Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Similar documents
MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

2013, IJARCSSE All Rights Reserved Page 85

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Gurleen Kaur Walia 1, Charanjit Singh 2

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

SIMULATION BASED ANALYSIS OF OLSR AND GRP PERFORMANCE IN MOBILE AD HOC NETWORKS

Routing Protocols in Mobile Ad-Hoc Network

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis and Enhancement of Routing Protocol in Manet

Arvind Krishnamurthy Fall 2003

Routing Protocols in MANET: Comparative Study

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Evaluation of Various Routing Protocols in MANET

Effects of Caching on the Performance of DSR Protocol

II. ROUTING CATEGORIES

Keywords: AODV, MANET, WRP

Routing Protocols in MANETs

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Performance Analysis of MANET Routing Protocols OLSR and AODV

Comparative Performance Analysis of AODV, DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Different QoS Based TORA Reactive Routing Protocol using OPNET 14.5

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

Ad Hoc Routing Protocols and Issues

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A Survey of Routing Protocols for Ad Hoc Wireless Home Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

IJMIE Volume 2, Issue 6 ISSN:

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

Performance Evaluation of AODV and DSR routing protocols in MANET

Caching Strategies in MANET Routing Protocols

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks Dr. Kamaljit I. Lakhtaria

PERFORMANCE COMPARISON OF AODV AND DSR ROUTING PROTOCOL IN MOBILE AD-HOC NETWORK

LECTURE 9. Ad hoc Networks and Routing

Performance Comparison of Routing Protocols for Remote Login in MANETs

Estimate the Routing Protocols for Internet of Things

A QoS-based Measurement of DSR and TORA Reactive Routing Protocols in MANET

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

OPNET based Investigation and Simulation Evaluation of WLAN Standard with Protocols using Different QoS

A Survey - Energy Efficient Routing Protocols in MANET

A Novel Review on Routing Protocols in MANETs

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

CHAPTER 2 LITERATURE REVIEW

Performance Analysis of OLSR and QoS Constraint OLSR in MANET

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Evaluation of MANET through NS2 Simulation

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

A Simulation study : Performance comparison of AODV and DSR

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Performance Analysis of Aodv Protocol under Black Hole Attack

Figure 1: Ad-Hoc routing protocols.

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Analysis of Routing Protocols in MANETs

A Study on Routing Protocols for Mobile Adhoc Networks

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Chapter-2 Routing Protocols of MANET

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Impact of Hello Interval on Performance of AODV Protocol

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Comprehensive Study and Review Various Routing Protocols in MANET

Keywords- Routing protocols, Mobile Ad hoc network, routing schemes Classification of protocols, Comparison of protocols.

Advanced Network Approaches for Wireless Environment

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

PNR: New Position based Routing Algorithm for Mobile Ad Hoc Networks

Mobile Communications. Ad-hoc and Mesh Networks

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Introduction to Mobile Ad hoc Networks (MANETs)

Performance Comparison and Analysis of DSDV and AODV for MANET

A Comparative Study of On-Demand Routing Protocols for Mobile Ad-hoc Networks

Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad Hoc Networks: DSR, AODV, AOMDV, TORA

Performance Tuning of OLSR and GRP Routing Protocols in MANET s using OPNET

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

Exploring Performance of Different Adhoc Routing Protocols in Mobile Adhoc Networks

STUDY AND ANALYSIS OF DSDV AND OLSR

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Transcription:

Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department of Computer Science, Punjabi University, Patiala, India) ABSTRACT An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any pre-existing network infrastructure. A number of ad hoc routing protocols have been developed during the time, but none of these is able to produce efficient routing of packets in large number of nodes due to their own limitations. Therefore, scalability is an open issue in all routing protocols. In this paper, we presented our observations regarding the scalability comparison of the three MANET routing protocols, Ad hoc On Demand Distance Vector (AODV), Temporally Ordered Routing Protocols (TORA) and Optimized Link State Routing (OLSR) by varying the number of nodes. The simulation is done by using OPNET Modeler 14.5 simulator by taking throughput and network delay as performance metrics. In case of delay AODV and OLSR perform in a similar manner as the number of nodes increases. However, in throughput OLSR outperforms AODV and TORA. Keywords AODV, MANET, OLSR, Scalability, TORA I. INTRODUCTION In last three decades, wireless network has grown enormously. Although, wireless network has eased the information sharing and communication but we have to setup static links before we can start the communication between two systems. This form of network is known as infrastructured network. These networks can only work in the environment where a fixed infrastructure exists. This motivates the need of infrastructureless networks which are known as ad hoc networks. Ad-hoc means for one specific purpose only [1]. Hence, these networks are formed when needed. All available nodes are aware of all other nodes within range. The entire collection of nodes is interconnected in many different ways. The topology of such networks changes very rapidly because the nodes in ad hoc network are mobile and independent of each other. This makes the routing very difficult. The widespread adaptation of ad hoc networks has produced the challenge of scalability. The scalability performance of the network depends on the routing protocol used in the network. A routing protocol is responsible for delivering the packet from source to destination. In this paper, we have analysed and compared three widely used routing protocols namely AODV, TORA and OLSR based on the scalability. Network delay and throughput are chosen as the performance metrics. The rest of the paper is organized as follows: Section II presents the definition of MANET, Routing and protocol classification. Overview of three protocols used in the study is presented in Section III. Section IV describes the simulation environment and performance metrics and then the results are presented in Section V. Finally, Section VI concludes the paper. II. MOBILE AD-HOC NETWORK (MANET) Mobile Ad-hoc NETwork (MANET) [1] is a collection of wireless mobile nodes forming a temporary/short-lived network without any fixed infrastructure where all nodes are free to move arbitrarily and where all the nodes configure themselves. The entire collection of nodes is interconnected in many different ways. There are more than one path from one node to another. The nodes in a MANET can be of varying capabilities. Mobile phones, laptop computers and Personal Digital Assistants (PDAs) are some examples of nodes in ad-hoc networks. 2.1 Routing In MANETs To facilitate communication within the network a routing protocol is used to discover routes between nodes. The goal of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be delivered in a timely manner. Figure 1. Routing in MANETs As shown in Fig. 1, route is created between nodes A and H using a number of intermediate nodes. This is called multi-hop routing. Bandwidth and power constraints are the important factors to be considered in current wireless network because multi-hop ad-hoc wireless relies on each node in the network to act as a router and packet forwarder. This dependency places bandwidth, power computation demands on mobile host 87 P a g e

to be considered while choosing the protocol for the nodes. Routing protocols used in wired network cannot be used for mobile ad hoc networks because of node mobility [2]. 2.2 Classification of Routing Protocols Many protocols have been proposed for MANETs. These protocols can be mainly divided into two categories [3]. Reactive/On-demand Routing Protocols Proactive/Table-driven Routing Protocols A. Reactive/On-demand Routing Protocols In reactive or On-demand protocols, the routing information is maintained only for active routes. That is, the routes are determined and maintained by a node only when it wants to send data to a particular destination. A route search is needed for every unknown destination. Therefore, the communication overhead is reduced at expense of delay due to route research. Some reactive protocols are Ad hoc On-Demand Distance Vector (AODV), Temporally Ordered Routing Algorithm (TORA) and Dynamic Source Routing (DSR). But here we ll discuss only AODV and TORA as we have simulated these two protocols from reactive category [2]. B. Proactive/Table-driven Routing Protocols In proactive or table-driven routing protocols, the routing tables are used. Each node maintains up-todate routing information to every other node in the network in the routing tables. Routing information is periodically transmitted throughout the network in order to maintain routing table consistency. However, for highly dynamic network topology, the proactive schemes require a significant amount of resources to keep routing information up-to-date and reliable. Some highly used proactive routing protocols are Optimized Link State Routing (OLSR), Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) [2]. III. DESCRIPTION OF AODV, TORA AND OLSR A. Ad hoc On-Demand Distance Vector (AODV) The AODV joins the mechanism of DSDV and DSR. The hop-by-hop routing and sequence number of DSDV and the on-demand mechanism of route discovery and route maintenance from DSR are combined in AODV [4]. Route Discovery: In this part when the route is present in cache, route discovery is not used. Otherwise the RREQ which contains the last known sequence number, is flooded in network. The intermediate nodes store the reverse route to source. When destination gets the RREQ, it sends back RREP that contains number of hops to it and most recent sequence number. All intermediate nodes that forward the RREP backward build a forward path. Because of the hop-by-hop nature of AODV the nodes store only the next hop instead of entire route. Route Maintenance: To maintain routes, the nodes check link status of their next hop neighbor in active routes. The node, detecting a link break sends a route error (RERR) message to each of its upstream neighbor to invalidate this route and the neighbors forward it further. Consequently, these nodes propagate the RERR to their predecessor nodes. This process continues until the source node is reached. When RERR is received by the source node, it can either stop sending the data or reinitiate the route discovery mechanism by sending a new RREQ message if the route is still required. A routing table entry is removed if not used recently [7]. B. Temporally Ordered Routing Algorithm (TORA) The TORA [5] is a distributed routing protocol. This is based on the link reversal algorithm. TORA is designed to minimize the reaction to topological changes. The key concept is that control messages are typically localized to very small set of nodes. TORA can be separated into three separated functions: Creating Routes Maintaining Routes Erasing Routes The creation of routes basically assigns directions to the undirected network forming a Directed Acyclic Graph (DAG) rooted at the destination node. When a link between the source and the destination fails, the nodes reverse the direction of the links and update the previous nodes in the path. Additionally, each node maintains multiple paths to a given destination and is capable of detecting any partitions in the network. In TORA, a value height is associated with each node at all times. The Data flow occurs from a node with a higher value of height to a node with a lower value. When a node cannot detect the height value of one of its neighbors, it does not forward data packets to that node. Routes are discovered using query (QRY) and update (UPD) packets. When a node with no downstream links needs a route to destination, it will broadcast QRY packet. This QRY packet will propagate through the network until it reaches a node that has route or a destination itself. Such a node will then send a UPD packet that contains the node height. Every node receiving this UPS packet will sets its own height to larger height than specified in the UPD message. The nodes will then broadcast their own UPD packets. This will result in a number of directed links from the originator of QRY packet to destination. This process can result in multiple routes. Maintaining routes refers to reacting to topological changes in the network in a manner such that routes to destination are re-established within finite time, meaning that its directed portion return to destination oriented graph within finite time. Upon detection of network partition, all the links in portioned part are marked as undirected to erase invalid routes by using clear (CLR) message. TORA disseminates control messages in a small local area [10], not in the entire network, thus preserving 88 P a g e

bandwidth and minimizing processing time in the nodes. When a link failure occurs, there is no need for a largescaled dissemination of control packets, as they can be limited to the small region where the link failure occurs. TORA requires bidirectional links between the nodes in the network. C. Optimized Link State Routing (OLSR) The Optimized Link State Routing protocol (OLSR) [6] is an optimization of a pure link state protocol (complete link information is flooded though network) as it compacts the size of information sent in each message, and reduces the number of retransmissions to flood these messages in the entire network. The protocol uses a multipoint relaying technique to flood its control messages in an efficient and economic way. The idea of multipoint relays is to minimize the flooding of broadcast packets in the network by reducing retransmissions in the same region. Each node selects a set of 1-hop neighbors, which retransmits its packets. These neighbors are called the multipoint relays (MPRs) of that node. The neighbors of any node N that are not in the MPR set, read and process packets but do not retransmit the broadcast packets received from node N. For the retransmission, each of the nodes maintains a set of neighbors called MPR Selectors. The node is assumed to retransmit every broadcast message coming from one of these MPR Selectors. The multipoint relay set is chosen among a node s one-hop neighbors in such a manner that it is the minimum set that covers (radio range) all the nodes that are two hops away. The multipoint relay set of N, MPR(N), satisfies the following condition: every node in the two hop neighborhood of N must have a bidirectional link towards other nodes in MPR(N). These bi-directional links are determined by periodically broadcasting HELLO messages, containing the information about neighbors and their link status [3]. OLSR protocol depends on the selection of multipoint relays and determines routes through these nodes. The MPR nodes are selected as intermediate nodes in the path. To use this scheme every node periodically broadcasts its one-hop neighbors, which have selected it as multipoint relay. Each node uses this information to calculate and update each known destination. A route is a sequence of hops through the multipoint relays from source to destination. IV. SIMULATION SETUP 4.1 Simulator The simulation is performed using the OPNET (Optimized Network Engineering Tool) Modeler 14.5 simulator. OPNET is a discrete event network simulator that provides virtual network communication environment. OPNET Modeler 14.5 is chosen because it is one of the leading environments for network modelling and simulation. It offers easy graphical interface. This tools is highly reliable, robust and efficient. It supports large number of built-in industry standard network protocols, devices, and applications [9]. 4.2 Simulation Parameters This simulation study focuses on the performance of routing protocols with increase in the number of nodes. Therefore, nine simulation scenarios consisting of different number of nodes i.e. 25, 50 and 75 are considered for three routing protocols AODV, TORA & OLSR. HTTP traffic is generated using the Application and Profile Configuration. Table 1 shows the simulation parameters used in this study. The speed of the nodes is set to 5 meters/sec. We have chosen random waypoint mobility model as this assures that mobile nodes are configured with mobility. Buffer size is set to 1024000 bits as heavy browsing is used for traffic generation. Table 1. Simulation Parameters Attribute Maximum Simulation Time Interface Type Network Area Mobility Model Data Rate(bps) Value 300 sec Wireless(ad-hoc) 500*500 meters 700*700 meters 900*900 meters Random Way Point 11Mbps Transmit Power(W) 0.020 Buffer Size(bits) 1024000 No. of Nodes 25, 50, 75 Protocols Traffic Application Generation TORA, AODV, OLSR HTTP 4.3 Performance Metrics The metrics have been chosen in order to evaluate the routing protocols for scalability. The metrics which capture the most basic overall performance of Routing protocols studied in the research work are as follows: (a) Throughput (messages/second): Total number of delivered data packets per second of simulation time. We analyze the throughput of the protocol 89 P a g e

in terms of number of messages delivered per second. Throughput= (number of delivered packets * packet size)/ total duration of simulation. (b) Average End-to-End Delay: Average End-to- End delay (seconds) is the average time it takes a data packet to reach the destination. This includes all possible delays. Delay= (Total Delay for all successful data packet delivery)/ Number of received data packets. V. RESULTS AND DISCUSSIONS The performance comparison is made between three routing protocols AODV, TORA and OLSR by varying the number of nodes from 25 to 75. A. Average End-to-End Delay The first performance metric, Average End-to- End Delay is calculated for all three routing protocols for 25, 50 and 75 number of nodes. Figure 3. Network Delay for 50 nodes (TORA, AODV and OLSR) OLSR protocol performed better as compared to AODV and TORA in case of network delay. This is due to the proactive nature of the protocol. Based on the performance of protocols in delay metric, we can say that OLSR is scalable with respect to the number of nodes. Figure 2. Network Delay for 25 nodes (TORA, AODV and OLSR) The Fig. 2, 3 and 4 show the network delay in all three protocols for 25, 50 and 75 nodes respectively. In all three cases TORA has maximum delay as compared to AODV and OLSR as the number of nodes increased. Therefore, TORA performance is worst among these three protocols for scalability. The main reason behind failure of TORA to react quickly is that it finds multiple routes from source to destination so, it takes more time for searching the routes. AODV shows lower delays but slightly higher than the OLSR. Figure 4. Network Delay for 75 nodes (TORA, AODV and OLSR) B. Throughput Network Throughput is taken as main performance metric for the comparative analysis of the protocols. As in case of delay, throughput is also calculated for all three protocols AODV, TORA and OLSR by varying number of nodes. Fig. 5, 6 and 7 show the network throughput in all three protocols for 25, 50 and 75 number of nodes. 90 P a g e

maintenance, are also limited so that they do not create unnecessary overhead in the network. Figure 5. Throughput for 25 nodes (TORA, AODV and OLSR) Figure 7. Throughput for 75 nodes (TORA, AODV and OLSR) OLSR performed better than TORA and OLSR in case of throughput too. This is due to the proactive nature of OLSR. OLSR reduce the control overhead forcing the MPR to propagate the updates of the link state. But the drawback of this is that it must maintain the routing table for all the possible routes, so there is no difference in small networks, but when the number of the mobile hosts increase, then the overhead from the control messages also increases. This constrains the scalability of the OLSR protocol to some extent. The OLSR protocol work most efficiently in the dense networks. Figure 6. Throughput for 50 nodes (TORA, AODV and OLSR) Comparing all three protocols, TORA performed worst in case of throughput too. Throughput of TORA is very less than that of AODV and OLSR. This is due to the large network overhead generated by TORA. Other reason for lower throughput by TORA is that it deletes its routes when they are not in use. AODV performed decently in terms of throughput when increased the number of nodes. AODV discovers multiple routes from source to destination so there are always the chances of finding an optimal route. AODV tends to reduce the control traffic overhead at the cost of increased latency in finding new routes. The Hello messages, which are responsible for the route VI. CONCLUSION In this research study, we have performed simulations of three MANET routing protocols AODV, TORA and OLSR to evaluate their scalability and then compared them. Simulation is done using the OPNET Modeler 14.5. In the research work, Average end to end delay and throughput are considered as the performance evaluation parameters. HTTP heavy browsing is used for traffic generation. The simulation results conclude that on increasing the number of nodes there is performance degradation in all protocols, but it varies from protocol to protocol. As the number of nodes increased the network average end to end delay also increased for all three routing protocols. However, OLSR protocol outperformed the AODV and TORA protocols and has least network latency. TORA performed worst even it uses the localization feature [3]. In case of network throughput too, it is observed that on varying the number of nodes performance of TORA protocol was very poor. Whereas, the performance of the OLSR protocol was far better than 91 P a g e

the AODV and TORA in terms of throughput. AODV performance was average during the simulation however; it reduces the routing overhead to great extent and reacts quickly during its operation. Hence, this paper concludes that the OLSR protocol in highly scalable with reference to varying network size, however the AODV protocol is almost equally scalable but less than OLSR. This comparative analysis is done to identify the suitable protocols according to the network size, so that the routing could be more efficient and cost effective. REFERENCES [1] IETF Working Group MANET: http://www.ietf.org/ html charters/manet-chart er.html. [2] Amandeep Makkar, Bharat Bhushan, Shelja and Sunil Taneja, Behavioral study of MANET Routing Protocols, International Journal of Innovation, Management and Technology, Singapore, Vol. 2,No. 3, PP. 210-216, June 2011. [3] Ashish Shrestha, Firat tekiner, On MANET Routing protocols for Mobility and Scalability 2009 International Conference on Parallel and Distributed Computing, Applications and Technologies, Higashi Hiroshima, IEEE, Dec- 2009,. [4] Ad hoc On-Demand Distance Vector (AODV) Routing: http://tools.ietf.org/ht ml/rfc3561 [5] Temporally-Ordered Routing Algorithm (TORA): http://tools.ietf.org/html/draft-ietfmanet-tora-spec-04. [6] Optimized Link State Routing Protocol (OLSR): http://www.ietf.org/rfc/rfc3626.txt [7] Laxmi Shrivastava, Sarita S. Bhadauria, G. S. Tomar, Performance Evaluation of Routing Protocols in MANET with different traffic loads, 2011 International Conference on Communication Systems and Network Technologies, Harbin, China, IEEE, June 2011. [8] Sabina Baraković, Suad Kasapović, and Jasmina Baraković, Comparison of MANET Routing Protocols in Different Traffic and Mobility Models, Telfor Journal, Vol. 2, No. 1,PP. 8-12, 2010. [9] Introduction to OPNET Modeler, 2007 OPNET Technologies. [10] N Vetrivelan and Dr. A. V. Reddy, Performance Analysis of Three Routing Protocols for Varying MANET Size, Proceedings of International MultiConference of Engineers and Computer Scientists, IMECS 2008, Singapore, Vol. 2, PP. 10-21, March 2008. 92 P a g e