IJMIE Volume 2, Issue 6 ISSN:

Similar documents
Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Performance Evaluation of MANET through NS2 Simulation

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Analysis of Routing Protocols in MANETs

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in MANETs

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

A Survey - Energy Efficient Routing Protocols in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

2013, IJARCSSE All Rights Reserved Page 85

Implementation: Detection of Blackhole Mechanism on MANET

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

A Literature survey on Improving AODV protocol through cross layer design in MANET

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Comparative Study of Routing Protocols in MANET

Routing Protocols in MANET: Comparative Study

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Scenario Based Performance and Comparative Simulation Analysis of Routing Protocols of MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Figure 1: Ad-Hoc routing protocols.

Comprehensive Study and Review Various Routing Protocols in MANET

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

II. ROUTING CATEGORIES

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

A Survey on Path Weight Based routing Over Wireless Mesh Networks

IMPLEMENTATION OF DYMO ROUTING PROTOCOL

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Recent Researches in Communications, Information Science and Education

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Performance Evaluation of Ad Hoc Network Routing Protocols with NS2

Comparative Performance Analysis of AODV,DSR,DYMO,OLSR and ZRP Routing Protocols in MANET using Random Waypoint Mobility Model

Performance Improvement of Wireless Network Using Modern Simulation Tools

Keywords: AODV, MANET, WRP

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

Gurleen Kaur Walia 1, Charanjit Singh 2

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 3, May

A Simulation study : Performance comparison of AODV and DSR

Performance Analysis of DSDV and ZRP Protocols with Mobility Variations in MANETs

A Comparison of Routing Protocols for MANET using NS-2 Simulator

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

Performance Evaluation of Various Routing Protocols in MANET

Defending MANET against Blackhole Attackusing Modified AODV

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

A Novel Method for Power Consumption Optimization In Manet

Performance measurement of MANET routing protocols under Blackhole security attack

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

A RELATIVE ANALYSIS OF MANET ROUTING PROTOCOLS DSDV AND AOMDV USING NS2

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

Comparative Performance Analysis of Routing Protocols in MANET using Varying Pause Time

Mitigating Superfluous Flooding of Control Packets MANET

Packet Estimation with CBDS Approach to secure MANET

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

PIONEER RESEARCH & DEVELOPMENT GROUP

LECTURE 9. Ad hoc Networks and Routing

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

A Review paper on Routing Protocol Comparison

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Performance Evaluation of AODV and DSR routing protocols in MANET

Transcription:

Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network Mr. Amol V. Zade* Prof. Vijaya K. Shandilya** Abstract: A major aspect of ad-hoc networks is that the nodes can move randomly, which requires the routing protocols. The routing protocol should try to minimize control traffic, such as periodic update messages. Instead the routing protocol should be reactive, thus only calculates routes upon receiving a specific request. The On-demand protocol performs better than the tabledriven protocol. The simulator that we are using is Network Simulator (NS-2) which is a most widely used network simulator. It has the capabilities to simulate a range of networks including wired and wireless networks. The size of the network and the offered traffic load affects protocols based on routing, like AODV, to some extent. A large network with many mobile nodes will increase the overhead for AODV quite drastically. This paper is subjected to Adhoc On-demand Distance Vector (AODV) routing protocol and evaluated its performance. Furthermore, in this paper the performance of AODV in terms of packet delivery and routing load is analyzed by varying the number of nodes, parameters through simulation results ns2 simulator. Keywords: MANET, AODV, NS2, PDR, Routing Load * M.E. II Year. Dept. of CSE, Sipna s COET, Amravati, MH, India. ** Asso. Prof. Dept. of CSE, Sipna s COET, Amravati, MH, India. 280

1. INTRODUCTION: The On-demand protocol performs better than the table-driven protocol. The simulator that we are using is Network Simulator (NS-2) which is a most widely used network simulator. It has the capabilities to simulate a range of networks including wired and wireless networks. This paper is subjected to Adhoc On Demand Distance Vector (AODV) routing protocol and evaluated its performance.. The On-demand protocol performs better than the table-driven protocol. The simulator that we are using is Network Simulator (NS-2) which is a most widely used network simulator. It has the capabilities to simulate a range of networks including wired and wireless networks. This paper is subjected to Adhoc On Demand Distance Vector (AODV) routing protocol and evaluated its performance. The field of wireless communication and networking has experienced considerable advances in recent years. In particular, MANETs have become quite popular. Ad hoc is derived from Latin, meaning for this purpose. Usually ad hoc networks are created on the fly for a particular one time purpose. Here, each node in the network acts as a router itself and performs network control. Therefore, these networks are easily deployable, unlike infrastructure-based networks. Ad hoc networks are used in the following applications: conferencing, emergency services, sensor networking and intelligent transportation systems. A wireless mobile ad-hoc network (MANET) is a network consisting of two or more mobile nodes equipped with wireless communication and networking capabilities, but lacking any pre-existing network infrastructure. Each node in the network acts both as a mobile host and a router, offering to forward traffic on behalf of other nodes within the network. For this traffic forwarding functionality, a routing protocol is needed. Figure 1: Mobile ad-hoc Network (MANET) 281

Ad-hoc networks do not rely on any pre-existing network infrastructure. Instead, these networks are formed in an on-demand fashion as soon nodes come sufficiently close to each other. This eliminates the need for stationary network components, such as routers and base stations, as well as cabling and central administration. The functionality and usefulness of an adhoc network heavily depends on this forwarding feature of participating nodes. 2. AD-HOC ROUTING PROTOCOLS: The main purpose of a routing protocol is to set up and maintain a routing table, containing information on where packets should be sent next to reach their destinations. Nodes use this information to forward packets that they receive. Ad-hoc routing protocols are usually classified by the approach they use for maintaining and updating their routing tables. The three main approaches are: Figure 2: MANET s Routing Protocols. Reactive (on-demand-driven) Protocols: In this approach, routes to a destination are acquired by a route discovery process in an on-demand fashion, i.e., a route is not searched for unless it is needed. The acquired route is maintained by a route maintenance process until it has been determined that the route is not needed anymore, or has become invalid. The advantage of 282

this approach is that unnecessary exchange of route information is avoided, leaving more network resources available for other network traffic. The disadvantage is that route look-ups could take some time. Depending on the application, this may or may not be acceptable. Proactive (table-driven) Protocols: In this approach, the routing protocol attempts to maintain a routing table with routes to all other nodes in the network. Changes in the network topology are propagated by means of updates throughout the entire network to ensure that all nodes share a consistent view of the network. The advantage of this approach is that routes between arbitrary source-destination pairs are readily available, all the time. The disadvantages are that the routing tables will occupy a large amount of space if the network is large, and that the updates may lead to inefficient usage of network resources if they occur too frequently. Hybrid Protocols: It is the combination of both proactive and reactive routing protocols i.e. temporary ordered routing algorithm (TORA), zone routing protocol (ZRP), hazy sighted link state (HSLS) and order one routing protocol (OOPR). Proactive and reactive algorithms are used to route packets. The route is established with proactive routes and uses reactive flooding for new mobile nodes. In this paper we have compared MANETs routing protocols from reactive, proactive and hybrid categories, as we have used randomly one protocol from each categories as from reactive AODV, proactive OLSR, hybrid TORA. 3. AODV ROUTING PROTOCOL DESCRIPTION: When a source node needs to send data packets to some destination, it checks its route table to determine whether it has a valid route. If no route exists, it performs a route discovery procedure to find a path to the destination. Hence, route discovery becomes on-demand. These routing approaches are well known as Reactive routing. The route discovery typically consists of the network-wide flooding of a request message. Once a route has been established, it is maintained by some form of route maintenance procedure until either the destination becomes inaccessible along every path or until the route is no longer desired. A. Route Discovery: When a node wants to send a packet to some destination node and does not have a valid route in its routing table for that destination, it initiates a route discovery process. Source node broadcasts a route request (RREQ) packet to its Neighbours, which then forwards the request to 283

their neighbours and so on. A node generates a Route Request with destination address, Sequence number and Broadcast ID and sent it to his neighbour nodes. Each node receiving the route request sends a route back (Forward Path) to the node. When the RREQ is received by a node that is either the destination node or an intermediate node with a fresh enough route to the destination, it replies by unicasting the route reply (RREP) towards the source node. As the RREP is routed back along the reverse path, intermediate nodes along this path set up forward path entries to the destination in its route table and when the RREP reaches the source node, a route from source to the destination established. B. Route Maintenance: A route established between source and destination pair is maintained as long as needed by the source. When a link break in an active route is detected, the broken link is invalid and a RERR message is sent to other nodes. These nodes in turn propagate the RERR to their precursor nodes, and so on until the source node is reached. The affected source node may then choose to either stop sending data or reinitiate route discovery for that destination by sending out a new RREQ message. 4. SIMULATION ENVIRONMENT: Here we give more focus on the varying number of mobile nodes for the evaluation of performance of Ad-hoc routing protocol AODV. The simulations have been performed using network simulator NS-2. The network simulator ns-2 is discrete event simulation software for network simulations which means it simulates events such as sending, receiving, forwarding packets. The ns-allinone-2.32 supports simulation for routing protocols. 4.1 Simulation Model: We consider the network of nodes placing within a 1000m 1000m area, the performance of AODV is evaluated by considering following parameters. Simulation Parameters 284

Simulator Ns-2.32 Protocol Simulation Duration Simulation Area AODV 500 Seconds 1000m 1000m Number of Nodes 10,20,30,40,50 Channel Type Network Interface type Channel/ Wireless Channel Phy/ wireless phy MAC type Mac/ 802.11 Link Layer type LL Table-1: Parameter Values for AODV 4.2 Performance Metrics: For analyzing AODV protocol, we focused on three performance parameters which are Packet Delivery Ratio (PDR), Average End-to-End delay and throughput. 4.2.1 Packet Delivery Ratio (PDR): The fraction of all the received data packets successfully at the destinations over the number of data packets sent by the sources is known as Packet delivery fraction. The greater value of packet delivery ratio means better performance of the protocol. PDR= 4.2.2 Routing Load: The number of routing packets transmitted per data packet delivered at the destination. The routing load metric evaluates the efficiency of the routing protocol. 285

5. RESULTS AND ANALYSIS: 5.1 Packet Delivery Ratio: Simulation: Sr. No. of Packet Packet PDR No. Nodes Sent Received 1 10 4388 3316 0.7557 2 20 4388 4297 0.9793 3 30 4388 4336 0.9881 4 40 4388 4328 0.9863 5 50 4388 4340 0.9891 Table-2: Simulation Result for PDR Analysis: 1.5 PDR 1 0.5 0 10 20 30 40 50 No. of Nodes Figure 3: Graphical representation of PDR 286

The above graphical figure shows us that the value of PDR is in increasing order from nodes 10 to nodes 20, and then it is increases for node 30 and decreases for node 40 slightly and finally increases for nodes 50. 5.2 Routing Load: Simulation: Sr. No. No. of Nodes Routing Load 1 10 0.392 2 20 0.351 3 30 0.611 4 40 0.831 5 50 0.971 Table-3: Simulation Result Routing Load. Analysis: From following graphical representation we can say that the value of Routing Load decreasing from nodes 10 to nodes 20. Then it is increasing from nodes 30 to nodes 50 drastically. 1.5 Routing Load 1 0.5 0 10 20 30 40 50 No. of Nodes Figure 4: Graphical representation of Routing Load 287

6. CONCLUSION & FUTURE SCOPE: Thus we have evaluated the AODV routing protocol for the application oriented performance metrics such as packet delivery ratio and routing load with increasing the number of mobile nodes up to 50. As a result of our studies, we conclude that AODV exhibits a better performance in terms of packet delivery ratio and as the nodes increases the average routing load is also increases. Our result also indicates that as the number of nodes in the network increases AODV exhibits better performance with varying nodes in terms of Packet Delivery Ratio but the routing load on the network increases so the performance decreases for large number of nodes. Our future work is to find out the performance of AODV protocol under the wormhole attack in mobile Ad-hoc networks. 7. REFERENCES [1] Amol V. Zade, Prof. Vijaya K. Shandilya, A Provenance of Black Hole attack on Mobile Adhoc Networks (MANETS) Ad-hoc Demand Routing (AODV) protocol, International Journal of Computer Information Systems, Vol. 2, No. 3, 2011, ISSN 2229 5208 [2] Nilesh P. Bobade, Performance Evaluation of Ad Hoc On Demand Distance Vector in MANETs with varying Network Size using NS-2 Simulation, International Journal on Computer Science and Engineering(IJCSE), Vol. 02, No. 08, 2010, 2731-2735 [3] Parma Nand, Simulation Based Parametric Analysis of AODV Protocol for Adhoc Network, International Journal of Advanced Engineering & Applications, Jan. 2010 [4] Dr. Aditya Goel, Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol, International Journal of Computer Science and Security (IJCSS), Volume (3): Issue(5) [5] Amandeep Verma, A Study of Performance Comparisons of Simulated Ad hoc Network Routing Protocols, International Journal of Computer Technology and Applications, Vol 2(3), 565-569, ISSN: 2229-6093. 288

[6] Samyak Shah, Amit Khandre, Mahesh Shirole and Girish Bhole, Performance Evaluation of Ad Hoc Routing Protocols Using NS2 Simulation, Mobile and Pervasive Computing (CoMPC 2008) [7] D. Kim, J. Garcia and K. Obraczka, Routing Mechanisms for Mobile Ad Hoc Networks based on the Energy Drain Rate, IEEE Transactions on Mobile Computing. Vol 2, no 2, 2003, pp.161-173 289

AUTHORS PROFILE Amol V. Zade received his Bachelor of Engineering degree from Sant Gadge Baba Amravati University, Amravati, India in 2008. This author is Pursuing M.E. in Computer Science & Engineering from Sant Gadge Baba Amravati University, Amravati, India. His main area of interest includes Ad-Hoc Networks routing terminologies, Network Security. Prof. Vijaya K. Shandilya received her degree in CSE from VYWS College of Engineering badnera, Amravati, India, also received her Master of Engineering degree in CSE from badnera, Amravati. This author pursuing Ph.D. from Sant Gadge Baba Amravati University, Amravati, India. She is currently working as Associate Professor in the department of CSE Sipna s COET, Amravati. Her teaching experience is 14 years and 3 months. 290