TCP Simulation Evaluations over Ad Hoc Wireless Networks

Size: px
Start display at page:

Download "TCP Simulation Evaluations over Ad Hoc Wireless Networks"

Transcription

1 University of Bern & NCCR MICS Summer Internship 24 TCP Simulation Evaluations over Ad Hoc Wireless Networks Student: Derman Akcelik Supervisor: Ruy de Oliveira Professor: Torsten Braun

2

3 TCP Simulation Evaluations over Ad Hoc Wireless Networks Abstract The Transmission Control Protocol (TCP) represents the most deployed transport protocol used in the Internet so far. This popularity motivates its presence in wireless networks, including ad hoc networks. These networks are very promising since they make it possible communication among end systems directly without any infrastructure. However, TCP faces various problems when required to work in such environments. Because of that, it is very important to understand the behaviour of this protocol in wireless networks. This project evaluates TCP performance in ad hoc networks by means of simulation. We compare two TCP flavours, namely Newreno and SACK, under a variety of conditions. Specifically, we assessed throughput, retransmissions, and energy consumption features of TCP. We also evaluated the delayed acknowledgment option for TCP. The results provided some insight into this quite wide subject.

4 4 I. INTRODUCTION In today s world, wireless devices became an evident part of our life. These devices may provide seamless connectivity in environments where wired networks are not possible or desirable. One of the emerging wireless technologies is ad hoc networks. These networks are attractive for not depending on any fixed infrastructure to communicate. As a result, researches on ad hoc wireless networks have gained non-negligible popularity in recent years. Ad hoc networks consist of mobile hosts that communicate with each other over a wireless medium without central control. The utilisation of this medium develops the hidden-node problem and exposed node problems that are investigated in more detail in [1]. In an ad hoc network, the topology may change due to various medium constraints, forcing self-reconstruction adaptness. Because of the distance limit, multihop routing is used where the packets are forwarded towards the next node along a route to the receiver. Energy consumption is also a concern in these networks because the nodes are supposed to be battery powered. The IEEE proposed IEEE as a standard MAC protocol for wireless multihop networks [2]. It defines the link and physical layer specifications. It minimizes the known hidden node problem using a local retransmission strategy with RTS/CTS (request-tosend/clear to send) control frames. It works efficiently for scenarios having at most 3 hops. Therefore, end-to-end communication protocols have to deal with the problem for the best use of network bandwidth. The popularity of the TCP in the Internet motivates its presence on the wireless networks. Since TCP was developed for wired environments, it has distinct behavior in ad hoc networks. In these networks, TCP will see every dropped packet as a congestion sign. It will reduce its sending rate, which means less throughput, more retransmissions and more spent energy. Packet error rate of the wireless channels and link interruptions are other reasons for packet losses. The interaction between TCP and the IEEE MAC protocol is one of the most challenging topics in today s wireless communication systems. TCP Newreno and TCP SACK are two important flavors of TCP protocol. Their features are quite distinct though. TCP Newreno uses a new fast recovery mechanism for speeding up the recovery from losses. TCP SACK has a receiver that gives more information about the lost packets to the sender. A sender of TCP SACK uses this feature for recovering quickly in situation in which multiple packet losses within a single window occur. TCP SACK claim to be very good to deal with a packet loss because of its selective acknowledgement strategy. Nevertheless, adding extra information to be sent imply more spent energy. Both TCP flavors may work with the delayed acknowledgement (DA) option, whichmeans that the receiver acknowledges only one packet out of two two received. This is expected to reduce energy consumption. The aim of this work is to characterize, energy consumption, number of retransmissions and throughput for TCP Newreno and TCP SACK flavors, with and without Delayed Acknowledgement (DA). Because of the time limit, we focused on these two topical flavors. Additionally, we do not address mobility related issues, since the goal here is to evaluate the behavior of TCP over the IEEE MAC protocol.

5 5 The remainder of this report is organized as follows. Section II gives general information about ad hoc networks. Section III describes the concepts that learnt by the student during this study. Section IV presents the simulation environments and the simulated scenarios. Section V contains the simulation results and their discussions. Finally, section VI summarizes our work. II. AD HOC An ad-hoc network is a local area network or other small network that is not dependent on any access point or any server. Fig. 1 shows a typical ad hoc network that communicates over a wireless medium. As the nodes are mobile its topology may change continuously. The devices can join and leave networks readily. Each device is immediately recognized as part of the network when is close enough to one of the network components. Fig. 1. Ad hoc networks In recent years, the number of commercial applications with ad hoc networks raised with the rapid spread of mobile telephone usage, personal digital assistants and the enlargement of inexpensive wireless solutions for monitoring tools. Accordingly, there are many ongoing distributed systems researches. Examples for the ad hoc applications are disaster relief, conferencing, home networking, habitat monitoring, warehouse inventory monitoring, and personal area networks. An ad-hoc network utilises multihop scenarios because of the limit of transmission range (see [1] for more details). The nodes works as a router and forward the packets to the other nodes. By virtue of the centralized entities absence, the commutation methods and routing algorithms are decentralized. They have to deal with the mobility of the participants and the variation in the connectivity. Thus, different routing protocols have been developed. AODV (Ad hoc On Demand Distance Vector routing protocol), DSR (Dynamic Source Routing protocol), DSDV (Highly Dynamic Destination-Sequenced Distance Vector routing protocol), and TORA (Temporally-Ordered Routing Algorithm routing protocol) are the examples of the routing protocols. AODV [3] and DSR [4] routing protocols are cited as the most prominent frameworks to be standardized in the future. The ad hoc networks devices are battery powered. Therefore, the amount of spent energy by the routing protocol affects the bandwidth utilisation. If a node,that is in the shortest

6 6 path, is not active because of the lack of the energy, a longer path will serve to the packet. The longer the transport time, the less the throughput and the more the energy consumption. The energy is one of the metric investigated in [5]. The energy consumption is induced by the well-known hidden node problem and its solution mechanisms. They are presented in [1]. Accordingly, many studies have been dedicated to analyze its characteristics and/or propose new routing methods (see, e.g., [5]). As mentioned in [6], due to the spatial reuse property of [2], the nodes not only communicate but also interfere with other nodes. III. LESSONS LEARNT During the study, we worked with different utilities that I did not have the change to work with before. The LINUX as OS, Perl as text interpreter, ns2 as the simulator program and the Gnuplot as graph designer. I also tried to write a project report in English, which is not obvious at all. Working with LINUX was not only interesting but also hard. We worked with varius shell commands. In order to automate the tasks, we wrote several scripts. Their developments are hard but then changing the parameters for different executions becomes easier. Ns2 [7] is a well-known and developed simulation program. It was used to simulate the different scenarios. Is requires not only the ns2 commands knowledge but also networking concepts knowledge. For example, because of the headers that are added at every level, the physical layer data throughput value has to be bigger then the MAC layer throughput. When a file transfer is finished, we have to close the output files after enough time. This time is necessary to save eveything on the files. Happily we did not have installation problems. The only problem was the size of the traces files. They might be big enough to make impossible to work with a single PC. After certain numbers of trace file, the user might easily reach its hard disk limit. That is why we erased the trace files between each execution after getting the necessary information. Perl was used to obtain the desirable data from the trace files. There are different possible ways to get the same information. Developing the efficient one takes time because we have to have enough experience on it. Because of the lack of the time, and having lots to do, only a little introduction step on it was done. In our case, it was used to get the energy left on the sender node from the trace file. Besides the use of different tools, we studied the main concepts behind ad hoc networks, as explained in detail on section II, and the performance analysis of TCP Newreno and TCP SACK protocols with or without DA. The experiment is realized via three metrics. Those are energy consumption, number of the retransmission and throughput. IV. SIMULATION SETUP We used the ns2 [7] simulator to perform our evaluation. Fig. 2 shows the scenario used in our simulations. Each node is 2 meters apart from its closest neighbors and the wireless data rate is 2 Mbps. In the simulator, the effective transmission range is 25 meters while the interference range is 55 meters as recommended by the IEEE standard [2]. In all evaluations, the throughput bw is computed as bw = seq 8 stime, where seq

7 7 is the maximum sequence number (in bytes) transmitted and acknowledged and stime is the simulated time. We focus our discussions on short chain of nodes containing at most 7 hops, because this is a reasonable limit for today s networks. The first node is the sender and the last node is the receiver of the packets. The sender transfers continuously a file (infinite ftp) to the receiver. For generating ten flows, we used ten ftp agents at the sender. At the receiver, depending on the flow number, we placed one or ten sink receiver agent. During the enery consumption analyses, we used an energy model that computes energy expenditure to transmitted and received packets only. Energy spent in idle state is computed. In this way, the energy related to only TCP operations are better evaluated. The measured energy is the one consumed by the sender n sender node receiver node Fig. 2. Chain topology The parameters settings are as follows. IEEE is the MAC layer protocol. AODV is the routing protocol. The initial energy of nodes is 1 joules, a dynamic flat area computed as (number of hops * 2m + 1m) x (3m). The window limit (WL) for the TCP flavours is 3 packets. To take into account the hidden node problem, we simulated 5 and 6 hops for the measurements of the energy consumption and the throughput. Unless otherwise mentioned, the other parameters were kept as the default of the simulator and all simulation runs lasted 3 seconds. For the simulations with losses, a uniform distribution function is used as error pattern, and 5% of Packet Error Rate (PER) is simulated. A. Energy Consumption V. SIMULATION RESULTS In this section we evaluate the energy consumption pattern for TCP with varying packet sizes and 5 hops in Fig. IV. Energy consumption is a very important aspect for ad hoc networks as the nodes in place are supposed to be battery powered. Fig. 3(a) and Fig. 3(b) depict the results for packet sizes of 25, 5, 1, and 146 bytes under 1 and 1 flows, respectively. A general conclusion from these results, is that the larger the packet the less energy spent, as shown in both Figs. This is intuitive because with short packet size TCP sender has to perform more operations to send the whole data. Both Figs also show that by using the Delayed Acknowledgment (DA) option the two TCP flavours saved some energy. For the one flow evaluation, TCP SACK without DA spent up to 16% more energy than when using DA. Comparing TCP SACK with TCP Newreno, we did not get clear distinction between both performances. In our experiments with DA, TCP Newreno performed slightly better than the TCP SACK for short packet sizes.

8 8 Energy Spent (joule *e-7/bits) Energy spent vs. Paket Size (1 flows) DA DA 8 (a) 1 flow Energy Spent (joule *e-7/bits) Energy spent vs. Paket Size (1 flows) DA DA 8 (b) 1 flows Fig. 3. Energy Consumption B. Energy Consumption Including Packet Error Rate of 5% Owing to observe the energy efficiency of TCP Newreno and TCP SACK over an ad hoc network including losses, we simulated the same network that is used in the previous section. There is no congestion but only a packet error rate of 5%. Figs. 4(a) and 4(b) illustrate the results for packet sizes of 25, 5, 1, and 146 bytes under 1 and 1 flows, respectively. We obtained the same general conclusions that we had for the case without error. Yet the energy consumption increased with the packet error constraint. DA option reduced the spent energy under losses as well. Fig. 4(b) shows that TCP SACK with DA performed

9 9 Energy Spent (joule *e-7/bits) Energy spent vs. Paket Size (1 flows / 5% error) DA DA (a) 1 flow Energy Spent (joule *e-7/bits) Energy spent vs. Paket Size (1 flows/ 5% error) DA DA (b) 1 flows Fig. 4. Energy Consumption with Packet Error Rate of 5% the best in terms of energy consumption in most cases. Comparing Figs. 4(a) and 4(b) one can say that for small packet sizes TCP Newreno outperformed TCP SACK for the scenario with one flow. The opposite happened for the ten flows case. For large packet sizes we did not notice any difference between the two flavours. In short, the only effective conclusion from these results is that DA is helpfull for energy consumption benefits, even for noisy environments. C. Retransmissions The idea here is to observe the typical behavior of the retransmissions in the ad hoc networks. For that, we simulated flows with packet size of 25, 5, 1, and 146 bytes.

10 1 As in the previous simulations, we considered the DA option a well. The scenario is also the chain topology of Fig. 2 with 5 and 6 hops. The results are shown in Figs. 5 and 6, which include evaluations for 1 or 1 flows, respectively. Retransmissions vs. Paket Size (1 flow) Number of Retransmissions DA DA (a) 5-hop Number of Retransmissions Retransmissions vs. Paket Size (1 flow) DA DA (b) 6-hop Fig. 5. Number of retransmissions for 1 flow For the scenario facing one single flow, we can see in Fig. 5(a) and Fig. 5(b) that the number of retransmissions rise with the increase of the packet size. Furthermore, we obtained the best performances for both flavours with DA option enabled. On the other side, the results for the evaluations with 1 flows exhibited the opposite as illustrated in Figures 6(a) and 6(b). That is, the larger packet size the less retransmissions.

11 11 Number of Retransmissions Retransmissions vs. Paket Size (1 flows) DA DA 6 (a) 5-hop Number of Retransmissions Retransmissions vs. Paket Size (1 flows) DA DA 6 (b) 6-hop Fig. 6. Aggregate number of retransmissions for 1 flows Presumably, this is a result of the high congestion caused by the competing flows, which becomes worse as the packet size increases. In terms of comparison between Newreno and SACK, the results confirm again that their performance are variable in most cases. There are cases in which the former outperforms the latter and vice versa, but no one is definitely better the other.

12 12 D. Retransmissions Including Packet Error Rate of 5% In this section, we investigate the behaviour of the retransmission in ad hoc networks with losses. We used the same topology evaluated in section V-D containing packet error rate of 5%. The results for 2 and 5 hops are shown in Figs. 7 and 8, which includes evaluations for 1 or 1 flows, respectively. Number of Retransmissions Retransmissions vs. Paket Size (1 flows / 5%) DA DA (a) 1 flow 2 hops Number of Retransmission Retransmissions vs. Paket Size (1 flows / 5%) DA DA (b) 1 flows 5 hops Fig. 7. Number of retransmissions for 1 flow with packet error rate of 5% Figs. 7 and 8 show that it is not always possible to get the best results with DA option. Once again the results do not allow us to make clear distinction between TCP Newreno and TCP SACK flavors. It was expected that TCP SACK would perform better under losses,

13 13 mainly for large packet sizes, since its receiver provides better information to the sender about losses. That was observed for the largest packet size in Figs. 7, 8, 8(a) but not in Fig. 8(b). However, this tendency was not observed for the smaller packet sizes. Number of Retransmissions Retransmissions vs. Paket Size (1 flows / 5% ) DA DA (a) 1 flows 2 hops Number of Retransmission Retransmissions vs. Paket Size (1 flows / 5% ) DA DA (b) 1 flows 5 hops Fig. 8. Aggregate number of retransmissions for 1 flows with packet error rate 5% E. Throughput In this section, we investigate the bandwidth utilisation not only with different number of hops but also different number of concurrent flows in the chain topology of Fig. 2. The

14 14 results are shown in Fig. 9, which includes the results for 1, 1 flows and using or not the DA option. It is well known that the throughput decreases as the number of hops go high. The primary reason is that the longer the path the higher delay for the packets to arrive at the destination. Additionally, there is the hidden node problem that becomes worse for larger number of hops. So, the probability of packet loss is significantly higher for large number of hopes. More flows, on the other side, means more congestion which will decrease the throughput as well. Throughput (kbits/s) Throughput vs. Number of hops (1 flow) DA DA Number of hops (a) 1 flow Throughput (kbits/s) Throughput vs. Number of hops (1 flows) DA DA Number of hops (b) 1 flows Fig. 9. End-to-end throughput

15 15 Fig. 9(b) shows that the aggregate throughput, which is the capacity of the network, is nearly the same of that obtained in Fig. 9(a) in which only one flow is crossing the network. The difference between the two flavors, using or not DA, is too small to see from the figures. Once again, the DA option provided better result for both flavors. Fig. 9 shows improvement of up to 7%, which is not very significant. Among the TCP flavors the difference is completely negligible. VI. CONCLUSIONS In this work, we have investigated the performance of TCP Newreno and TCP SACK over ad hoc networks. ns2 was used for simulating the different scenarios. We used three metrics: energy consumption, throughput and retransmissions with or without delayed acknowledgment option DA. We observed the following: The energy consumed at the sender was inverseley proportional to the packet size regardless of the flavor. The energy consumption increased with losses for both flavors as well. The losses increased the retransmissions number in all cases. The two TCP flavors with DA option spent in general less energy and achieved better throughput in many cases. However, the DA option did not guarantee the best result in all circumstances. The difference between the TCP flavors performances were more perceptive in the simulations with losses. TCP SACK performed slightly better than TCP Newreno for large packet sizes. Because of the lack of time, we evaluated only TCP Newreno and TCP SACK protocols with or without DA option. In general the results did not show us meaningful differences between the two TCP flavors. Although TCP SACK uses the selective acknowledgment strategy, it did not outperformed TCP Newreno in most cases as expected. Therefore, the general outcome is that the two flavors work quite the same in the evaluated scenarios, and delayed acknowledgment is indeed helpful in ad hoc networks without high level of bit errors. For future work, more simulation runs and different scenarios with other metrics could be considered. REFERENCES [1] R. Oliveira and T. Braun. Tcp in wireless mobile ad hoc networks. University of Bern, Technical Report IAM-2-3, July 22. [2] IEEE. Wireless lan medium access control (mac) and physical layer (phy) specifications - std The Institute of Electrical and Electronics Engineers, [3] IETF. Rfc ad hoc on-demand distance vector (aodv) routing. The Internet Engineering Task Force, July 23. [4] Maltz Johnson. Internet draft - the dynamic source routing protocol for mobile ad hoc networks. The Internet Engineering Task Force, Apr 23. [5] H.Singh and S.Singh. Energy consumption of tcp reno, newreno and sack in multi-hop wireless networks. California, USA, July 22. ACM SIGMETRICS. [6] R. Oliveira and T. Braun. A dynamic adaptive acknowledgement strategy for tcp over multihop wireless networks. July 24. [7] Kevin Fall and Kannan Varadhan. editors. ns notes and documentation. San Francisco, USA, November The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC.

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

A Smart TCP Acknowledgment Approach for Multihop Wireless Networks

A Smart TCP Acknowledgment Approach for Multihop Wireless Networks 1 A Smart TCP Acknowledgment Approach for Multihop Wireless Networks Ruy de Oliveira and Torsten Braun Institute of Computer Science and Applied Mathematics University of Bern Neuebruckstrasse 10, CH-3012,

More information

A Dynamic Adaptive Acknowledgment Strategy for TCP over Multihop Wireless Networks

A Dynamic Adaptive Acknowledgment Strategy for TCP over Multihop Wireless Networks A Dynamic Adaptive Acknowledgment Strategy for over Multihop Wireless Networks Ruy de Oliveira and Torsten Braun Abstract Multihop wireless networks based on the IEEE 802.11 MAC protocol are promising

More information

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments 24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide

More information

AVC College of Engineering, Mayiladuthurai, India

AVC College of Engineering, Mayiladuthurai, India Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Performance Improvement of Wireless Network Using Modern Simulation Tools

Performance Improvement of Wireless Network Using Modern Simulation Tools Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,

More information

WITH the evolution and popularity of wireless devices,

WITH the evolution and popularity of wireless devices, Network Coding with Wait Time Insertion and Configuration for TCP Communication in Wireless Multi-hop Networks Eiji Takimoto, Shuhei Aketa, Shoichi Saito, and Koichi Mouri Abstract In TCP communication

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks Baisakh Department of Computer Science and Engineering, Jaypee University of Engineering and Technology, Guna, Madhya Pradesh, India

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS

PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS Nutan Bhati, Dr. Ashish Bansal Abstract: Mobile Ad hoc Networks (MANETs) are a collection of mobile nodes forming a dynamic autonomous

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Lecture 16: Wireless Networks

Lecture 16: Wireless Networks &6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET

A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET K. ARULANANDAM 1 and Dr. B. PARTHASARATHY 2 1 Research scholar, Vinayaka Mission University, Salem, Tamilnadu 2 Dean, Mailam Engineering College, Tindivanam.

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

SWAP and TCP performance

SWAP and TCP performance SWAP and TCP performance Jean Tourrilhes, HPLB 23 March 98 1 Introduction The SWAP protocol that we have proposed [4] the HRFWG is designed to carry TCP/IP traffic. Of course, we would never had proposed

More information

Improving the Multiple Access Method of CSMA/CA Home Networks

Improving the Multiple Access Method of CSMA/CA Home Networks Improving the Multiple Access Method of CSMA/CA Home Networks Miguel Elias M. Campista, Luís Henrique M. K. Costa, and Otto Carlos M. B. Duarte Universidade Federal do Rio de Janeiro - PEE-COPPE/DEL-POLI

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

Methods to Resolve Traffic Jams using VANET

Methods to Resolve Traffic Jams using VANET Methods to Resolve Traffic Jams using VANET Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab Abstract - In this paper we have proposed a method to avoid

More information

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS Md. Abdullah-Al-Mamun, M. Mahbubur Rahman Department of Information and Communication Engineering Islamic University Kushtia

More information

Improving TCP Performance for Multihop Wireless Networks*

Improving TCP Performance for Multihop Wireless Networks* Improving TCP Performance for Multihop Wireless Networks* Sherif M. ElRakabawy, Christoph Lindemann University of Dortmund Department of Computer Science August-Schmidt-Str. 1 447 Dortmund Germany http://mobicom.cs.uni-dortmund.de/

More information

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 47-53 Design and Implementation of a Simulator for Ad Hoc Network Routing

More information

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Performance Evaluation of TCP in the Presence of in Heterogeneous Networks by using Network

More information

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks

A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless mesh networks Available online at www.sciencedirect.com Computer Networks 52 (28) 1583 162 www.elsevier.com/locate/comnet A link layer adaptive pacing scheme for improving throughput of transport protocols in wireless

More information

ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY

ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY ENHANCING ENERGY EFFICIENT TCP BY PARTIAL RELIABILITY L. Donckers, P.J.M. Havinga, G.J.M. Smit, L.T. Smit University of Twente, department of Computer Science, PO Box 217, 7 AE Enschede, the Netherlands

More information

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks Punit Rathod 1, Nirali Mody 1, Dhaval Gada 1, Rajat Gogri 1, Zalak Dedhia 1, Sugata Sanyal 2 and Ajith Abraham 3 1 Mumbai University,

More information

Homework #4. Due: December 2, 4PM. CWND (#pkts)

Homework #4. Due: December 2, 4PM. CWND (#pkts) Homework #4 Due: December 2, 2009 @ 4PM EE122: Introduction to Communication Networks (Fall 2009) Department of Electrical Engineering and Computer Sciences College of Engineering University of California,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 24: Mobile and Wireless Wireless Challenges 15-441: Computer Networking Lecture 24: Mobile and Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Force us to rethink many assumptions Need to share airwaves rather

More information

TCP Congestion Control in Wired and Wireless networks

TCP Congestion Control in Wired and Wireless networks TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini

More information

Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol

Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol with Emphasis on Mobility and Communication Patterns Vahid Garousi Department of Systems and Computer Engineering Carleton University,

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

A Multi-homing Extension of Wireless Node Implementation in NS-2

A Multi-homing Extension of Wireless Node Implementation in NS-2 A Multi-homing Extension of Wireless Node Implementation in NS-2 Qinghua Wang, Tingting Zhang Department of Information Technology and Media Mid Sweden University, 85170 Sundsvall, Sweden Email: {qinghua.wang,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Examining Mobile-IP Performance in Rapidly Mobile Environments: The Case of a Commuter Train.

Examining Mobile-IP Performance in Rapidly Mobile Environments: The Case of a Commuter Train. Examining Mobile-IP Performance in Rapidly Mobile Environments: The Case of a Commuter Train. Edwin Hernandez and Abdelsalam (Sumi) Helal Department of Computer and Information Science and Engineering

More information

Variable Step Fluid Simulation for Communication Network

Variable Step Fluid Simulation for Communication Network Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr

More information

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS Abdulrahman H. Altalhi Computer Science Department University of New Orleans New Orleans, LA, 70148 USA Golden G. Richard, III Abstract

More information

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/

More information

CHAPTER 7 SIMULATION OBSERVATIONS

CHAPTER 7 SIMULATION OBSERVATIONS CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source

More information

TCP challenges in multi-hop wireless networks. Why multi-hop?

TCP challenges in multi-hop wireless networks. Why multi-hop? TCP challenges in multi-hop wireless networks Konstantinos Psounis Assistant Professor EE and CS departments, USC Joint work with Vlad Balan, Ramesh Govindan, Ki- Young Jang, Apoorva Jindal, Sumit Rangwala

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

Throughput Analysis of Congestion Control Protocols (TCP, XCP, RCP) in Multi-Hop Wireless Network.

Throughput Analysis of Congestion Control Protocols (TCP, XCP, RCP) in Multi-Hop Wireless Network. Analysis of Congestion Control Protocols (TCP, XCP, RCP) in Multi-Hop Wireless Network. Dr. Atul M Gosai 1, Udit Narayan Kar 2 and Bhargavi H Goswami 3, Assistant Professor 1 Research Fellow 2, Research

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

QoS Routing For Mobile Ad Hoc Networks

QoS Routing For Mobile Ad Hoc Networks International Journal of Scientific & Engineering Research Volume 4, Issue3, March-2013 1 QoS Routing For Mobile Ad Hoc Networks Sonali L. Gaiakwad # Electronics Department, Pune University MAE Alandi,

More information

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Name Student ID Department/Year. Final Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006 Name Student ID Department/Year Final Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2006 9:20-11:00 Tuesday January 16, 2007 Prohibited 1. You are not allowed to write down the

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Node Density based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-hoc Networks

Node Density based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-hoc Networks Node Density based Performance Analysis of Two Reactive Routing Protocols in Mobile Ad-hoc Networks Gurleen Kaur Walia 1, Charanjit Singh 2 1,2 UCoE Department, Punjabi University, Patiala, Punjab, India

More information

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS 1 TANMAYA SWAIN, 2 PRASANT KUMAR PATTNAIK School Of Computer Engineering, KIIT University, Bhubaneswar E-mail:

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Comparison of Various Routing Protocols & Brief of MANET

Comparison of Various Routing Protocols & Brief of MANET International Journal of Modern Trends in Engineering and Research www.ijmter.com Comparison of Various Routing Protocols & Brief of MANET Akashkumar Patel 1, Rakshitkumar Hirapara 2, Vivekkumar Dhamecha

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2006 Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2006 9:20-11:00 Tuesday November 14, 2006 Prohibited 1. You are not allowed to write down the

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Chapter - 1 INTRODUCTION

Chapter - 1 INTRODUCTION Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

RED Tuning for TCP Performance on the Mobile Ad Hoc Networks

RED Tuning for TCP Performance on the Mobile Ad Hoc Networks RED Tuning for TCP Performance on the Mobile Ad Hoc Networks Shin-Jer Yang and Yung-Chieh Lin Dept. of Computer and Information Science, Soochow University, Taipei, Taiwan E-mail: sjyang@cis.scu.edu.tw

More information

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Satoshi Ohzahata and Konosuke Kawashima Department of Computer, Information and Communication Sciences, Tokyo

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS)

COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) COMP3331/9331 XXXX Computer Networks and Applications Final Examination (SAMPLE SOLUTIONS) Question 1 (X marks) (a) The one-way propagation delay between A and B is 100/1 = 100 seconds. The RTT will be

More information

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Mitigating Malicious Activities by Providing New Acknowledgment Approach Mitigating Malicious Activities by Providing New Acknowledgment Approach G. S. Devi Lakshmi, J. Rajasekaran 2 PG Student, Sri Subramanya College of Engineering and Technology, Palani, Tamilnadu, India

More information