Analysis and Performance Evaluation of Routing Protocols in MANETS

Size: px
Start display at page:

Download "Analysis and Performance Evaluation of Routing Protocols in MANETS"

Transcription

1 Analysis and Performance Evaluation of Routing Protocols in MANETS Team Effort by Ankita Mukherjee Roopashree N Department of Computer Science & Engineering, Santa Clara University Fall 2014

2 Preface Mobile ad- hoc network is a relatively new innovation in the field of wireless technology. These types of networks operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. The absence of any fixed infrastructure in mobile ad- hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. Mobile ad- hoc networks (MANETS) are a popular subject for research as laptops and /Wi- Fi wireless networking has become a widespread application. Many of the academic papers evaluate protocols and abilities assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other, and usually with nodes sending data at a constant rate. Different protocols are then evaluated based on the packet drop rate, the overhead introduced by the routing protocol, and other measures. This project aims at evaluating one proactive, two reactive and one hybrid protocol in MANETS. Computer Networks Project Fall

3 Acknowledgement The sense of contention and elation that accompanies the success of this project and report could be incomplete without expressing our gratitude to Dr. Prof Ming- Hwa Wang, whose constant guidance and support resulted in the completion of the project and also for giving us the opportunity to work together as a team. Computer Networks Project Fall

4 Table of Contents List of Tables and Graphs... 4 Abstract Introduction Objective What is the problem? Why is this project related to class Why other approaches are not good Why we think our approach is better Statement of the problem Area or scope of investigation Theoretical bases and literature review Definition of the problem Theoretical background of the problem Related research to solve the problem Advantage/Disadvantage of those research Our solution to solve this problem Where our solution is different from others? Why our solution is better? Hypothesis/Goals Positive/Negative hypothesis Methodology How to generate/collect input data How to solve the problem Algorithm Design Language used Tools used How to generate output How to test against hypothesis Implementation Code Data analysis and discussion Output generation Tracing Objects Working with Trace file Plotting Graph Output analysis Computer Networks Project Fall

5 7.2.1 AODV DSDV DSR ZRP Comparison Graphs Compare output against hypothesis Abnormal case explanation Conclusions and Recommendations Summary and Conclusions Recommendations for future studies Bibliography Appendices Other related material Awksript NS Directory Structure List of Tables and Graphs Table 7.1 Collision values for AODV.20 Graph 7.1 Collision in AODV..20 Table 7.2 Delay values for AODV 21 Graph 7.2 Delay in AODV.21 Table 7.3 Throughput values per node for AODV 21 Graph 7.3 Throughput values for AODV 21 Table 7.4 Collision values for DSDV..22 Graph 7.4 Collision in DSDV 22 Table 7.5 Delay values for DSDV.22 Graph 7.5 Average delay in DSDV..22 Table 7.6 Throughput values per node DSDV.23 Graph 7.6 Throughput values per node DSDV 23 Table 7.7 Collision values for DSR..23 Graph 7.7 Collision in DSR 23 Table 7.8 Delay values for DSR.24 Graph 7.8 Delay in DSR..24 Table 7.9 Throughput values per node for DSR.24 Graph 7.9 Throughput values per node in DSR..24 Table 7.10 Collision values for ZRP.25 Computer Networks Project Fall

6 Graph 7.10 Collision in ZRP 25 Table 7.11 Delay values for ZRP.25 Graph 7.11 Delay in ZRP..25 Table 7.12 Throughput values per node for ZRP.26 Graph 7.12 Throughput values per node in ZRP.26 Graph 7.13 Comparison of Delay..26 Graph 7.14 Comparison per node throughput.27 Graph 7.15 Comparison of drop packets.27 Computer Networks Project Fall

7 Abstract A wireless network is a network of computers, computer peripherals and various other devices that are connected to each other without wires. This enables ease of communication, especially for mobile computing platforms. A wireless ad- hoc network is a decentralized type of wireless network. The network is ad- hoc because it does not rely on a pre- existing infrastructure, such as routers in wired networks or access point in managed wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. A Mobile Ad- hoc Network (MANET) is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves i.e., routing functionality will be incorporated into mobile nodes. In MANETS, each mobile node acts as a routing node, and a packet is routed from source to its destination by incorporating of other network users. Every node in this ad- hoc network acts as both a host and a router, and often the network is intelligent enough to handle the network dynamics. This project aims to analyze the performance metrics i.e. Collision, delay incurred and throughput in MANETS for different routing protocols. A network collision occurs when more than one mobile device attempts to send a packet on a network segment at the same time. The delay of a network specifies how long it takes for a bit of data to travel across the network from one node to another. Delay is incurred due to collision. Throughput or network throughput is the average rate of successful message delivery over a communication channel. This data may be delivered over a physical or logical link, or pass through a certain network node. The throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second or data packets per time slot. Collision and delay together affect throughput of the transmission in the network. We aim to analyze the metrics for one proactive, two reactive and one hybrid routing protocol for MANETS. All these performance metrics are analyzed for different scenarios using NS- 2. Computer Networks Project Fall

8 2. Introduction 2.1 Objective To analyze the performance of different routing protocols in MANETS with respect to different performance metrics i.e; collision, delay incurred and throughput. All these performance metrics are analyzed for different scenarios using NS What is the problem? MANETS operate in the absence of fixed infrastructure, which makes them easy to deploy at any place and at any time. The absence of any fixed infrastructure in mobile ad- hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area and one of the major challenges is to find a appropriate routing protocol. 2.3 Why is this project related to class The project involves implementing and evaluating different routing protocols. In MANETS, every node acts as a router and also as a host to forward data packets. Since, it does not relay on any fixed infrastructure, a suitable routing protocol which works best in a particular scenario is highly needed. Hence, routing protocols play a major role in MANETS and also it is a key feature of computer networks. 2.4 Why other approaches are not good While studying different research papers, we came across few papers where reactive protocols works better with low no of nodes. The conclusions of those papers are totally specific for a particular condition. As the no of nodes and connections increases, reactive protocols might not work at its best as compared to hybrid protocols. 2.5 Why we think our approach is better We propose to do a detail simulation study of different routing protocols in mobile ad- hoc networks under various scenarios which includes low no of nodes and connections as well as high no of nodes and connections so that we can show which particular protocol works best in a particular condition. Also, we are using NS- 2 for the simulation in which results can be quickly obtained and more complex scenarios can be easily tested in a smaller time frame. 2.6 Statement of the problem Impact of different routing protocols for mobile ad- hoc networks with respect to different performance metrics. Computer Networks Project Fall

9 2.7 Area or scope of investigation Ad- hoc networks are a new paradigm of wireless communication for mobile host. The future commercial use may include but not restrict to conferencing, home networking and personal area network and embedded computing application. This project will focus mostly on analyzing proactive, reactive and hybrid protocols. Designing of network protocols in MANETS is a complex issue. We will be simulating these protocols in NS- 2 with different no of nodes and based on the performance metrics we will try to show which protocol works best for the given scenario. These results would be shown graphically using Gnuplot. 3. Theoretical bases and literature review 3.1 Definition of the problem For MANETS to operate efficiently appropriate routing protocols have to be incorporated. To identify the best routing protocol we need to analyze where proactive, reactive and hybrid protocols works at its best. 3.2 Theoretical background of the problem Pervasive computing refers to the emerging trend towards numerous, easily accessible computing devices connected to an increasingly ubiquitous network infrastructure. This trend will likely create new opportunities and challenges for the Information Technology (IT) companies to place high- performance computers and sensors in virtually every device, appliance, and piece of equipment in buildings, homes, workplaces, and factories, and even in clothing. Various areas like sensing the environment and Actuating, Human Computer Interaction, Security and Privacy and Networking and Distributed Systems, contribute to the Pervasive Computing Environment. This project contributes to the Networks aspect of Pervasive Computing. A MANET is an autonomous collection of mobile users that communicate over relative bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. 3.3 Related research to solve the problem Research has been carried out to evaluate performance of different MANET routing protocols based on performance metrics such as average end- to- end delay, throughput, normalized routing load, packet delivery fraction and average jitter. Lot of research is being carried out to optimize the hybrid protocols such that it works better than hybrid protocols. Computer Networks Project Fall

10 3.4 Advantage/Disadvantage of those research Based on detailed simulation study appropriate routing protocol in MANETS for particular scenario can be chosen. Better improvement can be done on the research in terms of optimization techniques for routing protocols in MANETS. 3.5 Our solution to solve this problem We will analyze one proactive (DSDV), 2 reactive (AODV & DSR) and 1 hybrid (ZRP) protocol for different number of nodes and various connections in a network simulator. We have chosen NS2 version 2.35 as our simulation tool. The back end of NS2 consists of C++ core methods and the front end is OTCL. We will use TCL scripts for the simulation of the above mentioned protocols. Also, we are using NAM (Network Animator) in which we can visualize the network topology, node mobility and transmission of data packets. Based on the simulation results obtained for different routing protocols, we need to plot graphs for the purpose of evaluation. 3.6 Where our solution is different from others? Active research work for mobile ad hoc network is carried out mainly in the fields of medium access control, routing, resource management, power control and security. Because of the importance of routing protocols in dynamic multi- hop networks, a lot of mobile ad hoc network routing protocols have been proposed in the last few years but most of them have proved that reactive protocol DSR is best in performance. We will implement zone routing protocol which is a hybrid protocol and show that it will perform better than DSR. 3.7 Why our solution is better? As we are trying to implement a hybrid protocol which combines the advantages of both proactive and reactive protocol. It will definitely produce better results than proactive and reactive protocols for various no of nodes and under different conditions. 4. Hypothesis/Goals 4.1 Positive/Negative hypothesis Implementing hybrid protocol like ZRP will give better results than other proactive and reactive protocols as the no of nodes, connections and node mobility increases. If we optimize ZRP protocol to control the overhead caused by the forwarding of query packets, then much efficient performance will be obtained. Computer Networks Project Fall

11 5. Methodology 5.1 How to generate/collect input data We have to write a TCL script which contains the below details Define Options: define the channel type, queue length, no of mobile nodes, routing protocol, X area grid, Y area grid and simulation stop time. Should Initialize the global variables such as packet size and trace file descriptor and set the network animator file. Set up the topography object. Create specified no of mobile node and attach them to channel. Also, configure the nodes that are created. Provide initial X, Y coordinates for mobile nodes. Specify node movements. Specify data packet transfer. Stop at the specified simulation end time. 5.2 How to solve the problem Algorithm Design Code to construct topology using TCL Script Code is executed using Shell Script Inputs are given to Shell Script Output file is generated when Shell Script is executed Run a awk program to calculate Delay and Throughput Plot the Graph using Gnuplot Compare the Results Observe the Packet Transfer Process using Network Animator Calculate Drop Packets due to Collision Language used TCL and awk scripts Tools used NS2 and Gnuplot 5.3 How to generate output When the code is executed, we obtain an output file which is a.tr file. Trace file contains event Computer Networks Project Fall

12 type, time source node, destination node, packet name, packet size, flags, flow id, source address, destination address, sequence no and packet unique id. As the trace files can be very large, so to extract any meaningful information out of them is difficult. Hence we resort text processing tools like awk. AWK is a UNIX based text processing tools and awk programming is like any other high level programming. AWK identifies the strings separated by tabs and spaces on a single line in the text as a single unit and accordingly designates those numbers. We will need to write AWK scripts to calculate end- to- end delay and throughput. 5.4 How to test against hypothesis By measuring average end- to- end delay, drop packets and throughput against various no of nodes for different routing protocols like DSDV, AODV, DSR and ZRP. 6. Implementation 6.1 Code The scenarios generated are random and the inbuilt NS procedure module has been used for this purpose. The following is the explanation of the Tcl script. set ns [new Simulator]: Generates an NS simulator object instance, and assigns it to variable. The "Simulator" object has member functions that do the following: Create compound objects such as nodes and links Connect network component objects created (ex. attach- agent) Set network component parameters (mostly for compound objects) Create connections between agents (ex. make connection between a "tcp" and "sink") Specify NAM display options etc. set tracefd [open tracefilename.tr w] $ns_ trace- all $tracefd : The first line opens the file tracefilename.tr for writing and gives it the file handler ' tracefd '. In the second line we tell the simulator object that we created above to write all simulation data into this file. It is similar for NAM file trace data. $ns namtrace- all file- descriptor: This member function tells the simulator to record simulation traces in NAM input format. It also gives the file name that the trace will be written to later by the command $ns flush- trace. Similarly, the member function trace- all is for recording the simulation trace in a general format. set topo [new Topography]: Next create a topology object that keeps track of movements of mobilenodes within the topological boundary. Provide the topography object with x and y co- Computer Networks Project Fall

13 ordinates of the boundary, (x=500, y=500). A different value can be passed as a third parameter to load_flatgrid { as $topo load_flatgrid x y create- god $val(nn): God (General Operations Director) is the object that is used to store global information about the state of the environment, network or total number of mobile nodes and a table of shortest number of hops required to reach from one node to another. God object stores the The next hop information is normally loaded into god object from movement pattern files, before simulation begins, since calculating this on the fly during simulation runs can be quite time consuming. However, in order to keep this example simple we avoid using movement pattern files and thus do not provide God with next hop information.first, we need to configure nodes before we can create them. Node configuration API may consist of defining the type of addressing (flat/hierarchical etc), the type of adhoc routing protocol, Link Layer, MAC layer, IfQ etc. set n0 [$ns node]: The member function node creates a mobile node. $node_ (node number) set X_ co- ordinate value : This is used to specify the X co- ordinate position, similarly we should set Y and Z co- ordinate position. $ns_ at time "$node_(1) setdest x coordinate y coordinate speed : It produce some node movements, means at time, node1 starts to move towards the destination (e.g. x=25,y=20) at a speed of k m/s (e.g. 15m/s). This API is used to change direction and speed of movement of the mobile nodes. As basic network setup is done, the next thing to do is to setup traffic agents such as TCP, traffic sources such as FTP and attach them to nodes and agents respectively. set tcp [new Agent/TCP]: This line shows how to create a TCP agent. But in general, users can create any agent or traffic sources in this way. Agents and traffic sources are in fact basic objects (not compound objects), mostly implemented in C++ and linked to OTcl. Therefore, there are no specific Simulator object member functions that create these object instances. To create agents or traffic sources, a user should know the class names these objects (Agent/TCP, Agnet/TCPSink, Application/FTP and so on). $ns attach- agent node agent: The attach- agent member function attaches an agent object created to a node object. Actually, what this function does is call the attach member function of specified node, which attaches the given agent to itself. Therefore, a user can do the same thing by, for example, $n0 attach $tcp. Similarly, each agent object has a member function attach- agent that attaches a traffic source object to itself $ns connect agent1 agent2: After two agents that will communicate with each other are created, the next thing is to establish a logical network connection between them. This line establishes a network connection by setting the destination address to each others' network. Computer Networks Project Fall

14 proc finish {: This function is called after this simulation is over by the command $ns at "finish". In this function, post- simulation processes are specified. We need to define stop time when the simulation ends and tell mobile nodes to reset, which actually resets their internal network components. The nodes are reset at that time and the "$ns_ halt" is called at some specific time, a little later after resetting the nodes. The procedure stop{ is called to flush out traces and close the trace file. $ns run: Command to start the simulation The general template of wireless specifications: #Define options set val(chan) Channel/WirelessChannel ;# channel type set val(prop) Propagation/TwoRayGround ;# radio- propagation model set val(netif) Phy/WirelessPhy ;# network interface type set val(mac) Mac/802_11 ;# MAC type set val(ifq) Queue/DropTail/PriQueue ;# interface queue type set val(ll) LL ;# link layer type set val(ant) Antenna/OmniAntenna ;# antenna modelset val set val(ifqlen) 50 ;# max packet in ifq set val(nn) 8 ;# number of mobilenodes set val(rp) AODV ;# routing protocol set val(x) 500 ; set val(y) 500 ; set val(stop) 180 ; # Initialize Global Variables and create a simulator object set ns_ [new Simulator] set pktsize 500 set tracefd [open AODV8.tr w] $ns_ trace- all $tracefd set namfile [open AODV8.nam w] $ns_ namtrace- all- wireless $namfile $val(x) $val(y) # set up topography object set topo [new Topography] $topo load_flatgrid # Create God create- god $val(nn) # Create the specified number of mobilenodes [$val(nn)] and "attach" them to the channel. Computer Networks Project Fall

15 # configure nodes that are created. $ns_ node- config - adhocrouting $val(rp) \ - lltype $val(ll) \ - mactype $val(mac) \ - ifqtype $val(ifq) \ - ifqlen $val(ifqlen) \ - anttype $val(ant) \ - proptype $val(prop) \ - phytype $val(netif) \ - channeltype $val(chan) \ - topoinstance $topo \ - agenttrace ON \ - routertrace ON \ - mactrace ON \ - movementtrace OFF for {set i 0 {$i < $val(nn) {incr i { set node_($i) [$ns_ node] # disable random motion as we are going to provide node position and movement(speed & direction) directives # Provide initial (X,Y, for now Z=0) co- ordinates for mobile nodes $node_(0) set X_ $node_(0) set Y_ $node_(0) set Z_ 0.0 $node_(1) set X_ $node_(1) set Y_ $node_(1) set Z_ 0.0 $node_(3) set X_ $node_(3) set Y_ 90.0 $node_(3) set Z_ 0.0 $node_(2) set X_ 30.0 $node_(2) set Y_ $node_(2) set Z_ 0.0 $node_(4) set X_ 30.0 $node_(4) set Y_ 90.0 $node_(4) set Z_ 0.0 $node_(5) set X_ $node_(5) set Y_ $node_(5) set Z_ 0.0 $node_(6) set X_ $node_(6) set Y_ 30.0 Computer Networks Project Fall

16 $node_(6) set Z_ 0.0 $node_(7) set X_ $node_(7) set Y_ 30.0 $node_(7) set Z_ 0.0 # node movements $ns_ at 10.0 "$node_(0) setdest " $ns_ at 15.0 "$node_(1) setdest " $ns_ at 30.0 "$node_(0) setdest " $ns_ at 45.0 "$node_(2) setdest " $ns_ at 50.0 "$node_(4) setdest " $ns_ at 60.0 "$node_(5) setdest " $ns_ at 65.0 "$node_(7) setdest " $ns_ at 85.0 "$node_(1) setdest " # Setup traffic flow between nodes set tcp [new Agent/TCP/Newreno] $tcp set class_ 2 $ns_ attach- agent $node_(0) $tcp set sink [new Agent/TCPSink] $ns_ attach- agent $node_(4) $sink $ns_ connect $tcp $sink set tcp1 [new Agent/TCP] $tcp1 set class_ 3 $ns_ attach- agent $node_(4) $tcp1 set sink1 [new Agent/TCPSink] $ns_ attach- agent $node_(1) $sink1 $ns_ connect $tcp1 $sink1 set tcp2 [new Agent/TCP] $tcp2 set class_ 4 $ns_ attach- agent $node_(2) $tcp2 set sink2 [new Agent/TCPSink] $ns_ attach- agent $node_(6) $sink2 $ns_ connect $tcp2 $sink2 set tcp3 [new Agent/TCP] $tcp3 set class_ 5 $ns_ attach- agent $node_(1) $tcp3 set sink3 [new Agent/TCPSink] $ns_ attach- agent $node_(3) $sink3 Computer Networks Project Fall

17 $ns_ connect $tcp3 $sink3 set tcp4 [new Agent/TCP] $tcp4 set class_ 6 $ns_ attach- agent $node_(5) $tcp4 set sink4 [new Agent/TCPSink] $ns_ attach- agent $node_(7) $sink4 $ns_ connect $tcp4 $sink4 set ftp [new Application/FTP] $ftp attach- agent $tcp $ns_ at 75.0 "$ftp start" set ftp1 [new Application/FTP] $ftp1 attach- agent $tcp1 $ns_ at 75.0 "$ftp1 start" set ftp2 [new Application/FTP] $ftp2 attach- agent $tcp2 $ns_ at 75.0 "$ftp2 start" set ftp3 [new Application/FTP] $ftp3 attach- agent $tcp3 $ns_ at 75.0 "$ftp3 start" set ftp4 [new Application/FTP] $ftp4 attach- agent $tcp4 $ns_ at 75.0 "$ftp4 start" for {set i 0 {$i < $val(nn) {incr i { $ns_ initial_node_pos $node_($i) 30 for { set i 0 { $i < $val(nn) { incr i { $ns_ at $val(stop) "$node_($i) reset"; $ns_ at $val(stop) "$ns_ nam- end- wireless $val(stop)" $ns_ at $val(stop) "stop" $ns_ at $val(stop).01 "puts \"end simulation\";$ns_ halt" proc stop { { global ns_ tracefd namfile $ns_ flush- trace exec nam AODV84new.nam & Computer Networks Project Fall

18 close $tracefd close $namfile exit 0 $ns_ run 7. Data analysis and discussion 7.1 Output generation The following parameters are considered along with the default values of Network Simulator for our comparative study. Frequency Data rate RTS Size CTS Size Data Packet Size Ack size 2.4 GHz 1Mbps 20 bytes 14 bytes 500 bytes 4 bytes Slot time 20 µs Mobility Model Propagation Model Routing Protocol Simulation Time Channel Random Waypoint Two way ground AODV/DSDV/DSR/ZRP s Wireless Channel We simulated the results for four protocols namely, AODV, DSDV, DSR and ZRP for different number of nodes such as 8 nodes, 16 nodes, 32 nodes, 64 nodes and 128 nodes. The following graphs show the average collision, delay and throughput for each of the four protocols. The Computer Networks Project Fall

19 comparison has been carried out between proactive, reactive protocols and hybrid protocol Tracing Objects NS simulation can produce both the visualization trace(for NAM) as well as ASCII file trace corresponding to the events registered in the network. When we use tracing, NS inserts four objects in the link: EnqT, DeqT, RecvT and DrpT. EnqT registers information concerning a packet that arrives and is queued at the input queue of the link. If the packet overflows, then the information concerning the dropped packet are handled by DrpT. DeqT registers information at the instant the packet is dequeued. Finally, RecvT gives us information about packets that have been received at the output of the link. The meanings of the fields are: 1. The first field is event type. It is given by one of four possible symbols r, +, -, d which correspond respectively to received, enqueued, dequeued and dropped. 2. The second field is the time at which the event occurs. 3. Gives the input node of the link at which the event occurs. 4. Gives the output node of the link at which the event occurs. 5. Gives the packet type. The type corresponds to the name that we gave to those applications. For ex, TCP or CBR. 6. Gives the packet size. 7. Some flags. 8. This is the Flow id(fid) of IPv6 that a user can set for each flow at the input OTcl script. One can further use this field for analysis purpose. 9. This is the source address given in the form of node.port. 10. This is the destination address given in the above mentioned format. 11. This is the network layer protocol s packet sequence number. Computer Networks Project Fall

20 12. The last field shows the unique id of the packet Working with Trace file Once the Tcl script runs, it generates a trace file with the above mentioned format. Data files can be processed using awk. The awk utility allows us to do simple operations on data files such as averaging the values of the given column, adding or multiplying them by term between several columns, all data reformatting tasks etc. Sample awkscript for calculating Throughput is shown as below: Throughput: BEGIN { recvdsize = 0 starttime = 400 stoptime = 0 { event = $1 time = $2 node_id = $3 pkt_size = $8 level = $4 # Store start time if (level == "AGT" && event == "s" && pkt_size >= 512) { if (time < starttime) { starttime = time # Update total received packets' size and store packets arrival time if (level == "AGT" && event == "r" && pkt_size >= 512) { if (time > stoptime) { stoptime = time # Rip off the header hdr_size = pkt_size % 512 pkt_size - = hdr_size # Store received packet's size recvdsize += pkt_size END { printf("average Throughput[kbps] = %.2f\t\t Computer Networks Project Fall

21 StartTime=%.2f\tStopTime=%.2f\n",(recvdSize/(stopTime- starttime))*(8/1000),starttime,stoptime) Plotting Graph We are using Gnuplot software to plot the graphs. Once we get the value from awk scripts for different performance metrics, we need to keep those values in.txt file with a tabular format. Below are the sample commands for plotting a graph in gnuplot. set title "ZRP per node Throughput(Kbps)" set xlabel "no of nodes" set logscale x set xtics (8,16,32,64,128) set ylabel "per node throughput(kbps)" set yrange [0:100] set ytics (10,20,30,40,50,60,70,80,90,100) plot 'Path \ZRPTh.txt' using 1:2 with linespoints title "ZRP" 7.2 Output analysis AODV A network of 4, 8,16,32,64,128 nodes respectively have been simulated using the reactive protocol AODV. The corresponding values for collision, delay and throughput are tabulated as shown below. AODV Collision Nodes Drop Packets Table 7.1 Collision values for AODV Graph 7.1 Collision in AODV Computer Networks Project Fall

22 AODV Delay Nodes Delay(ms) Table 7.2 Delay values for AODV Graph 7.2 Delay in AODV AODV Throughput Nodes Throughput per node (kbps) Table 7.3 Throughput values per node for AODV Graph 7.3 Throughput values for AODV DSDV A network of 8,16,32,64,128 nodes respectively has been simulated using the proactive protocol DSDV. The corresponding values for collision, delay and throughput are tabulated as shown below. Computer Networks Project Fall

23 DSDV Collision Nodes Drop Packets Table 7.4 Collision values for DSDV Graph 7.4 Collision in DSDV DSDV Delay Nodes Delay(ms) Table 7.5 Delay values for DSDV Graph 7.5 Average delay in DSDV Computer Networks Project Fall

24 DSDV Throughput Nodes Throughput per node(kbps) Table 7.6 Throughput values per node DSDV Graph 7.6 Throughput values per node DSDV DSR A network of 8,16,32,64,128 nodes respectively have been simulated using the reactive protocol DSR. The corresponding values for collision, delay and throughput are tabulated as shown below. DSR Collision Nodes Drop Packets Table 7.7 Collision values for DSR Graph 7.7 Collision in DSR Computer Networks Project Fall

25 DSR Delay Nodes Delay(ms) Table 7.8 Delay values for DSR Graph 7.8 Delay in DSR DSR Throughput Nodes Throughput per node (kbps) Table 7.9 Throughput values per node for DSR Graph 7.9 Throughput values per node in DSR ZRP A network of 8,16,32,64,128 nodes respectively has been simulated using the hybrid protocol ZRP. The corresponding values for collision, delay and throughput are tabulated as shown below. Computer Networks Project Fall

26 ZRP Collision Nodes Drop Packets Table 7.10 Collision values for ZRP Graph 7.10 Collision in ZRP ZRP Delay Nodes Delay(ms) Table 7.11 Delay values for ZRP Graph 7.11 Delay in ZRP Computer Networks Project Fall

27 ZRP Throughput Nodes Throughput per node(kbps) Table 7.12 Throughput values per node for ZRP Graph 7.12 Throughput values per node in ZRP Comparison Graphs The comparison has been carried out between proactive and reactive protocols and the following results have been evaluated. Graph 7.13 Comparison of Delay Computer Networks Project Fall

28 Graph 7.14 Comparison per node throughput Graph 7.15 Comparison of drop packets 7.3 Compare output against hypothesis As per the analysis carried out for ZRP, we see the number of drop packets decreases and also delay is moderate when compare to DSR though there are more number of connections with varying nodes. We have analyzed that ZRP gives less throughput in case of higher number of nodes and connections because of overhead caused by the forwarding of query packets 7.4 Abnormal case explanation While evaluating ZRP protocol in terms of throughput, we noticed that ZRP gives worst Computer Networks Project Fall

29 throughput (64, 128 in our evaluation) for higher number of nodes when compare to other protocols. As per theory for routing protocols, we know that delay increases as the number of nodes increases but we observed that the delay for 128 nodes decreases for all the protocols. 8. Conclusions and Recommendations 8.1 Summary and Conclusions As a result of our analysis, DSR worked out to be an efficient protocol for different node scenarios. DSR being a on- demand protocol works without any periodic updates, whereas other protocols like DSDV is table driven protocol. Even AODV works well in many scenarios which do not involve too many mobile nodes. DSR has much higher delay than AODV. DSDV is lesser than AODV, DSR and ZRP The number of dropped packets in AODV is more than that of the other protocols because of the random mobility of the nodes and its random trajectories. The performance of DSR with lesser number of nodes is similar to that of AODV and DSDV. But as the number of nodes increases the performance of DSR is better than that of the other two protocols. In this project, the hybrid protocol ZRP is found to be the moderate for low numer of nodes and low mobility due to its hybrid nature and the capability to adapt to the routing conditions based on the zone radius. So in Real time scenarios, DSR works much more efficient than other routing protocols. 8.2 Recommendations for future studies In this study we only considered the number nodes as constant throughout the simulation. But this could be varied dynamically so as to make the network scalable. The various parameters used for propagation model, Link layer, MAC layer, interface queue and the antenna type in the Mobile ad hoc nodes can also be modified so as to evaluate more practical mobile networks. Future work shall propose a new algorithm to reduce the network load by limiting the number of control packets when the protocol searches for a new route. Computer Networks Project Fall

30 9. Bibliography [1] Performance Evaluation of DSR, OLSR and ZRP Protocols in MANETS, IEEE published in 2012 [2] An Efficient Query Packets Forward Algorithm in ZRP Protocol, IEEE published in 2014 [3] Marc Greis Tutorial for the UCB/LBNL/VINT Network Simulator ns. [4] Siting Internet Website : [5] Siting Internet Website : [6] Ad- hoc, Mobile and Wireless Networks: Second International Conference, ADHOC- NOW 2003, Montreal, Canada, October 8-10, 2003, Proceedings (Lecture Notes in Computer Science) [7] Aditya Goel, Ajaii Sharma. Performance Analysis of Mobile Adhoc Network using AODV Protocol. [8] G. Anastasi, E. Borgia, M. Conti, E. Gregori, IEEE Ad Hoc Networks: Performance Measurements, Proceedings of the Workshop on Mobile and Wireless Networks (MWN 2003), Providence (Rhode Island), May 19, [9] IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Speci$cations, IEEE Std The Institute of Electrical and Electronics Engineers, New York. [10] L. Kleinrock, Nomadicity: Anytime, anywhere in a disconnected world, in Mobile Networks and Applications, vol. 1, pp , Baltzer 1996 Computer Networks Project Fall

31 10. Appendices 10.1 Other related material Awksript Delay: BEGIN { seqno = - 1; count = 0; { if($4 == "AGT" && $1 == "s" && seqno < $6) { seqno = $6; #end- to- end delay if($4 == "AGT" && $1 == "s") { start_time[$6] = $2; else if(($7 == "tcp") && ($1 == "r")) { end_time[$6] = $2; else if($1 == "D" && $7 == "tcp") { end_time[$6] = - 1; END { for(i=0; i<=seqno; i++) { if(end_time[i] > 0) { delay[i] = end_time[i] - start_time[i]; count++; else Computer Networks Project Fall

32 { delay[i] = - 1; for(i=0; i<=seqno; i++) { if(delay[i] > 0) { n_to_n_delay = n_to_n_delay + delay[i]; n_to_n_delay = n_to_n_delay/count; print "\n"; print "Average End- to- End Delay = " n_to_n_delay * 1000 " ms"; print "\n"; Drop Packets: BEGIN { HighestPacketId=0; numberofsentpackets=0; LowestPacketId=0; numberofreceivedpackets=0; { strevent=$1; stragt=$4; strtype=$7; Time=$2; idpacket=$6; nbytes=$8; if(stragt=="agt" && strtype=="tcp" ) { if(idpacket>idhigestpacket) HighestPacketId=idPacket; if(idpacket<lowestpacketid) LowestPacketId=idPacket; if(strevent=="s") { Computer Networks Project Fall

33 numberofsentpackets+=1; if(strevent=="r" && idpacket>=lowestpacketid) { numberofreceivedpackets+=1; END { DropPackets = numberofsentpackets - numberofreceivedpackets print "DroppedPAckets = " DropPackets; NS Directory Structure Now let s briefly examine what information is stored in which directory or file. Fig.3.6 shows a part of the directory structure of the simulator available with the ns all in one package. Among the sub directories of ns- allinone, NS2 is the place that has all of the simulator implementations (either in C++ or in OTcl), validation test OTcl scripts and example OTcl scripts. Within this directory, all OTcl codes and test/example scripts are located under a sub directory called Tcl. Most of the C++ code which implements event scheduler and basic network component object classes except the www related ones are located in the main level. Fig.3.6 NS Directory Structure Computer Networks Project Fall

34 The Tcl directory has sub directories among which the lib directory that contains OTcl source codes for the most basic and essential parts of the NS implementation(agent, node, link, packet, address, routing and etc ) is the place one as a user, or as a developer will visit the most. Note that the OTcl source codes for LAN, Web and multicast implementations are located in separate sub directories of Tcl. Following is a partial list of files in NS 2/Tcl/lib directory. NS- lib.tcl:the simulator class and most of its member function definitions except for LAN, web and multicast related ones are located here. If we want know which member functions of the simulator object class are available and how they work, this is a place to look for. NS- default.tcl: The default values for configurable parameters for various network components are located here. Since most of network components are implemented in C++, the configurable parameters are actually C++ variables made available to OTcl via an OTcl linkage function, bind(c++_variable_name, OTcl_variable_name). NS- packet.tcl: The packet header format initialization implementation is located here. When we create a new packet header, we should register the header in this file to make the packet header initialization process to include the header into the header stack format and give the offset of that header in the stack. Other OTcl files: Other OTcl files in this directory contain OTcl implementation of the compound network objects or the front end(control part) of network objects in C++. The FTP application is completely implemented in OTcl and the source code is located in the NS- source.tcl. Computer Networks Project Fall

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2

Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 Eexercise5: How to do Data Transmission between Nodes Using TCP in NS2 In wireless network, nodes communicate using the communication model that consists of TCP agent, TCPSink agent, and FTP application.

More information

Part 5. Wireless Network

Part 5. Wireless Network Introduction to NS-2 Part 5. Wireless Network Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Introduction to Wireless Network An Example of Wireless Simulation

More information

Comparing ad-hoc wireless to wiredwireless

Comparing ad-hoc wireless to wiredwireless TNK092: Network Simulation/Nätverkssimulering Network Simulation---ns2 Lecture 6 wired-wireless simulation Comparing ad-hoc wireless to wiredwireless We are going to make modifications to the tcl script

More information

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.

Network Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore. Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple

More information

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2)

CDA6530: Performance Models of Computers and Networks. Chapter 10: Introduction to Network Simulator (NS2) CDA6530: Performance Models of Computers and Networks Chapter 10: Introduction to Network Simulator (NS2) Some Contents are from. USC ISI Network Simulator (ns) Tutorial 2002 http://www.isi.edu/nsnam/ns/ns-tutorial/tutorial-02/index.html

More information

ANALYSIS OF SMART DEVICE GAME PROTOCOL

ANALYSIS OF SMART DEVICE GAME PROTOCOL ENSC 427: COMMUNICATION NETWORKS SPRING 2013 ANALYSIS OF SMART DEVICE GAME PROTOCOL http://www.sfu.ca/~mea19/ Mehdi Elahi (mea19@sfu.ca) 301043763 Seyed Ahmari (mahmari@sfu.ca) 301124836 Bilal Nurhusien

More information

PART A SIMULATION EXERCISES

PART A SIMULATION EXERCISES PART A SIMULATION EXERCISES 1. Simulate a three nodes point to point network with duplex links between them. Set the queue size and vary the bandwidth and find the number of packets dropped. set ns [ new

More information

Performance Analysis of Routing Protocols

Performance Analysis of Routing Protocols IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 08, Issue 5 (May. 2018), VI PP 69-77 www.iosrjen.org Performance Analysis of Routing Protocols N Dinesh Kumar 1, V.S

More information

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou *

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY INVESTIGATION ON THE INTERNET OF THINGS Jin Wang *, Yi bin Hou * School of software engineering, Department of Information, Beijing

More information

FACULTY OF ENGINEERING

FACULTY OF ENGINEERING FACULTY OF ENGINEERING LAB SHEET ETM 3056 - COMMUNICATIONS NETWORKS TRIMESTER 1 (2010/2011) CN1 COMMUNICATION PROTOCOLS ANALYSIS CN2 WIRELESS NETWORK SIMULATION Note: On-the-spot evaluation may be carried

More information

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore

REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT. Kattigenahalli, Jala Hobli, Yelahanka, Bangalore REVA INSTITUTE OF TECHNOLOGY AND MANAGEMENT Kattigenahalli, Jala Hobli, Yelahanka, Bangalore 560 064 Department of Master of Computer Applications III Semester MCA Laboratory Manual 1 Subject Code: I.A

More information

Scholars Research Library. Investigation of attack types in Ad Hoc networks and simulation of wormhole avoidance routing protocol

Scholars Research Library. Investigation of attack types in Ad Hoc networks and simulation of wormhole avoidance routing protocol Available online at www.scholarsresearchlibrary.com European Journal of Applied Engineering and Scientific Research, 2012, 1 (4):207-215 (http://scholarsresearchlibrary.com/archive.html) ISSN: 2278 0041

More information

TCP over Ad Hoc Networks : NS-2 Simulation Analysis. Ren Mao, Haobing Wang, Li Li, Fei Ye

TCP over Ad Hoc Networks : NS-2 Simulation Analysis. Ren Mao, Haobing Wang, Li Li, Fei Ye TCP over Ad Hoc Networks : NS-2 Simulation Analysis Ren Mao, Haobing Wang, Li Li, Fei Ye Chapter 1 Introduction This report is for simulation of TCP transimition in Ad-hoc networks.to begin with,we have

More information

Wireless Networks - Preliminaries

Wireless Networks - Preliminaries This chapter describes an overview and classification of networks used for communication. A comparative simulation study regarding nature of wired and wireless network through commercially available simulators

More information

arxiv: v2 [cs.ni] 26 Jul 2010

arxiv: v2 [cs.ni] 26 Jul 2010 arxiv:1007.4065v2 [cs.ni] 26 Jul 2010 A Tutorial on the Implementation of Ad-hoc On Demand Distance Vector (AODV) Protocol in Network Simulator (NS-2) Mubashir Husain Rehmani, Sidney Doria, and Mustapha

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 A brief Introduction to ns-2 2 Contents 1. Introduction to ns-2 2. ns-2 Components 3. Create a Basic ns-2 Model 4. Case Study: WiFi Simulation 5. Simulation

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib

More information

ABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session

ABSTRACT. socialize with nearby users of common interest, but there exists no pre-established session ii ABSTRACT An opportunistic network application is a scenario in which mobile node users socialize with nearby users of common interest, but there exists no pre-established session by which users register

More information

Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network

Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network Master s Thesis Electrical Engineering September 2014 Simulation-Based Comparative Study of Routing Protocols for Wireless Ad-Hoc Network Jani Saida Shaik School of Computing Blekinge Institute of Technology

More information

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7

Babak Shahabi ( ), Shaoyun Yang ( ) Team # 7 www.sfu.ca/~bshahabi Babak Shahabi (301102998), Shaoyun Yang (301133524) bshahabi@sfu.ca yshaoyun@sfu.ca Team # 7 1 Table of contents Contents Contents... 2 Related Works... 5 1. Mobile IP overview...

More information

Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network

Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network Comparison of AODV, DSR, and DSDV Routing Protocols in a Wireless Network Pushpender Sarao Hyderabad Institute of Technology and Management, Hyderabad-1401, India Email: drpushpendersarao@gmail Abstract

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Network Simulator 2: Introduction

Network Simulator 2: Introduction Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific

More information

Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks

Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks D. Kiranmayi Department of CSE, Vignan s Institute Of IT, Visakhapatnam, India ABSTRACT:There are many routing protocols that which can

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

ENSC 427. Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 3/17/2012

ENSC 427. Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 3/17/2012 2012 ENSC 427 Group 05 - Final Report UMTS Cellular & Wi- Fi Network Simulation in NS- 2 Gyuhan David Choi Seungjae Andy Back Calvin Chun Kwan Ho gca16@sfu.ca sjb18@sfu.ca cch8@sfu.ca 3/17/2012 Contents

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com

More information

STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2

STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2 STUDY OF PERFORMANCE OF ROUTING PROTOCOLS FOR MOBILE ADHOC NETWORKING IN NS-2 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF Bachelor of Technology In Computer Science

More information

Part 3. Result Analysis

Part 3. Result Analysis Introduction to NS-2 Part 3. Result Analysis Min Chen School of Computer Science and Engineering Seoul National University 1 Outline A Simulation and its results The Format of Trace File The AWK language

More information

EE 122: Computer Networks Network Simulator ns2

EE 122: Computer Networks Network Simulator ns2 EE 122: Computer Networks Network Simulator ns2 Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 Adapted from F04 Slides K. Fall, J.

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS

A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS A BENEFICIAL ANALYSIS OF NODE DEPLOYMENT SCHEMES FOR WIRELESS SENSOR NETWORKS G Sanjiv Rao 1 and V Vallikumari 2 1 Associate Professor, Dept of IT, Sri Sai Aditya Institute of Science And Technology, Surampalem,

More information

Routing Protocols Simulation of Wireless Self-organized Network Based. on NS-2. Qian CAI

Routing Protocols Simulation of Wireless Self-organized Network Based. on NS-2. Qian CAI International Conference on Computational Science and Engineering (ICCSE 2015) Routing Protocols Simulation of Wireless Self-organized Network Based on NS-2 Qian CAI School of Information Engineering,

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University

More information

Performance Improvement of Wireless Network Using Modern Simulation Tools

Performance Improvement of Wireless Network Using Modern Simulation Tools Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,

More information

Performance Analysis of WLAN MAC algorithms

Performance Analysis of WLAN MAC algorithms MEE10:91 Performance Analysis of WLAN MAC algorithms Author: Ramaz Samhan Amer Khoulani Supervisor: Dr. Jorgen Nordberg A Thesis Presented in partial fulfillment of the requirements for the degree of Master

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2

More information

Implementation of AODV Routing Protocol in NS2: A comparison with DSDV routing protocol

Implementation of AODV Routing Protocol in NS2: A comparison with DSDV routing protocol Implementation of AODV Routing Protocol in NS2: A comparison with DSDV routing protocol N Dinesh Kumar, Associate Professor & Head - EIE, Vignan Institute of Technology & Science, Deshmukhi, Andhra Pradesh,

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS

CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 59 CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 4.1 OVERVIEW OF SIMULATION MODEL The performance of a MANET routing protocol under varying network conditions is to be evaluated in order to understand

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT ENSC 427: COMMUNICATION NETWORKS SPRING 2014 FINAL PROJECT VoIP Performance of City-Wide Wi-Fi and LTE www.sfu.ca/~tly/webpage.html Ou, Cheng Jie 301144355 Yang, Tian Lin 301107652

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

IJMIE Volume 2, Issue 6 ISSN:

IJMIE Volume 2, Issue 6 ISSN: Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network Mr. Amol V. Zade* Prof. Vijaya K. Shandilya** Abstract: A major aspect of ad-hoc networks is that the nodes

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Ns-2 Laboratory Prof. Chansu Yu http://academic.csuohio.edu/yuc/ In-Class Lab: Mobile IP 5 nodes 2 wired nodes, W(0) and W(1) 2 mobile agents, HA and FA A

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering

More information

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Poonam Pahuja Department of Computer Engineering, Mewar University, Chittorgarh Rajasthan, Email: poonamsanjay2007@gmail.com

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

Comparative study and performance analysis of Routing protocols for MANET

Comparative study and performance analysis of Routing protocols for MANET IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. I (Nov Dec. 2014), PP 25-32 Comparative study and performance analysis of Routing protocols

More information

A Novel Review on Routing Protocols in MANETs

A Novel Review on Routing Protocols in MANETs Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract

More information

SIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2

SIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 9, Sep 2015, pp. 32-41, Article ID: IJCET_06_09_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=6&itype=9

More information

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University

DMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University DMN1 : COMMUNICATION PROTOCOL SIMULATION Faculty of Engineering Multimedia University DMN1 Marking Scheme No Component Criteria Not answered 0 marks Poor 2 marks Acceptable 4 (max) marks 1 Viva Students

More information

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Part 6. Confidence Interval

Part 6. Confidence Interval Introduction to NS-2 Part 6. Confidence Interval Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Definitions Normal Distribution Confidence Interval Central Limit

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks E.Gnanamanoharan 1 and R. Bensraj 2 Department of Electrical Engineering 1, 2 Annamalai University 1, 2 Email:

More information

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1051-1058 Research India Publications http://www.ripublication.com Performance Comparison of Routing Protocols

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Tcl script 2

Tcl script 2 Ns : 5... 1 5...nam ns 6... ns 6... nam 1.1 1.2 1.3 7... Tcl script 2 8... 9... 10... 2.1 2.2 2.3 12... 3 13... ( ) 14... 16... 17... 3.1 3.2 3.3 3.4 18... 4 18... 20... 4.1 4.2 22... Xgraph 5 22... 5.1

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Performance Analysis of Wired and Wireless Network using NS2 Simulator

Performance Analysis of Wired and Wireless Network using NS2 Simulator Performance Analysis of Wired and Wireless Network using NS2 Simulator Sachi Pandey Asst. Professor SRM University NCR Campus, Modinagar Vibhore Tyagi Pursuing M-Tech Radha Govid Group of Institution Meerut

More information

Comprehensive Study and Review Various Routing Protocols in MANET

Comprehensive Study and Review Various Routing Protocols in MANET 126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet

More information

WIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR

WIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR UNIVERSITY OF VAASA FACULTY OF TECHNOLOGY TELECOMMUNICATIONS ENGINEERING Xiang Chao WIRELESS NETWORK STUDY AND ANALYSIS USING NS2 SIMULATOR Master s thesis for the degree of Master of Science in Technology

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

Performance of DSDV Protocol over Sensor Networks

Performance of DSDV Protocol over Sensor Networks Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs

Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs Nafiza Mann Department of Computer Science and Engineering RIMT-IET, Mandi-Gobindgarh, Punjab, India Abhilash Sharma Department

More information

Project Network Simulation CSE 5346/4346

Project Network Simulation CSE 5346/4346 Project Network Simulation CSE 5346/4346 Project Overview This is a comprehensive project designed to be completed by 4 phases, and intended to demonstrate network performance and quality of service (QoS)

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Performance Analysis of Routing Protocols in MANET

Performance Analysis of Routing Protocols in MANET IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. XI (Mar-Apr. 2014), PP 89-94 Performance Analysis of Routing Protocols in MANET Mohamed Otmani

More information

Network Simulator 2 (NS2)

Network Simulator 2 (NS2) Network Simulator 2 (NS2) Basics and Mobility Management 1. Experiment 1 Let the following example be considered. All links in this network have a bandwidth of 1 Mbit/s. Please go through the tasks (1-1)

More information

A Comparison of Routing Protocols for MANET using NS-2 Simulator

A Comparison of Routing Protocols for MANET using NS-2 Simulator A Comparison of Routing Protocols for MANET using NS-2 Simulator 1 Renu Singla, 2 Priyanka 1 Asst. Prof (CSE), Sri Ram College of Engg.,Palwal, India 2 M.Tech(CSE), Sri Ram College of Engg.,Palwal, India

More information

A Review paper on Routing Protocol Comparison

A Review paper on Routing Protocol Comparison A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna

More information

An Introduction to NS-2

An Introduction to NS-2 An Introduction to NS-2 * Roadmap For Today s Lecture 1. ns Primer 2. Extending ns Part I: ns Primer What is ns? Object-oriented, discrete event-driven network simulator Written in C++ and OTcl By VINT:

More information