SlideShare a Scribd company logo
1 of 6
Download to read offline
IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network”
                                                                                                                   CCSN, 2011


        Performance Comparison of DSDV, DSR, AODV
      Protocol with IEEE 802.11 MAC for Chain Topology
            for Mobile Ad-hoc Network using NS-2

                    V.K.Taksande                                                           Dr.K.D.Kulat
   Department of Electronics & Communication,                               Department of Electronics & Computer,
Priyadarshini Indira Gandhi College of Engineering                                     VNIT, Nagpur
                 Nagpur University


ABSTRACT                                                            The best performing protocol is presented in section VI and the
An Ad-hoc network is a collection of mobile nodes                   conclusion is presented in section VII.
dynamically forming a temporary network without the use of
any existing network infrastructure or centralised administer.      2. RELATED WORK
Because of limited communication range among mobile nodes           A Several researchers have done the qualitative and
in ad-hoc network, several network hopes may be needed to           quantitative analysis of Ad Hoc Routing Protocols by means of
deliver a packet from one node to another node in the wireless      different performance metrics. They have used different
network. In recent years, a variety of different routing            simulators for this purpose.
protocols addressing multi-hop ad-hoc network have been
presented and their performance issues are discussed. This          1) Mr.Rafi U Zamam [1] studied & compared the performance
paper is subjected to comprehensive analysis among                  of DSDV, AODV and DSR routing protocols for ad hoc
DSR,DSDV,AODV routing protocols of ad-hoc network with              networks using NS-2 simulations. In this paper, auther
IEEE 802.11 Mac protocol in chain topology using Network            observed that the competitive reactive routing
Simulator-2(NS-2).Various important performance metrics of          protocols, AODV an d DSR, both show better performance
MANET such as Generated Packet Vs. no. of nodes, Received           than the other in terms of certain metrics. It is still
Packet Vs. no. of nodes, Packet delivery ratio Vs. no. of nodes,    difficult to determine which of them has overall better
Total dropped packets Vs. no. of nodes, Average end to end          performance in MANET.
delay Vs. no. of nodes are investigated to confirm the best         2) Vahid Garousi [2] studied an analysis of network traffic in
routing protocol in the simulation environment.                     ad-hoc networks based on the DSDV protocol with an
                                                                    emphasis on mobility and communication patterns of the nodes.
Keywords - MANET, AODV, DSDV, DSR, Packets, IEEE
                                                                    In this paper, he observed that simulations measured the ability
802.11, Performance Metrics, NS-2 Simulation.
                                                                    of DSDV routing protocol to react to multi-hop ad-hoc network
                                                                    topology changes in terms of scene size, mobile nodes
1. INTRODUCTION                                                     movement, number of connections among nodes, and also the
Ad-hoc wireless network are self creating, self organizing, and     amount of data each mobile node transmits.
self-administrating networks. Ad hoc networks are used where
wired network and mobile access is unproductive and not             3) C.E. Perkins & P. Bhagwat[3] studied & proposed an
feasible. A fundamental problem in ad hoc networking is how         efficient DSDV (Eff-DSDV) protocol for ad hoc networks.
to deliver data packets among MNs efficiently without               Eff-DSDV overcomes the problem of stale routes, and thereby
predetermined topology or centralized control, which is the         improves the performance of regular DSDV. The proposed
main objective of ad hoc routing protocols. A fundamental           protocol has been implemented in the NCTUns Simulator and
problem in ad hoc networking is how to deliver data packets         performance comparison has been made with regular DSDV
among mobile nodes efficiently without predetermined                and DSR protocols. The performance metrics considered are
topology or centralized control, which is the main objective of     packet-delivery ratio, end-end delay, dropped packets, routing
ad hoc routing protocols. A central challenge in the design of      overhead, route length. It has been found after analysis that the
ad hoc networks is the development of dynamic routing               performance of Eff-DSDV is superior to regular DSDV and
protocols that can efficiently find routes between two              sometimes better than DSR in certain cases.
communicating nodes. The goal is to carry out a systematic          4) Das,S.R., Perkins,C.E., and Royer,E.M [2] studied &
performance study of DSDV, DSR, AODV routing protocol for           compared the performance of DSDV, AODV and DSR routing
ad hoc networks. Moreover performance analysis is based on          protocols for ad hoc networks using NS-2 simulations. In this
varying number of nodes in the Mobile Ad Hoc Network in             paper, they observed that DSDV uses the proactive table-
chain topology. The rest of the paper is organized as follows:      driven routing strategy while both AODV and DSR use the
The work contributed in this area is provided in section II. The    reactive on-demand routing strategy. Both AODV and DSR
AODV, DSDV, DSR routing protocol description is                     perform better under high mobility simulations than DSDV.
summarized in section III. The simulation environment and           High mobility results in frequent link failures and the overhead
performance metrics are described in Section IV .The                involved in updating all the nodes with the new routing
simulation results and observation are described in section V.      information as in DSDV is much more than that involved
                                                                    AODV and DSR, where the routes are created as and when
                                                                    required.




                                                                                                                                  26
IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network”
                                                                                                                   CCSN, 2011

                                                                    14) Jorg D.O. [29] studied the behaviour of different routing
                                                                    protocols on network topology changes resulting from link
5) Chao,C-M., Sheu,J-P.,and Hu,C-T.[5] studied            the       breaks, node movement, etc. In his paper performance of
performance comparison based on packet delivery fraction and        routing protocols was evaluated by varying number of nodes
normalized routing load. In the future, extensive complex           etc. But he did not investigate the performance of protocols
simulations could be carried out in gain a more in-depth            under heavy loads (high mobility +large number of traffic
performance analysis of the ad hoc routing protocols. This          sources + larger number of nodes in the network), which may
would include delay of data packet delivery and performance         lead to congestion situations.
comparison on location-based ad hoc routing protocols.
                                                                    15) J Broch et al. [30] performed experiments for performance
6) Md.Anisur Rahman,Md.Shahidual Islam, Alex Televasky              comparison of both proactive and reactive routing protocols. In
[17]studied & analyzed that Packet dropping rate for DSR is         their Ns-2 simulation, a network size of 50 nodes with varying
very less than DSDV and AODV indicating its highest                 pause times and various movement patterns were chosen.
efficiency. Both AODV and DSR perform better under high
mobility than DSDV. High mobility occurs due to frequent link
failures and the overhead involved in updating all the nodes
                                                                    3. DESCRIPTION OF THE PROTOCOLS
with the new routing information as in DSDV is much more            This section briefly describe the key features of DSDV, DSR
than that involved in AODV and DSR.                                 and AODV protocols that being studied in this paper.

7) B. Cameron Lesiuk[18] studied & presented an overview of
ad hoc routing principles and thereby demonstrating how             3.1 Destination-Sequenced Distance Vector
                                                                    (DSDV)
these differ from conventional routing. Three proposed ad hoc
                                                                    The Destination Sequenced Distance Vector Protocol (DSDV)
routing protocols, DSDV, TORA,and DSR were presented and            is a proactive, distance vector protocol which uses the
commented on.                                                       Bellmann -Ford algorithm. DSDV is a hop-by hop distance
8) A.E. Mahmoud, R. Khalaf & A, Kayssi[21] studied &                vector routing protocol, wherein each node maintains a routing
analyses three protocols AODV, DSDV and I-DSDV & were               table listing the “next hop” and “number of hops” for each
simulated using NS-2 package and were compared in terms of          reachable destination. This protocol requires each mobile
packet delivery ratio, end to end delay and routing overhead in     station to advertise, to each of its current neighbors, its own
different environment; varying number of nodes, speed and           routing table (for instance, by broadcasting its entries). The
pause time. Simulation results show that I-DSDV compared            entries in this list may change fairly dynamically over time, so
with DSDV, it reduces the number of dropped data packets            the advertisement must be made often enough to ensure that
with little increased overhead at higher rates of node mobility     every mobile computer can almost always locate every other
but still can’t compete with AODV in higher node speed and          mobile computer of the collection. In addition, each mobile
number of node.                                                     computer agrees to relay data packets to other computers upon
                                                                    request. This agreement places a premium on the ability to
9) N Vetrivelan & Dr. A V Reddy [24] analysed the                   determine the shortest number of hops for a route to a
performance differentials using varying network size and            destination we would like to avoid unnecessarily disturbing
simulation times. They performed two simulation experiments         mobile hosts if they are in sleep mode. In this way a mobile
for 10 & 25 nodes for simulation time up to 100 sec.                computer may exchange data with any other mobile computer
10) S. Gowrishanker et al [25] performed the Analysis of            in the group even if the target of the data is not within range for
AODV and OLSR by using NS-2 simulator, the simulation               direct communication.
period for each scenario was 900 seconds and the simulated
mobility network area was 800 m x 500 m rectangle. In each          3.2 Dynamic Source Routing (DSR)
simulation scenario, the nodes were initially located at the        The Dynamic Source Routing (DSR) protocol is an on demand
centre of the simulation region. The nodes start moving after       routing protocol based on source routing. DSR Protocol is
the first 10 seconds of simulated time. The application used to     composed by two “on-demand” mechanisms, which are
generate is CBR traffic and IP is used as Network layer             requested only when two nodes want to communicate with
protocol.                                                           each other. Route Discovery and Route Maintenance are built
11) Arunkumar B R et al. [26] in this paper they present their      to behave according to changes in the routes in use, adjusting
observations regarding the performance comparison of the            them-selves when needed. Along with those mechanisms, DSR
routing protocols for variable bit rate (VBR) in mobile ad hoc      allows multiple routes to any destination, thus can lead easily
networks (MANETs). They perform extensive simulations,              to load balancing or increase robustness .In the source routing
using NS-2 simulator [2]. Their studies have shown that             technique, a sender determines the exact sequence of nodes
reactive protocols perform better than proactive protocols.         through which to propagate a packet. The list of intermediate
                                                                    nodes for routing is explicitly contained in the packet’s header.
12) S. P. Setty et.al.[27] evaluated the performance of existing    In DSR, every mobile node in the network needs to maintain a
wireless routing protocol AODV in various nodes placement           route cache where it caches source routes that it has learned.
models like Grid, Random and Uniform using QualNet 5.0.             When a host wants to send a packet to some other host, it first
                                                                    checks its route cache for a source route to the destination. In
13) Khan et al. [28] studied and compared the performance of
                                                                    the case a route is found, the sender uses this route to propagate
routing protocols by using NCTUns 4.0 network simulator. In
                                                                    the packet. Otherwise the source node initiates the route
this paper, performance of routing protocols was evaluated by
                                                                    discovery process.
varying number of nodes in multiples of 5 in the ad hoc
network. The simulations were carried out for 70 seconds of
the simulation time. The packet size was fixed to 1400 bytes.




                                                                                                                                    27
IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network”
                                                                                                                   CCSN, 2011


3.3 Ad Hoc On-Demand Distance Vector                                     TABLE 1    PARAMETERS VALUES FOR SIMULATION

(AODV)
AODV is a purely reactive routing protocol. In this protocol,                              Simulation Parameters
each terminal does not need to keep a view of the whole
network or a route to every other terminal. Nor does it need to      Simulator                        ns-2.34
periodically exchange route information with the neighbor            Protocols                        AODV,DSDV,DSR
terminals. Furthermore, only when a mobile terminal has              Simulation duration              200 seconds
packets to send to a destination does it need to discover and        Simulation area                  2200 m x 500 m
maintain a route to that destination terminal. In AODV, each         Number of nodes                  5,9,25,35,40
terminal contains a route table for a destination. A route table     Transmission range               250 m
stores the following information: destination address and its        Movement model                   Chain topology
                                                                     MAC Layer Protocol               IEEE 802.11
sequence number, active neighbors for the route, hop count to
                                                                     Maximum speed                    50 m/s
the destination, and expiration time for the table. The
                                                                     Packet rate                      4 packets/sec
expiration time is updated each time the route is used. If this      Traffic type                     CBR
route has not been used for a specified period of time, it is        Data payload                     512 bytes/packet
discarded.

                                                                    4.3 Performance Metrics
4. SIMULATION ENVIRONMENT                                           While analysing the AODV,DSDV,DSR protocol with chain
                                                                    topology, we focused on performance metrics such as
4.1 Simulation Model                                                Generated Packets vs. No. of nodes, Received Packets Vs. no.
This section have given the emphasis for the simulation of          of nodes, Packet delivery ratio Vs. no. of nodes, Total dropped
performance of Ad Hoc routing protocols AODV,DSDV,DSR               packets Vs. no. of nodes, Average end to end delay Vs. No. of
with varying the number of mobile nodes. The simulations            nodes and investigate the best routing protocol with simulation
have been performed using network simulator NS-2 [12]. The          environment.
network simulator ns-2 is discrete event simulation software
for network simulations which means it simulates events such        5. SIMULATION                        RESULTS                 &
as sending, receiving, forwarding and dropping packets. The         OBESRVATION
latest version, ns-allinone-2.34, supports simulation for routing
protocols for ad hoc wireless networks such as AODV, TORA,          The simulation results are shown in the following section in the
DSDV, and DSR. Ns-2 is written in C++ programming                   form of line graphs. The performance of AODV, DSDV, DSR
language and Object Tool Common Language (OTCL).                    based on the varying the number of nodes in chain topology
Although ns-2.34 can be built on various platforms, we chose a      [10] is done on parameters like Received Packets, Packets
Linux platform [FEDORA 7] for this paper, as Linux offers a         Delivery ratio & Average End to End delay,. “Fig. 2” shows
number of programming development tools that can be used            the creation of chain topology with mobile nodes.
along with the simulation process. To run a simulation with ns-
2.34, the user must write the simulation script in OTCL, get the
simulation results in an output trace file. The performance
metrics are graphically visualized in XGRAPH(Fig.1,2,3,4,5).
Ns-2 also offers a visual representation of the simulated
network by tracing nodes movements and events and writing
them in a network animator (NAM) file. The fig.1 shows the
flow chart of exact flow of data.




                                                                                        Fig 2. Chain Topology

                  Fig 1: Simulation Model                           “Fig. 3” highlights the relative performances of AODV DSDV,
                                                                    DSR protocols for Generated Packets with varying numbers of
                                                                    nodes of 5, 9,25,35,40. From figure it is observed that DSR
4.2 Simulation Parameters                                           protocols have better performance than AODV & DSDV
We consider a network of nodes placing within a 2200m X             protocols.
500m area. The performances of AODV,DSDV,DSR are
evaluated by keeping the network speed and pause time
constant and varying the network size that is number of mobile
nodes. Table 1 shows the simulation parameters used in this
valuation.




                                                                                                                                 28
IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network”
                                                                                                                  CCSN, 2011




                  Fig 3. Generated Packets                                Fig 5. Total Dropped Packets Vs. numbers of nodes.

  “Fig. 4” highlights the relative performances of AODV            Fig.6 highlights the relative performance of AODV, DSDV &
DSDV,DSR protocols for Received Packets with varying               DSR protocol for Packet Delivery Ratio with varying numbers
numbers of nodes of 5,9,25,35,40. From figure it is observed       of nodes of 5, 9,25,35,40 . From figure it is observed that
that for small number of nodes up to 10 numbers, the               AODV protocol have better performance over DSR & DSDV
performance of DSR protocol have better performance than           protocols in term of Packet Delivery Ratio. AODV protocol
AODV & DSDV protocols but for more numbers of nodes that           delivered more data packets to the destination than DSR &
is more than 10 nodes, the performance of AODV protocol            DSDV protocols.
have better performance than DSR & DSDV protocol.




                                                                            Fig 6. Packet Delivery Ratio Vs. numbers of nodes

       Fig 4. Received Packets Vs, numbers of nodes.
                                                                   Fig.7 highlights the relative performance of AODV, DSDV &
Fig.5 highlights the relative performance of AODV, DSDV &          DSR protocols for Average End To End delay with varying
DSR protocols for Total Dropped Packet with varying numbers        numbers of nodes of 5,9,25,35,40. From figure it is observed
of nodes of 5, 9,25,35,40. From figure it is observed that DSR     that AODV protocol have better performance over DSR &
protocol outperformed both AODV & DSDV protocols. For              DSDV protocols for chain topology in terms of Average End
more than 10 numbers of nodes, DSR protocol with chain             To End delay. It is observed that up to 10 numbers of nodes,
topology has less Total Dropped packets than AODV & DSDV           AODV protocol have better performance but above 10
protocols.                                                         numbers of nodes DSR have better performance as compared
                                                                   to AODV & DSDV protocol while transmitting data packets
                                                                   from source to destination.




                                                                                                                               29
IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network”
                                                                                                                     CCSN, 2011

                                                                      show better performance than the other in terms of certain
                                                                      performance metrics. It is still difficult to determine which of
                                                                      them has overall better performance in MANET for Chain
                                                                      topology.

                                                                      8. REFERENCES
                                                                      [1] Mr.Rafi U Zamam “An Efficient DSDV Routing Protocol
                                                                          for Wireless Mobile Ad Hoc Networks and its
                                                                          Performance     Comparison    http://www.computer.org/
                                                                          portal/web/csdl/doi/10.1109/EMS.2008.11”
                                                                      [2] Vahid Garousi, Simulating Network traffic in Multi-hop
                                                                          Wireless Ad Hoc Networks based on DSDV (Destination
                                                                          Sequenced Distance Vector) protocol using NS (Network
                                                                          Simulator) Package, University of Waterloo, Fall 2001.
                                                                      [3] C.E. Perkins & P. Bhagwat, “Highly Dynamic Destination
Figure 7..Average End to End delay Vs. numbers of nodes.                  Sequence-Vector Routing (DSDV) for Mobile
                                                                          Computers”, Computer Communication Review, 24(4),
                                                                          1994, 234-244.
6. SELECTING THE BEST                                    MANET
                                                                      [4]       Das,S.R., Perkins,C.E., and Royer,E.M. (2000).
ROUTING PROTOCOL                                                             Performance     Comparison of Two On Demand Routing
Simulation analysis as shown in above figures produces Table                 Protocols for Ad Hoc Networks. IEEE INFOCOM 2000.
2 wherefrom the best performing protocol with respect to a                   Nineteenth Annual Joint Conference of the IEEE
specific network parameters for chain topology can be selected               Computer and Communications Societies, pp.3-12.
to optimize MANET performance.
                                                                      [5]     Chao,C-M., Sheu,J-P.,and Hu,C-T. (2003). Energy-
                                                                             Conserving Grid Routing Protocol in Mobile Ad Hoc
                                                                             Networks. IEEE Proceedings of the 2003 International
                 TABLE 2      Best performing protocol
                                                                             Conference on Parallel Processing (ICPP’03).
                Parameters                         Best Protocol      [6] Park,S.M., Ko,Y.B., and Kim,J.H. (2003). Disconnected
                                                                           Operation Service in Mobile Grid Computing. Graduate
                                                                           School of Information and Communication, Ajou
Generated Packets                              DSR                         University, South Korea.
                                               DSR up to 10           [7]     Perkins,C.E., Royer,E.M., Das,S.R., and Marina,M.K.
Received Packets Vs. No. of nodes              nodes,AODV      for           (2001). Performance Comparison of Two On-Demand
                                               more than 10 nodes            Routing Protocols for Ad Hoc Networks. IEEE Personal
                                                                             Communications, 16-28.
Total Dropped Packets Vs. No. of nodes         DSR
                                                                      [8] Perkins,C.E., and Bhagwat.P. (1994). Highly Dynamic
                                                                          Destination-Sequenced Distance-Vector Routing (DSDV)
Packet Delivery Ratio Vs. No. of nodes         AODV                       for Mobile Computers. ACM, pp.234 – 244.
                                               AODV upto 10           [9]       Phan,T., Huang,L. and Dulan,C. (2002) Challenge:
Average End To End Delay Vs. No. of nodes      nodes, DSR for                Integrating    Mobile Wireless Devices Into the
                                               more than 10 nodes.           Computational Grid. ACM , pp. 271-278.
                                                                      [10] Irving,M., Taylor.G., and Hobson.P. (2004). Plug in to
7. CONCLUSION                                                              Grid Computing. IEEE Power & Energy Magazine,
                                                                           March/April, pp.40-44.
This study was conducted to evaluate the performance three
MANET protocols i.e. DSR, AODV and DSDV based on CBR                  [11] Kaneda,K., Taura,K., and Yonezawa,A., (2004). Routing
traffic. These routing protocols were compared in terms of                 and Resource Discovery in Phoenix Grid-Enabled
Packet delivery ratio, Average routing overhead and Average                Message Passing Library. IEEE International Symposium
end-to-end delay when subjected to varying no. of nodes.                   on Cluster Computing and the Grid, pp. 670-671.
Though the numbers of authors as mentioned in the literature
                                                                      [12]     Rajsbaum,S. (2002). Distributed Computing Research
survey have worked on these three standard protocols of
                                                                             Issues In Grid Computing. ACM SIGACT News Distibuted
MANET, in the worked presented here, the authors has used
                                                                             Computing Column 8, pp.50-67.
higher area, more speed, larger duration for simulation &
higher range for chain topology & successfully shown that the         [13]      Roy,N., Das.S.K., Basu.K., and Kumar.M. (2005).
results of DSR protocol is superior for parameters such as                   Enhancing Availability of Grid Computational Services to
Generated packets, Received Packets up to 10 nodes, total                    Ubiquitous Computing Applications. Proceedings of the
dropped Packets & Average End To End Delay for more than                     19th IEEE International Parallel and Distributed
10 nodes as compare to DSDV or AODV & for             Packet                 Processing Symposium (IPDPS’05), pp.1-10.
Delivery Ratio, AODV protocol have better performance for
the given simulation environment, the results of which are            [14]      Staub.T., (2004). Ad-hoc and Hybrid Networks:
reflected in Table no.2.So authors conclude that the                         Performance Comparison of MANET Routing Protocols
competitive reactive routing protocols, AODV and DSR, both                   in Ad-hoc and Hybrid Networks. Institute of Computer



                                                                                                                                   30
IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network”
                                                                                                                   CCSN, 2011

       Science and Applied Mathematics, University of Berne,        [23] Abdul Hadi Abd Rahman and Zuriati Ahmad Zukarnain,
       Switzerland, pp.1-38.                                             “Performance Comparison of AODV, DSDV and I-DSDV
                                                                         Routing Protocols in Mobile Ad Hoc networks”, European
[15] The NS2 Manual, 2005.                                               Journal of Scientific Research ISSN 1450- 216X Vol.31
[16]     Josh Broch , David A. Maltz , David B. Johnson , Yih-           No.4 (2009).pp.566-576.
       Chun                Hu ,Jorjeta Jetcheva, A performance      [24] N Vetrivelan, Dr. A V Reddy, “ Performance Analysis of
       comparison of multi-hop wireless ad hoc network routing          Three Routing Protocols for Varying MANET Size”,
       protocols, Proceedings of the 4th annual ACM/IEEE                Proceeding of the International MultiConference of
       international conference on Mobile computing and                 Engineers and Computer Scientists 2008 Vol II, IMECS
       networking, p.85-97, October 25-30, 1998, Dallas, Texas,         2008,19-21 March, 2008, Hong Kong.
       United States
                                                                    [25]       S.Gowrishankar, T.G. Basavaraju, M.Singh, Subir
[17] Md. Anisur Rahman, Md. Shohidul Islam, Alex Talevski                  Kumar Sarkar, “Scenario based Performance Analysis of
     “Performance Measurement of Various Routing Protocols                 AODV and OLSR in Mobile Ad Hoc Networks”,
     in Ad-hoc Network” Vol I, IMECS 2009 International                    Proceedings of the 24th South East Asia Regional
     Multi Conference of Engineers and Computer Scientists,                Computer Conference, November 18-19, 2007,
     March 18 - 20, 2009, Hong Kong.                                       Bangkok,Thailand.
[18] B. Cameron Lesiuk,” Routing in Ad Hoc Networks of              [26]     Arun Kumar B. R., Lokanatha C. Reddy, Prakash. S.
    Mobile Hosts”, Department of Mechanical Engineering                    Hiremath, “Performance Comparison of Wireless Mobile
    University of Victoria, Victoria, BC, Canada, December                 Ad-Hoc      Network     Routing   Protocols”  IJCSNS
    2, 1998                                                                International Journal of Computer Science and Network
[19] Nor Surayati Mohamad ,Usop, Azizol Abdullah, Ahmad                    Security VOL.8 No.6,June 2008.
    Faisal Amri Abidin “Performance Evaluation of AODV,             [27] S.P. Setty et. al., “Performance evolution of AODV in
    DSDV & DSR Routing Protocol in grid Environment”                    different envirment”, International Journal of Engineering
    IJCSNS International Journal of Computer Science and                Science and Technology Vol. 2(7), 2010, 2976-2981
    Network Security, VOL.9 No.7, July 2009.
                                                                    [28] K U Khan, R U Zaman, A. Venugopal Reddy,
[20] Uzzal K. Acharjee, Anis Ahmed, Shahida Rafique,                    “Performance Comparison of On-Demand and Table
    “Experiential Analysis of Ad-hoc Routing Protocols                  Driven Ad Hoc Routing Protocols using NCTUns ”, Tenth
    Using Network Simulator” © 2007 Journal of Computer                 International Conference on Computer Modeling and
    Science Vol -1, No - 2, December 2007, pp 01-06 Faculty             Simulation, 2008.
    of Computer Science ISSN 1994-6244
                                                                    [29]     D. O. Jorg, “Performance Comparison of MANET
[21] A.E. Mahmoud, R. Khalaf & A, Kayssi, Performance of                   Routing Protocols In Different Network Sizes”, Computer
    the AODV and DSDV Routing Protocols in Mobile Ad-                      Networks & Distributed Systems, 2003.
    Hoc Networks, Lebanon, 2007.
                                                                    [30] J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J.
[22]      E. M. Royer, and C.K. Toh, “A Review of Current               Jetcheva”, A Performance Comparison of Multi-Hop
       Routing     Protocols for Ad Hoc Mobile Wireless                 Wireless Network Routing Protocols,” Proceedings of the
       Networks”, IEEE Personal Communications, Vol. 6, Issue           Fourth Annual ACM/IEEE International Conference on
       2, pp. 46-55, April 1999.                                        Mobile Computing and Networking (MobiCom’98),
                                                                        October 25-30, 1998,Dallas,Texas,USA,pp.25-3




                                                                                                                               31

More Related Content

What's hot

Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networksambitlick
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 

What's hot (17)

Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueingImprovement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
Improvement of multi-channel_lo_ra_networks_based_on_distributed_joint_queueing
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
3
33
3
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networks
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
A02100108
A02100108A02100108
A02100108
 
47 50
47 5047 50
47 50
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
A2546035115
A2546035115A2546035115
A2546035115
 

Similar to Ns2 x graphs

Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...IJECEIAES
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...Saurabh Mishra
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...IDES Editor
 
Performance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsPerformance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsIOSR Journals
 

Similar to Ns2 x graphs (20)

Ip2515381543
Ip2515381543Ip2515381543
Ip2515381543
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...Simulation based comparison of routing protocols in wireless multihop ad hoc ...
Simulation based comparison of routing protocols in wireless multihop ad hoc ...
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Bt25420424
Bt25420424Bt25420424
Bt25420424
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
 
Performance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsPerformance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer Models
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
adhoc networks
adhoc networksadhoc networks
adhoc networks
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Ns2 x graphs

  • 1. IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network” CCSN, 2011 Performance Comparison of DSDV, DSR, AODV Protocol with IEEE 802.11 MAC for Chain Topology for Mobile Ad-hoc Network using NS-2 V.K.Taksande Dr.K.D.Kulat Department of Electronics & Communication, Department of Electronics & Computer, Priyadarshini Indira Gandhi College of Engineering VNIT, Nagpur Nagpur University ABSTRACT The best performing protocol is presented in section VI and the An Ad-hoc network is a collection of mobile nodes conclusion is presented in section VII. dynamically forming a temporary network without the use of any existing network infrastructure or centralised administer. 2. RELATED WORK Because of limited communication range among mobile nodes A Several researchers have done the qualitative and in ad-hoc network, several network hopes may be needed to quantitative analysis of Ad Hoc Routing Protocols by means of deliver a packet from one node to another node in the wireless different performance metrics. They have used different network. In recent years, a variety of different routing simulators for this purpose. protocols addressing multi-hop ad-hoc network have been presented and their performance issues are discussed. This 1) Mr.Rafi U Zamam [1] studied & compared the performance paper is subjected to comprehensive analysis among of DSDV, AODV and DSR routing protocols for ad hoc DSR,DSDV,AODV routing protocols of ad-hoc network with networks using NS-2 simulations. In this paper, auther IEEE 802.11 Mac protocol in chain topology using Network observed that the competitive reactive routing Simulator-2(NS-2).Various important performance metrics of protocols, AODV an d DSR, both show better performance MANET such as Generated Packet Vs. no. of nodes, Received than the other in terms of certain metrics. It is still Packet Vs. no. of nodes, Packet delivery ratio Vs. no. of nodes, difficult to determine which of them has overall better Total dropped packets Vs. no. of nodes, Average end to end performance in MANET. delay Vs. no. of nodes are investigated to confirm the best 2) Vahid Garousi [2] studied an analysis of network traffic in routing protocol in the simulation environment. ad-hoc networks based on the DSDV protocol with an emphasis on mobility and communication patterns of the nodes. Keywords - MANET, AODV, DSDV, DSR, Packets, IEEE In this paper, he observed that simulations measured the ability 802.11, Performance Metrics, NS-2 Simulation. of DSDV routing protocol to react to multi-hop ad-hoc network topology changes in terms of scene size, mobile nodes 1. INTRODUCTION movement, number of connections among nodes, and also the Ad-hoc wireless network are self creating, self organizing, and amount of data each mobile node transmits. self-administrating networks. Ad hoc networks are used where wired network and mobile access is unproductive and not 3) C.E. Perkins & P. Bhagwat[3] studied & proposed an feasible. A fundamental problem in ad hoc networking is how efficient DSDV (Eff-DSDV) protocol for ad hoc networks. to deliver data packets among MNs efficiently without Eff-DSDV overcomes the problem of stale routes, and thereby predetermined topology or centralized control, which is the improves the performance of regular DSDV. The proposed main objective of ad hoc routing protocols. A fundamental protocol has been implemented in the NCTUns Simulator and problem in ad hoc networking is how to deliver data packets performance comparison has been made with regular DSDV among mobile nodes efficiently without predetermined and DSR protocols. The performance metrics considered are topology or centralized control, which is the main objective of packet-delivery ratio, end-end delay, dropped packets, routing ad hoc routing protocols. A central challenge in the design of overhead, route length. It has been found after analysis that the ad hoc networks is the development of dynamic routing performance of Eff-DSDV is superior to regular DSDV and protocols that can efficiently find routes between two sometimes better than DSR in certain cases. communicating nodes. The goal is to carry out a systematic 4) Das,S.R., Perkins,C.E., and Royer,E.M [2] studied & performance study of DSDV, DSR, AODV routing protocol for compared the performance of DSDV, AODV and DSR routing ad hoc networks. Moreover performance analysis is based on protocols for ad hoc networks using NS-2 simulations. In this varying number of nodes in the Mobile Ad Hoc Network in paper, they observed that DSDV uses the proactive table- chain topology. The rest of the paper is organized as follows: driven routing strategy while both AODV and DSR use the The work contributed in this area is provided in section II. The reactive on-demand routing strategy. Both AODV and DSR AODV, DSDV, DSR routing protocol description is perform better under high mobility simulations than DSDV. summarized in section III. The simulation environment and High mobility results in frequent link failures and the overhead performance metrics are described in Section IV .The involved in updating all the nodes with the new routing simulation results and observation are described in section V. information as in DSDV is much more than that involved AODV and DSR, where the routes are created as and when required. 26
  • 2. IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network” CCSN, 2011 14) Jorg D.O. [29] studied the behaviour of different routing protocols on network topology changes resulting from link 5) Chao,C-M., Sheu,J-P.,and Hu,C-T.[5] studied the breaks, node movement, etc. In his paper performance of performance comparison based on packet delivery fraction and routing protocols was evaluated by varying number of nodes normalized routing load. In the future, extensive complex etc. But he did not investigate the performance of protocols simulations could be carried out in gain a more in-depth under heavy loads (high mobility +large number of traffic performance analysis of the ad hoc routing protocols. This sources + larger number of nodes in the network), which may would include delay of data packet delivery and performance lead to congestion situations. comparison on location-based ad hoc routing protocols. 15) J Broch et al. [30] performed experiments for performance 6) Md.Anisur Rahman,Md.Shahidual Islam, Alex Televasky comparison of both proactive and reactive routing protocols. In [17]studied & analyzed that Packet dropping rate for DSR is their Ns-2 simulation, a network size of 50 nodes with varying very less than DSDV and AODV indicating its highest pause times and various movement patterns were chosen. efficiency. Both AODV and DSR perform better under high mobility than DSDV. High mobility occurs due to frequent link failures and the overhead involved in updating all the nodes 3. DESCRIPTION OF THE PROTOCOLS with the new routing information as in DSDV is much more This section briefly describe the key features of DSDV, DSR than that involved in AODV and DSR. and AODV protocols that being studied in this paper. 7) B. Cameron Lesiuk[18] studied & presented an overview of ad hoc routing principles and thereby demonstrating how 3.1 Destination-Sequenced Distance Vector (DSDV) these differ from conventional routing. Three proposed ad hoc The Destination Sequenced Distance Vector Protocol (DSDV) routing protocols, DSDV, TORA,and DSR were presented and is a proactive, distance vector protocol which uses the commented on. Bellmann -Ford algorithm. DSDV is a hop-by hop distance 8) A.E. Mahmoud, R. Khalaf & A, Kayssi[21] studied & vector routing protocol, wherein each node maintains a routing analyses three protocols AODV, DSDV and I-DSDV & were table listing the “next hop” and “number of hops” for each simulated using NS-2 package and were compared in terms of reachable destination. This protocol requires each mobile packet delivery ratio, end to end delay and routing overhead in station to advertise, to each of its current neighbors, its own different environment; varying number of nodes, speed and routing table (for instance, by broadcasting its entries). The pause time. Simulation results show that I-DSDV compared entries in this list may change fairly dynamically over time, so with DSDV, it reduces the number of dropped data packets the advertisement must be made often enough to ensure that with little increased overhead at higher rates of node mobility every mobile computer can almost always locate every other but still can’t compete with AODV in higher node speed and mobile computer of the collection. In addition, each mobile number of node. computer agrees to relay data packets to other computers upon request. This agreement places a premium on the ability to 9) N Vetrivelan & Dr. A V Reddy [24] analysed the determine the shortest number of hops for a route to a performance differentials using varying network size and destination we would like to avoid unnecessarily disturbing simulation times. They performed two simulation experiments mobile hosts if they are in sleep mode. In this way a mobile for 10 & 25 nodes for simulation time up to 100 sec. computer may exchange data with any other mobile computer 10) S. Gowrishanker et al [25] performed the Analysis of in the group even if the target of the data is not within range for AODV and OLSR by using NS-2 simulator, the simulation direct communication. period for each scenario was 900 seconds and the simulated mobility network area was 800 m x 500 m rectangle. In each 3.2 Dynamic Source Routing (DSR) simulation scenario, the nodes were initially located at the The Dynamic Source Routing (DSR) protocol is an on demand centre of the simulation region. The nodes start moving after routing protocol based on source routing. DSR Protocol is the first 10 seconds of simulated time. The application used to composed by two “on-demand” mechanisms, which are generate is CBR traffic and IP is used as Network layer requested only when two nodes want to communicate with protocol. each other. Route Discovery and Route Maintenance are built 11) Arunkumar B R et al. [26] in this paper they present their to behave according to changes in the routes in use, adjusting observations regarding the performance comparison of the them-selves when needed. Along with those mechanisms, DSR routing protocols for variable bit rate (VBR) in mobile ad hoc allows multiple routes to any destination, thus can lead easily networks (MANETs). They perform extensive simulations, to load balancing or increase robustness .In the source routing using NS-2 simulator [2]. Their studies have shown that technique, a sender determines the exact sequence of nodes reactive protocols perform better than proactive protocols. through which to propagate a packet. The list of intermediate nodes for routing is explicitly contained in the packet’s header. 12) S. P. Setty et.al.[27] evaluated the performance of existing In DSR, every mobile node in the network needs to maintain a wireless routing protocol AODV in various nodes placement route cache where it caches source routes that it has learned. models like Grid, Random and Uniform using QualNet 5.0. When a host wants to send a packet to some other host, it first checks its route cache for a source route to the destination. In 13) Khan et al. [28] studied and compared the performance of the case a route is found, the sender uses this route to propagate routing protocols by using NCTUns 4.0 network simulator. In the packet. Otherwise the source node initiates the route this paper, performance of routing protocols was evaluated by discovery process. varying number of nodes in multiples of 5 in the ad hoc network. The simulations were carried out for 70 seconds of the simulation time. The packet size was fixed to 1400 bytes. 27
  • 3. IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network” CCSN, 2011 3.3 Ad Hoc On-Demand Distance Vector TABLE 1 PARAMETERS VALUES FOR SIMULATION (AODV) AODV is a purely reactive routing protocol. In this protocol, Simulation Parameters each terminal does not need to keep a view of the whole network or a route to every other terminal. Nor does it need to Simulator ns-2.34 periodically exchange route information with the neighbor Protocols AODV,DSDV,DSR terminals. Furthermore, only when a mobile terminal has Simulation duration 200 seconds packets to send to a destination does it need to discover and Simulation area 2200 m x 500 m maintain a route to that destination terminal. In AODV, each Number of nodes 5,9,25,35,40 terminal contains a route table for a destination. A route table Transmission range 250 m stores the following information: destination address and its Movement model Chain topology MAC Layer Protocol IEEE 802.11 sequence number, active neighbors for the route, hop count to Maximum speed 50 m/s the destination, and expiration time for the table. The Packet rate 4 packets/sec expiration time is updated each time the route is used. If this Traffic type CBR route has not been used for a specified period of time, it is Data payload 512 bytes/packet discarded. 4.3 Performance Metrics 4. SIMULATION ENVIRONMENT While analysing the AODV,DSDV,DSR protocol with chain topology, we focused on performance metrics such as 4.1 Simulation Model Generated Packets vs. No. of nodes, Received Packets Vs. no. This section have given the emphasis for the simulation of of nodes, Packet delivery ratio Vs. no. of nodes, Total dropped performance of Ad Hoc routing protocols AODV,DSDV,DSR packets Vs. no. of nodes, Average end to end delay Vs. No. of with varying the number of mobile nodes. The simulations nodes and investigate the best routing protocol with simulation have been performed using network simulator NS-2 [12]. The environment. network simulator ns-2 is discrete event simulation software for network simulations which means it simulates events such 5. SIMULATION RESULTS & as sending, receiving, forwarding and dropping packets. The OBESRVATION latest version, ns-allinone-2.34, supports simulation for routing protocols for ad hoc wireless networks such as AODV, TORA, The simulation results are shown in the following section in the DSDV, and DSR. Ns-2 is written in C++ programming form of line graphs. The performance of AODV, DSDV, DSR language and Object Tool Common Language (OTCL). based on the varying the number of nodes in chain topology Although ns-2.34 can be built on various platforms, we chose a [10] is done on parameters like Received Packets, Packets Linux platform [FEDORA 7] for this paper, as Linux offers a Delivery ratio & Average End to End delay,. “Fig. 2” shows number of programming development tools that can be used the creation of chain topology with mobile nodes. along with the simulation process. To run a simulation with ns- 2.34, the user must write the simulation script in OTCL, get the simulation results in an output trace file. The performance metrics are graphically visualized in XGRAPH(Fig.1,2,3,4,5). Ns-2 also offers a visual representation of the simulated network by tracing nodes movements and events and writing them in a network animator (NAM) file. The fig.1 shows the flow chart of exact flow of data. Fig 2. Chain Topology Fig 1: Simulation Model “Fig. 3” highlights the relative performances of AODV DSDV, DSR protocols for Generated Packets with varying numbers of nodes of 5, 9,25,35,40. From figure it is observed that DSR 4.2 Simulation Parameters protocols have better performance than AODV & DSDV We consider a network of nodes placing within a 2200m X protocols. 500m area. The performances of AODV,DSDV,DSR are evaluated by keeping the network speed and pause time constant and varying the network size that is number of mobile nodes. Table 1 shows the simulation parameters used in this valuation. 28
  • 4. IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network” CCSN, 2011 Fig 3. Generated Packets Fig 5. Total Dropped Packets Vs. numbers of nodes. “Fig. 4” highlights the relative performances of AODV Fig.6 highlights the relative performance of AODV, DSDV & DSDV,DSR protocols for Received Packets with varying DSR protocol for Packet Delivery Ratio with varying numbers numbers of nodes of 5,9,25,35,40. From figure it is observed of nodes of 5, 9,25,35,40 . From figure it is observed that that for small number of nodes up to 10 numbers, the AODV protocol have better performance over DSR & DSDV performance of DSR protocol have better performance than protocols in term of Packet Delivery Ratio. AODV protocol AODV & DSDV protocols but for more numbers of nodes that delivered more data packets to the destination than DSR & is more than 10 nodes, the performance of AODV protocol DSDV protocols. have better performance than DSR & DSDV protocol. Fig 6. Packet Delivery Ratio Vs. numbers of nodes Fig 4. Received Packets Vs, numbers of nodes. Fig.7 highlights the relative performance of AODV, DSDV & Fig.5 highlights the relative performance of AODV, DSDV & DSR protocols for Average End To End delay with varying DSR protocols for Total Dropped Packet with varying numbers numbers of nodes of 5,9,25,35,40. From figure it is observed of nodes of 5, 9,25,35,40. From figure it is observed that DSR that AODV protocol have better performance over DSR & protocol outperformed both AODV & DSDV protocols. For DSDV protocols for chain topology in terms of Average End more than 10 numbers of nodes, DSR protocol with chain To End delay. It is observed that up to 10 numbers of nodes, topology has less Total Dropped packets than AODV & DSDV AODV protocol have better performance but above 10 protocols. numbers of nodes DSR have better performance as compared to AODV & DSDV protocol while transmitting data packets from source to destination. 29
  • 5. IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network” CCSN, 2011 show better performance than the other in terms of certain performance metrics. It is still difficult to determine which of them has overall better performance in MANET for Chain topology. 8. REFERENCES [1] Mr.Rafi U Zamam “An Efficient DSDV Routing Protocol for Wireless Mobile Ad Hoc Networks and its Performance Comparison http://www.computer.org/ portal/web/csdl/doi/10.1109/EMS.2008.11” [2] Vahid Garousi, Simulating Network traffic in Multi-hop Wireless Ad Hoc Networks based on DSDV (Destination Sequenced Distance Vector) protocol using NS (Network Simulator) Package, University of Waterloo, Fall 2001. [3] C.E. Perkins & P. Bhagwat, “Highly Dynamic Destination Figure 7..Average End to End delay Vs. numbers of nodes. Sequence-Vector Routing (DSDV) for Mobile Computers”, Computer Communication Review, 24(4), 1994, 234-244. 6. SELECTING THE BEST MANET [4] Das,S.R., Perkins,C.E., and Royer,E.M. (2000). ROUTING PROTOCOL Performance Comparison of Two On Demand Routing Simulation analysis as shown in above figures produces Table Protocols for Ad Hoc Networks. IEEE INFOCOM 2000. 2 wherefrom the best performing protocol with respect to a Nineteenth Annual Joint Conference of the IEEE specific network parameters for chain topology can be selected Computer and Communications Societies, pp.3-12. to optimize MANET performance. [5] Chao,C-M., Sheu,J-P.,and Hu,C-T. (2003). Energy- Conserving Grid Routing Protocol in Mobile Ad Hoc Networks. IEEE Proceedings of the 2003 International TABLE 2 Best performing protocol Conference on Parallel Processing (ICPP’03). Parameters Best Protocol [6] Park,S.M., Ko,Y.B., and Kim,J.H. (2003). Disconnected Operation Service in Mobile Grid Computing. Graduate School of Information and Communication, Ajou Generated Packets DSR University, South Korea. DSR up to 10 [7] Perkins,C.E., Royer,E.M., Das,S.R., and Marina,M.K. Received Packets Vs. No. of nodes nodes,AODV for (2001). Performance Comparison of Two On-Demand more than 10 nodes Routing Protocols for Ad Hoc Networks. IEEE Personal Communications, 16-28. Total Dropped Packets Vs. No. of nodes DSR [8] Perkins,C.E., and Bhagwat.P. (1994). Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) Packet Delivery Ratio Vs. No. of nodes AODV for Mobile Computers. ACM, pp.234 – 244. AODV upto 10 [9] Phan,T., Huang,L. and Dulan,C. (2002) Challenge: Average End To End Delay Vs. No. of nodes nodes, DSR for Integrating Mobile Wireless Devices Into the more than 10 nodes. Computational Grid. ACM , pp. 271-278. [10] Irving,M., Taylor.G., and Hobson.P. (2004). Plug in to 7. CONCLUSION Grid Computing. IEEE Power & Energy Magazine, March/April, pp.40-44. This study was conducted to evaluate the performance three MANET protocols i.e. DSR, AODV and DSDV based on CBR [11] Kaneda,K., Taura,K., and Yonezawa,A., (2004). Routing traffic. These routing protocols were compared in terms of and Resource Discovery in Phoenix Grid-Enabled Packet delivery ratio, Average routing overhead and Average Message Passing Library. IEEE International Symposium end-to-end delay when subjected to varying no. of nodes. on Cluster Computing and the Grid, pp. 670-671. Though the numbers of authors as mentioned in the literature [12] Rajsbaum,S. (2002). Distributed Computing Research survey have worked on these three standard protocols of Issues In Grid Computing. ACM SIGACT News Distibuted MANET, in the worked presented here, the authors has used Computing Column 8, pp.50-67. higher area, more speed, larger duration for simulation & higher range for chain topology & successfully shown that the [13] Roy,N., Das.S.K., Basu.K., and Kumar.M. (2005). results of DSR protocol is superior for parameters such as Enhancing Availability of Grid Computational Services to Generated packets, Received Packets up to 10 nodes, total Ubiquitous Computing Applications. Proceedings of the dropped Packets & Average End To End Delay for more than 19th IEEE International Parallel and Distributed 10 nodes as compare to DSDV or AODV & for Packet Processing Symposium (IPDPS’05), pp.1-10. Delivery Ratio, AODV protocol have better performance for the given simulation environment, the results of which are [14] Staub.T., (2004). Ad-hoc and Hybrid Networks: reflected in Table no.2.So authors conclude that the Performance Comparison of MANET Routing Protocols competitive reactive routing protocols, AODV and DSR, both in Ad-hoc and Hybrid Networks. Institute of Computer 30
  • 6. IJCA Special Issue on “2nd National Conference- Computing, Communication and Sensor Network” CCSN, 2011 Science and Applied Mathematics, University of Berne, [23] Abdul Hadi Abd Rahman and Zuriati Ahmad Zukarnain, Switzerland, pp.1-38. “Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc networks”, European [15] The NS2 Manual, 2005. Journal of Scientific Research ISSN 1450- 216X Vol.31 [16] Josh Broch , David A. Maltz , David B. Johnson , Yih- No.4 (2009).pp.566-576. Chun Hu ,Jorjeta Jetcheva, A performance [24] N Vetrivelan, Dr. A V Reddy, “ Performance Analysis of comparison of multi-hop wireless ad hoc network routing Three Routing Protocols for Varying MANET Size”, protocols, Proceedings of the 4th annual ACM/IEEE Proceeding of the International MultiConference of international conference on Mobile computing and Engineers and Computer Scientists 2008 Vol II, IMECS networking, p.85-97, October 25-30, 1998, Dallas, Texas, 2008,19-21 March, 2008, Hong Kong. United States [25] S.Gowrishankar, T.G. Basavaraju, M.Singh, Subir [17] Md. Anisur Rahman, Md. Shohidul Islam, Alex Talevski Kumar Sarkar, “Scenario based Performance Analysis of “Performance Measurement of Various Routing Protocols AODV and OLSR in Mobile Ad Hoc Networks”, in Ad-hoc Network” Vol I, IMECS 2009 International Proceedings of the 24th South East Asia Regional Multi Conference of Engineers and Computer Scientists, Computer Conference, November 18-19, 2007, March 18 - 20, 2009, Hong Kong. Bangkok,Thailand. [18] B. Cameron Lesiuk,” Routing in Ad Hoc Networks of [26] Arun Kumar B. R., Lokanatha C. Reddy, Prakash. S. Mobile Hosts”, Department of Mechanical Engineering Hiremath, “Performance Comparison of Wireless Mobile University of Victoria, Victoria, BC, Canada, December Ad-Hoc Network Routing Protocols” IJCSNS 2, 1998 International Journal of Computer Science and Network [19] Nor Surayati Mohamad ,Usop, Azizol Abdullah, Ahmad Security VOL.8 No.6,June 2008. Faisal Amri Abidin “Performance Evaluation of AODV, [27] S.P. Setty et. al., “Performance evolution of AODV in DSDV & DSR Routing Protocol in grid Environment” different envirment”, International Journal of Engineering IJCSNS International Journal of Computer Science and Science and Technology Vol. 2(7), 2010, 2976-2981 Network Security, VOL.9 No.7, July 2009. [28] K U Khan, R U Zaman, A. Venugopal Reddy, [20] Uzzal K. Acharjee, Anis Ahmed, Shahida Rafique, “Performance Comparison of On-Demand and Table “Experiential Analysis of Ad-hoc Routing Protocols Driven Ad Hoc Routing Protocols using NCTUns ”, Tenth Using Network Simulator” © 2007 Journal of Computer International Conference on Computer Modeling and Science Vol -1, No - 2, December 2007, pp 01-06 Faculty Simulation, 2008. of Computer Science ISSN 1994-6244 [29] D. O. Jorg, “Performance Comparison of MANET [21] A.E. Mahmoud, R. Khalaf & A, Kayssi, Performance of Routing Protocols In Different Network Sizes”, Computer the AODV and DSDV Routing Protocols in Mobile Ad- Networks & Distributed Systems, 2003. Hoc Networks, Lebanon, 2007. [30] J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. [22] E. M. Royer, and C.K. Toh, “A Review of Current Jetcheva”, A Performance Comparison of Multi-Hop Routing Protocols for Ad Hoc Mobile Wireless Wireless Network Routing Protocols,” Proceedings of the Networks”, IEEE Personal Communications, Vol. 6, Issue Fourth Annual ACM/IEEE International Conference on 2, pp. 46-55, April 1999. Mobile Computing and Networking (MobiCom’98), October 25-30, 1998,Dallas,Texas,USA,pp.25-3 31