Keywords : AODV, Reactive Protocol, Analytical Study, Simulation based

Similar documents
Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Performance Evaluation of MANET through NS2 Simulation

Routing Protocols in MANETs

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Routing Protocols in Mobile Ad-Hoc Network

Computation of Multiple Node Disjoint Paths

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Impact of Hello Interval on Performance of AODV Protocol

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

2013, IJARCSSE All Rights Reserved Page 85

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Figure 1: Ad-Hoc routing protocols.

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

International Journal of Advance Research in Computer Science and Management Studies

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Wireless Networking & Mobile Computing

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Keywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network,

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Comparative Study of Routing Protocols in MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Power aware Multi-path Routing Protocol for MANETS

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

AVC College of Engineering, Mayiladuthurai, India

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

Pardeep Mittal Assistant Professor, Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India.

Performance Evaluation of Various Routing Protocols in MANET

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Routing Protocols in MANET: Comparative Study

Analysis of Routing Protocols in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Chapter 16. Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols. Wireless Network Models. Illustration of an ad hoc network

Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols

A Literature survey on Improving AODV protocol through cross layer design in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Performance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Performance Analysis of Aodv Protocol under Black Hole Attack

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

A Study on Issues Associated with Mobile Network

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

A NOVEL APPROACH OF AODV FOR STABILITY AND ENERGY EFFICIENT ROUTING FOR MANET USING IPV6

SUMMERY, CONCLUSIONS AND FUTURE WORK

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks

Chapter 7 CONCLUSION

Transcription:

Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Analytical Comparison of Reactive Protocols in Mobile Network Ankit Chaudhary PDM College of Engineering, Bahadurgarh Maharshi Dayanand University, Rohtak-124001, India Abstract :- Mobile communication is most required communication network in today s scenarios. In such network, different kind of data is communicated over the network. The main consideration in such network is given to routing protocol used for the communication. The presented work is about to identify the effective mobile protocol by performing a comparative analysis. In this work, a simulation based analysis is performed on reactive protocols. The work is simulated in NS2 environment. Results obtained from the system shows AODV is most effective routing protocol. Keywords : AODV, Reactive Protocol, Analytical Study, Simulation based I INTRODUCTION A mobile area network is one of the most busy networks that is opened worldwide for new users. But because of this publicly open nature of the network, there are number of internal issues with the network. These issues includes the security, QOS, route optimization etc. To perform the communication over the network, there are number of predefined protocols. These protocols are responsible to provide a secure and reliable communication over the network. To understand the basic formation of mobile network, it is required to understand the actual communication flow over the network. As the communication initiate between two nodes called source and the destination, a series of intermediate nodes are elected dynamically to perform the communication. These intermediate nodes are elected based on the blind mutual trust with neighboring nodes. Another important property of these network is the capability to work without any infrastructure or any centralized system. Each node over the network can play the role of a router as well as the host. The network is not bounded to any geographical restriction and no energy restriction apply on the mobile nodes. Mobile network is been used in many application areas such as battlefield, vehicular area communication etc. It also applied to some emergency services such as disaster recovery and relief activities. A) Routing Protocols A protocol is responsible to perform end to end communication. MANET adapts the TCP/IP structure to perform the end to end communication over the network. As the mobile network having the mobility features because of which it works on modified TCP/IP model. To take the routing decisions, there are number of associated routing protocols. These all protocols are divided in three main categories called reactive protocols, proactive protocols and hybrid protocols. These all protocols are listed in figure 1. Figure 1 : Routing Protocols The reactive protocols are also known as on-demand protocols, It means they need not to identify the initial route to perform the communication at the source end. Instead, as the communication performed, each node identify its best neighbor and perform the communication with that node. The reactive protocols generate the route dynamically between the source and the destination. To identify the best neighbor, they use flooding technique. The information is only flooded, data is transmitted only to the specified route. 2013, IJARCSSE All Rights Reserved Page 1322

These protocols are designed for the adhoc network by using the traditional distance vector routing approach. These kind of protocols maintains the routing information for each node in the form of a table. The route creation and updation is done periodically after the fixed intervals. This updation is done under different parameters regardless to the mobility, intervals etc. These protocols generates the significant number of data session to perform effective communication over the network. Hybrid routing protocols are the new generation protocols that contains the characteristics of both reactive and proactive protocols. These systems are improves the scalability vector and allowing nodes to form some backbone to reduce the overhead of route discovery. These protocols are zone based or cluster based that maintain the routes to near nodes and determine the route for far away nodes using route discovery approach. B) Flooding Flooding is the approach used by reactive protocols to search the best neighbor among neighboring nodes. It broadcast the request to all neighboring nodes till the destination node is not arrived. Flooding does not require any topological information or the hardware to broadcast the route request. Once the route request populated, it gets the reply from the nodes. Out of these nodes, the effective neighbor is selected as the next hop in the route and communication is performed using that node. C) Gossiping It is an intelligent flooding approach in which the information is broadcast to random nodes instead of all neighbor nodes. Once the neighbor node receive data, it randomly identify next sensor node for the communication. The main advantage of this approach is the avoid to the implosion problem as it does not send duplicate messages. II REACTIVE PROTOCOLS As discussed above, the reactive protocols does not have any centralized controller to maintain the route or to store the routing information. Some of these protocols are described here under A) DSR (Dynamic Source Routing) It is the on-demand routing protocol. It is one of most efficient and simple protocol used in wireless adhoc network to perform multi hop communication. As of reactive protocol, it does not require any centralized controller instead it is a completely self configuring network protocol. The complete routing mechanism adapted by DSR is divided in two main stages called route discovery and route maintenance. The route information of DSR is regularly modified to identify the new effective routes. Once the route is identified, the packets are transmitted over that route. This route information is sent by the sender node once the specific route is discovered. To perform the route discover, the route request(rreq) is broadcasted and the route information is obtained in the form of route reply(rrep). As some node want to send some information, the RREQ is broadcasted to all its neighboring nodes using flooding approach. These neighboring nodes accept the RREQ message and broadcast it to its neighboring nodes; the process is repeated till the destination node not arrived. In this protocol, each node is having a separate route cache to store the discovered routes. When a node broadcast the request, it check the internal cache for the destination node. This cache concept reduces the memory overhead that occur when the route discover is done. If a route is already in route cache then there is no need of broadcast it again. As a message reached to the destination node, it contains the complete information about the route as shown in figure 2. Src RREQ (A) RREQ (A,B) RREQ (A,B,C) Figure 2 : Route Generation by DSR Once the route is identified, the next stage is route maintenance. This process is completed using two type of messages called Route Error (RERR) and Route Acknowledgement (ACK). As a node receive message successfully, the ACK is send to the sender. In same way Src Dst A B C D RREP (A,B,C,D) RRER (C-D) RREP (A,B,C,D) RRER (C-D) RREP (A,B,C,D) Dst A B C D DP (A,(B),C,D) DP (A,B,(C),D ) Figure 3 : Route Maintenance in DSR DP (A,B,C,(D) ) 2013, IJARCSSE All Rights Reserved Page 1323

as the packets transmitted successfully the next neighboring nodes gets the acknowledgement. If some problem occur during the communication RERR message is transmitted to the sender. The route maintenance process is shown in figure 3. B) AODV (Active On-Demand Distance Vector) As the name suggest it creates the route only on demand from the destination node. This protocol support both the unicast as well as multicast routing. It maintain the route till is desired by the source. It is a tree based protocol that creates a tree with group members while performing the multicast communication. These group members are connected in a tree form using intermediate nodes or directly. The sequence number is assigned to all communicating nodes to keep track on all nodes. To perform the communication over the network there are three kind of communicating messages called RREQ(Route Request), RREP (Route Reply) and RERR (Route Error). Like DSR, AODV also broadcast the Route request to neighboring nodes and keep the request alive for a fix time period. It also contains the information about the number of hops on which the message is forwarded. Each node contains the information including the broadcast id and the sequence number of the node. As a node receive the message, it send a route reply message to the originator of route request. If some link breakage occur on the active route, a loss message RERR will be generated to notify other nodes about the link break. The routing process followed by AODV is shown in figure 4. The route information maintained in the routing table are Destination Next hop Number of hops Destination sequence number Active neighbors for this route Expiration time for this route table entry Figure 4 : Routing Process of AODV III. RESULT ANALYSIS In this present work, the analysis of these two routing protocols i.e. DSR and AODV is done under different parameters. The basic parameters taken for the analysis are shown in table 1. Table 1 : Simulation Parameters Parameter Value Number of Nodes 20 Coverage Area 800x800 Traffic Type CBR Propagation Model Two-Ray Ground MAC Type 802.11 Mobility Model Random Packet Size 512 Protocol DSR/AODV Simulation Time 10 sec Communication Delay.01 sec Presented work is analyzed under different parameters including throughput, pakey delay, packet loss rate etc. The analysis is here presented in the form of graph, shown as under. 2013, IJARCSSE All Rights Reserved Page 1324

Figure 5 : Packet Transmitted (AODV Vs. DSR) As we can see in figure 5, the packet successfully transmitted in case of AODV are more than DSR. It shows that when the heavy communication is performed over the network AODV protocol is more effective. Figure 6 : Packet Lost (AODV Vs. DSR) Here figure 6 is showing the comparision of two reactive protocols in terms of number of packets lost. As shown Figure 7 : Bytes Transmitted (AODV Vs. DSR) Here figure 7 is showing the comparsion of DSR and AODV protcol in terms of total number of bytes transmitted. As shown in the figure, AODV has transmitted more number of bytes in the specified time interval. It shows AODV protocol is more effective than DSR protocol. Figure 8 : Bit rate Analysis (AODV Vs. DSR) 2013, IJARCSSE All Rights Reserved Page 1325

in the figure data loss in case of DSR protocol is higher than AODV. It means AODV is more effective than DSR. The comparison of these two protocols in terms of bit rate is shown in figure 8. As we can see, the bit rate of AODV is higher than DSR protocol. It shows that the AODV is more efficient and it can provide transmit data with higher data rate. Figure 9 : Packet Delay Analysis (AODV Vs. DSR) Here figure 9 is showing the analysis of AODV and DSR protocols in terms of packet delay. As we can see, the AODV taken the higher delay between the packet transmission. Packet delay is one of the reasons for the effectiveness of AODV protocol. Whereas the delay between the packets in DSR is lower so that higher data loss occurs in case of DSR. The results obtained driven from the above parameters shows that AODV protocol is more effective, reliable and efficient than DSR protocol. We can see that AODV provide the higher bit rate and packet transmission over the network whereas the packet loss in case of AODV is lesser. IV. CONCLUSION In this paper, the analysis of two reactive protocols is shown under different parameters. The protocols considered here are AODV and DSR and the parameters considered here are packet delay, packet transmission, packet loss and the bit rate. All parameters shows that the AODV protocol is more effective where high rate transmission is performed over the network. REFERENCES [1] Yuxia Lin," Experimental Comparisons between SAODV and AODV Routing Protocols", WMuNeP 05, October 13, 2005, Montreal, Quebec, Canada. ACM 1-59593-183-X/05/0010 [2] Henock Mulugeta," Performance of TCP Variants over Proactive and Reactive Routing Protocols in MANET", MEDES 12, October 28-31, 2012, Addis Ababa, Ethiopia. ACM 978-1-4503-1755-9 [3] Chin-Yang Tseng," A Specification-based Intrusion Detection System for AODV", Proceedings of the 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, Virginia ACM-1-58113-783-4/03/0010 [4] Daniel Peter Dallas," Optimal and Resilient Routing for Many-to-One Topologies in Event Triggered Wireless Sensor Networks", PM2HW2N 12, October 21 22, 2012, Paphos, Cyprus. ACM 978-1-4503-1626-2/12/10 [5] Lin Zhuang," Hybrid Gateway Discovery Mechanism in Mobile Ad Hoc for Internet Connectivity", IWCMC 09, June 21-24, 2009, Leipzig, Germany. ACM 978-1-60558-569-7/09/06 [6] Nianjun Zhou," Reactive Routing Overhead in Networks with Unreliable Nodes", MobiCom 03, September 14 19, 2003, San Diego, California, USA. ACM 1-58113-753-2/03/0009 [7] John Mullen," Impact of Multipath Fading in Wireless Ad Hoc Networks", PE-WASUN 05, October 10 13, 2005, Montreal, Quebec, Canada. ACM 1-59593-182-1/05/0010 [8] Geetha.N," Performance analysis of Certain Topology based routing protocols of Mobile Ad hoc Network", RACS 12, October 23-26, 2012, San Antonio, TX, USA. ACM 978-1-4503-1492-3/12/10 [9] Chhagan Lal," A Rate Adaptive and Multipath Routing Protocol to Support Video Streaming in MANETs", ICACCI 12, August 3-5, 2012, Chennai, T Nadu, India. ACM 978-1-4503-1196-0/12/08 [10] S A Talekar," Bandwidth Estimation with RTS/CTS Mechanism for IEEE 802.11 Adhoc Networks Using Cross Layer Design", International Conference and Workshop on Emerging Trends in Technology (ICWET 2010) TCET, Mumbai, India ICWET 10, February 26 27, 2010, Mumbai, Maharashtra, India. ACM 978-1-60558-812-4 [11] Pattana Wannawilai," AODV with Sufficient Bandwidth Aware Routing Protocol", "IWCMC 10, June 28 July 2, 2010, Caen, France. ACM 978-1-4503-0062-9/10/06 [12] S Madhavi," Survey of Attacks on AODV and MAODV", International Conference and Workshop on Emerging Trends in Technology (ICWET 2010) TCET, Mumbai, India ICWET 10, February 26 27, 2010, Mumbai, Maharashtra, India. ACM 978-1-60558-812-4 [13] Jean-Michel Dricot," Integrated Ad-Hoc and Cellular Networking in Indoor or Faded Environments", IWCMC 09, June 21-24, 2009, Leipzig, Germany. ACM 978-1-60558-569-7/09/06 [14] Uttam Ghosh," Identity based Secure AODV and TCP for Mobile Ad Hoc Networks", ACWR 11, December 18-21 2011, Amritapuri, Kollam, Kerala, India ACM 978-1-4503-1011-6/11/12 [15] Chinyang Henry Tseng," DRETA: Distributed Routing Evidence Tracing and Authentication intrusion detection model for MANET", ASIACCS 07, March 20 22, 2007, Singapore. ACM 1-59593-574-6/07/0003 2013, IJARCSSE All Rights Reserved Page 1326

[16] Rafi-U-Zaman," Gateway Load Balancing In Integrated Internet-MANET Using WLB-AODV", International Conference and Workshop on Emerging Trends in Technology (ICWET 2010) TCET, Mumbai, India ICWET 10, February 26 27, 2010, Mumbai, Maharashtra, India. ACM 978-1-60558-812-4 2013, IJARCSSE All Rights Reserved Page 1327