CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS
|
|
- Shannon Adams
- 5 years ago
- Views:
Transcription
1 59 CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 4.1 OVERVIEW OF SIMULATION MODEL The performance of a MANET routing protocol under varying network conditions is to be evaluated in order to understand the behaviour and assess the applicability of the protocol. Simulation is a tool which can be used to assess the performance of the protocol prior to implementing in a real-time environment. Network Simulator -2 (NS-2) version 2.30 (The Network Simulator - NS-2 Home page) was used in the present investigation. It records data regarding the traffic and saves in a trace file which can be used for detailed analysis. These trace files usually contains packet level information generated during packet transmission among nodes. The trace file format with two lines is shown below for reference. The relevant meaning for abbreviations is included in Table 4.1 and Table 4.2. LINE 1 S -T HS 9 -HD -2 -NI 9 -NX NY NZ NE NL AGT -NW --- -MA 0 -MD 0 -MS 0 -MT 0 -IS 9.2 -ID 3.0 -IT CBR -IL 512 -IF 0 -II 0 -IV 32 -PN CBR -PI 0 -PF 0 -PO 0 LINE 2 R -T HS 9 -HD -2 -NI 9 -NX NY NZ NE NL RTR -NW --- -MA 0 -MD 0 -MS 0 -MT 0 -IS 9.2 -ID 3.0 -IT CBR -IL 512 -IF 0 -II 0 -IV 32 -PN CBR -PI 0 -PF 0 -PO 0
2 60 Table 4.1 Wireless flags of trace file (Riswold 2003). Abbreviation Flag Type Value -t Double Time -Ni int Node ID -Nx double X coordinate of node -Ny double Y coordinate of node -Nz double Z coordinate of node -Ne double Node energy level s: Send r: Receive d: Drop f: Forward -Nl string Network trace level (AGT, RTR etc.) -Nw string Drop reason -Hs int Hop source node ID -Hd int Hop dest. node ID, -1, -2 -Ma hexadecimal Duration -Ms hexadecimal Source Ethernet address -Md hexadecimal Destination Ethernet address -Mt hexadecimal Ethernet type -P string Packet type -Pn string Packet type (cbr, tcp)
3 61 Table 4.2 IP and TCP flags for trace file (Riswold 2003). Event Flag Type Value -ls int Source address and port -ld int Destination address and port -lt string Packet type -ll int Packet size IP Trace -lf int Flow ID -li int Unique ID -lv int TTL Value -Ps int Sequence Number -Pa int Acknowledgement Number TCP Trace -Pf int No. of times packet forwarded -Po int Optimal forwards Compared to other competing simulators such as OPNET and GloMoSim, NS-2 offers the following unique characteristics (Lee Breslau et al (2000) and Sandeep Bajaj et al (1999)). NS is an event driven and object oriented simulator. NS uses a discrete event processor as its engine. NS performs sequential simulation NS uses a split programming model which includes C++ language for low level event processing and tcl language for high end processing such as configuration of protocol objects, nodes, routes and links.
4 In addition to that, NS offers the following additional features which made it a suitable choice for this present investigation: 62 Setting up of simulation scenarios: It is possible to create network topologies and define links between nodes. Apart from that it is possible to create traffic models with specific source and destination with workload. The node and link failures can also be monitored. Modifying existing protocols: In most of the cases, a common research objective might be modifying an existing protocol or proposing a new protocol and compare it with the existing protocol in NS. NS provides this possibility and an ideal choice for modification which is publicly available with a very good protocol library. 4.2 INSTALLATION AND CONFIGURATION The NS-2 was installed with Fedora Linux operating system. The 2.30 version of the NS-2 software was downloaded and installed based on instructions from After installation, the./validate command was executed to ensure successful installation. After the validation process, the.bashrc file was modified to set the PATH correctly, LD_LIBRARY, and TCL_LIBRARY variables for the proper use of NS SIMULATION SCENARIOS The simulation scenarios were established using Tcl programming. The traffic flows, movement patterns and other simulation environment variables were defined within the Tcl files. The MAC protocol is defined to be the wireless channel and DSR is defined as the routing protocol. Each mobile node used a Two-
5 63 Ray Ground radio propagation model with an Omni antenna. The initial battery capacity of each node assumed to be 100%. The battery capacity of a mobile node was decremented in a predefined manner by the txpower and rxpower levels which remains constant throughout the simulation. In order to conform to the IEEE b specification, the datarate_ variable was set to 11 Mbps and the basicrate_ variable was set to 1 Mbps. These settings are important to change the default NS-2 setting of 2 Mbps. The CTS / RTS process used in IEEE b within NS2 normally generate huge volumes of data that made processing the trace files complicated. In order to restrict the processing of unnecessary data, the RTSThreshold_ variable was set to 3,000 bytes which restrict the processing of packets that have a size greater than 3,000 bytes. As per the definition, the simulation scenarios did not generate packets larger than 512 bytes which is well below the set RTSThreshold_ variable. In the present investigation, two different simulation scenarios, predefined scenario and random scenario were defined and detailed performance analysis was carried out Pre-defined Scenario In a pre-defined scenario, the topology, traffic flow and nodal movements are predetermined which is programmed in Tcl. These pre-defined setup of a network environment helps to verify and compare the functionality and performance of the modified DSR protocol with standard DSR protocol. Even though, in a real MANET environment, the changes in topology and node mobility are random and unpredictable in nature, an occurrence of congestion or failure of a node can easily be created in a pre-defined MANET situation which paves the way for more accurate and pointed analysis of the performance of the protocol. The pre-defined topology was created in a 1200 x 1200 meter grid with 17 nodes. The size of the topology was selected in such a way that it should provide adequate node spacing in order to minimize interference that cause dropping of
6 64 packets. Considering the size of the topology and node spacing, the speed of nodes is set at 10 meters per second. Each node had a maximum queue size of 50 packets. The five destination nodes were placed close to the border of the topology in a circular manner and the two source nodes located at the center as shown in Figure 4.1. The destinations were placed away from each other so that transmission interference and signal overlap could be avoided. The destination nodes were stdatic throughout the simulation and the source nodes moved in a clock-wise manner. The data transmission from the source defined to be transmitted during pause times through a pre-defined path and by using a hop of another stationary node. During transmission, few other intermediate nodes are moved inside the transmission range to provide alternate path to destination. In addition to that, the workload was intentionally increased in certain instance to cause congestion in the primary path. An example of a Tcl file used in a random scenario is given in Appendix 2. Figure 4.1 Initial Node position in a pre-defined topology.
7 65 Six different simulation iterations were carried out in sets of three. In the first set, the pause time was varied at 4, 10 and 20 seconds, by keeping the workload and data rate constant at 5 CBR and 200 PPS, respectively. This will create high, medium and low mobility scenarios. In the second set, the workload was varied at 10, 15 and 20 CBR traffic flows by keeping the pause time and data rate constant at 4 seconds and 200 PPS, respectively. This will result in low, medium and high workload scenarios. For example, in a 10 CBR workload scenario, one source node transmit two CBR traffic to three destinations and the another source node transmit two CBR traffic to other two destinations. In case of 15 and 20 CBR workload, the number of traffic flows from the source node proportionally increased to 3 and 4 CBR, respectively Random Scenario In realistic situations, MANETs consists of mobile nodes that move and generate traffic randomly. In order to validate the functionality of the modified DSR in diverse and unpredictable random environment, a random scenario was created with NS-2. In the random scenario, the topologies, CBR multimedia traffic flows and movement patterns were created randomly. The random topology consisted of 800 x 800 meter grid with 20 nodes. This smaller topology was used to create a densely populated network that did not consider spatial boundaries or interference as considered in pre-defined scenario. The packet sizes of CBR multimedia streams were fixed at 512 bytes with each node had a maximum queue size of 50 packets. The simulation time was set to be 400 seconds and the speed of the node is 10 m/s. The scenarios were similar to the pre-defined scenario with varying mobility and workload environment. An example of a Tcl file used in a random scenario is given in Appendix 3.
8 66 During the random scenario simulation, the traffic flows and movement patterns were randomly created using the cbrgen.tcl and setdest.exe utilities of NS- 2. The pattern for CBR is as follows: ns cbrgen.tcl [-type cbr tcp][-nn nodes][-seed seed][-mc connections][-rate rate] These utilities create text files for repeatable use and testing. Within these text files, the random traffic flow and movement patterns were defined. The generated text files were referenced and called from within the Tcl files which allowed both the standard and modified DSR protocols to be tested using the same movement and traffic flow pattern. 4.4 PERFORMANCE METRICS In streaming multimedia applications, throughput alone cannot be considered as performance indicator and that mobility may have a deceive effect on other parameters. Reide and Seide (2003) insisted on measuring packet loss, endto-end delay and jitter to further validate the network performance. (Durkin 2003) stated that packet loss and delay are the most important measures for CBR traffic. In the present investigation, the performance metrics such as throughput, average jitter, average end-to-end delay, packet delivery fraction (PDF) and percentage packet loss were calculated and evaluated for both normal DSR and modified DSR. The above mentioned performance metrics were calculated as follows: Throughput Number of bytesreceived 8 Throughtpu t kbps (4.1) Time 1000
9 67 The instant throughput can be computed if the time been considered as instant time. Similarly, the average throughput can be computed using the same relationship by considering the time as total simulation time Average Jitter Jitter is a measure of variation in delay across multiple packets associated with a given traffic flow. In streaming multimedia applications, only a small and limited amount of jitter is tolerable Average End-to-End Delay The average end-to-end delay is a measure of average time taken to transmit each packet of data from the source to the destination. Network congestion is indicated by higher end-to-end delays Packet Delivery Fraction (PDF) PDF is the ratio of successfully received packets to the number of sent packets. A higher PDF value indicates a good network performance with lower packet loss Percentage Packet Loss Number of packetssent - Number of packets received % Packet loss 100 (4.2) Number of packetssent In pre-defined scenarios, the performance metrics were calculated using the generated trace files. The $tracefd variable of the Tcl file can establish the
10 68 parameter and specify the trace file for a particular simulation scenario. The data stored in the trace file can be imported as an external data and then it can be graphed for further comparison. Within the Tcl files, the performance metrics concerning traffic to a particular destination were also calculated using the record procedure. The data can be collected by repeating this procedure every five seconds. In random scenarios, it is very difficult to capture the traffic details of individual nodes since there is no predefined source or destination nodes. The nodes assume their role as either source or destination during the start of the simulation and communicate via intermediate nodes available at that instance. Hence, different awk programs were used to extract the performance metrics from the generated trace files. For example, the average throughput can be calculated by giving the following command: > awk -f throughput.awk dsr-highmobility.tr > throughput.out The throughput.awk is the program which calculate the throughput by using the data generated in the trace file dsr-highmobility.tr and give the output in throughput.out file. Similarly, the other performance metrics can be calculated using the same procedure with the help of corresponding awk programs. A sample awk program is given in Appendix 4.
4. Simulation Model. this section, the simulator and the models used for simulation are discussed.
4. Simulation Model In this research Network Simulator (NS), is used to compare and evaluate the performance of different ad-hoc routing protocols based on different mobility models. In this section, the
More informationPart 5. Wireless Network
Introduction to NS-2 Part 5. Wireless Network Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Introduction to Wireless Network An Example of Wireless Simulation
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationA STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS
A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND DSDV IN MANET USING NS-2
PERFORMANCE ANALYSIS OF AODV, DSR AND DSDV IN MANET USING NS-2 Subhrananda Goswami 1 * and Chandan Bikash Das 2 1 Assistant Professor, Department of IT, Global Group of Institutions, Haldia, Purba Midnapore,
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationPerformance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks
Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/
More informationA Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks
International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2
More informationNetwork Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.
Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple
More informationAnalysis and Simulations of Routing Protocols with Different Load Conditions of MANETs
Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Poonam Pahuja Department of Computer Engineering, Mewar University, Chittorgarh Rajasthan, Email: poonamsanjay2007@gmail.com
More informationAnalysis of Routing Protocols in MANETs
Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,
More informationMobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV
Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationCHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN
26 CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN Due to the continuous research progress in the field of WSN, it is essential to verify the new hardware and software design and
More informationA Simulation study : Performance comparison of AODV and DSR
A Simulation study : Performance comparison of AODV and DSR K.Dileep Kumar 1, N.Seethayya 2, H.Venkata Bhagya Sri 3,S.Papa Rao 4 1,2,3,4 Asst.Professor Department of CSE, Sri Sivani College of Engineering,
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationChallenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast
More informationAPPENDIX A. Installation Procedure of VanetMobiSim 1.1
APPENDIX A Installation Procedure of VanetMobiSim 1.1 A1.1 How to install VanetMobiSim-1.1 The first step is downloading the source code of VanetMobiSim-1.1and expand it in a base directory of our choice.
More informationCHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION
58 CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 4.1 INTRODUCTION TO SLBHAD The focus of this chapter is to detect and isolate Black Hole attack in the MANET (Khattak et al 2013). In order to do that,
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationChapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION
Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service
More informationPerformance Analysis of Three Routing Protocols for Varying MANET Size
Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,
More informationAVC College of Engineering, Mayiladuthurai, India
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationImpact of Mobility Models on the Performance of Routing Protocols in Mobile Ad Hoc Networks
Impact of Mobility Models on the Performance of Routing Protocols in Mobile Ad Hoc Networks Mohammad Amin Roshanasan a, Ghassan A. QasMarrogy b, Zainab Murtadha c, Jia Uddin d, *, Emmanuel A. Oyekanlu
More informationPerformance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model
Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationChapter-4. Simulation Design and Implementation
Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview
More informationAnalysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol
Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol with Emphasis on Mobility and Communication Patterns Vahid Garousi Department of Systems and Computer Engineering Carleton University,
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationSimulation Based Performance Evaluation of Various Routing Protocols in MANETs
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) e-issn: 2394-5, P-ISSN: 2394-42.Volume 3, Issue 4 (Jul. - Aug. 216), PP 23-39 www.iosrjournals.org Simulation Based Performance Evaluation of
More informationCERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research
CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West
More informationPerformance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks
, pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh
More informationEvaluation of Mobility Models with AODV & OLSR Protocol by Varying Node Speed in MANET
Evaluation of Mobility Models with AODV & OLSR Protocol by Varying Node Speed in MANET Smt. Rekha Shahapurkar 1, Dr. Umesh Kumar Singh 2, Sh. Yogesh Mishra 3 1 Reasearch Scholar, 2 Reader 3 Assistant ptofessor
More informationPerformance Evaluation of Routing Protocols for Mobile Ad Hoc Networks
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib
More informationIssues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study
Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationPerformance of Ad-Hoc Network Routing Protocols in Different Network Sizes
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co
More informationPERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET
Volume 1, Issue 4, 215 PERFORMANCE BASED EVALUATION OF, AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh Gyan Vihar University Abstract:A Mobile
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationOPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS
OPNET BASED SIMULATION AND INVESTIGATION OF WIMAX NETWORK USING DIFFERENT QoS Kamini Jaswal 1, Jyoti 2, Kuldeep Vats 3 1 M.tech, Department of electronics and communication, South point institute of engineering
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationPOLITECNICO DI TORINO Repository ISTITUZIONALE
POLITECNICO DI TORINO Repository ISTITUZIONALE Comparative Performance Simulation of DSDV, AODV and DSR MANET Protocols in NS2 Original Comparative Performance Simulation of DSDV, AODV and DSR MANET Protocols
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationPerformance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2
Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2 Fan-Shuo KONG, Bei-Bei CUI School of Software Engineering, Beijing University of Technology, Beijing, China e-mail: kongfanshuo0224@163.com,
More informationSIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 9, Sep 2015, pp. 32-41, Article ID: IJCET_06_09_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=6&itype=9
More informationPerformance Analysis of Routing Protocols for Mobile Ad-hoc Networks
Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks Anil Choudhary Department of Electrical and Electronics Engineering Rajiv Gandhi Govt. Polytechnic, Itanagar, Arunachal Pradesh, India
More informationPERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET
Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh
More informationRouting Protocols Simulation of Wireless Self-organized Network Based. on NS-2. Qian CAI
International Conference on Computational Science and Engineering (ICCSE 2015) Routing Protocols Simulation of Wireless Self-organized Network Based on NS-2 Qian CAI School of Information Engineering,
More informationCHAPTER 3 IMPROVED AODV BASED ON LINK QUALITY METRICS
63 CHAPTER 3 IMPROVED AODV BASED ON LINK QUALITY METRICS 3.1 INTRODUCTION The current ad hoc wireless routing protocols usually select the route with the shortest-path or minimum hop count to the destination
More informationCHAPTER 5 IMPLEMENTATION OF ROUTING PROTOCOLS ON NETWORK SIMULATORS
Implementation of Routing Protocols on Network Simulators 1 CHAPTER 5 IMPLEMENTATION OF ROUTING PROTOCOLS ON NETWORK SIMULATORS 5.1 Introduction This chapter primarily focuses on the implementation of
More informationEfficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection
Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Kin Choong Yow School of Computer Engineering Nanyang Technological University Nanyang Avenue,
More informationMobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks
MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks Priya Mahadevan UC, San Diego pmahadevan@cs.ucsd.edu Adolfo Rodriguez IBM, RTP and Duke University razor@cs.duke.edu David
More informationPerformance of DSDV Protocol over Sensor Networks
Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA
More informationIMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS
IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationRouting in Variable Topology Networks
Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute Variable Topology Networks P2P networks for distributed
More informationCHAPTER 7 SIMULATION OBSERVATIONS
CHAPTER 7 CHAPTER 7 SIMULATION OBSERVATIONS Over a randomly distributed wireless network system with the specification is modeled with the suggested algorithms for communication from a selected source
More informationSELECTION OF METRICS (CONT) Gaia Maselli
SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationSimulation lifecycle
Simulation lifecycle Holger Füßler Holger Füßler Lecture overview» Retrospection Tour d horizon Simulation life-cycle (recap from another perspective) Holger Füßler - 2 Retrospection RNGs DES Ns-2 OMNeT++
More informationROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS
ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile
More informationConnection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information
Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Javad Ghaderi, Tianxiong Ji and R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering
More informationOSI Network Layer. Network Fundamentals Chapter 5. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Network Layer Network Fundamentals Chapter 5 Version 4.0 1 Objectives Identify the role of the Network Layer, as it describes communication from one end device to another end device. Examine the most
More informationQuantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks
Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks E. Suresh Babu P S V Srinivasa Rao M Srinivasa Rao C Nagaraju Assoc. Prof. of CSE K L University, Vijayawada.
More informationImplementation and simulation of OLSR protocol with QoS in Ad Hoc Networks
Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT
More informationPerformance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network * Jiandong LI ISN Lab., Xidian University JL384@cornell.edu Zygmunt J. Haas Cornell University haas@ece.cornell.edu
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationCOMPARATIVE PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET USING NS-2
COMPARATIVE PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET USING NS-2 Mr. Ashutosh Padubidri 1, Mr.Davesh Singh Manral 2, Mr.Nikhil Sharma 3, Ms.Amunaganti Anusha 4 1,2,3,4 BE students, Department
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationDynamic Power Control MAC Protocol in Mobile Adhoc Networks
Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department
More informationPerformance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)
Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET) Md. Zulfikar Alom 1, Tapan Kumar Godder 2, Mohammad NayeemMorshed 3, Student Member, IEEE 1,2 Department of Information & Communication
More informationEffects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi
More informationAshish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India
Simulation based performance of AODV (Reactive) and DSDV (Proactive) routing protocol for MANET Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India Abstract Mobile Ad
More informationEEL6951 Project: Simulation of LDoS Attack in Ad-hoc Network by Y. He et al. I. Introduction
EEL6951 Project: Simulation of LDoS Attack in Ad-hoc Network by Y. He et al. By Paul Muri, Carlo Pascoe, and Brian Sapp I. Introduction Research Paper: LDoS Attack in Ad-hoc Network by Y. He et al. Citation:
More informationMobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks
MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks Priya Mahadevan Department of Computer Science Duke University priya@cs.duke.edu Abstract 1 Introduction The current state
More informationAn Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET
An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini
More informationEffect of 3 Key Factors on Average End to End Delay in MANET
Effect of 3 Key Factors on Average End to End Delay in MANET Suhaimi. Abd. Latif, Saqib Hakak Department of Electrical and Computer Engineering International Islamic University Malaysia, Kuala Lumpur,
More informationPERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationNetwork Simulators, Emulators and Testbeds
Outline Network Simulators, Emulators and Testbeds By: George Nychis Gaurang Sardesai Motivation for Research Different Techniques Simulators Assumptions/Axioms Methods and Results Testbeds Architecture
More informationReliable Routing In VANET Using Cross Layer Approach
Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,
More informationANALYSIS OF METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS USING NS-2
ANALYSIS OF METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS USING NS-2 Mr.Ganesh R.Patil 1, Prof. Prashant S.Wankhade 2 1 PG Scholar,Dept of Electronics &Telecomm. Engg, ARMIET, Asangaon, Mumbai (India)
More informationLecture 16: Wireless Networks
&6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,
More informationEvaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios
Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models
More informationPerformance Evaluation of Routing Protocols in Mobile Ad Hoc Networks Using Http Traffic
DOI: 10.7763/IPEDR. 2012. V54. 14 Performance Evaluation of Routing Protocols in Mobile Ad Hoc Networks Using Http Traffic Armstrong Kadyamatimba 1+, Michel Mbougni 2, Zenzo P. Ncube 2 Albert Helberg 3
More informationAnalysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio
Analysis of TCP and UDP Traffic in MANETs Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio MANET Routing Protocols Proactive protocols Maintain routes to all nodes Distance vector, link
More informationOn Admission of VoIP Calls Over Wireless Mesh Network
On Admission of VoIP Calls Over Wireless Mesh Network Hung-yu Wei Department of Electrical Engineering National Taiwan University Taipei, Taiwan {hywei}@ntu.edu.tw Kyungtae Kim, Anand Kashyap and Samrat
More information!"# $ I. Introduction
!"# $ LAGRIT (Laboratoire de gestion des réseaux informatiques et de télécommunications) * LACIME (Laboratoire de communications et d'intégration de la microélectronique) Department of Electrical Engineering,
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationPerformance Analysis of OLSR and QoS Constraint OLSR in MANET
RESEARCH ARTICLE OPEN ACCESS Performance Analysis of OLSR and QoS Constraint OLSR in MANET Mohit Gambhir*, Sapna Gambhir** *Research Scholar, JamiaMilliaIslamia, Delhi **Associate Professor, YMCA University
More informationIntroduction to Wireless Networking ECE 401WN Spring 2008
Introduction to Wireless Networking ECE 401WN Spring 2008 Lecture 2: Communication Networks The first major topic we will study will be WLANs. But before that, we need to consider a few basics of networking.
More information