kharagpur, India. Currently he is 
working in Trident Academy of Technology, B.P.U.T, Bhubaneswar, Odisha, as an 
Assistant Professor. His research interest are in image processing, and wireless 
communication.

Mais conteúdo relacionado

Mais procurados

IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLZac Darcy
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Sushant Kushwaha
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networksijceronline
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 

Mais procurados (19)

AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOLIMPLEMENTATION OF DYMO ROUTING PROTOCOL
IMPLEMENTATION OF DYMO ROUTING PROTOCOL
 
B03406010
B03406010B03406010
B03406010
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
O26087092
O26087092O26087092
O26087092
 
E010322531
E010322531E010322531
E010322531
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc NetworksQuality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
Quality of service Routing Using Stable Nodes in Mobile Ad hoc Networks
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
Ab25144148
Ab25144148Ab25144148
Ab25144148
 

Destaque

Social Media Report
Social Media ReportSocial Media Report
Social Media ReportDin Tran
 
20130531 linq with_row_number
20130531 linq with_row_number20130531 linq with_row_number
20130531 linq with_row_numberLearningTech
 
A high performance novel image compression technique using huffman coding
A high performance novel image compression technique using huffman codingA high performance novel image compression technique using huffman coding
A high performance novel image compression technique using huffman codingIAEME Publication
 
политкорректность как условие для взаимопонимания представит
политкорректность как условие для взаимопонимания представитполиткорректность как условие для взаимопонимания представит
политкорректность как условие для взаимопонимания представитOlga Gushcha
 
G anesthesia personnel
G anesthesia personnelG anesthesia personnel
G anesthesia personnelElmedin Bajric
 
Fse 18 - emission trading
Fse   18 - emission tradingFse   18 - emission trading
Fse 18 - emission tradingLuca Vecchiato
 
Madhubbu Resume
Madhubbu ResumeMadhubbu Resume
Madhubbu ResumeMadhu Babu
 
Laminas leyes especiales
Laminas leyes especialesLaminas leyes especiales
Laminas leyes especialesRafael Isea
 
Vintage Power Boat Racing Program Havasu 1967
Vintage Power Boat Racing Program Havasu 1967Vintage Power Boat Racing Program Havasu 1967
Vintage Power Boat Racing Program Havasu 1967idn12
 

Destaque (18)

23
2323
23
 
Social Media Report
Social Media ReportSocial Media Report
Social Media Report
 
20130531 linq with_row_number
20130531 linq with_row_number20130531 linq with_row_number
20130531 linq with_row_number
 
The first conditional
The first conditionalThe first conditional
The first conditional
 
A high performance novel image compression technique using huffman coding
A high performance novel image compression technique using huffman codingA high performance novel image compression technique using huffman coding
A high performance novel image compression technique using huffman coding
 
Consulta nombre
Consulta nombreConsulta nombre
Consulta nombre
 
Ejercicios de algoritmos
Ejercicios de algoritmosEjercicios de algoritmos
Ejercicios de algoritmos
 
политкорректность как условие для взаимопонимания представит
политкорректность как условие для взаимопонимания представитполиткорректность как условие для взаимопонимания представит
политкорректность как условие для взаимопонимания представит
 
G anesthesia personnel
G anesthesia personnelG anesthesia personnel
G anesthesia personnel
 
Fse 18 - emission trading
Fse   18 - emission tradingFse   18 - emission trading
Fse 18 - emission trading
 
Planning Brief
Planning BriefPlanning Brief
Planning Brief
 
Madhubbu Resume
Madhubbu ResumeMadhubbu Resume
Madhubbu Resume
 
MERCOSUR Y UNASUR
MERCOSUR Y UNASURMERCOSUR Y UNASUR
MERCOSUR Y UNASUR
 
65 nhan day kem ha no
65  nhan day kem ha no65  nhan day kem ha no
65 nhan day kem ha no
 
Laminas leyes especiales
Laminas leyes especialesLaminas leyes especiales
Laminas leyes especiales
 
Emergencia
EmergenciaEmergencia
Emergencia
 
Schovanek
SchovanekSchovanek
Schovanek
 
Vintage Power Boat Racing Program Havasu 1967
Vintage Power Boat Racing Program Havasu 1967Vintage Power Boat Racing Program Havasu 1967
Vintage Power Boat Racing Program Havasu 1967
 

Semelhante a A simulation based performance evaluation

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...Editor IJMTER
 
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...IOSR Journals
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...IJERA Editor
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...pijans
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...IOSR Journals
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingeSAT Publishing House
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
 
Dsr aodv performance
Dsr aodv performanceDsr aodv performance
Dsr aodv performanceGilles Samba
 

Semelhante a A simulation based performance evaluation (20)

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Ijetr021145
Ijetr021145Ijetr021145
Ijetr021145
 
Ijetr021145
Ijetr021145Ijetr021145
Ijetr021145
 
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
Performance Comparison of AODV, DSR and LAR1 in Mobile Ad-hoc Network based o...
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...Performance Improvement of Multiple Connections in AODV with the Concern of N...
Performance Improvement of Multiple Connections in AODV with the Concern of N...
 
A41040105
A41040105A41040105
A41040105
 
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
Detecting Good Neighbor Nodes and Finding Reliable Routing Path Based on AODV...
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
 
Dsr aodv performance
Dsr aodv performanceDsr aodv performance
Dsr aodv performance
 

Último

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 

Último (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 

A simulation based performance evaluation

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 A SIMULATION BASED PERFORMANCE EVALUATION OF AODV, R-AODV AND PHR-AODV ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS Pravanjan Das1, Sumant Kumar Mohapatra2 and Biswa Ranjan Swain3 1Ericsson India Global Services Pvt. Ltd., Salt Lake, Kolkata, India 2Trident Academy of Technology, Bhubaneswar, Odisha 3Trident Academy of Technology, Bhubaneswar, Odisha ABSTRACT Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure and un-accessibility to the trusted servers. The performance of various MANET routing protocols is significantly affected due to frequently changing network topology, confined network resources and security of data packets. In this paper, a simulation based performance comparison of one of the most commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node energy for data transmission. KEYWORDS MANET, AODV, R-AODV, PHR-AODV, packet delivery fraction, latency. 1. INTRODUCTION A group of mobile nodes made a MANET[1]. They form a network for information exchange. For this information exchange, they never use the central authority as well as existing fixed network infrastructure. This upcoming technology creates new research opportunities and dynamic challenges for different topology of the network, bandwidth limitation, node’s battery capacity improvement and multi-hop communication. The routes are updated at regular intervals with respect to their requirement in proactive routing but routes are determined only when there is a need to transmit a data packet in reactive routing. Single path routing protocols [1-2] and multipath routing protocols [3-5] are classified on the basis of number of routes computed between source and destination. The area of discussion in this paper is based on AODV [2], a single path routing protocol and its multipath versions, R-AODV and PHR-AODV routing protocols. AODV is both on-demand and destination initiated, that means routes are established from destination only on demand [1]. But the problem in such kind of single path routing is the increased latency and packet loss due to DOI : 10.5121/ijwmn.2014.6514 165
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 dynamic nature of the routing environment. Unnecessary bandwidth consumption due to periodic beacons also affects the performance of AODV. Besides, the performance of AODV is significantly affected due to the loss of single unicasted route reply (RREP) packets. The drastically altering environment prevents the RREP packet from getting delivered to the source node. As a result the source node starts rediscovery process, which in turn increases both consumed energy and communication delay. The Reverse-AODV (R-AODV) [6], broadcasts the route reply packet throughout the network instead of unicasting it. This process generates multiple discovered partial or full disjoint paths at the source node. It also ensures both successful route discovery and data packet delivery reducing path fail correction messages. Protecting network activity from intrusion of malicious nodes and enhancing the data security are the important issues of Mobile Ad hoc networks. Sometimes the performance of R-AODV routing protocol gets significantly affected due to the activity of these active malicious nodes. So PHR-AODV [11], builds multipath to destination and adaptively hops between the available paths for transmission of data packets. As a result load distribution arises and it ensures that the nodes do not get depleted of energy which in turn increases the network lifetime. In this paper, a significant amount of network parameters and energy related parameters have been considered in order to compare the above mentioned routing protocols. The graphs obtained are based on multiple readings and later averaging for a single plot point. The simulation environment considered in this paper is highly dynamic (lesser pause time and higher nodes speed) and the simulation software used is network simulator (NS-2). 166 2. OVERVIEW OF ROUTING PROTOCOLS This section briefly describes AODV, R-AODV and PHR-AODV routing protocols. 2.1. AODV Routing Protocol The Ad hoc On-Demand Distance Vector (AODV) [1-2] is a destination initiated routing protocol that maintains the sequence number concept for loop free routing and initiates the route discovery process on demand, hence has the combined features of DSDV and DSR respectively. The entire working principle of AODV can be covered under two important phases: Route Discovery and Route Maintenance. The node disseminates and avoids repeated processing of RREQ packets at nodes by matching the source IP address and RREQ ID pair of the packet with nodes stored information. A RREP packet is generated by a node if it is itself the destination node or it has an active route to the destination. The destination node unicasts the RREP packet back towards the source node along the reverse path. Another route error known as RERR message initiates and defects a link break for for the next hop of an active route in it’s routing table but it is not attempting for any other local repairing. As a decision the RERR message which is received looks for an another route from it’s routing table. 2.2. R-AODV Routing Protocol The Reverse AODV (R-AODV) [6], an optimized AODV routing protocol uses a reverse route discovery methodology in order to avoid RREP packet loss. R-AODV prevents a large number of
  • 3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 retransmissions of RREQ packets which in turn reduces the congestion in the network and enhances the delivery ratio [7]. From the RREQ packet transmission point of view, both AODV and R role. The RREQ packet format of receives the first RREQ packet, a reverse route request (R broadcasted to its neighbour nodes within its transmission range. The R given in Table 1. Type smission R-AODV play the same R-AODV is same as that of AODV. When the destination node The source node starts packet transmission after receiving the first R late arrived R-RREQ packets are saved for future use. received R-RREQ packet is not a source node. Then the R nodes. After receiving the packet , it adds in a new path with a different hop or with the same next hop. This is totally depends upon a sequence number which is greater or less [7][9]. Figure1. R Figure 1 shows the flooding of R node. So along with the primary path D node such as D-5-6-7-8-S, D-9-11 2.3. PHR-AODV Routing Protocol PHR-AODV [11] contains no permanent routes in nodes routing table. It is an extension of R AODV routing protocol which prevents loss of data packets by active malicious node and distributes load uniformly among the nodes. The processing of RREQ and R-of R-AODV and PHR-AODV are same. its neighbour nodes, it simply builds partial node R-RREQ) packet is initiated and R-RREQ packet format is Table1. R-RREQ Message Format [6] Reserved Hop Count Broadcast ID Destination IP address Destination Sequence Number Source IP address Reply Time R-RREQ message whereas the A forward route entry is created if the node R-RREQ is broadcasted to it’s neighbour R-RREQ from Destination to Source Node R-RREQ packet by the destination node in order to find the source D-3-2-1-S, a number of paths might be built at the source 11-12-13-S. -RREQ packets is same as that of R-AODV. The packet formats When the source node receives R-RREQ packets from node-disjoint paths. After receiving al 167 acket R-AODV all the node-
  • 4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 disjoint paths within the timeout period, source node hops between different paths (based on the ascending order of their hop count values) while sending data packets to the destination node. During this communication of data packets, if a parti from the list. The source node reinitiates the route discovery when no paths remain in the list. Figure 2 shows the node disjoint paths discovered between source and destination node. Figure2. particular path fails then that path is eliminated Hopping of Paths at Source Node PHR-AODV provides an effective and analytic method to estimate the security of the network [11]. The probability of active malicious node Pm is given as: Pm = (Nrp * Nm) / Ntotal (1) Where Nrp is the number of nodes in routing path, Ntotal is the number of all nodes in network, Nm is the Number of malicious nodes (2 malicious nodes are considered in this paper) and Np is the number of paths from a source to a destination. The malicious node intrusion Pi = Pm / Np e (2) 3. SIMULATION AND PERFORMANCE EVALUATION rate is given by This section explained the simulation model and their performance metrics. This also describes the results which are analysed from the simulation. 3.1. Simulation Model In this section, the network simulator-simulator 2 is used. It supports for simulating a multi-hop wireless ad hoc environment completed with physical, data link and medium access control layer models. The table-2 and 3 shows the simulation paramet parameters and energy parameters respectively. 168 cular ad-hoc
  • 5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 169 Table 2. Energy Parameters [7][9] Parameters Values Routing Protocol AODV,R-AODV,PHR-AODV Number of Nodes 20,30,40,50,60,70 Area of Terrain 1500 m X 1500 m Total time for simulation 100.0 sec Type of Traffic CBR Size of Packet 512 bytes Maximum speed of Nodes 2,5,10,15,20 m/s Bandwidth 2.0Mbps Transmission Range 250 m Transmission Rate 4 Packets/sec No of flows 10 Frequency Band 2.4 GHz Pause Time 5 sec Propagation type Propagation/TwoRayGround Antenna Antenna/OmniAntenna Queue Type Queue/DropTail/PriQueue Queue Length 50 MAC type Mac/802_11b Mobility Model Random Waypoint Table 3:Simulation Parameters 3.2. Performance Metrics Parameters Values Receiving Power 1.0 watt Transmitting Power 1.4 watt Idle Power 0.83 watt Sleep Power 0.13 watt Transition Power 0.2 watt Nodes’ Initial Energy 300 Joules The following performance metrics [6-10] are considered for the simulation: • Packet Delivery Fraction: It is the ratio of data packets received at the destination to those generated by the source. • Average End-to-End Delay: It is the time interval between Transmitting packet and Receiving packet, which is a summation of isolation of data packets during route discovery, retransmission delays at the MAC and queuing at the interface queue. • Routing Overhead: It is the sum of all control packets transmitted/received during route discovery and route maintenance. • Average Energy Consumed: It is the mean value of energy consumed by a node during the whole simulation process. • Intrusion Rate: It is the percentage of intrusion instances present in the test set.
  • 6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 170 3.3. Results and Discussions The packet delivery fraction and average end-to-end delay of R-AODV characterisation are shown in figure 3 and 4. It is very obvious that above two factors improved as compared to other two protocols due to R-AODV utilises multiple recent routes at the source node which are fresh enough. Also the routing overhead of R-AODV is much larger than AODV which is clearly shown in figure 5 because R-AODV broadcasts route reply packets whereas it is unicasted in AODV. Figure 3. Packet Delivery Fraction varying Number of Nodes Figure 4. Average End-to-End Delay varying Number of Nodes
  • 7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 171 Figure 5. Control Overhead varying Number of Nodes From Figure 6 and 7 it is clear that R-AODV completely outperforms AODV and PHR-AODV when performance is considered by varying Nodes Maximum Speed due to that R-AODV uses a number of multiple invented routes with high consistency to switch over the rapid topology changes due to higher nodes speed, which reduces the delay of communication which arises due to successful delivery of data packets. Figure 6. Packet Delivery Fraction vs. Nodes Max. Speed
  • 8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 172 Figure 7. Average End-to-End Delay varying Nodes Max. Speed Figure 8. Average Energy Consumed varying Number of Nodes The average consumed energy for R-AODV is lesser than AODV and PHR-AODV is clearly illustrated in figure(8). This will effective even if it has transmitted larger number of control packets than others. The reason is that the R-AODV uses fewer hops in the chosen paths to route the data packets[8]. As a result for a longer period R-AODV increases the survival of the nodes in the network.
  • 9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 173 Figure 9. Intrusion Rate varying Number of Nodes The two malicious nodes which are described in this paper, their intrusion rate decreases depending upon the number of nodes increases in case of PHR_AODV. Further the intrusion rate decreases as the probability of active malicious nodes decreases. 4. CONCLUSIONS An extensive analytic model and a simulation study have been conducted to evaluate the performance of AODV, R-AODV and PHR-AODV using NS-2.The above simulation analysis raise a conclusion that the performance of R-AODV in terms average end-to-delay, average energy consumption and packet delivery fraction totally dominates both AODV and PHR-AODV .This is happened in high mobility scenarios at a cost of higher routing overhead. It can also be seen that in case of PHR-AODV, the intrusion rate of malicious nodes decreases with increase in number of nodes. ACKNOWLEDGEMENTS The authors would like to thank everyone, just everyone! REFERENCES [1] Elizabeth M. Royer and Chai-Keong Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications, Vol. 6, No. 2, pp. 46-55, April 1999. [2] C.E. Perkins and E. M. Royer, “Ad hoc on-demand distance vector routing” in Proc. WMCSA, New Orleans, LA, pp. 90–100, Feb. 1999. [3] M. K. Marina and S. R. Das “On-Demand Multi Path Distance Vector Routing in Ad Hoc Networks” in Proc. ICNP 2001, pp. 14– 23, Nov. 2001. [4] A. Nasipuri and S. R. Das, “On-Demand Multipath Routing for Mobile Ad Hoc Networks” Proc. ICCN 1999, pp. 64–70, Oct. 1999. [5] Tarique, M., Tepe, E., Sasan Adibi, and Shervin Erfani, “Survey of multipath routing protocols for Mobile Ad-hoc networks”, Journal of Network and Computer Applications, 32:1125-1143, 2009. [6] Chonggun Kim, Elmurod Talipov and Byoungchul Ahn, "A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks," LNCS 4097, pp. 522-531, 2006.
  • 10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 6, No. 5, October 2014 [7] Pravanjan Das and Upena D Dalal, “A Comparative Analysis of AODV and R- AODV Routing Protocols in MANETS”, International Journal of Computer Applications 72(21):1-5, June 2013. [8] Khafaei Taleb and Khafaie Behzad, “The Effect of Number of Hops per Path on Remind Energy in MANETs Routing Protocols,” International Journal of Computer Applications vol. 43, no. 24, pp. 23- 28, April 2012. [9] Humaira Nishat, Vamsi Krishna K, D.Srinivasa Rao and Shakeel Ahmed, “Performance Evaluation of On-Demand Routing Protocols AODV and Modified AODV (R-AODV) in MANETS,” International Journal of Distributed and Parallel Systems, vol. 2, no. 1, January 2011. [10] Talipov, Elmurod, Donxue Jin, Jaeyoun Jung, Ilkhyu Ha, YoungJun Choi, and Chonggun Kim. "Path hopping based on reverse AODV for security." Management of Convergence Networks and Services, pp. 574-577. Springer Berlin Heidelberg, 2006. 174 [11] “The Network Simulator – NS-2”, available at http://www.isi.edu/nsnam/ns, 2004. Authors Sumant Ku Mohapatra was born in Bhubaneswar, Orissa, India . He received t he B.Tech degree from ITER, Bhubaneswar, India in 2002 & M.Tech(Electronics & Instrumentation Engg) from GIET, BPUT, Odisha in 2011. Currently he is working in Trident Academy of Technology, B.P.U.T, Bhubaneswar, Odisha, India as an Assistant Professor. His research interest are in signal and image processing ,optical fiber communication and wireless communication. Pravanjan Das was born in the Cuttack district, Odisha, India . He received the B.Tech degree from TAT, Bhubaneswar, India in 2010 & M.Tech(Communication Systems) from SVNIT,Surat,Gujrat in 2013. Currently he is working in Ericsson India Global Services Pvt. Ltd, Salt Lake, Kolkata, India as Researcher. His research interest are in signal processing , and wireless communication. Biswa Ranjan Swain was born in the Cuttack district, Odisha, India . He received the B.Tech degree from SIET, Dhenkanal, India in 2006 & M.Tech(Electronics & Telecommunication Engg.) from IIT Kharagpur, Kharagpur, India. Currently he is working in Trident Academy of Technology, B.P.U.T, Bhubaneswar, Odisha, as an Assistant Professor. His research interest are in image processing, and wireless communication.