Pardeep Mittal Assistant Professor, Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India.

Similar documents
Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Keywords: AODV, MANET, WRP

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

II. ROUTING CATEGORIES

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

A Review paper on Routing Protocol Comparison

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Routing Protocols in MANET: Comparative Study

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

3. Evaluation of Selected Tree and Mesh based Routing Protocols

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

2013, IJARCSSE All Rights Reserved Page 85

A Survey - Energy Efficient Routing Protocols in MANET

Routing Protocols in Mobile Ad-Hoc Network

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Routing Protocols in MANETs

Power aware Multi-path Routing Protocol for MANETS

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

PERFORMANCE COMPARISON OF AODV AND DSR ROUTING PROTOCOL IN MOBILE AD-HOC NETWORK

Performance Evaluation of Various Routing Protocols in MANET

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

A Novel Review on Routing Protocols in MANETs

Fig. 1 Mobile Ad hoc Network- MANET[7]

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

Performance Analysis of Aodv Protocol under Black Hole Attack

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Comprehensive Study and Review Various Routing Protocols in MANET

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Analysis and Enhancement of Routing Protocol in Manet

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Figure 1: Ad-Hoc routing protocols.

Security in DOA routing protocol for Mobile Adhoc Networks

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks

IJMIE Volume 2, Issue 6 ISSN:

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

A Review on Black Hole Attack in MANET

Performance of DSDV Protocol over Sensor Networks

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July ISSN

Mobile Ad Hoc Network Routing Protocols: A Comparative Study

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

AVC College of Engineering, Mayiladuthurai, India

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

A Simulation Study and Comparison of On-Demand Adhoc Routing Protocols using QualNet 5.2

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS)

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs

Transcription:

Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Comparative Study of & Routing Protocols in Mobile Ad-Hoc Networks Anit Kumar* M.Tech., Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India. Pardeep Mittal Assistant Professor, Department of Computer Science and Applications, Kurukshetra University, Kurukshetra, Haryana, India. Abstract Mobile Ad-Hoc Networks are those networks which don t have any fixed infrastructure. Due to mobility of nodes, frequent link breakage takes place. Therefore routing in mobile ad hoc networks is challenging task and this has led to the development of many different routing protocols. This paper analyses the performance of and routing protocols for the metrics Packet Delivery Ratio. This would be a great help for the people conducting research on real world problems in MANET security. Keywords MANET s, routing protocols, reactive, proactive, hybrid,,, NS 2. I. INTRODUCTION Ad hoc networks [1] are autonomous, self configuring, adaptive which make them applicable in various areas. Ad hoc wireless networks comes up with two variations of wireless network- first is [2] known as Infrastructure or base stations. A mobile unit, which is mobile, communicates to nearest base station. When it moves out of the coverage area of one base station, a process called Handoff and it comes in the coverage area of the other base station. In Infrastructure less or Ad Hoc wireless network [3] the node can move while communicating, there are no fixed base stations and all the nodes in the network act as routers. The mobile node changes their location and establishes their own network on the fly. II. CHARACTERISTICS OF MANETS Some of the major characteristics of mobile ad hoc routing protocols are: Dynamic Network topology: As the nodes move, the topology may change rapidly and the connectivity within the network varies with time. Limited Bandwidth: The bandwidth [4] available is limited than that of wired networks. The power is limited and the computation should be energy efficient Distributed Operation: collaborate them to implement functions and not a single node is solely responsible for the overall operation. Security: The wireless links lack defence against threats. Various attacks such as denial of services, eavesdropping, replay attacks are possible. MANETs are resource constrained, bandwidth constrained and as the nodes are mobile, the network topology changes dynamically effectively. Therefore routing must be done and hence the need of efficient routing protocols. In MANETs, the protocols for routing are grouped into three categories based on the way how they work. The rest of the paper is organized as follows: Section III. describes related work. Section IV. gives an overview of routing protocols in mobile ad hoc networks.section V. describes about. Section VI. describes. Section VII gives the simulation environment. Section VIII. gives the performance metrics. Section IX provides the simulation results. Section X gives the comparative study. Section XI conclude the paper along with the future work. Section XII. acknowledges the contributors and finally the Section XIII gives the references. III. Related Work As a promising network type for future mobile application, MANETs are attracting more and more researcher. Mobile ad hoc networks are resource constrained and hence Routing in mobile ad hoc networks is more challenging task. Many researchers have done work on analyzing the characteristics of different routing protocols in mobile ad hoc networks. Rachit Jain, Laxmi Shrivastava [10] analyzed the performance of & on the basis of Path Loss Propagation Models based on various performance metrics in order to create a substantial understanding of choosing the correct protocol for any active operating environment. Dhananjay Bisen et al. [11] studied the effect of pause time on, and DYMO routing protocols in mobile ad hoc networks based on parameters like Packet Drop Ratio (), Throughput, Jitter and End to End Delay with variations in Pause Time of network. They concluded that performs better than and DYMO under different situations with variation in pause time and performance of DYMO is better than in some situations. Monika at el. [12] compared, DSDV and Routing Protocols in 2013, IJARCSSE All Rights Reserved Page 658

Vehicular Network Using EstiNet Simulator based on parameters like throughput, number of packets dropped. The performance of found to be better in most situations. M.L Sharma et al. [13] analyzed the performance of MANET routing protocols under CBR and FTP traffic classes under different network scenarios like pause time, offered load (i.e. number of source destination pairs), node speed. The results shows that for CBR traffic, performs better than and WRP in terms of Packet Delivery Ratio(), Throughput and routing overhead and for FTP traffic, performs better than and WRP in terms of packet delivery ratio and throughput. Liang Qin, Thomas Kunz [14] provides a method to increase the packet delivery ratio in by link protection through link breakage prediction algorithm. They also proposed that Enhanced route cache maintenance based on the link status can further reduce the number of dropped packets. IV. ROUTING PROTOCOLS Routing protocols tells the way how a message is sent from source to the destination. These protocols are categorized as shown in figure 1 Taxonomy of routing protocols Figure 1: Taxonomy of Ad-Hoc Routing Protocols 1. Reactive Routing Protocols In Reactive routing protocols or demand routing protocols, nodes are set up when needed. When a node wants to send a packet to another node, it initiates communication with that node [8], if no node is present earlier. The reactive routing protocols have two major components [4] Route discovery: When a node or the source [5] wants to send a packet to another node or the destination node, it first scans its cache to find the route to the destination, if route not present, it initiates route discovery process containing through a packet having the destination address and the address of intermediate nodes to the destination. Route maintenance: Due to mobility of nodes, the nodes change their topology and hence route maintenance is done. Route maintenance is achieved through the use of acknowledgement. 2. Proactive routing protocols Proactive routing protocols are also knows as table driven protocol. In these protocols, each node maintains a routing table consisting of routing information to every other node in the network [7]. Since the nodes are mobile, they keep on changing their location. So the routing tables maintained by different nodes are periodic or whenever a change occurs, are updated. There are a number of proactive routing protocols. They differ in various areas like number of routing table [6] maintained and how the changes are propagated in the network 3. Hybrid routing protocols Hybrid routing protocols [7] are both proactive and reactive in nature. There protocols work on the merits of these protocols to increase scalability and to decrease the routing overhead. V. DYNAMIC SOURCE ROUTING () It uses the concept of [5] source routing in which the creates routes only when source requires [6]. It is based on link state algorithm [4]. As it is on demand routing protocol, the routing overhead is less [14] This Protocol is composed of two essential parts of route discovery and route maintenance. Route Discovery: When a source node S wants to send a packet to the destination D, it first checks its route cache. If there is an entry for the destination node, then the source uses the available route in cache. If route not found or the the route cache has an expired route, then it initiate the route discovery process. Route cache contains the recently discovered routes. Route discovery requires 7 fields during this process such as sourceid, destid, ReqID,Addresslist, Hoplimit,NetworkInterf---aceList, Acknowledgment list. Then source node broadcasts the message to its neighbour. Moreover, source node also maintains a replica of messages sent in its send buffer. Packets can be dropped if send buffer is full or the time limit for route discovery is over. When a nodes destination or the intermediate node having route to destination receives the route request message, it generates route reply [6] Route Maintenance: Route maintenance includes monitoring the routes against failure through route error messages and route cache [5]. There is no need of keeping routing table in [3] protocol. Route cache can further decrease route discovery overhead. reduces overhead of route maintenance. However is not scalable to large networks and packet Size grows with length of the route due to source routing. 2013, IJARCSSE All Rights Reserved Page 659

VI. (AD HOC ON DEMAND DISTANCE VECTOR) [3] is based on DSDV and collectively. It keeps Routing tables.route is between two nodes is discovered as when needed. When a source S node wants to send a packet to the destination node D, it first checks its routing table and if there is no entry, it initiates route discovery process. It broadcasts a route request (RREQ) packet to its neighbors [6]. The RREQ contains IP addresses of source(s) and destination(d) node, current sequence number of source(s) and last known sequence number of D, a broadcast ID from S, which is incremented each time S sends a RREQ message. The broadcast ID, IP address pair of the source S forms a unique identifier for the RREQ. utilizes destination sequence numbers to guarantee the fresh route. When a node broadcast RREQ message, it waits for RREP. If the reply is not received within certain time limit, the source node rebroadcast the RREQ or it assumes that there is no route present. When a node receives a RREQ message, it broadcast the RREQ message to its neighbour if it is not the destination route and creates a temporary reverse route to the source IP address in its routing table with next hope equal to the IP address of neighbouring node that sent the RREQ. Intermediate nodes can reply to the RREQ only if they have a route to the destination whose corresponding destination sequence number is greater than or equal to that contained in the RREQ. Once the RREQ reaches the destination or an intermediate node with a fresher route, it generates RREP and it is unicasted back to the requesting node which eventually reaches the source node. The intermediate node records the route to the destination as the RREP follows from destination to source. The nodes are mobile, so it can move anytime. IF the source node moves to different location, it can rediscover the route the destination node by route discovery process. IF the destination node/the intermediate node moves to different location [6], it informs the upstream node through Route error message which eventually reaches the source node. The source node terminates the ongoing communication and initiate route discovery process. Hello messages are used to maintain the local connectivity. protocol reduces number of routing messages in the network. It handles the dynamic behaviour of the nodes efficiently. However there is possibility of various attacks on. The route discovery latency is high. VII. SIMULATIONS The simulations were performed using Network Simulator 2 (Ns-2.34), particularly popular [9] in the ad hoc networking community. The traffic sources are UDP. The source-destination pairs are spread randomly over the network. During the simulation, each node starts its journey from a random spot to a random chosen destination. Once the destination is reached, the node takes a rest period of time in second and another random destination is chosen after that pause time. This process repeats throughout the simulation, causing continuous changes in the topology of the underlying network. Different network scenario for different number of nodes and pause times are generated. The model parameters that have been used in the following experiments are summarized in Table 1. Table 1: Simulation Environment Parameter Value Simulator Simulation Area NS-2.34 1000m X 1000m Mobile 10,20,50,75 Pause Time 100,200,300,400,500 Sec. 2,3,5,7,10 m/s Channel Routing Protocols Traffic Sources Simulation Time No. of connections per Sec. Wireless & UDP 500 Sec. 1.0,2.0,3.0,4.0,5.0 VIII. PERFORMANCE METRICS 1. Packet Delivery Ratio () Packet delivery ratio [8] is defined as the ratio of data packets received by the destinations to those generated by the sources. This performance metric gives us an idea of how well the protocol is performing in terms of packet delivery at different speeds and different pause time. The greater value of packet delivery ratio means the better performance of the protocol. 2. Pause Time Pause time refers to the rest time of the node. A node begins by staying in one location for a certain period of time (i.e. a pause time). Once this time expires, the node chooses a random destination in the simulation area and a speed that is 2013, IJARCSSE All Rights Reserved Page 660

100 200 300 400 500 Anit et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(5), uniformly distributed between [min speeds,max speed]. The node then travels towards the newly chosen destination at the selected speed. Upon arrival the node pauses for a specified time period before starting the process again. IX. SIMULATION RESULTS 100.5 100 99.5 99 98.5 98 97.5 Vs for 10 aodv's Vs Pause Time for 10 102 100 98 96 94 92 100 200 300 400 500 Pause Time Figure 2: Vs Figure 3: Vs Pause Time Vs for 20 101 100 99 98 97 96 Vs Pause Time for 20 99 97 95 Pause Time Figure 4: Vs Figure 5: Vs Pause Time Vs for 50 95 91 87 83 79 75 75 Vs Pause Time for 50 95 85 80 100 200 300 400 500 Pause Time Figure 6: Vs Figure 7: Vs Pause Time 2013, IJARCSSE All Rights Reserved Page 661

Vs for 75 Vs Pause TIme for 75 80 70 80 70 60 60 100 200 300 400 500 Pause time Figure 8: Vs Figure 9: Vs Pause Time X. COMPARATIVE STUDY A case study has been done using UDP connections. Various cases have been taken and a bias less scenario generation has been done. Scenarios has been created using TCL scripts and a real life situation has been assumed. Various cases have been taken for final results. taken are 10, 20, 50 and for denser medium as 75. Also two major metrics have been used for calculation of schemes. These are for Pause time and speed. For more realism speed has been increased up to a car moving in a street and pause time has been increased from 100 to 500 to generate bias less patterns for data transmission. It has been observed in all experiments that outperforms in most cases and its is above. The sudden abrupt rise and fall may be due to many reasons some of the important points to highlight in this regards are: 1. Scenario generated 2. Number of connections made 3. Transmission of data at time intervals 4. Motion pattern of various nodes 5. Simulation time and other simulation parameters 6. Lesser Link breaks in generated scenario (which in other case will lead to better performance by ) XI. CONCLUSION & FUTURE WORK In this paper an effort has been made on the comparative study of and routing protocols using as a function of node s speed and pause time. Both protocols showed variation in packet loss with increase in speed and the pause time. There is margin of 4-5 % in all cases. outperforms for the reasons stated above. Efforts can be made in future to increase the with increase in speed and make it more consistent. More work can be done to find out End to end delay and throughput which will the case study worth producing specific decisions for selection of a particular protocol. Acknowledgement Author is especially thankful to Dr. Ashwani Kush, Department of Computer Science, University College, Kurukshetra University Kurukshetra for his valuable suggestions about the topic. References [1] Pore Ghee Lay, John C. McEachen A Comparison of Optimized Link State Routing with Traditional Ad-hoc Routing Protocols U.S. Navy Research Paper 2. [2] Umang Singh Secure Routing Protocols in Mobile Adhoc Network-A Survey and Taxonomy International Journal of Reviews in Computing 30th September 2011. Vol. 7 [3] Sunil Taneja and Ashwani Kush A survey of Routing Protocols in Mobile Ad Hoc Networks, International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010 ISSN: 2010-0248 [4] Robinpreet Kaur & Mritunjay Kumar Rai A Novel Review on Routing Protocols in MANETs, Undergraduate Academic Research Journal (UARJ), ISSN : 2278 1129, Volume-1, Issue-1, 2012 [5] Dr.D.Siva Kumar Review: Swarm Intelligent based routing Protocols for Mobile Adhoc Networks International Journal of Engineering Science and Technology Vol. 2 (12), 2010, 7225-7233 [6] Elizabeth M. Royer, A Review of current routing protocols for Ad-Hoc Mobile Wireless Networks, IEEE Personal Communication * April 1999 [7] Mehran Abolhasana, Tadeusz Wysockia, Eryk Dutkiewicz b,* A review of routing protocols for mobile ad hoc networks, Telecommunication and Information Research Institute, University of Wollongong, Wollongong, NSW 2522, Australia b Motorola Australia Research Centre, 12 Lord St., Botany, NSW 2525, Australia Received 25 March 2003; accepted 4 June 2003 [8] http://harrismare.net/2011/07/14/packet-delivery-ratio-packet-lost-end-to-end-delay/ [9] NS-2 Network Simulator http://www.isi.edu/nsnam/ns. 2013, IJARCSSE All Rights Reserved Page 662

[10] Rachit Jain1, Laxmi Shrivastava Study and Performance Comparison of & on the basis of Path Loss Propagation Models International Journal of Advanced Science and Technology Vol. 32, July, 2011 [11] Dhananjay Bisen at el. Effect of Pause Time on, and DYMO Routing Protocols in MANET Manuscript received November 20, 2009. [12] Monika at el. Comparative Study of, DSDV and Routing Protocols in Vehicular Network Using EstiNet Simulator International Journal of Scientific & Engineering Research, Volume 3, Issue 6, June-2012 1 ISSN 2229-5518 [13] M.L Sharma at el. Performance Evaluation of MANET Routing Protocols under CBR and FTP traffic classes Int. J. Comp. Tech. Appl., Vol 2 (3), 392-400 ISSN: 2229-6093 [14] Liang Qin Thomas Kunz Increasing Packet Delivery Ratio in by Link Prediction Proceedings of the 36th Hawaii International Conference on System Sciences - 2003 2013, IJARCSSE All Rights Reserved Page 663