Review of Scenario based Routing Protocols in MANET

Similar documents
Scenario Based Performance and Comparative Simulation Analysis of Routing Protocols of MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Maharishi Markandeshwar University

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

2013, IJARCSSE All Rights Reserved Page 85

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

Performance Evaluation of Various Routing Protocols in MANET

Routing Protocols in MANET: Comparative Study

Routing Protocols in Mobile Ad-Hoc Network

Performance Evaluation of MANET through NS2 Simulation

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Routing Protocols in MANETs

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Performance Analysis and Enhancement of Routing Protocol in Manet

A Survey of Routing Protocols for Ad Hoc Wireless Home Networks

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Routing protocols in Mobile Ad Hoc Network

II. ROUTING CATEGORIES

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

IJMIE Volume 2, Issue 6 ISSN:

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Performance Comparison and Analysis of DSDV and AODV for MANET

The Performance Evaluation of AODV & DSR (On-Demand. emand- Driven) Routing Protocols using QualNet 5.0 Simulator

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Mobile Ad Hoc Network Routing Protocols: a Detailed Performance Examination of AODV, DSR and DSDV

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

Current Project Work on Routing Protocols for MANET: A Literature Survey Mr. Chethan Chandra S Basavaraddi, Smt. Geetha N.B. M.Tech.

CS5984 Mobile Computing

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Survey of Reactive Routing Protocols for MANET

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

Gurleen Kaur Walia 1, Charanjit Singh 2

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery

Performance Analysis of AODV, DSDV and DSR by using Different Mobility Models

Reducing End to End per Packet Energy Consumption

Figure 1: Ad-Hoc routing protocols.

A Novel Review on Routing Protocols in MANETs

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)

Energy Efficient EE-DSR Protocol for MANET

Introduction to Mobile Ad hoc Networks (MANETs)

Routing Problems in Mobile Ad hoc Networks (MANET)

Exploring Performance of Different Adhoc Routing Protocols in Mobile Adhoc Networks

AODV-PA: AODV with Path Accumulation

Performance Evaluation of AODV and DSR routing protocols in MANET

A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Impact of Hello Interval on Performance of AODV Protocol

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Improving Performance of Routing Protocols Using MRP Framework

Comprehensive Study and Review Various Routing Protocols in MANET

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

A Survey on Cross-Layer Reliable Routing Protocols in MANETs

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 3, May

Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad Hoc Networks: DSR, AODV, AOMDV, TORA

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Analysis of Routing Protocols in MANETs

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Transcription:

Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 673-678 Review of Scenario based Routing Protocols in MANET Rashmi Pathak 1, Prof.Ajay Lala 2 1,2 Department of Computer Science and Engineering, Gyan Ganga Institute of Technology and Sciences, Jabalpur, INDIA ABSTRACT Path routing and protocol selection are the primary strategies to design any wireless network. In Mobile Adhoc Network (MANET) the selected protocol should have best in terms of data delivery and data integrity. Hence the performance analysis of the protocols is the major step before selecting a particular protocol. In this paper, the performance analysis is carried out on Adhoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Destination Sequenced Distance Vector (DSDV) protocols using NS2 simulator. The delay, throughput, control overhead and packet delivery ratio are the four common measures used for the comparison of the performance of above protocols. Keywords--- Mobile Ad-hoc Network; Routing protocols; Throughput; Delay; Packet Delivery Ratio; Control Overhead I. INTRODUCTION Mobile ad hoc network is a collection of wireless nodes that do not need to rely on a predefined infrastructure to keep the network connected. MANET [1] is a selfconfigurable network and nodes are free to move in anywhere within the range of the network, so topology may change and this event is unpredictable. MANET participant do not need access point or base stations, and instead rely on each other to establish a temporary network; peers communicate beyond their individual transmission ranges by routing packets through intermediate nodes [18]. According to these characteristics, routing is a critical issue and we should choose an efficient routing protocol to makes the MANET reliable [4]. Mobile ad hoc network topology is dynamic [5], so due to mobility of nodes, dynamic topology of the network, lack of centralized mechanism makes MANET more vulnerable. One of the distinctive features of MANET is, each node must be able to act as a router to find out the optimal path to forward a packet. II. MOBILE AD-HOC NETWORK A mobile ad-hoc network (MANET) is a selfconfiguring infrastructure less [5] [14] network of mobile devices such as PDA, laptop connected by wireless links. Nodes in the network should be able to sense and discover with nearby nodes.due to the limited transmission range of wireless network interfaces, multiple network hops may be needed for one node to exchange data with another across the network. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. Routing protocol plays very important part in implementation of mobile ad hoc networks. Due to the nature of mobile ad hoc networks it is non-trivial problem to find path from source to the destination and perform the communication between nodes for a long period of time. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger Internet. Fig. 1.1 MANET 2.1 Characteristics of MANET MANET s node consists of wireless transmitters and receivers using antennas which are: highly directional, omni-directional or a combination of both [18]. To enable communication within a MANET, a routing protocol is required to establish routes between participating nodes. Because of limited transmission range, multiple network 673 Copyright 2011-15. Vandana Publications. All Rights Reserved.

hops may be needed to enable data communication between two nodes in the network. In MANETs mobile nodes share the same frequency channel thereby limiting the network capacity. Thus one of the highly desirable properties of a routing protocol for MANETs is that it should be bandwidth efficient. Since MANET is an infrastructure-less network, each mobile node operates not only as a host but also as a router, forwarding packets for other mobile nodes in the network [14]. Any protocol handle several inherent characteristics of MANETS. i. Dynamic topology: Mobility of nodes lends to unpredictable network topology. ii. Variable capacity wireless links: The capacity of wireless-networks is significantly lesser than the hardwired systems. Considering the multiple access, fading, noise, and interference conditions, etc.[3] and throughput of wireless networks is often much less than a radio's maximum transmission rate. iii. Power constrained operation: Power conservation is crucial in mobile wireless systems since these networks typically operate off power-limited sources [12], which dictate whether a network is operational or not. iv. Limited Physical security: Mobile networks are more vulnerable to physical security threats such as eavesdropping. 2.2 MANET Routing Protocol Properties MANET routing protocol include various desirable properties. They describe following: i. Distributed Operation: The decentralized nature of a MANET requires that any routing protocol execute in a distributed fashion [12]. ii. On demand operation: Since a uniform traffic distribution cannot be assumed within the network, the routing algorithm must adapt to the traffic pattern on a demand or need basis, require close coupling with the linklayer protocol through a standardized interface thereby utilizing power and bandwidth resources more efficiently. iii. Loop-free: To ensure proper message delivery and efficient network operation [11], a routing protocol must be loop-free. iv. Security: Since MANETs are more vulnerable to physical security threats, provisions for security must be made [11], e.g., the application of Internet Protocol (IP) security techniques. v. Entering/Departing nodes: A routing protocol should be able to quickly adapt to entering or departing nodes in the network, without having to restructure the entire network. vi. Bidirectional/Unidirectional links: Since the condition of a MANET is dynamic, a routing protocol should be able to execute on both bidirectional and unidirectional links. vii. Sleep- period operation: Nodes of a MANET stop transmitting and receiving for some arbitrary time interval [11] as a result of energy conservation. III. EXISTING AD HOC ROUTING PROTOCOLS Since the advent of Defence Advanced Research Projects Agency (DARPA) packet radio networks in the early 1970s [1], numerous protocols have been developed for ad hoc mobile networks. Such protocols must deal with the typical limitations of these networks, which include high power consumption, low bandwidth, and high error rates. These routing protocols may generally be categorized as: Table-driven Source-initiated (demand-driven) Solid lines in this figure represent direct descendants, while dotted lines depict logical descendants. Despite being designed for the same type of underlying network, the characteristics of each of these protocols are quite distinct. The following sec-tions describe the protocols and categorize them according to their characteristics. A. Table-Driven Routing Protocols Table-driven routing protocols attempt to maintain consistent, up-to-date routing information from each node to every other node in the network. These protocols require each node to maintain one or more tables to store routing information, and they respond to changes in network topology by propagating updates throughout the network in order to maintain a consistent network view. The areas in which they differ are the number of necessary routing-related tables and the methods by which changes in network structure are broadcast. The following sections discuss some of the existing table-driven ad hoc routing protocols. 3.1 Destination-Sequenced Distance-Vector Routing The Destination-Sequenced Distance-Vector Routing protocol (DSDV) described in [2] is a table-driven algorithm based on the classical Bellman-Ford routing mechanism [3]. The improvements made to the Bellman- Ford algorithm include freedom from loops in routing tables. Every mobile node in the network maintains a routing table in which all of the possible destinations within the network and the number of hops to each destination are record-ed. Each entry is marked with a sequence number assigned by the destination node. The sequence numbers enable the mobile nodes to distinguish stale routes from new ones, there-by avoiding the formation of routing loops. Routing table updates are periodically transmitted throughout the network in order to maintain table consistency. To help alleviate the potentially large amount of network traffic that such updates can generate, route updates can employ two possible types of packets. The first is known as a full dump. This type of packet carries all available routing information and can require multiple network protocol data units (NPDUs). During periods of occasional movement, these packets are transmitted infrequently. Smaller incremental packets are used to relay only that information which has changed since the last full dump. Each of these broadcasts should fit into a standard-size NPDU, thereby decreasing the amount of traffic generated. The mobile nodes maintain an additional table where they store the data sent in the incremental routing information packets. New route broadcasts contain the address of the destination, the number of hops to reach the destination, 674 Copyright 2011-15. Vandana Publications. All Rights Reserved.

the sequence number of the information received regarding the destination, as well as a new sequence number unique to the broadcast [2]. The route labelled with the most recent sequence number is always used. In the event that two updates have the same sequence number, the route with the smaller metric is used in order to optimize (shorten) the path. Mobiles also keep track of the settling time of routes, or the weighted average time that routes to a destination will fluctuate before the route with the best metric is received (see [2]). By delaying the broadcast of a routing update by the length of the settling time, mobiles can reduce network traffic and optimize routes by eliminating those broadcasts that would occur if a better route was discovered in the very near future. 3.2 Clusterhead Gateway Switch Routing The Clusterhead Gateway Switch Routing (CGSR) protocol differs from the previous protocol in the type of addressing and network organization scheme employed. Instead of a flat network, CGSR is a clustered multi-hop mobile wireless network with several heuristic routing schemes [4]. The authors state that by having a cluster head controlling a group of ad hoc nodes, a framework for code separation (among clusters), channel access, routing, and bandwidth allocation can be achieved. A cluster head selection algorithm is utilized to elect a node as the cluster head using a distributed algorithm within the cluster. The disadvantage of having a cluster head scheme is that frequent cluster head changes can adversely affect routing protocol performance since nodes are busy in cluster head selection rather than packet relaying. Hence, instead of invoking cluster head reselection every time the cluster membership changes, a Least Cluster Change (LCC) clustering algorithm is introduced. Using LCC, cluster heads only change when two cluster heads come into contact, or when a node moves out of contact of all other cluster heads. CGSR uses DSDV as the underlying routing scheme, and hence has much of the same overhead as DSDV. However, it modifies DSDV by using a hierarchical cluster-head-to-gate-way routing approach to route traffic from source to destination. Gateway nodes are nodes that are within communication range of two or more cluster heads. A packet sent by a node is first routed to its cluster head, and then the packet is rout-ed from the cluster head to a gateway to another cluster head, and so on until the cluster head of the destination node is reached. The packet is then transmitted to the destination. Figure 2 illustrates an example of this routing scheme. Using this method, each node must keep a cluster member table where it stores the destination cluster head for each mobile node in the network. These cluster member tables are broad-cast by each node periodically using the DSDV algorithm. Nodes update their cluster member tables on reception of such a table from a neighbour. Figure 1.2 CGSR: routing from node 1 to node 8. Figure 1.3 Categorization of ad hoc routing protocols. 3.3 The Wireless Routing Protocol The Wireless Routing Pro-tocol (WRP) described in [5] is a table-based protocol with the goal of maintaining routing information among all nodes in the network. Each node in the network is responsible for maintaining four tables: Distance table Routing table Link-cost table Message retransmission list (MRL) table Each entry of the MRL contains the sequence number of the update message, a retransmission counter, an acknowledge-ment-required flag vector with one entry per neighbour, and a list of updates sent in the update message. The MRL records which updates in an update message need to be retransmit-ted and which neighbours should acknowledge the retransmission [5]. Mobiles inform each other of link changes through the use of update messages. An update message is sent only between neighbouring nodes and contains a list of updates (the destination, the distance to the destination, and the predecessor of the destination), as well as a list of responses indicating which mobiles should acknowledge (ACK) the update. Mobiles send update messages after processing updates from neighbours or detecting a change in a link to a neighbour. In the event of the loss of a link 675 Copyright 2011-15. Vandana Publications. All Rights Reserved.

between two nodes, the nodes send update messages to their neighbours. The neighbours then modify their distance table entries and check for new possible paths through other nodes. Any new paths are relayed back to the original nodes so that they can update their tables accordingly. Nodes learn of the existence of their neighbours from the receipt of acknowledgments and other messages. If a node is not sending messages, it must send a hello message within a specified time period to ensure connectivity. Otherwise, the lack of messages from the node indicates the failure of that link; this may cause a false alarm. When a mobile receives a hello message from a new node, that new node is added to the mobile s routing table, and the mobile sends the new node a copy of its routing table information. B. Source-Initiated On-Demand Routing A different approach from table-driven routing is source-initiated on-demand routing. This type of routing creates routes only when desired by the source node. When a node requires a route to a destination, it initiates a route discovery process within the network. This process is completed once a route is found or all possible route permutations have been examined. Once a route has been established, it is maintained by a route maintenance procedure until either the destination becomes inaccessible along every path from the source or until the route is no longer desired. 3.4 Ad Hoc On-Demand Distance Vector Routing The Ad Hoc On-Demand Distance Vector (AODV) routing protocol described in [7] builds on the DSDV algorithm previously described. AODV is an improvement on DSDV because it typically minimizes the number of required broadcasts by cre-ating routes on a demand basis, as opposed to maintaining a complete list of routes as in the DSDV algorithm. The authors of AODV classify it as a pure on-demand route acquisition sys-tem, since nodes that are not on a selected path do not main-tain routing information or participate in routing table exchanges [7]. When a source node desires to send a message to some destination node and does not already have a valid route to that destination, it initiates a path discovery process to locate the other node. It broadcasts a route request (RREQ) packet to its neighbours, which then forward the request to their neighbours, and so on, until either the destination or an inter-mediate node with a fresh enough route to the destination is located. Figure 3a illustrates the propagation of the broad-cast RREQs across the network. AODV utilizes destination sequence numbers to ensure all routes are loop-free and contain the most recent route information. Each node maintains its own sequence number, as well as a broadcast ID. The broadcast ID is incremented for every RREQ the node initiates, and together with the node s IP address, uniquely identifies an RREQ. Along with its own sequence number and the broadcast ID, the source node includes in the RREQ the most recent sequence number it has for the destination. Inter-mediate nodes can reply to the RREQ only if they have a route to the destination whose corresponding destination sequence number is greater than or equal to that contained in the RREQ. Figure 1.4. AODV route discovery. Timing is an important factor for TORA because the height metric is dependent on the logical time of a link fail-ure; TORA assumes that all nodes have synchronized clocks (accomplished via an external time source such as the Global Positioning System). TORA s metric is a quintuple comprising five elements, namely: Logical time of a link failure The unique ID of the node that defined the new reference level A reflection indicator bit A propagation ordering parameter The unique ID of the node 3.5 Associatively-Based Routing A totally different approach in mobile routing is proposed in [12]. The Associatively-Based Routing (ABR) protocol is free from loops, deadlock, and packet duplicates, and defines a new routing metric for ad hoc mobile networks. This metric is known as the degree of association stability. In ABR, a route is selected based on the degree of association stability of mobile nodes. Each node periodically generates a beacon to signify its existence. When received by neighbouring nodes, this beacon causes their associatively tables to be updated. For each beacon received, the associatively tick of the current node with respect to the beaconing node is incremented. Association stability is defined by connection stability of 676 Copyright 2011-15. Vandana Publications. All Rights Reserved.

one node with respect to another node over time and space. A high degree of association stability may indicate a low state of node mobility, while a low degree may indicate a high state of node mobility. Associatively ticks are reset when the neighbours of a node or the node itself move out of proximity. A fundamental objective of ABR is to derive longer-lived routes for ad hoc mobile networks. The three phases of ABR are: Route discovery Route reconstruction (RRC) Route deletion IV. PERFORMANCE METRICS The performance metrics helps to characterize the network that is substantially affected by the routing algorithm to achieve the required Quality of Service (QoS). In this work, the following metrics are considered. End-to- End Delay(EED): It is the time taken for an entire message to completely arrive at the destination from the source. Evaluation of end-to-end delay mostly depends on the following components i.e. propagation time (PT), transmission time (TT), queuing time (QT) and processing delay (PD). Therefore, EED is evaluated as: EED = PT + TT + QT + PD. (1) Throughput: It is the measure of how fast a node can actually sent the data through a network. So throughput is the average rate of successful message delivery over a communication channel. Control Overhead: It is ratio of the control information sent to the actual data received at each node. Packet Delivery Ratio (PDR): It is the ratio of the total data bits received to total data bits sent from source to destination. V. CONCLUSION Routing protocols has to consider the problems that take place due to node mobility. Most of the current protocols assume that nodes are stationary. However, the nodes change their positions frequently. In such cases, the frequent update of the position of nodes and the propagation of that information through the network consumes the energy of nodes. New routing algorithms are needed in order to handle the overhead of mobility and topology changes in such energy constrained environment. We have seen a great development in the field of wireless networks (infrastructure based) and in the field of Mobile a d hoc network (infrastructure less network). In this paper, we discuss MANET and its characteristics, advantages, application, challenges, issues and various types of routing protocols for efficient and effective communication between the mobile nodes participating in a dynamically established network of nodes. The routing protocols are broadly classified into Broadcast, Unicast and Multicast routing Protocols. In this paper, a brief description on unicast routing protocols is provided and how they are better than other routing protocols is shown. REFERENCES [1] Anil Kumar Sharma and Neha Bhatia, Behavioral Study of MANET Routing Protocols by using NS-2, IJCEM, ISSN (Online): 2230-7893, Vol. 12, pp.100-104, April 2011. [2] Anuj K. Gupta and Dr. Anil K. Verma, Performance analysis of AODV, DSR & TORA Routing Protocols, IACSIT, ISSN: 1793-8236, Vol. 2, No. 02, April 2010. [3] Manijeh Keshtgary and Vahide Babaiyan, Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in MANET, IJCSE, ISSN: 0975-3397 Vol. 4 No. 02 February 2012. [4] S. D. Khatawkar, K. K. Pandyaji, R. M. Patil, V. M. Sali and U. L. Kulkarni, Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs, International Conference on Computer Networks and Communication Systems, (CNCS 2012) IPCSIT, vol.35 IACSIT Press, Singapore,2012. [5] A. Al-Maashri, M. Ould-Khaoua, Performance analysis of MANET routing protocols in the presence of self-similar traffic, In Proceedings of the 31st IEEE Conference on Local Computer Networks, 2006, 14-16 November 2006, pages pp. 801-807, Tampa, Florida, USA. [6] Samyak Shah, Amit Khandre, Mohesh Shirole and Girish Bhole, Performance evaluation of ad hoc routing protocols using NS2 simulation, National Conference on Mobile and Pervasive Computing (CoMPC)-2008. [7] Nor Surayati Mohamad Usop, Azizol Abdullah and Ahmad Faisal Amri Abidin, Performance Evaluation of AODV, DSDV & DSR Routing Protocol in Grid Environment, IJCSNS, vol. 9, No. 7, pp. 261-268, July 2009. [8] Anurag Malik, Shivanshu Rastogi, Sajendra Kumar, Performance Analysis of Routing Protocol in Mobile Ad Hoc Network using NS-2, [9] Aleksandr Huhtonen, Comparing AODV and OLSR Routing Protocols, Seminar on Internetworking, HUT T- 110.551, Helsinki University of Technology, Sjökulla, 2004. [10] Ramamohana Rao.G and Dr. Ranjan Bose, Reactive Routing Protocol For Multicasting in MANET, [11] Nadia N. Qadri and Antonio Liotta, Analysis of Pervasive Mobile Ad Hoc Routing Protocols, Pervasive Computing: Innovations in Intelligent Multimedia and Application Computer Communications and Networks, DOI 10.1007/978-1-84882-599-4 19, Springer-Verlag London Limited, pp.433-453, 2009. [12] Ramesh, Dr. P. Subbaiah, N. Koteswar Rao and M.Janardhana Raju, Performance Comparison and 677 Copyright 2011-15. Vandana Publications. All Rights Reserved.

Analysis of DSDV and AODV for MANET, IJCSE, ISSN 0975-3397, Vol. 02, No. 02, pp. 183-188, 2010. [13] NS-2, The ns Manual (formally known as NS Documentation) available at http:// www. isi.edu / nsnam / ns/doc. [14] C. Perkins, E. Belding-Royer, and S. Das, Ad Hoc On-Demand Distance Vector (AODV) Routing, IETF RFC3561, Available fromhttp://www.ietf.org/rfc/rfc3561txt?number=3561, July 2003. [15] David B. Johnson, D. Maltz, and Yih - Chun Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), <draft-ietf-manet-dsr-10.txt> Internetdraft, 2004. [16] Sachin Kumar Gupta & R. K. Saket, Performance Metric Comparison of AODV and DSDV Routing Protocols in MANETs using NS-2, IJRRAS, Vol7, Issue3, pp.339-350, June 2011. [17] L. Abusalah and A. Khokhar, TARP: Trust-Aware Routing Protocol, IWCMC, ACM 1-59593-306-9/06/0007Vancouver, British Columbia, Canada,, July 3 6, 2006. [18] D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile Computing, Imielinski and Korth, Eds. Kluwer Academic Publishers, 1996,vol. 353. [19] C. Perkins and P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing(dsdv) for mobile computers, in Proceedings of ACM SIGCOMM 94 Conference on Communications Architectures, Protocols and Applications, London, UK, Aug. - Sept. 1994, pp. 234 244. [20] C. E. Perkins and E. M. Royer, Ad hoc on demand distance vector routing, in Proceedings of WMCSA 99 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, Feb. 1999, pp. 90 100. 678 Copyright 2011-15. Vandana Publications. All Rights Reserved.