ABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session

Size: px
Start display at page:

Download "ABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session"

Transcription

1 ii ABSTRACT An opportunistic network application is a scenario in which mobile node users socialize with nearby users of common interest, but there exists no pre-established session by which users register or de-register their presence. As nodes are dynamically joining and leaving the network, a node discovers any newly joined nodes or knows when to release conversations from nodes who have left the network. This project aims to build a complete topology of end-to-end paths and periodically refresh it, to thereby erase all the connectivity and node position history, to adapt to the dynamic changing nature of opportunistic networks, and is called as Topology Refresh Protocol (TRP) [1]. TRP integrates the solution to the questions with data forwarding. It is lightweight and efficient that requires no path break detection and repair as required by on-demand routing, no complex route calculations as in probabilistic routing, and no duplication of messages as used in the class of epidemic routing. The TRP performance in terms of overhead, delay, and acceptance rate is calculated by computer simulation and it is found out that the acceptance rate is higher in TRP than in DSR.

2 iii TABLE OF CONTENTS TABLE OF CONTENTS... III LIST OF FIGURES... V LIST OF TABLES... VI 1. BACKGROUND AND RATIONALE Previous Work Present Work and Importance Introduction to NS2 Simulator NAM (Network Animator) NARRATIVE Objective SYSTEM DESIGN IMPLEMENTATION Implementation of DSR Protocol Network Configuration Creating Trace Files Configuring Mobile Nodes Node Placement in Network Calculating Distance Between Nodes Figurative Explanation for DSR Implementation of TRP protocol Network Configuration Evaluation of Mobile Nodes Energy... 25

3 iv Packet Delivery Ratio Throughput Figurative explanation for TRP TESTING AND EVALUATION Test case Test case Test case Test case Evaluation CONCLUSION AND FUTURE WORK Conclusion Future Work BIBLIOGRAPHY AND REFERENCES APPENDIX... 38

4 v LIST OF FIGURES Figure 1. Opportunistic Networking... 2 Figure 2. Implementation of NS Figure 3 Message Format Figure 4. System Design Figure 5. A screenshot depicting initial position of nodes Figure 6. A screenshot depicting data transfer between nodes Figure 7. A screenshot depicting source node dropping packets Figure 8. A screenshot depicting malicious nodes Figure 9. A Screenshot depicting throughput for TRP Figure 10. A screenshot depicting throughput for TRP Figure 11. A Screenshot depicting data transfer in TRP Figure 12 A screenshot depicting malicious nodes in TRP Figure 13. A screenshot depicting packet drops in TRP Figure 14. A screenshot depicting packet delivery in test case Figure 15. A screenshot depicting packet delivery in test case Figure 16. A screenshot depicting packet delivery in test case Figure 17. A screenshot depicting packet delivery ration in test case Figure 18. A screenshot depicting packet delivery in test case Figure 19. A screenshot depicting packet information in test case Figure 20. A screenshot depicting packet delivery in test case Figure 21. A screenshot depicting average throughput in test case

5 vi LIST OF TABLES Table 1 Network Configuration Table 2 Trace File Creation Table 3 Mobile Nodes Configuration Table 4 Mobile Nodes Creation Table 5 Initial Node Position Table 6 Node Movement Creation Table 7 Calculating Distance Between Nodes Table 8 C++ code for Shortest Path Table 9 Communication Establishment Table 10 Network Configuration for Proposed System... 24

6 1 1. BACKGROUND AND RATIONALE Opportunistic networks are multi-hop wireless networks that have no fixed infrastructure support and no stable topology due to the movement of the mobile nodes [1]. In addition to sourcing and sinking data, nodes are co-operating to forward data in the network. Opportunistic networks operate in environment where Internet like facility is either unavailable or infeasible, or where localized networks are less expensive to use than fixed infrastructure networks. Opportunistic networks have many applications. There are scenarios in which fixed Infrastructure such as Internet is unavailable but local communication is desirable, opportunistic network is the solution. Consider the opportunistic advice situation where a rescue worker needs some advice from an expert in the disaster recovery area where the Internet access equipment has been damaged. Application of opportunistic network is exciting and limited only by one s imagination, supporting sessions that are scheduled, unscheduled, or spontaneous. There are scenarios in which localized communications using an opportunistic network is simply cheaper than using the Internet. Consider the application example in which a reporter at an accident scene would choose to send the video shot of the scene back to the television station over the opportunistic network to a faraway Internet access point because sending the video over the satellite link of the device she is carrying is way too expensive. Consider the example [2] shown in Figure 1, the woman at the desktop opportunistically transfers, via a Wi-Fi link, a message for a friend to a bus crossing the area, hoping that the bus will carry the information closer to the destination. The bus

7 2 moves through the traffic, then uses its Bluetooth radio to forward the message to the mobile phone of a girl that is getting off at one of the bus stops. The girl walks through a near park to reach the university. Her cellular phone sends the message to a cyclist passing by. By proceeding in the same way some hops further, the message eventually arrives at the receiver. As it is clearly shown in this example, a network connection between the two women never exists but, by opportunistically exploiting contacts among heterogeneous devices, the message is delivered hop-by-hop (hopefully) closer to the destination, and eventually to the destination itself. Figure 1. Opportunistic Networking One of the major challenges in deploying opportunistic networks is data forwarding [3]. The traditional distance vector and link state routing protocols developed for the Internet assume a very stable physical topology and react well to a slow changing topology. However, they are not suitable for opportunistic networks because of the lack of fixed infrastructure upon which stable routes can be built and maintained, and route repairs are unable to keep pace with the fast changing nature of the topology. As a result, a large body of data forwarding protocols were proposed designed to overcome the challenges posed by opportunistic networks. The major contribution of this project is to propose a high performance lightweight adaptive data forwarding protocol for opportunistic network that accounts for nodes entering and leaving the network dynamically.

8 3 1.1 Previous Work Much research has been done with the help of Network Simulators. This section gives a detailed report of local graduate projects that have been implemented with the help of NS-2 simulator in the past few years. NS (from network simulator) is a name for series of discrete event network simulators, specifically ns-1, ns-2 and ns-3 [4]. All of them are discrete-event computer network simulators, primarily used in research and teaching. Implementation of simulation to enhance wireless ad-hoc networks performance using the medium access control (MAC) protocol [5]. This project aimed at implementing MAC protocol to enhance the simulation in WANETs. It makes use of network coding and cooperative transmission to improve the network performance. The source and destination nodes are dynamically selected and the data transfer is implemented with the help of choosing a relay node in NS2. While the implementation of this project has some similarities with the present work, the output and the approach is completely different in terms of data transfer. Simulation of Attacks in a Wireless Sensor Network using NS2 [6]. This project aimed at simulating several kinds of attacks such as Sybil, Denial of Service attack, Sinkhole attack, Hello flood attack. Nodes are created, configured and chosen dynamically. Malicious nodes were picked to create the attacks. There isn t much discussion about the data transfer in this project. Detection of misbehavior in delay tolerant networks [7] is also a similar project to [6], which makes use of the NS2 simulator and also has similar attacks simulated for their own purposes.

9 4 Implementation of prototype network early warning alarm system applying defense in depth approach [8]. This project aimed at notifying users with an early warning alarm in case of an attack and stop the attack. This project makes use of the CBR application and TCP protocol in NS2 simulator. The present project also makes use of the tcp protocol while implementing the AODV protocol. 1.2 Present Work and Importance Network Simulator is a discrete event simulator targeted at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless networks. Ns had a wide range of applications. While all these projects use NS2 simulator for various purposes like simulating and prevention of an attack, sending data over nodes, introducing malicious nodes, etc; The present work makes use of NS2 to implement AODV and a TRP protocol [1] in similar ways to the previously mentioned projects. However TRP is entirely a new concept introduced for opportunistic networks where the nodes are joining and leaving the network dynamically. Implementing TRP is the main motive of this project. AODV protocol is being implemented only to compare the results and to prove that TRP s performance is better than that of AODV. TRP makes use of a header for each message and a forwarding table for each mobile node making it unique for a faster data transfer in opportunistic networks. TRP is different from all these other mentioned projects mainly coz of the usage of header and the forwarding table which are periodically updated. And also none of these projects implemented an opportunistic network where the nodes are mobile.

10 5 1.3 Introduction to NS2 Simulator NS2 stands for Network Simulator version 2. Ns-2 is a discrete event simulator for networking research as already mentioned. Ns-2 works at a packet level. It provides substantial support to simulate bunch of protocols like TCP, UDP, FTP, HTTP and DSR. It is capable of simulating wired and also wireless networks. It is primarily Unix based. TCL is the scripting language used for ns-2. It is basically a standard experiment environment in the community of networking. It has many advantages that make it a useful tool, such as support for multiple protocols and the capability of graphically detailing network traffic with the help of NAM (Network Animator). Figure 2 shows the implementation of ns-2. Figure 2. Implementation of NS-2 Tcl helps in simulation of slightly varying parameters or configurations. Tcl helps in quickly exploring a number of scenarios in ns-2 which allows in faster development. It

11 6 is pretty easy to use and is available for free. 1.4 NAM (Network Animator) Nam is a TCL/TK based animation tool for viewing network simulation traces and real world packet traces. Network visualization tools allow designers to take in large amounts of information quickly, visually identify patterns in communications, and better understand causality and interaction. Nam is a network animator that provides packet- level animation, protocol graphs, traditional time-event plots of protocol actions, and scenario editing capabilities. Nam benefits from a close relationship with ns, which can collect detailed protocol information from a simulation.

12 7 2. NARRATIVE The Ad hoc On-demand Distance Vector (AODV) [1] protocol sets up a route between two nodes on a needed basis. AODV broadcasts route request messages and each node receiving the requests caches a route back to the originator of the request. The Dynamic Source Routing (DSR) proposed is also an on-demand protocol. In DSR, a source node broadcasts a route request packet, containing its own address and target node address as the initial route record, to its neighbors. The neighbors, in turn append their own address to the route record and broadcast the packet to their neighbors. Upon receiving the route request packet, the target node returns a route reply packet to the source node. Both AODV and DSR flood the network with route discovery packets, detect any link breaks, notify link breaks to the source node, and require the source node to establish a new route to the destination node. If route discovery is not successful, both protocols must keep trying until a new route is confirmed. The drawback of on-demand routing is energy and bandwidth consumption in handling the frequent link breaks. Instead of finding end-to-end paths, a generic solution is to replicate copies of the same message to many nodes and the message delivery is successful when a node carrying a Copy makes contact with the target node. The first such protocol is the Epidemic Routing Protocol (ERP) [3] which requires source nodes to flood the network with copies of a message so that the destination node will eventually receive a copy. To overcome the large bandwidth and energy overhead associated with flooding, the spray and wait protocol spreads copies of a packet to a limited number of nodes in multiple periods, the spray and route sprays a few copies into the network and routes them Independently. The PROPHET protocol is one of the earliest schemes based on probabilistic routing. It requires each node to estimate the probabilities of reaching Destinations based on the frequency of encounters

13 8 with transitivity and exchange these information with neighbors. A packet is forwarded to a node if the node has a larger such probability and hence multiple copies of the same message are made. The drawbacks of these protocols are the large energy consumption, reduced bandwidth, and increased node Memory to buffer copies of messages. Recent protocols require no end-to-end paths and no message replication. For examples, the d-adaptor [1] and POR. d-adaptor computes and updates a score in each node based on transmission cost and successful packet delivery reward. The scores are used by nodes to determine probabilistically the next hop forwarder or drop the packet. In POR, nodes must know their own locations as well as the locations of their neighbors. A sender prioritizes its neighbors as next hop forwarders according to their distances to destination. A significant drawback of all of these solutions [1] is that nodes are assumed to know the identity of their recipient nodes and that the recipient nodes are alive in the network. A static list of recipients is not suffice whether the list is preregistered or obtained from some service when nodes join the network. This is because membership can be very dynamic as nodes leaving and returning to the wireless coverage of the network, new nodes joining and leaving the network from time to time, or nodes simply being turned on and off. On-demand routing protocols can tell if recipient nodes have left the network indicated by route repair failures. Protocols, other than on-demand, send packets into the network, not knowing if the target nodes have left the network or failed, or the network is partitioned separating them from their target nodes. 2.1 Objective The main objective of this project is to build a high performance (relative to other

14 9 well-known routing protocols) lightweight adaptive data forwarding protocol for opportunistic network that accounts for nodes entering and leaving the network dynamically. Other routing protocols as in AODV and ERP protocols. TRP should open up a whole new set of applications such as unscheduled or unorganized social gathering over an opportunistic network and applications discussed in the introduction section. The low message delay performance also makes the TRP suitable for non-stringent real-time applications.

15 10 3. SYSTEM DESIGN In the Proposed framework every message contains a header utilized for route setup and message forwarding. The message field distinguishes the neighbor node to which the message ought to be sent. Neighbor nodes of a node are inside of the node's transmission range. On the off chance that message is all ones, the message is telecast to all the neighbor nodes. They recognize the immediate node from which the message is sent. The node distinguishes whether this message is data or an acknowledgement. The messages have priority over the other types for processing. Acknowledgement has priority over data for both processing and transmission. The performance metric is used to select the best path out of the multiple available paths. The resulting end-to-end path is the max-min remaining energy path. It is, however, permissible to use different metrics such as delay and throughput, or a combination of metrics. Then the hop count keeps track of the number of nodes the message has traversed so far. Then the sequence number of the message generated at sender node is followed and the remaining time is noted after which the message is erased. It is because the message is unable to be forwarded or severely delayed. That is all data messages are assumed to be unicast. Neighbors of a node will receive the same message originated from the node. Neighbors will reject any received messages if the messages do not match their own node id values. Each mobile node maintains a table, called the Forwarding Table. The destination node id is extracted from the header of message. The sender node is next hop neighbor node that a data message should be forwarded, which is extracted from the header of the message. Then the sequence of message that are sent from one node to another is noted and the time taken to send the message are noted and entered into the Forwarding table. Figure 3. Shows the message format in a tabular view.

16 11 Figure 3 Message Format Figure 4 gives a detail of the system design for the proposed system. An opportunistic network will be created in the simulator. Figure 4. System Design A source node is chosen for the data transfer. Destination node is randomly selected based on the tcl script coded for the project. Data is transferred by using the default UDP protocol from ns-2. The path through which the data traverses is determined by one of the output files named base.tr. The path is chosen based on the distance from the nearest node.

17 12 TRP deals with two kinds of messages as already mentioned namely data, acknowledgement. Any malicious nodes will be identified and the data is rerouted if any malicious nodes are found. Finally the data is transferred to the destination node.

18 13 4. IMPLEMENTATION In this project, two different protocols have been implemented to show the difference between the results of the proposed system from existing system. The two protocols are DSR (Dynamic Source Routing) and TRP (Topology Refresh Protocol) namely. 4.1 Implementation of DSR Protocol In this section, a brief of the modules developed in the TCL script to implement the DSR protocol, Execution flow of the DSR protocol is presented. Node attack definition is presented at the end of the report in the appendix section Network Configuration Table 1 shows the code snippet used to configure the network in DSR protocol. set is the keyword to assign functionalities or value to the objects. val() is the datatype to add values to the object. val(chan) is the variable which sets the functionality of the network as Wireless Channel (predefined property). LL is the pre-defined linked layer property to establish communication in the network layer. 20 is assigned to the object val(nn), for setting the number of mobile nodes to 20. DSR is a predefined protocol in NS2 and it is assigned to object val(rp). This sets the routing protocol as DSR in the resulting network. A wireless network with 20 nodes is created in the Network Animator. Table 1 Network Configuration #Creating variables set val(chan) Channel/WirelessChannel ;#Channel Type set val(prop) Propagation/TwoRayGround ;# radio-propagation model

19 14 set val(netif) Phy/WirelessPhy ;# network interface type set val(mac) Mac/802_11 ;# MAC type set val(ifq) CMUPriQueue ;# interface queue type set val(ll) LL ;# link layer type set val(ant) Antenna/OmniAntenna ;# antenna model set val(ifqlen) 500 ;# max packet in ifq set val(nn) 20 ;# number of mobilenodes set val(rp) DSR ;# routing protocol Creating Trace Files A base trace file along with three other trace files namely out0.tr, out1.tr, out2.tr and a NAM trace file are created with each trace file tracking different kinds of information on the network behavior and a base trace file is created to keep track of all the information about the simulation. Table 2 shows the code snippet for creating trace files. open is the keyword to make a file, dsr.tr is the file name and w denotes the write operation. $tracefd is the variable name, it is assigned to trace-all predefined property. trace-all takes the entire information and activity of the network. namtrace-all-wireless is the predefined keyword which creates the dsr.nam file to display the network simulation process. This results in creating 4 trace files namely out0.tr, out1.tr, out2.tr & dsr.nam. #CREATE TRACE FILE Table 2 Trace File Creation set tracefd [open dsr.tr w] $ns trace-all $tracefd

20 15 set f0 [open out0.tr w] set f1 [open out1.tr w] set f2 [open out2.tr w] #CREATE NAM TRACE FILE set natr [open dsr.nam w] $ns namtrace-all-wireless $natr $val(x) $val(y) Configuring Mobile Nodes Nodes are initially set with the configuration as shown below. Table 3 shows the code snippet used to configure mobile nodes in the network. These node configuration values are already defined in section node-config is the keyword to assign the properties for the nodes. This configures the network with the required configuration. Router trace (RTR), Agent trace (ATR) and Movement trace are set to be ON and Mac trace is set to be OFF since it is not required and increases the load on the network. #CONFIGURE NODE Table 3 Mobile Nodes Configuration $ns node-config -adhocrouting $val(rp) \ -lltype $val(ll) \ -mactype $val(mac) \ -ifqtype $val(ifq) \ -ifqlen $val(ifqlen) \ -anttype $val(ant) \ -proptype $val(prop) \

21 16 -phytype $val(netif) \ -channeltype $val(chan) \ -topoinstance $topo \ -agenttrace ON \ -routertrace ON \ -mactrace OFF \ -movementtrace ON Creation of Mobile nodes The Mobile nodes are created and configured inside the network with the help of NS-2 network simulator. Table 4 shows the code snippet for creating nodes. node() is the array variable for creating nodes. lappend is the keyword to list the elements onto a variable. A network of 20 nodes will be simulated. Table 4 Mobile Nodes Creation #CREATE NODES set nodelist {} for {set i 0} {[expr $i < $val(nn)]} {incr i} { set node($i) [$ns node] # $node($i) label "$i" if {$i!=30} { lappend nodelist $i } } By providing the nodes with initial location details and destination location details,

22 17 one can create mobile nodes. The start-position and future destinations for a mobile node can be set by using the following APIs. Initial position of nodes in the network simulator is set with code snippet from the below table 5. $node set X_ \<x1\> Table 5 Initial Node Position $node set Y_ \<y1\> $node set Z_ \<z1\> Node movement is created with the code line shown in the table 6. Table 6 Node Movement Creation $ns at $time $node setdest \<x2\> \<y2\> \<speed\> The above syntax shows that the particular node starts to move to particular destination of x2, y2 at the $time, which is declared in the script Node Placement in Network Node position at the beginning of the simulation is shown below for few nodes in table 7. Node positions cannot be determined after this point since nodes are moving continuously. Nodes are placed randomly for each simulation and move in random directions. The initial positions can be determined from the trace file base.tr. Table 7 Node Positions Node 0 is placed in and Node 1 is placed in and

23 18 Node 2 is placed in and Node 3 is placed in and Node 4 is placed in and Calculating Distance Between Nodes Each mobile node in the network is placed in different location. The mobile nodes have some random distance between each other and those distances are calculated by applying the node(x, y) coordinates in Pythagoras theorem. The distance calculation between each mobiles nodes helps to develop proposed routing protocol. Figure 4 shows a screen of the displaced mobile nodes to help with calculating distance between mobile nodes. Figure 4. Screen shot of the displaced mobile nodes Table 8 contains the code snippet for calculating distance between nodes. puts is the keyword to print in the terminal. expr is the keyword to do mathematical expression or calculations. pow is the keyword to make the power operation on the two variables.

24 19 Table 8 Calculating Distance Between Nodes for {set j 0} {$j < $val(nn) } { incr j } { set dx [expr $xx($i) - $xx($j)] set dy [expr $yy($i) - $yy($j)] set dx2 [expr $dx * $dx] set dy2 [expr $dy * $dy] set h2 [expr $dx2 + $dy2] set h($i-$j) [expr pow($h2, 0.5)] puts "Distance of node($i) from node($j) = $h($i-$j)" puts $r "Distance of node($i) from node($j) h($i-$j) = $h($i-$j)" } Figurative Explanation for DSR Figure 5. A screenshot depicting initial position of nodes

25 20 Figure 5 shows the initial position of nodes after clicking the play button in the NAM visualizer. As it is seen nodes are randomly positioned in the network. Source node is predefined to be 14 in the TCL code. An important thing to note down here is that nodes start in different positions for each time the network is simulated. Once the nodes are randomly positioned in the network, node 0 sends a packet to its neighbor nodes about its position. Neighbor nodes of a node are the nodes that are in the transmission range of the node as already mentioned. These neighbor nodes in turn send packets to their neighbor nodes about the position of node 0 until the position of node 0 is informed to the source node. Figure 6 shows packets transferring from the source node 14 to node 0. Figure 6. A screenshot depicting data transfer between nodes Data transfer takes place sequentially beginning from node 0 to node 19. In this particular case, the route chosen for the source node to transfer packets to node 0 is In this case, shortest path is clear. But, in general shortest path is calculated based on

26 21 the C++ code that comes in the DSR folder of the NS-2 package which is shown in table 9. Table 9 C++ code for Shortest Path struct hdr_sr hsr; if (net_id == ID(1,::IP)) { printf("adding route to 1\n"); hsr.init(); hsr.append_addr( 1, NS_AF_INET ); hsr.append_addr( 2, NS_AF_INET ); hsr.append_addr( 3, NS_AF_INET ); hsr.append_addr( 4, NS_AF_INET ); route_cache->addroute(path(hsr.addrs(), hsr.num_addrs()), 0.0, ID(1,::IP)); } if (net_id == ID(3,::IP)) { printf("adding route to 3\n"); hsr.init(); hsr.append_addr( 3, NS_AF_INET ); hsr.append_addr( 2, NS_AF_INET ); hsr.append_addr( 1, NS_AF_INET ); route_cache->addroute(path(hsr.addrs(), hsr.num_addrs()), 0.0, ID(3,::IP)); } One more important thing in NAM visualization is that, it only shows high chunks of data. NAM visualization ignores small traces of data in the visualization. So the path through which data is traversed cannot be obtained from the visualization. It can only be obtained with the help of the trace file which is created after the simulation.

27 22 In DSR protocol, Communication between nodes is established by using TCP (Transmission Control Protocol). Data is transferred by using the UDP (User Datagram Protocol). UDP agent accepts data in variable size chunks from the application which is defined in the simulation and segments the data as per the requirements of the simulation part. UDP packets also contain a monotonically increasing sequence number and an RTP timestamp. Although real UDP packets do not contain sequence numbers or timestamps, this sequence number does not incur any simulated overhead, and can be useful for trace file analysis or for simulating UDP-based applications. The default maximum segment size (MSS) for UDP agents is 1000 byte: Agent/UDP set packetsize_ 1000 # max segment size; The sample code to establish communication between nodes in the network using TCP is given below in table 10. new Agent/TFRC is the property to add source node. new Agent/TFRCSink is the property to add destination node. attach-agent is the property to attach source or sink properties to the nodes. $tfrc start where the start denotes to initiate the operation at a particular time. Table 10 Communication Establishment set tfrc [new Agent/TFRC] set tfrcsink [new Agent/TFRCSink] $tfrc set class_ 2 $tfrcsink set class_ 2 $ns attach-agent $n() $tfrc $ns attach-agent $n() $tfrcsink $ns connect $tfrc $tfrcsink

28 23 $ns at 0.2 "$tfrc start" Number of packets sent by the source node, no. of packets received by the destination node, no. of packets dropped by the source node/intermediate nodes, Hop count of the message and the route through which message is traversed. All this information is stored in to the base trace file that is created in the trace file creation module. When the source node is overloaded with too much traffic and reaches it s Maximum capacity of packets, it starts dropping packets to accommodate acknowledgments coming from other nodes. Figure 7 shows the same. Figure 7. A screenshot depicting source node dropping packets Figure 8 shows the malicious nodes in the network simulated for DSR. Nodes that are encircled in red circles are the malicious nodes. These colors can be set with the help of NS2 simulator. As one can see, number of malicious nodes while implementing DSR is high. This is one of the limitations of DSR.

29 24 Figure 8. A screenshot depicting malicious nodes 4.2 Implementation of TRP protocol A brief of all the important modules developed for the proposed system (TRP) is presented in this section. Node attack definition is presented at the end of the report in the appendix section Network Configuration The network is initially set with the configuration as shown below. #Creating variables Table 11 Network Configuration for Proposed System set val(chan) Channel/WirelessChannel ;#Channel Type set val(prop) Propagation/TwoRayGround ;# radio-propagation model set val(netif) Phy/WirelessPhy ;# network interface type

30 25 set val(mac) Mac/802_11 ;# MAC type set val(ifq) Queue/DropTail/PriQueue ;# interface queue type set val(ll) LL ;# link layer type set val(ant) Antenna/OmniAntenna ;# antenna model set val(ifqlen) 1000 ;# max packet in ifq set val(nn) 20 ;# number of mobilenodes set val(rp) AODV ;# routing protocol The modules for creation of trace files, Configuring mobile nodes, Creation of mobile nodes, Calculating distance between nodes are almost same as used in the DSR protocol. Therefore there is no need to repeat them in this section. Node attack definition module is presented in the appendix section of the report Evaluation of Mobile Nodes Energy Every mobile node in the network requires certain amount of energy for transmitting or receiving packets. The mobile nodes lose some particular amount of energy for each packet transmission around the network, they require energy to stay active in the network for long time. The nodes with highest energies are taken for packet transmission, this helps mobiles nodes from keeping the network in the active state. The below information shows the remaining energy in the mobile nodes after the end of packet transmission using proposed routing protocol. Table 12 Remaining Energies Remaining energy of the node 0 is Remaining energy of the node 1 is

31 26 Remaining energy of the node 2 is Remaining energy of the node 3 is Remaining energy of the node 4 is Packet Delivery Ratio Figure 9 shows the packet delivery ratio when PacketDeliveryRatio.awk is executed. The ratio of the number of delivered data packets to the sent data packets is packet delivery ratio. The packet transmission is established between mobile nodes using CBR and UDP traffic. Figure 9. A Screenshot depicting throughput for TRP Throughput Figure 10 shows the screenshot for throughput when throughput.awk file is executed. Throughput is defined as the ratio of the acceptance rate to the input rate. Figure 10. A screenshot depicting throughput for TRP

32 Figurative explanation for TRP In TRP protocol execution, after the play button is pressed in the NAM visualization predefined source node 15 starts transmitting packets to the nodes in the sequence 1 to 19. Since the data transmission is set to be sequential, initially node 0 starts sending requests to its neighbor nodes and these neighbor nodes in turn start sending these requests to their neighbors until the request reaches the source node 15. Once the source node 15 receives request from 0, Source node establishes a communication with the first destination node 0. After a communication link is established between nodes 15 and 0, node 15 starts sending packets to node 0 via node 1. Figure 11 shows the source node transmitting packets to node 0 via node 1. Figure 11. A Screenshot depicting data transfer in TRP Figure 12 shows a screenshot of malicious nodes in the TRP protocol. Some of the nodes in the network turn malicious after a certain time. Node 5 and node 11 turned malicious in this case as it can be seen from figure 12. Whenever there is a malicious node in the path through which data is traversing, the network gets refreshed.

33 28 Figure 12 A screenshot depicting malicious nodes in TRP Once the network is refreshed, all the data transmissions are stopped and all the nodes are set back with their initial configurations. When the data transmissions resume again, malicious nodes are avoided and a new route is established between the source node and destination node. If no route is found, Network waits until a new route is found. No routes can be found there is no node with in the transmission range of the source node. Network waits until some node comes in the transmission range of the source node. Packet drops happen for the same reason as in DSR. Packet drops happen when a node is overloaded with packets. Figure 13 shows the same happening with node 9. The number of packet drops is observed to be minimum in case of TRP. This is one of the goals in implementing TRP. There is a chance of source node becoming malicious node in case of DSR. That is avoided in TRP, which means source node cannot turn malicious in case of TRP.

34 29 Figure 13. A screenshot depicting packet drops in TRP Once packets are received to all the destination nodes from 0 to 19, all the nodes reply back an acknowledgement to the source node in a random order.

35 30 5. TESTING AND EVALUATION 5.1 Test case 1 This test case is for DSR protocol without any malicious nodes in the network. Red graph indicates total no. of packets dropped which are traced by the trace file out0.tr. Blue graph indicates the total no. of packets sent from the source node which are traced by the trace file out2.tr. Green graph indicates total no. of packets received by the destination nodes which are tracked by out1.tr. Figure 14 shows the result of the combined graphs. Figure 14. A screenshot depicting packet delivery in test case 1 Figure 15 shows the packet delivery ratio in this test case. Comparison between Packet Delivery Ratio in these test cases would lead to the result that TRP protocol is a better protocol when compared to DSR. This test case is implemented by removing the malicious nodes function in the network resulting in a safe network with 20 mobile nodes. Packet Delivery ratio =

36 Test case 2 Figure 15. A screenshot depicting packet delivery in test case 1 This test case is for DSR protocol with malicious nodes in the network. Even in this case, graphs indicate the same as in test case 1. Figure 16 shows the screenshot of packet delivery in this case. This test case is basically implementing DSR protocol as it should be implemented for opportunistic networks. No changes were made while testing this case. Figure 16. A screenshot depicting packet delivery in test case 2

37 32 Figure 17 shows the packet delivery ratio in this test case when PacketDeliveryRatio.awk is executed. Packet Delivery Ratio = r/s = Figure 17. A screenshot depicting packet delivery ration in test case 2 From the results of the above two test cases, it can be said that the inclusion of malicious nodes in the network doesn t make much difference in the packet delivery ratio when DSR protocol is used for routing in opportunistic networks. 5.3 Test case 3 Figure 18 depicts the test case results for TRP protocol without any malicious nodes in the network. Graphs indicate the same in all the test cases. Figure 18. A screenshot depicting packet delivery in test case 3 Test case 3 is tested for TRP protocol by removing malicious nodes in the network.

38 33 That means, implementing the TRP protocol for a normal opportunistic network. Figure 19 shows the no. of sent packets, no. of received packets, no. of received packets and the average end to end delay for this test case. Sent packets = 562 Received packets = 229 Dropped packets (bytes) = Test case 4 Figure 19. A screenshot depicting packet information in test case 3 Figure 20 shows the test case results for TRP protocol with malicious nodes in the network. Figure 20. A screenshot depicting packet delivery in test case 4

39 34 Test case 4 is tested for TRP protocol by keeping malicious nodes in the network. That means implementing TRP protocol as it is implemented in the proposed system. Figure 21 shows the screenshot of average throughput in this test case when throughput.awk file is executed. Average throughput = Figure 21. A screenshot depicting average throughput in test case Evaluation Summary of the test cases Packet Delivery ratio = in test case 1 Packet Delivery ratio = in test case 2 In test case 3 - Sent packets = Received packets = Dropped packets (bytes)= Packet Delivery ratio = in test case 3 Test Case 1 Test Case 2 Test Case 3 Test Case 4 No. of nodes Network Type Wireless Wireless Wireless Wireless Ratio

40 35 From the above results, it is seen that packet delivery ratio is higher in TRP when compared to DSR. Both the implemented protocols TRP and DSR are tested with two cases. Only 20 nodes are used to test these networks, since increasing the number of mobile nodes in the network couldn t be handled by the given network configuration. To maintain authenticity, Network configuration is not altered in any of the test cases.

41 36 6. CONCLUSION AND FUTURE WORK 6.1 Conclusion An opportunistic network with 20 mobile nodes is simulated to implement the project. The temporary and intermittent connectivity s between the nodes is taken as an opportunity to cooperate data forwarding in the simulated opportunistic network. Data transfer is set sequentially from node 0 to node 19 and data is transferred to all the nodes by minimizing the message delay and maximizing the acceptance rate and throughput of the simulation. Malicious nodes are avoided and the network is refreshed and rerouted when malicious nodes enter the network. DSR routing protocol is also implemented to opportunistic networks to compare its results with the results of TRP. From the results of the test cases, it is seen that TRP s performance is better than DSR for opportunistic networks. This project also implemented calculating remaining energies of the nodes. A protocol that is light weight, efficient and that requires no path breaking or repairs is implemented. TRP performance is studied in terms of acceptance rate, delay and throughput by computer simulations and is found out that the acceptance rate is higher in TRP than in DSR. 6.2 Future Work TRP is different from the other protocols in that TRP nodes know when new nodes join the network and when nodes leave the network. But due to the limitations in NS2 simulator, managing incoming and outgoing nodes is not implemented. This could be implemented by using other simulators which allow to kill the nodes. In this method, the mobility of the nodes is minimized. Mobility of the nodes could be increased too. General network traffic can also be introduced to make the evaluation of the network more realistic.

42 37 7. BIBLIOGRAPHY AND REFERENCES [1] P. Lau, "Topology refresh data forwarding protocol for opportunistic networks," in Wireless Telecommunications Symposium (WTS), 2015, New York, [2] L. Pelusi, "Opportunistic Networking: Data Forwarding in disconnected mobile adhoc networks". [3] D. B. Johnson, "Dynamic Source Routing in Ad Hoc Wireless Networks," Pittsburgh, [4] Rivanvx, "Wikipedia," [Online]. Available: [Accessed 15 November 2015]. [5] A. R. Tammineni, "Implementation of simulation to enhance wireless ad-hoc networks performance using the MAC protocol," Texas A&M University, Corpus Christi, [6] A. Sher, "Simulation of attacks in a wireless sensor network using NS-2," Texas A&M University, Corpus Christi, [7] B. Todupunuri, "Detection of misbehavior in delay tolerant networks," Texas A&M University, Corpus Christi, [8] D. Matte, "Implementation of prototype network early warning alarm system applying defense in depth Approach," Texas A&M University, Corpus Christi, 2015.

43 38 8. APPENDIX Code for Implementing Topology Refresh protocol =================== #Creating variables ================= set val(chan) Channel/WirelessChannel ;#Channel Type set val(prop) Propagation/TwoRayGround ;# radio-propagation model set val(netif) Phy/WirelessPhy ;# network interface type set val(mac) Mac/802_11 ;# MAC type set val(ifq) Queue/DropTail/PriQueue ;# interface queue type set val(ll) LL ;# link layer type set val(ant) Antenna/OmniAntenna ;# antenna model set val(ifqlen) 1000 ;# max packet in ifq set val(nn) 20 ;# number of mobilenodes set val(rp) AODV ;# routing protocol set val(x) 600 ;# X topography value set val(y) 600 ;# Y topography value ===================#Create Simulator ====================== set ns [new Simulator] #CREATE TRACE FILE set tracefd [open base.tr w] $ns trace-all $tracefd $ns use-newtrace set f0 [open out0.tr w] set f1 [open out1.tr w] set f2 [open out2.tr w] ===================#Create NAM Trace File ================== set natr [open base.nam w] $ns namtrace-all-wireless $natr $val(x) $val(y) #CREAT A FINISH FUNCTION proc finish {} { global ns natr tracefd windowvstime2 f0 f1 f2 $ns flush-trace close $natr close $tracefd close $f0 close $f1 close $f2 #Call xgraph to display the results exec xgraph out0.tr out1.tr out2.tr -geometry 800x400 & exec nam base.nam exit 0 } ===================#CREATE TOPOLOGY====================== set topo [new Topography]

44 39 $topo load_flatgrid $val(x) $val(y) ===================#Create General Operation Directory ============= set god [create-god $val(nn)] ======================#Configure Node ========================= $ns node-config -adhocrouting $val(rp) \ -lltype $val(ll) \ -mactype $val(mac) \ -ifqtype $val(ifq) \ -ifqlen $val(ifqlen) \ -anttype $val(ant) \ -proptype $val(prop) \ -phytype $val(netif) \ -channeltype $val(chan) \ -topoinstance $topo \ -agenttrace ON \ -routertrace ON \ -mactrace OFF \ -movementtrace ON ======================#Create Nodes ============================ set nodelist {} for {set i 0} {[expr $i < $val(nn)]} {incr i} { set node($i) [$ns node] $node($i) color blue $ns at 0.0 "$node($i) color blue" if {$i!=30} { lappend nodelist $i } } =====================#Set Initial Node Position ==================== for {set i 0} {$i < $val(nn)} {incr i} { $ns initial_node_pos $node($i) 20 } =====================#Place The Nodes ========================== $node(0) set X_ $node(0) set Y_ $node(0) set Z_ 0.0 $node(1) set X_ $node(1) set Y_ $node(1) set Z_ 0.0 $node(2) set X_ $node(2) set Y_ $node(2) set Z_ 0.0 $node(3) set X_ $node(3) set Y_ $node(3) set Z_ 0.0 $node(4) set X_

45 $node(4) set Y_ $node(4) set Z_ 0.0 ========= #Setting random location for the nodes to move in the network======= proc myrand {min max} { set range [expr {$max - $min + 1}] return [expr {$min + int(rand() * $range)}] } proc ymyrand {min max} { set range [expr {$max - $min + 1}] return [expr {$min + int(rand() * $range)}] } ======================#Setting motion for nodes ==================== set xr -1; set yr -1; for {set i 0} {$i < $val(nn)} {incr i} { while {$xr == [set xr [myrand ]]} { } while {$yr == [set yr [ymyrand ]]} { } $ns at 0.0 "$node($i) setdest $xr $yr 30.0" $ns at 8.8 "$node($i) setdest " $ns at 9.0 "$node($i) setdest $xr $yr 30.0" $ns at 0.1 "$node($i) setdest $xr $yr 30.0" $ns at 0.2 "$node($i) setdest $xr $yr 30.0" $ns at 0.5 "$node($i) setdest $xr " $ns at 1.0 "$node($i) setdest $xr $yr 30.0" $ns at 1.5 "$node($i) setdest $yr 30.0" $ns at 2.0 "$node($i) setdest $xr $yr 30.0" $ns at 2.5 "$node($i) setdest $xr " $ns at 3.0 "$node($i) setdest $xr $yr 30.0" $ns at 3.5 "$node($i) setdest $yr 30.0" $ns at 4.0 "$node($i) setdest $xr $yr 30.0" $ns at 4.5 "$node($i) setdest $xr " $ns at 5.0 "$node($i) setdest $xr $yr 30.0" $ns at 5.5 "$node($i) setdest $yr 30.0" $ns at 6.0 "$node($i) setdest $xr $yr 30.0" $ns at 6.5 "$node($i) setdest $xr " $ns at 7.0 "$node($i) setdest $xr $yr 30.0" $ns at 7.5 "$node($i) setdest $yr 30.0" $ns at 8.0 "$node($i) setdest $xr $yr 30.0" $ns at 8.5 "$node($i) setdest $xr " $ns at 10.5 "$node($i) setdest $xr " $ns at 11.0 "$node($i) setdest $xr $yr 30.0" $ns at 12.5 "$node($i) setdest $yr 30.0" $ns at 13.0 "$node($i) setdest $xr $yr 30.0" $ns at 11.5 "$node($i) setdest $xr " $ns at 14.0 "$node($i) setdest $xr $yr 30.0" $ns at 12.5 "$node($i) setdest $yr 30.0" 40

46 41 } $ns at 16.0 "$node($i) setdest $xr $yr 30.0" $ns at 15.5 "$node($i) setdest $xr " $ns at 18.0 "$node($i) setdest $xr $yr 30.0" $ns at 19.5 "$node($i) setdest $yr 30.0" $ns at 17.0 "$node($i) setdest $xr $yr 30.0" $ns at 17.5 "$node($i) setdest $xr " puts "\n\n\t\tnode Placement In Network\n" puts "\t\t****************************" for {set i 0} {$i < $val(nn)} {incr i} { set node_x [$node($i) set X_] set node_y [$node($i) set Y_] puts "\nnode $i is Placed in $node_x and $node_y" } set ti 0 ================= #Distance between nodes calculation ============== set r [open distance.tr w] #Location fixing for a single node for {set i 0} {$i < $val(nn)} {incr i} { set xx($i) [expr rand()*$val(x)] set yy($i) [expr rand()*$val(y)] $node($i) set X_ $xx($i) $node($i) set Y_ $yy($i) $node($i) set Z_ 0 } ================== # Distance Calculation ======================== for {set i 0} {$i < $val(nn) } { incr i } { for {set j 0} {$j < $val(nn) } { incr j } { set dx [expr $xx($i) - $xx($j)] set dy [expr $yy($i) - $yy($j)] set dx2 [expr $dx * $dx] set dy2 [expr $dy * $dy] set h2 [expr $dx2 + $dy2] set h($i-$j) [expr pow($h2, 0.5)] } } for {set i 0} {$i<$val(nn)} {incr i} { set neigh($i) {} for {set j 0} {$j<$val(nn)} {incr j} { if {$i!=$j} { set node1_x [$node($i) set X_] set node1_y [$node($i) set Y_] set node2_x [$node($j) set X_] set node2_y [$node($j) set Y_] set dif_x [expr $node1_x-$node2_x] set dif_y [expr $node1_y-$node2_y] set sq_x [expr {pow($dif_x,2)}]

47 42 set sq_y [expr {pow($dif_y,2)}] set dis [expr {sqrt([expr {$sq_x + $sq_y}])}] puts "Distance between node($i) and node($j) is $dis" #Nearest node Distance if {$dis<250} { lappend neigh($i) $j } } } } =============== #Creating Node 15 as a default source in the network========= set sink 15 set nod {} set uni {} set check {} foreach i $nodelist { lappend nod $i set r 0 while {$r!=1} { set ran($i) [expr rand()*250] set ran($i) [expr int($ran($i))] if {[lsearch $check $ran($i)]==-1} { #puts "Unique number of the node $i is $ran($i)" lappend check $ran($i) set r 1 }}} set uni $check set msg {} set ti 0 ============= #Creating Source and Destination node to transmit data ======== foreach j $nodelist { lappend msg $j [$node($sink) set X_] [$node($sink) set Y_] set udp($sink) [new Agent/UDP] $ns attach-agent $node($sink) $udp($sink) $udp($sink) set fid_ 2 set cbr($sink) [new Application/Traffic/CBR] $cbr($sink) attach-agent $udp($sink) $cbr($sink) set type_ CBR $cbr($sink) set packet_size_ 1000 $cbr($sink) set rate_ 1Mb $cbr($sink) set random_ false set null($j) [new Agent/Null] $ns attach-agent $node($j) $null($j) $ns connect $udp($sink) $null($j) if {$sink!=$j} {

48 43 $ns at $ti "$cbr($sink) start" $ns at $ti "$ns trace-annotate \" Node $sink transmits to node $j \"" $node($sink) color green $ns at $ti "$node($sink) color green" $ns at $ti "$node($sink) label Source" set ti [expr $ti+0.1] $ns at $ti "$cbr($sink) stop" }} for {set i 0} {$i<5} {incr i} { ================ #Random node replies back to source node================ set no [expr rand()*[llength $nodelist]] set no [expr int($no)] set no [lindex $nodelist $no] puts "The node $no is transmitting to Sink" after 250 set udp($no) [new Agent/UDP] $ns attach-agent $node($no) $udp($no) $udp($no) set fid_ 2 set cbr($no) [new Application/Traffic/CBR] $cbr($no) attach-agent $udp($no) $cbr($no) set type_ CBR $cbr($no) set packet_size_ 1000 $cbr($no) set rate_ 1Mb $cbr($no) set random_ false set null($sink) [new Agent/Null] $ns attach-agent $node($sink) $null($sink) $ns connect $udp($no) $null($sink) $ns at $ti "$cbr($no) start" $ns at $ti "$ns trace-annotate \" Node $no transmits to node $sink \"" set ti [expr $ti+0.5] $ns at $ti "$cbr($no) stop" ===================== #Avoiding Malicious nodes ==================== set cx [$node($no) set X_] set cy [$node($no) set Y_] if {$cx>1000 && $cy > 1000} { #Identified malicious node in the network puts "The node $no is a malicious node" puts "Referesh the protocol to transmit packets" after 250 foreach j $nodelist { lappend msg $j [$node($sink) set X_] [$node($sink) set Y_] set udp($sink) [new Agent/UDP] $ns attach-agent $node($sink) $udp($sink)

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 In wireless network, nodes communicate using the communication model that consists of TCP agent, TCPSink agent, and FTP application.

More information

Part 5. Wireless Network

Part 5. Wireless Network Introduction to NS-2 Part 5. Wireless Network Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Introduction to Wireless Network An Example of Wireless Simulation

More information

Comparing ad-hoc wireless to wiredwireless

Comparing ad-hoc wireless to wiredwireless TNK092: Network Simulation/Nätverkssimulering Network Simulation---ns2 Lecture 6 wired-wireless simulation Comparing ad-hoc wireless to wiredwireless We are going to make modifications to the tcl script

More information

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore. Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple

More information

ANALYSIS OF SMART DEVICE GAME PROTOCOL

ANALYSIS OF SMART DEVICE GAME PROTOCOL ENSC 427: COMMUNICATION NETWORKS SPRING 2013 ANALYSIS OF SMART DEVICE GAME PROTOCOL http://www.sfu.ca/~mea19/ Mehdi Elahi (mea19@sfu.ca) 301043763 Seyed Ahmari (mahmari@sfu.ca) 301124836 Bilal Nurhusien

More information

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2)

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2) CDA6530: Performance Models of Computers and Networks Chapter 10: Introduction to Network Simulator (NS2) Some Contents are from. USC ISI Network Simulator (ns) Tutorial 2002 http://www.isi.edu/nsnam/ns/ns-tutorial/tutorial-02/index.html

More information

PART A SIMULATION EXERCISES

PART A SIMULATION EXERCISES PART A SIMULATION EXERCISES 1. Simulate a three nodes point to point network with duplex links between them. Set the queue size and vary the bandwidth and find the number of packets dropped. set ns [ new

More information

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou *

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * School of software engineering, Department of Information, Beijing

More information

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Kattigenahalli, Jala Hobli, Yelahanka, Bangalore 560 064 Department of Master of Computer Applications III Semester MCA Laboratory Manual 1 Subject Code: I.A

More information

Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks

Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks D. Kiranmayi Department of CSE, Vignan s Institute Of IT, Visakhapatnam, India ABSTRACT:There are many routing protocols that which can

More information

FACULTY OF ENGINEERING

FACULTY OF ENGINEERING FACULTY OF ENGINEERING LAB SHEET ETM 3056 - COMMUNICATIONS NETWORKS TRIMESTER 1 (2010/2011) CN1 COMMUNICATION PROTOCOLS ANALYSIS CN2 WIRELESS NETWORK SIMULATION Note: On-the-spot evaluation may be carried

More information

Analysis and Performance Evaluation of Routing Protocols in MANETS

Analysis and Performance Evaluation of Routing Protocols in MANETS Analysis and Performance Evaluation of Routing Protocols in MANETS Team Effort by Ankita Mukherjee Roopashree N Department of Computer Science & Engineering, Santa Clara University Fall 2014 Preface Mobile

More information

Scholars Research Library. Investigation of attack types in Ad Hoc networks and simulation of wormhole avoidance routing protocol

Scholars Research Library. Investigation of attack types in Ad Hoc networks and simulation of wormhole avoidance routing protocol Available online at www.scholarsresearchlibrary.com European Journal of Applied Engineering and Scientific Research, 2012, 1 (4):207-215 (http://scholarsresearchlibrary.com/archive.html) ISSN: 2278 0041

More information

TCP over Ad Hoc Networks : NS-2 Simulation Analysis. Ren Mao, Haobing Wang, Li Li, Fei Ye

TCP over Ad Hoc Networks : NS-2 Simulation Analysis. Ren Mao, Haobing Wang, Li Li, Fei Ye TCP over Ad Hoc Networks : NS-2 Simulation Analysis Ren Mao, Haobing Wang, Li Li, Fei Ye Chapter 1 Introduction This report is for simulation of TCP transimition in Ad-hoc networks.to begin with,we have

More information

Performance Analysis of Routing Protocols

Performance Analysis of Routing Protocols IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 5 (May. 2018), VI PP 69-77 www.iosrjen.org Performance Analysis of Routing Protocols N Dinesh Kumar 1, V.S

More information

Network Simulator 2 (NS2)

Network Simulator 2 (NS2) Network Simulator 2 (NS2) Basics and Mobility Management 1. Experiment 1 Let the following example be considered. All links in this network have a bandwidth of 1 Mbit/s. Please go through the tasks (1-1)

More information

Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network

Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network Master s Thesis Electrical Engineering September 2014 Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network Jani Saida Shaik School of Computing Blekinge Institute of Technology

More information

arxiv: v2 [cs.ni] 26 Jul 2010

arxiv: v2 [cs.ni] 26 Jul 2010 arxiv:1007.4065v2 [cs.ni] 26 Jul 2010 A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2) Mubashir Husain Rehmani, Sidney Doria, and Mustapha

More information

Wireless Networks - Preliminaries

Wireless Networks - Preliminaries This chapter describes an overview and classification of networks used for communication. A comparative simulation study regarding nature of wired and wireless network through commercially available simulators

More information

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT VoIP Performance of City-Wide Wi-Fi and LTE www.sfu.ca/~tly/webpage.html Ou, Cheng Jie 301144355 Yang, Tian Lin 301107652

More information

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7 www.sfu.ca/~bshahabi Babak Shahabi (301102998), Shaoyun Yang (301133524) bshahabi@sfu.ca yshaoyun@sfu.ca Team # 7 1 Table of contents Contents Contents... 2 Related Works... 5 1. Mobile IP overview...

More information

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro. Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 A brief Introduction to ns-2 2 Contents 1. Introduction to ns-2 2. ns-2 Components 3. Create a Basic ns-2 Model 4. Case Study: WiFi Simulation 5. Simulation

More information

Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network

Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network Pushpender Sarao Hyderabad Institute of Technology and Management, Hyderabad-1401, India Email: drpushpendersarao@gmail Abstract

More information

A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS

A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS G Sanjiv Rao 1 and V Vallikumari 2 1 Associate Professor, Dept of IT, Sri Sai Aditya Institute of Science And Technology, Surampalem,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol

Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol with Emphasis on Mobility and Communication Patterns Vahid Garousi Department of Systems and Computer Engineering Carleton University,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Network Simulator 2: Introduction

Network Simulator 2: Introduction Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific

More information

ns-2 Tutorial Exercise (1)

ns-2 Tutorial Exercise (1) ns-2 Tutorial Exercise (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Adopted from Nicolas s slides Jianping Wang, 2002 cs757 On to the Tutorial Work in group of

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

NS-2 Tutorial. Kumar Viswanath CMPE 252a.

NS-2 Tutorial. Kumar Viswanath CMPE 252a. NS-2 Tutorial Kumar Viswanath CMPE 252a kumarv@cse.ucsc.edu 1 What is ns-2? ns-2 stands for Network Simulator version 2. ns-2: Is a discrete event simulator for networking research packet level simulator.

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Tcl script 2

Tcl script 2 Ns : 5... 1 5...nam ns 6... ns 6... nam 1.1 1.2 1.3 7... Tcl script 2 8... 9... 10... 2.1 2.2 2.3 12... 3 13... ( ) 14... 16... 17... 3.1 3.2 3.3 3.4 18... 4 18... 20... 4.1 4.2 22... Xgraph 5 22... 5.1

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

A Case Based Study to Identify Malicious Node in Packet Routing

A Case Based Study to Identify Malicious Node in Packet Routing A Case Based Study to Identify Malicious Node in Packet Routing Suhasini Sodagudi #1, Dr.Rajasekhara Rao Kurra *2 # Associate Professor, Department of Information Technology, VRSiddhartha Engineering College

More information

The Transport Control Protocol (TCP)

The Transport Control Protocol (TCP) TNK092: Network Simulation - Nätverkssimulering Lecture 3: TCP, and random/short sessions Vangelis Angelakis Ph.D. The Transport Control Protocol (TCP) Objectives of TCP and flow control Create a reliable

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Ns-2 Laboratory Prof. Chansu Yu http://academic.csuohio.edu/yuc/ In-Class Lab: Mobile IP 5 nodes 2 wired nodes, W(0) and W(1) 2 mobile agents, HA and FA A

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib

More information

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University DMN1 : COMMUNICATION PROTOCOL SIMULATION Faculty of Engineering Multimedia University DMN1 Marking Scheme No Component Criteria Not answered 0 marks Poor 2 marks Acceptable 4 (max) marks 1 Viva Students

More information

Implementation: Detection of Blackhole Mechanism on MANET

Implementation: Detection of Blackhole Mechanism on MANET Implementation: Detection of Blackhole Mechanism on MANET Mr. Vishwajith M V 1, Pratik Sanjel 2, Pranish Pokharel 3, Kshetiz Pokhrel 4 1 Assistant professor Information Science & Engineering Department,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Project report Cross-layer approach in mobile as hoc routing by

Project report Cross-layer approach in mobile as hoc routing by Project report Cross-layer approach in mobile as hoc routing by Alexandre Boursier boursier@kom.aau.dk Stéphane Dahlen sdahlen@kom.aau.dk Julien Marie-Françoise mariefra@kom.aau.dk Thior Santander Marin

More information

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion

ABSTRACT. Communication is usually done through means of network where there is a lot of intrusion ABSTRACT Communication is usually done through means of network where there is a lot of intrusion included to it. In order to detect the misbehavior, there should an effective strategy, which is capable

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

EE 122: Computer Networks Network Simulator ns2

EE 122: Computer Networks Network Simulator ns2 EE 122: Computer Networks Network Simulator ns2 Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Adapted from F04 Slides K. Fall, J.

More information

STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2

STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2 STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Bachelor of Technology In Computer Science

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Project Network Simulation CSE 5346/4346

Project Network Simulation CSE 5346/4346 Project Network Simulation CSE 5346/4346 Project Overview This is a comprehensive project designed to be completed by 4 phases, and intended to demonstrate network performance and quality of service (QoS)

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

A Simulation study : Performance comparison of AODV and DSR

A Simulation study : Performance comparison of AODV and DSR A Simulation study : Performance comparison of AODV and DSR K.Dileep Kumar 1, N.Seethayya 2, H.Venkata Bhagya Sri 3,S.Papa Rao 4 1,2,3,4 Asst.Professor Department of CSE, Sri Sivani College of Engineering,

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

ns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2

ns-2 Tutorial Contents: Today Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 ns-2 Tutorial Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial exercise ns-2 internals Extending ns-2 Today Partly adopted from Nicolas slides. 1 Objectives of this week Get some

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Performance Improvement of Wireless Network Using Modern Simulation Tools

Performance Improvement of Wireless Network Using Modern Simulation Tools Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,

More information

ENSC 427. Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 3/17/2012

ENSC 427. Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 3/17/2012 2012 ENSC 427 Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 Gyuhan David Choi Seungjae Andy Back Calvin Chun Kwan Ho gca16@sfu.ca sjb18@sfu.ca cch8@sfu.ca 3/17/2012 Contents

More information

Course 6. Internetworking Routing 1/33

Course 6. Internetworking Routing 1/33 Course 6 Internetworking Routing 1/33 Routing The main function of the network layer is routing packets from the source machine to the destination machine. Along the way, at least one intermediate node

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Performance Analysis of WLAN MAC algorithms

Performance Analysis of WLAN MAC algorithms MEE10:91 Performance Analysis of WLAN MAC algorithms Author: Ramaz Samhan Amer Khoulani Supervisor: Dr. Jorgen Nordberg A Thesis Presented in partial fulfillment of the requirements for the degree of Master

More information

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:239-7242 Volume 4 Issue 7 July 205, Page No. 3422-3425 A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Volume 1, Issue 4, 215 PERFORMANCE BASED EVALUATION OF, AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh Gyan Vihar University Abstract:A Mobile

More information