Evaluation of Various Routing Protocols for Mobile Ad-hoc Networks (MANETs)

Size: px
Start display at page:

Download "Evaluation of Various Routing Protocols for Mobile Ad-hoc Networks (MANETs)"

Transcription

1 Evaluation of Various Routing Protocols for Mobile Ad-hoc Networks (MANETs) Dr. L. RAJA Assistant Professor, Dept. of Computer Science & Applications Pachaiyappa s College,Chenni-30 India Abstract the enhanced popularity of mobile wireless devices has lead researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols. Due to limited resources in MANETs, to design an efficient and reliable routing strategy is still a challenge.. Routing in MANETs receives a remarkable amount of attention from researchers around the world. A number of routing protocols have been developed and it is quite difficult to determine which protocols may perform well under a number of different network scenarios such as network size and topology etc. In this paper, we explore the range of MANET routing protocols available and discuss their characteristics and functionality. Numerous routing protocols proposed by researchers are mainly categorized as Proactive, Reactive and Hybrid routing protocols. A range of literature relating to the field of MANET routing protocols was identified and reviewed. The comparison is provided based on the routing methodologies and information used to make routing decisions. The performance of all the routing protocols is also discussed. Keywords: MANET, Routing Protocol, Comparison. I. INTRODUCTION Wireless system operates with the aid of a centralized supporting structure such as an access point. These access points assist the wireless users to keep connected with the wireless system, when they roam from one place to other. Advancement in wireless technologies introduces a new type of wireless system called Mobile Ad-hoc Network. A Mobile ad hoc network is a group of wireless mobile devices in which nodes work in partnership by forwarding packets for each other to allow them to communicate via remote wireless transmission. Ad hoc networks require no centralized management or fixed network infrastructure such as base stations. Each individual node must act as a router and responsible for performing the packet routing tasks. These routing tasks are done using one or more common routing protocols. MANETs possess certain characteristics like Bandwidth-constrained, variable capacity links, Energy constrained Operation, Limited Physical Security, Dynamic network topology, Frequent routing updates. Due to diverse nature of the network MANETs and its routing issues have become a challenge of this age. Numerous routing algorithms, for this purpose are being proposed by researchers. These protocols are mainly categorized as Proactive, Reactive and Hybrid routing protocols. This paper is organized as follows: Section II discusses routing in MANETs. Section III focuses is classification of various routing protocols. Sections IV, V, VI present the detailed analysis of all the three categories of ad hoc routing protocols and Section VII presents the overall comparison based on the review presented. Finally Section VIII concludes the paper. II. ROUTING PRINCIPLE IN MANETS Mobile Ad-hoc networks are self-organizing and self-configuring multihop wireless networks where, the structure of the network changes dynamically due to the mobility of the nodes. The absence of fixed infrastructure in a MANET poses several types of challenges. The major challenge among All Rights Reserved 271

2 is routing. Routing is the act of moving information from a source to a destination in an internetwork and it is the process of selecting paths in a network along which the data packets are sent. An ad hoc routing protocol is a principle, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad-hoc network. In ad hoc networks, nodes do not start out familiar with the topology of their networks; instead, they have to discover it. The basic idea is that a new node may announce its presence and should listen for announcements broadcast by its neighbors. Each node learns about nearby nodes and how to reach them, and may announce that it can reach them too. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations thus, constructing routing tables, which is very important for efficient routing. Routing tables are filled with a variety of information which is generated by the routing algorithms. A key issue is the necessity that the Routing Protocol must be able to respond rapidly to the topological changes in the network. In these networks, each node must be capable of acting as a router. Major problems in routing are limited Bandwidth, Asymmetric links, Routing Overhead, Interference, and Dynamic Topology. Routing in MANETs has been an active area of research and in recent years numerous protocols have been introduced for addressing the problems of routing. Depending on the routing strategy, the routing protocols are divided into three broad classes Proactive, Reactive and Hybrid reviewed in later sections. III. ROUTING PROTOCOLS CLASSIFICATION Routing protocols are categorized depending on the routing topology, as reactive and proactive routing protocols. The ad hoc routing protocols which have both proactive and reactive merits, is called hybrid routing protocols The figure 1 shows the prominent way of classifying MANETs routing protocols. Protocols always maintain up-to-date information of routes from each node to every other node in the network. These protocols continuously learn the topology of the network by exchanging topological information among the network nodes. The first kind of protocol is Proactive MANET Protocol (PMP). The proactive routing protocols present good reliability on the current network topology and low latency for deciding a route. These are typically table-driven. Some examples of this protocol include DSDV, OLSR, WRP, and CGSR. The second kind of protocol is simply called Reactive MANET Protocol (RMP). In these kinds of protocol the communication is only possible when the source node requests to communicate with the other node. Reactive MANET Protocols are generally suited for nodes with high mobility or nodes that transmit data seldom. Some examples of this protocol include AODV, DSR, TORA and All Rights Reserved 272

3 Figure 1: Classification of MANET Routing Protocols The third kind of protocol is simply called Hybrid protocol. These protocols try to incorporate various aspects of proactive and reactive routing protocols. The difficulty of all hybrid routing protocols is how to organize the network according to network parameters. The hybrid routing protocols is leads to more memory and power consumption. Some examples of Hybrid Routing Protocols include ZRP, ZHLS, SHARP and CEDAR. IV. PROACTIVE ROUTING (TABLE-DRIVEN) PROTOCOLS Proactive routing protocol detects the layout of the network actively. A routing table can be maintained at every node from which a route can be determined by less delay. The proactive routing protocols present good reliability on the current network topology and low latency for deciding a route. These are typically table-driven. Based on the periodically exchanging of routing information between the different nodes, every node builds its personal routing table which can be used to find a path to a destination. These tables are updated regularly in order to maintain up-to-date routing information from each node to all other node. To preserve the latest routing information, topology information has to be exchanged between the nodes on a regular base. This leads to moderate overhead on the network. Examples of the proactive routing protocols are DSDV, OLSR, WRP, and CGSR explained below: A. Destination Sequenced Distance Vector Protocol (DSDV) Destination Sequenced Distance Vector (DSDV) Routing Algorithm is based on Bellman Ford Routing Algorithm with certain improvements. This protocol adds a new characteristic, sequence number, to all route table entry at every node. In DSDV every node in the network maintains a routing table in which all of the possible destinations within the network and the number of hops to each destination are recorded. Each entry is marked with a sequence number assigned by the destination node. The sequence numbers enable the mobile nodes to distinguish stale routes from new ones, thereby avoiding the formation of routing loops. The routing table updates can be sent in two ways: a full dump or an incremental update. A full dump sends the complete routing table to its neighbors and could All Rights Reserved 273

4 many packets whereas in an incremental update only those entries that have metric change were sent and it must form a packet. If there is space left over in the incremental update packet then those entries whose sequence number has changed may be included. Incremental updates are sent to avoid extra traffic and full dump are relatively irregular. In a rapid altering network, full dumps will be more frequent. B. Optimized Link State Routing Protocol (OLSR) Optimized Link State Protocol, a point-to-point proactive protocol that employs an efficient link state packet forwarding mechanism called multipoint relaying (MPR). It provides an efficient flooding mechanism by reducing the number of transmissions required. Optimizations are done in two ways: by reducing the size of the control packets and by reducing the number of links used for forwarding the link state packets. Here each node maintains the topology information about the network by periodically exchanging link-state messages among the other nodes. OLSR is based on the following three mechanisms: neighbor sensing, efficient flooding and computation of an optimal route using the shortest-path algorithm. Neighbor sensing is the detection of changes in the neighborhood of node. Each node determines an optimal route to every known destination using this topology information and stores this information in a routing table. Routes to every destination are immediately available when data transmission begins and remain valid for a specific period of time till the information is expired. OLSR uses four messages: Hello message, Topology control, Multiple Interface Declaration (MID), Host and Network Association (HNA). C. Wireless Routing Protocol (WRP) The Wireless Routing Protocol, as proposed by Murthy and Garcia-Luna-Aceves is a table-based protocol similar to DSDV that inherits the properties of Bellman- Ford Algorithm. Wireless routing protocols (WRP) is a loop free routing protocol. WRP is a path-finding algorithm with the exception of avoiding the count-to-infinity problem by forcing each node to perform consistency checks of predecessor information reported by all its neighbors. Each node in the network uses a set of four tables to maintain more accurate information: Distance table (DT), Routing table (RT), Link-cost table (LCT), Message retransmission list (MRL) table. In case of link failure between two nodes, the nodes send update messages to their neighbors. This eliminates looping situations and enables faster route convergence when a link failure occurs. Because of complexity of maintaining so many tables WRP requires larger memory and processing power and so does not support scalability. D. Cluster head Gateway Switch Routing Protocol (CGSR) The Cluster head Gateway Switch Routing protocol differs from the other protocols as it uses hierarchical network topology, instead of a flat topology. It organizes nodes into clusters, which coordinate among the members of each cluster entrusted to a special node named cluster head. Least Cluster Change (LCC) algorithm is applied to dynamically elect a node as the cluster head. Each node must keep cluster member table where it stores the destination cluster head for each mobile node in the network. These cluster member tables are broadcast by each node periodically using the DSDV algorithm. CGSR is an extension of DSDV and hence uses it as the underlying routing scheme. It has the similar overhead as DSDV. CGSR improves the routing performance by routing packets through the cluster heads and gateways. Gateway nodes are nodes that are within communication range of two or more cluster heads. A packet sent by a node is first routed to its cluster head, and then the packet is routed from the cluster head to a gateway to another cluster head, and so on until the cluster head of the destination node is reached. The packet is then transmitted to the All Rights Reserved 274

5 Parameters DSDV WRP OLSR CGSR Route updates Periodic Periodic Periodic Periodic Loop free Yes Yes Yes Yes Routing overhead High High Low Low Throughput Low Low Medium Medium Routing tables TABLE 1: COMPARISON OF PROACTIVE ROUTING PROTOCOLS V. REACTIVE ROUTING (ON-DEMAND) PROTOCOLS In Reactive or on-demand protocols, nodes do not exchange any routing information. A source node obtains a path to a specific destination only when it needs to send some data to it. These protocols do not attempt to maintain correct routing information on all nodes every time. That is whenever there is a need of a path from any source to destination then a type of query reply dialog does the effort. Hence the latency is high. On the other hand, no control messages are compulsory. Examples of Reactive routing protocols are AODV, DSR, TORA and ABR are explained below: A. Adhoc On demand Distance Vector Protocol (AODV) The AODV algorithm gives an easy way to obtain changes in the link position. For example if a connection fails warnings are sent only to the affected nodes in the network. This warning cancels all the routes through this affected node. The algorithms primary objectives are transmit route discovery packets only when desired, differentiate between local connectivity organization neighborhood detection and general topology maintenance and propagate information regarding changes in local connectivity to those neighboring mobile nodes that are likely requires this information. AODV builds unicast routes from source to destination and that s why the network usage is least. Since the routes are built on demand the network traffic is low. AODV uses Destination Sequence Numbers (DSN) to avoid counting to infinity that is why it is loop free. There are three AODV messages i.e. Route Request (RREQs), Route Replies (RREPs), and Route Errors (RERRs). Using UDP (user datagram protocol) packets, the source to destination route is revealed and maintained by these AODV messages. When the source node wants to create a new route to the destination, the requesting node transmits an RREQ message in the network. The destination node replies with RREP message. The RREP reaches the originator of the request. This route is only presented by unicasting a RREP back to the source node. The messages received by the source nodes are cached from originator of the RREQ to each node. When a link breaks an RERR message is generated. RERR message contains information regarding nodes that are not available. B. Dynamic Source Routing Protocol (DSR) Dynamic Source Routing protocol is used for wireless mesh networks. It is similar to AODV in that it forms a route on-demand when a transmitting node desires. Instead of relying on the routing table at each intermediate device DSR uses source routing. In DSR the source routes require accumulating the address of each device between the source and destination during route detection. The accumulated pathway information is cached by nodes processing the route detection packets. The known paths are used to route packets. To achieve source routing, the routed packets containing the address of All Rights Reserved 275

6 device will navigate which results in high overhead for long paths or large addresses resembling IPv6. The protocol is truly based on source routing whereby all the routing information is maintained at mobile nodes. It has only two major phases, which are Route Discovery and Route Maintenance. Route Reply could be created if the message has reached the intended destination node to answer the Route Reply. If not the node will turn around the route based on the route record in the Route Request message header (this requires that all links are symmetric). In the event of critical broadcast, the Route Maintenance Phase is initiated where the Route Error packets are generated by the node. The erroneous hop will be disconnected from the node's route cache. All the routes containing the hop are curtailed at that point. Again, the first phase of Route Discovery is initiated to determine the possible route. The destination node, on receipt of RRP, sends a route reply packet back to the source, which carries the information temporally about traversed route by route request packet. C. Temporally Ordered Routing Algorithm Protocol (TORA) TORA is an algorithm for routing data across Wireless Mesh Networks or Mobile ad hoc networks. It attempts to achieve a high degree of scalability using a "flat", non-hierarchical routing algorithm. TORA builds and maintains a Directed Acyclic Graph (DAG) rooted at a destination. No two nodes may have the same height. Information may flow from nodes with higher heights to nodes with lesser heights. By maintaining a set of completely planned heights TORA achieves loop-free multipath routing, as information cannot 'flow uphill' and so cross back on its. The key design concepts of TORA are localization of control messages to a very small set of nodes near the occurrence of a topological transform. To achieve this, nodes have to preserve the routing information about adjacent (one hop) nodes. The protocol performs three fundamental functions Route creation, Route maintenance and Route erasure. During the route creation and maintenance phases, nodes use a height metric to set up a directed acyclic graph (DAG) rooted at destination. Then links are assigned based on the relative height metric of nearest nodes. During the period of mobility, if the DAG is broken, the route maintenance unit comes into picture to reestablish a DAG routed at the destination. Timing is an important factor for TORA because the height metric is dependent on the logical time of the link failure. TORA's route erasure phase basically involves flooding a broadcast clear packet (CLR) throughout the network to erase invalid routes. D. Associativity Based Routing Protocol (ABR) ABR protocol is a reactive routing protocol with a metric called the degree of association stability. This associativity is a relationship measure of node s connectivity with its neighbors over time and space. ABR is a standardized routing protocol because of the fact that it provides the same importance to all nodes which participate in routing. A node caches an entry for each neighbor which records the number of beacons received. This information is stored in a variable termed associativity tick and is incremented each time a beacon is received. However, if high associativity ticks are observed, the node is in the steady state and this is the best point to select the node to perform ad-hoc routing. When a node or its neighbor moves to a new position, the nodes reset the associativity ticks. Associativity threshold is computed as follows: where are the broadcast range, the migrating speed, and the beaconing period. ABR protocol consists of three phases, namely, route discovery, reconstruction, and route deletion. The first phase comprises of broadcast query (BQ) and await-reply cycle. The query packet contains source ID, intermediate ID, destination ID, associativity ticks, sequence number, hop count, and a type field that identifies the type of the message. The destination node upon receiving the query packet can find the best route to source by selecting the nodes with high associativity ticks and send the REPLY packet to source node. Route reconstruction occurs when a connection of All Rights Reserved 276

7 established route changes due to source, destination, and intermediate node movement. In the final phase, when the source node doesn t require the route to the destination, it sends a route erasure message and all the intermediate nodes on the way to the destination delete the route from the routing table. Parameters AODV DSR TORA ABR Route Creation By source By source Locally By source Performance Metrics Speed Shortness Speed Speed Routing overhead High High High High Throughput High Low Low Low Multipath No Yes Yes Yes TABLE 2: COMPARISON OF REACTIVE ROUTING PROTOCOLS VI. HYBRID ROUTING PROTOCOLS Purely proactive or reactive protocols perform well in a limited region of network location. However, the various applications of ad-hoc networks pose a challenge for a single protocol to operate efficiently. For example, reactive routing protocols are well suited for networks where the call-tomobility ratio is comparatively low whereas Proactive routing protocols are well suitable for networks wherever this ratio is moderately high. The performance of both the protocols degrades when they are applied to regions of ad hoc networks spaced between the two extremes. These protocols incorporate the merits of proactive as well as reactive routing protocols. Nodes are grouped into zones based on their geographical locations or distances from each other. Inside a single zone, routing is done using tabledriven mechanisms while an on-demand routing is applied for routing beyond the zone boundaries. Hybrid routing protocols include: ZRP, ZHLS, SHARP and CEDAR are explained below: A. Zone routing protocol (ZRP) Zone Routing Protocol (ZRP) was first introduced by Haas and Pearlman. It is a hybrid protocol and to execute operations it divides the total network area into different zones. Zone size or radius does not depend on the distance; it depends on the number of hops. It is applicable in a wide variety of mobile ad-hoc networks with diverse mobility across a large distance. It uses separate strategy to find out new routes for nodes which are lying internally or external to the zone. There are four functions available in ZRP: MAC level task, IARP, IERP and BRP. IARP, proactive protocol is used to discover route within zone and the relational links are measured as unidirectional. To communicate with the nodes which are located in different zones, nodes utilize IERP, on-demand routing protocol. ZRP works as a normal flooding protocol when zone size is one. In order to identify the direct nearest nodes, it uses MAC protocol. And to recognize the other nodes within the zone it uses NDP (Neighbor Discovery Protocol). B. Zone Based Hierarchical Link State Routing Protocol (ZHLS) Zone-based Hierarchical Link State routing protocol is a hierarchical protocol, where the network is divided into non-overlapping zones. In addition, mobile nodes are assumed to know their physical locations with assistance from a locating system like GPS. Each node only knows the node connectivity within its zone and the zone connectivity of the whole network. The zone level topological information is distributed to all nodes. All network nodes in ZHLS construct two routing tables, an intrazone routing table and an interzone routing table. ZHLS uses a hierarchical address scheme which contains zone ID and node ID. A node determines its zone ID according to its location and the predefined zone map is well known to all nodes in the All Rights Reserved 277

8 A two-level network topology structure is defined in ZHLS, the node level topology and the zone level topology. Respectively, there are two kinds of link state updates, the node level LSP (Link State Packet) and the zone level LSP. A node level LSP contains the node IDs of its neighbors in the same zone and the zone IDs of all other zones. A node periodically broadcast its node level LSP to all other nodes in the same zone. Gateway nodes broadcast the zone LSP throughout the network whenever a virtual link is broken or created. Consequently, every node knows the current zone level topology of the network. Before sending packets, a source firstly checks its intra-zone routing table. If the destination is in the same zone as the source, the routing information is already there. Otherwise, the source sends a location request to all other zones through gateway nodes. After a gateway node of the zone, in which the destination node resides, receives the location request, it replies with a location response containing the zone ID of the destination. The zone ID and the node ID of the destination node will be specified in the header of the data packets originated from the source. C. Sharp Hybrid Adaptive Routing based protocol (SHARP) Sharp Hybrid Adaptive Routing Protocol, formally known as SHARP is one category of Hybrid Routing Protocol that maintains the balance between proactive and reactive routing by adjusting the degree to which route information is propagated proactively versus the degree to which it needs to be discovered reactively. It adapts efficiently and seamlessly between proactive and reactive routing strategies. This adaptation can be directed to optimize the user-defined performance metrics, such as loss rate, routing overhead, or delay jitter. SHARP adapts between reactive and proactive routing by dynamically varying the amount of routing information shared proactively. This protocol defines the proactive zones around some nodes. The number of nodes in a particular proactive zone is determined by the node-specific zone radius. All nodes within the zone radius of a particular node become the member of that particular proactive zone for that node. If for a given destination a node is not present within a particular proactive zone, reactive routing mechanism (query-reply) is used to establish the route to that node. Proactive routing mechanism is used within the proactive zone. In this protocol, proactive zones are created automatically if some destinations are frequently addressed or sought within the network. D. Core Extraction Distributed Ad hoc Routing Protocol (CEDAR) Core Extraction Distributed Ad hoc Routing (CEDAR) is a partitioning protocol, integrates routing with QoS support. Each partition includes a core node called dominator node. A Dominator Set (DS) of a graph is defined as a set of nodes in the graph such that every node is either present in DS or is a neighbor of some node present in DS. The core nodes use a reactive source routing protocol to outline a route from a source to a destination. CEDAR has three key phases. First phase is the establishments and maintenance of self-organizing routing infrastructure (core) for performing route computations. Second phase is the propagation of the link-states of high-bandwidth and stable links in the core. Third phase is a QoS route computation algorithm that is executed at the core nodes using only locally available state. QoS routing in CEDAR is achieved by propagating the bandwidth availability information of stable links in the core sub-graph. To propagate the link information, slow moving increase-waves and fast moving decrease waves are used, which denotes increase of bandwidth and decrease of bandwidth All Rights Reserved 278

9 Parameters ZRP ZHLS SHARP CEDAR Routing Structure Flat Hierarchical Hierarchical Hierarchical Multiple routes No Yes Yes Yes Route information stored in Intrazone & Interzone tables Intrazone & Interzone tables Intrazone & Interzone tables Intrazone & Interzone tables Route metric Shortest path Shortest path Shortest path Shortest path TABLE 3: COMPARISON OF HYBRID ROUTING PROTOCOLS VII. COMPARISON OF PROTOCOLS In this section we have presented a comparison between existing routing protocols. TABLE 4 below provides an overall comparison of the three categories of routing protocols. The comparisons basically consider the characteristic properties of routing protocols in high load networks. Proactive routing protocols make an effort to preserve routes to all possible destinations, despite of whether or not they are desirable. Routing information is constantly maintained and propagated. On contrast, reactive routing protocols commence route discovery on the demand of data transfer traffic. Routes are desired only to those preferred destinations. This routing approach can spectacularly reduce routing overhead when a network is relatively static and the active transfer is low. The hybrid routing approach can adjust its routing strategies according to the network characteristics and thus provides an attractive method for routing in MANETs. However, a network's individuality, such as the mobility and traffic pattern, can be expected to be energetic. The linked information is very difficult to obtain and maintain. This complexity makes hard to implement the dynamically adjusting routing strategies. Protocols Proactive Reactive Routing structure Control Overhead Route acquisition delay Bandwidth requirement Power requirement Both Flat and hierarchical High Low High High structures Mostly Flat, Except CBRP Low High Low Low Hybrid Flat Medium Lower for Intrazone; Higher for Inter-zone Medium Medium TABLE 4: COMPARISON BETWEEN THE THREE CATEGORIES OF ROUTING PROTOCOLS VIII. CONCLUSION In this paper, we have presented and discussed the taxonomy of routing protocols in mobile ad hoc networks and provided comparisons between them. The protocols are divided into three main categories: (i) source-initiated (reactive or on-demand), (ii) table-driven (pro-active), (iii) hybrid protocols. Each routing protocol has unique features. We reviewed and compared a number of protocols. The main differentiating factor between the protocols is the ways of finding and maintaining the routes between source destination pairs. The comparison indicates that the design of a secure ad hoc routing protocol constitutes a challenging research problem against the existing security solutions. We hope All Rights Reserved 279

10 the taxonomy presented in this paper will be helpful and provide researchers a platform for choosing the right protocol for their work. At last we have provided the overall characteristic features of all routing protocols and described which protocols may perform best in large networks. Almost all the protocols we discussed in this paper have their own characteristic features and performance parameter combinations where they outperform their competitors. Mobile ad hoc networks have posed a great challenge for the researchers due to changing topology and security attacks, and none of the protocols is fully secured and research is going on around the globe. REFERENCES 1. Anuj K. Gupta, Dr. Harsh Sadawarti and Dr. Anil K. Verma, Performance analysis of AODV, DSR & TORA Routing Protocols, IACSIT International Journal of Engineering and Technology, Vol.2, No.2, April 2010 ISSN: S. Ahmed and M. S. Alam, Performance Evaluation of important ad hoc networks protocols, EURASIP Journal on wireless Communications and networking, Vol: 2006, Article ID 78645, PP 1-11, Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar, Comparative Study of Adhoc Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork, Indian Journal of Computer Science and Engineering Vol. 1 No , Shaily Mittal, Prabhjot Kaur, Performance Comparison of AODV, DSR and ZRP Routing Protocols in MANET's, International Conference on Advances in Computing, Control, and Telecommunication Technologies, Sunil Taneja, Ashwani Kush, A Survey of Routing Protocols in Mobile Adhoc Networks, International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August Suresh Kumar and Jogendra Kumar, Comparative Analysis of Proactive and Reactive Routing Protocols in Mobile Ad- Hoc Networks (Manet), Journal of Information and Operations Management ISSN: & E-ISSN: , Volume 3, Issue 1, N. S. Yadav and R.P. Yadav Performance Comparison and Analysis of Table- Driven and On- Demand Routing Protocols for Mobile Adhoc Networks, International Journal of Information Technology, vol.4, no. 2, pp , J. Luo, D. Ye, X. Liu, and M. Fan, A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks, IEEE Communications Surveys & Tutorials, vol. 11, no. 1, First Quarter Z. J. Haas, M. Perlman, The Performance of Query Control Schemes of the Zone Routing Protocol, IEEE/ACM Transactions on Networking, vol. 9, no. 4, pp , Aug P. Samar, M. R. Pearlman, and Z. J. Haas, Independent zone routing: an adaptive hybrid routing framework for ad hoc wireless networks, in IEEE/ACM Transactions on Networking (TON), vol. 12, 2004, pp Kulwinder Kaur and Barinderpal Singh, Survey Analysis of Routing Protocols and Mobility Models in MANETs, International Journal of Advanced Science and Technology, pp 55-64, volume 85, Hemagowri.J, Baranikumari.C, Brindha. B, A Study on Proactive Routing Protocol in Ad-hoc network, International Journal of Modern Engineering Research, pp 01-04, volume 2, November Hrituparna Paul, Dr. Prodipto Das, Performance Evaluation of MANET Routing Protocols, International Journal of Computer Science Issues, pp , volume 9, July M. palaniammal, m. lalli, comparative study of routing protocols for manets, International Journal of Computer Science and Mobile All Rights Reserved 280

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Keywords: - MANETs, Unicast, Network, Classification, Routing

Keywords: - MANETs, Unicast, Network, Classification, Routing Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Classification

More information

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing Volume 5, Issue 5, MAY 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on Unicast

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs

Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs Nafiza Mann Department of Computer Science and Engineering RIMT-IET, Mandi-Gobindgarh, Punjab, India Abhilash Sharma Department

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

Energy Efficient Routing Protocols in Mobile Ad hoc Networks International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 7 (August 2012), PP. 45-51 Energy Efficient Routing Protocols in Mobile

More information

A Survey on Performance Evaluation of MANET Routing Protocols

A Survey on Performance Evaluation of MANET Routing Protocols ISSN 2278 0211 (Online) A Survey on Performance Evaluation of MANET Routing Protocols Aviral Kumar Nishank Tyagi Vipin Kumar Abstract: The task of finding and sustaining routes in Mobile Ad-hoc Networks

More information

A Novel Review on Routing Protocols in MANETs

A Novel Review on Routing Protocols in MANETs Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract

More information

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW Kirandeep Kaur 1, Mr.Pawan Luthra 2, Er.Gagandeep 3 1 Department of Computer Science and Engineering, Shaheed Bhagat Singh

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Keywords- Routing protocols, Mobile Ad hoc network, routing schemes Classification of protocols, Comparison of protocols.

Keywords- Routing protocols, Mobile Ad hoc network, routing schemes Classification of protocols, Comparison of protocols. Classification of Routing Protocol in Mobile Ad Hoc Networks: A Review Vishal Pahal,* Amit Verma, Payal Gupta Department of Computer Science & Engineering Jind Institute of Engineering & technology. Jind,

More information

A Survey of Routing Protocols for Ad Hoc Networks Based on Update Mechanism

A Survey of Routing Protocols for Ad Hoc Networks Based on Update Mechanism A Survey of Routing Protocols for Ad Hoc Networks Based on Update Mechanism Ruaa A. S. Alsabah, Ali A. J. Al-Sabbag, and H. Alzorghani Abstract An essential matter for ad hoc networks is routing protocol

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Comprehensive Study and Review Various Routing Protocols in MANET

Comprehensive Study and Review Various Routing Protocols in MANET 126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Exploring Performance of Different Adhoc Routing Protocols in Mobile Adhoc Networks

Exploring Performance of Different Adhoc Routing Protocols in Mobile Adhoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.307

More information

A Review Paper on Routing Protocols in Wireless Sensor Networks

A Review Paper on Routing Protocols in Wireless Sensor Networks A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,

More information

Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET

Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA) in MANET www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 3 March 2013 Page No. 707-718 Comparative study of reactive routing protocol (AODV, DSR, ABR and TORA)

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department

More information

Comparative Performance Analysis of AODV,DSR,DYMO,OLSR and ZRP Routing Protocols in MANET using Random Waypoint Mobility Model

Comparative Performance Analysis of AODV,DSR,DYMO,OLSR and ZRP Routing Protocols in MANET using Random Waypoint Mobility Model Comparative Performance Analysis of AODV,DSR,DYMO,OLSR and ZRP Routing Protocols in MANET using Random Waypoint Mobility Model ISSN: 2349-6363 Jogendra Kumar Department of computer science and engineering

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Routing in Ad Hoc Networks

Routing in Ad Hoc Networks Chapter 2 Routing in Ad Hoc Networks 2.1 Introduction A MANET environment, illustrated in Figure 2.1(a), is characterized by energy-limited nodes (Mobile Hosts), bandwidth-constrained, variable-capacity

More information

A Study on Routing Protocols for Mobile Adhoc Networks

A Study on Routing Protocols for Mobile Adhoc Networks A Study on Routing Protocols for Mobile Adhoc Networks R.Logambal 1, Dr.K.Chitra 2 Research Scholar, Dept of Computer Science, Bharathiar University, Coimbatore, India 1 Asst. Professor, Govt Arts College,

More information

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords: Volume-9 Number-1 Jan -June 2017 pp. 16-21 available online at www.csjournalss.com Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Sachin Lalar, Arun Kumar Yadav

More information

DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS

DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS Melvin John Supervised By Dr. Cheryl Pope & Dr. Cruz Izu Submitted to the School of Computer Science The University

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 39 CHAPTER 2 LITERATURE REVIEW This chapter gives a brief summary of the MANET routing protocol types and their details. 2.1 ROUTING IN AD-HOC NETWORKS Routing is the act of moving information from source

More information

Routing in Ad Hoc Networks

Routing in Ad Hoc Networks Chapter 2 Routing in Ad Hoc Networks 2.1 Introduction A MANET environment, illustrated in Figure 2.1(a), is characterized by energy-limited nodes (Mobile Hosts (MHs)), bandwidth-constrained, variable-capacity

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols. MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology

More information

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS Er. Upasana garg 1, Dr. Vikram Singh 2 1 Student, Computer Science and Application Deptt, CDLU, Sirsa, Haryana, India,upasna.garg44@gmail.com

More information

Chapter 7 Routing Protocols for Ad Hoc Wireless Networks. Jang-Ping Sheu

Chapter 7 Routing Protocols for Ad Hoc Wireless Networks. Jang-Ping Sheu Chapter 7 Routing Protocols for Ad Hoc Wireless Networks Jang-Ping Sheu Introduction Routing protocols used in wired networks cannot be directly applied to ad hoc wireless networks Highly dynamic topology

More information

A Survey of Routing Protocols for Ad Hoc Wireless Home Networks

A Survey of Routing Protocols for Ad Hoc Wireless Home Networks International Journal of Electronics and Computer Science Engineering 52 Available Online at www.ijecse.org ISSN-2277-1956 A Survey of Routing Protocols for Ad Hoc Wireless Home Networks Meenakshi Chaturvedi

More information

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) RESEARCH ARTICLE International Journal of Computer Techniques - Volume 2 Issue 1, 2015 OPEN ACCESS A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) Sejal D Mello 1, Priyanka B. Patil 2, Tarannum

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Chapter 4 Routing in Mobile Ad Hoc Networks

Chapter 4 Routing in Mobile Ad Hoc Networks 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Chapter 4 Routing in Mobile Ad Hoc Networks Al-Sakib Khan Pathan and Choong Seon

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

ROUTING PROTOCOLS FOR MANETs

ROUTING PROTOCOLS FOR MANETs ROUTING PROTOCOLS FOR MANETs A Master s Project Presented to Department of Telecommunications In Partial Fulfillment of the Requirements for the Master of Science Degree State University of New York Polytechnic

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

The General Analysis of Proactive Protocols DSDV, FSR and WRP

The General Analysis of Proactive Protocols DSDV, FSR and WRP Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.

More information

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet) Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet) Dr. Naveen Kr. Singh Ms. Neetu Sharma Ms. Shweta Agarwal Asso. Prof. Asstt. Prof. Asstt. Prof. ABES Engineering College ABES

More information

ROUTING PROTOCOLS FOR MANET WITHIN MULTICHANNEL

ROUTING PROTOCOLS FOR MANET WITHIN MULTICHANNEL ROUTING PROTOCOLS FOR MANET WITHIN MULTICHANNEL MS. AMANDEEP KAUR Department of Computer Science and Technology, Asst Prof,in Guru Nanak National.College(Women),Nakodar,Punjab,India Abstract Mobile ad

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks Dr. Kamaljit I. Lakhtaria

Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks Dr. Kamaljit I. Lakhtaria Int. J. Advanced Networking and Applications 1416 Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks Dr. Kamaljit I. Lakhtaria Email: kamaljit.ilakhtaria@gmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Comparative Performance Analysis of Routing Protocols in MANET using Varying Pause Time

Comparative Performance Analysis of Routing Protocols in MANET using Varying Pause Time Comparative Performance Analysis of Routing Protocols in MANET using Varying Pause Time Suresh Kumar Computer Science & Engineering Department G.B. Pant Engineering College Pauri Garhwal Uttarakhand, INDIA

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi

More information

Routing protocols in Mobile Ad Hoc Network

Routing protocols in Mobile Ad Hoc Network Routing protocols in Mobile Ad Hoc Network Presented By :- Nitesh Jain Date:-26/10/2005 SCHOOL OF INFORMATION TECHNOLOGY INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR KHARAGPUR Types of Wireless Networks Infrastructure

More information

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data ISSN (e): 2250 3005 Volume, 08 Issue, 4 April 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

Chapter-2 Routing Protocols of MANET

Chapter-2 Routing Protocols of MANET Chapter-2 Routing Protocols of MANET Chapter 2 Routing Protocols of MANET Routing is an important function for any network, whether it is for wired or wireless. The protocols designed for routing in these

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Volume 2, Issue 1, January 2012 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering

Volume 2, Issue 1, January 2012 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 1, January 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Energy-Efficient

More information

COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MANETS

COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MANETS COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MANETS M. Palaniammal Computer Science and Engineering Bharathidasan University Trichy, India. m.palanimca@gmail.com M. Lalli Computer Science and Engineering

More information

Mr. Pradip A. Chougule 1, Mr. Rajesh A. Sanadi 2, Mr. U. H.Kamble 3

Mr. Pradip A. Chougule 1, Mr. Rajesh A. Sanadi 2, Mr. U. H.Kamble 3 IOSR Journal of Computer Engineering (IOSR-JCE) ISSN: 2278-0661, ISBN: 2278-8727, PP: 01-05 www.iosrjournals.org COMPARATIVE STUDY OF TABLE DRIVEN ROUTING PROTOCOLS IN AD HOC WIRELESS NETWORKS Mr. Pradip

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks E. Suresh Babu P S V Srinivasa Rao M Srinivasa Rao C Nagaraju Assoc. Prof. of CSE K L University, Vijayawada.

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 3, May

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 3, May Cluster Based on Demand Routing Protocol for Mobile Ad Hoc Network Neha Gupta Er. Manish Shrivastava Angad Singh Deptt. of IT Head of Deptt. of IT Assot. Professor Deptt. of IT LNCT BHOPAL INDIA Abstract

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

Maharishi Markandeshwar University

Maharishi Markandeshwar University RESEARCH ARTICLE OPEN ACCESS Simulation Based Performance Comparison of Adhoc Routing Protocols Kushagra Agrawal*, Shaveta Jain** *Department of Computer Science,, Mullana, Ambala agrawal_kushagra@rediffmail.com

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid

More information

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract: Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering

More information

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Oxford University Press 2007. All rights reserved. 1 Temporally ordered routing algorithm (TORA) A reactive

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in

More information

Chapter 16. Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols. Wireless Network Models. Illustration of an ad hoc network

Chapter 16. Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols. Wireless Network Models. Illustration of an ad hoc network Chapter 16 Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols Associate Prof. Yuh-Shyan Chen Department of CSIE National Chung Cheng University Wireless Network Models With Infrastructure:

More information

Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols

Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols Chapter 16 Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols Associate Prof. Yuh-Shyan Chen Department of CSIE National Chung Cheng University 2002/11/ Yuh-Shyan Chen 1 Wireless Network

More information

Survey of Routing Protocols for Mobile Ad-hoc Network

Survey of Routing Protocols for Mobile Ad-hoc Network Survey of Routing Protocols for Mobile Ad-hoc Network Humayun Bakht Taitec College Manchester, United Kingdom ABSTRACT Routing is a challenging issue in mobile ad-hoc network. Concerning routing various

More information