ADVANCES in NATURAL and APPLIED SCIENCES

Similar documents
Routing Protocols in MANETs

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Routing Protocols in MANET: Comparative Study

2013, IJARCSSE All Rights Reserved Page 85

Estimate the Routing Protocols for Internet of Things

Performance Evaluation of MANET through NS2 Simulation

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Maharishi Markandeshwar University

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

LECTURE 9. Ad hoc Networks and Routing

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Quantitative Performance Evaluation of DSDV and OLSR Routing Protocols in Wireless Ad-hoc Networks

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

AODV-PA: AODV with Path Accumulation

Keywords: AODV, MANET, WRP

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Evaluation of Routing Protocols for Mobile Ad hoc Networks

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

Figure 1: Ad-Hoc routing protocols.

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED

PERFORMANCE COMPARISON OF AODV AND DSR ROUTING PROTOCOL IN MOBILE AD-HOC NETWORK

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Advanced Network Approaches for Wireless Environment

Performance Evaluation of Various Routing Protocols in MANET

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Performance Analysis of Routing Protocols in MANET

A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2

Performance Analysis of MANET Routing Protocols OLSR and AODV

Analysis of Routing Protocols in MANETs

Power aware Multi-path Routing Protocol for MANETS

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Recent Researches in Communications, Information Science and Education

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Computation of Multiple Node Disjoint Paths

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Volume 2, Issue 1, January 2012 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering

Routing Protocols in Mobile Ad-Hoc Network

A Simulation study : Performance comparison of AODV and DSR

Mobile Communications. Ad-hoc and Mesh Networks

The Performance of MANET Routing Protocols for Scalable Video Communication

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)

A Survey - Energy Efficient Routing Protocols in MANET

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Gurleen Kaur Walia 1, Charanjit Singh 2

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Performance Improvement of Wireless Network Using Modern Simulation Tools

Mobile Ad-hoc Networks

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

A Review paper on Routing Protocol Comparison

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

II. ROUTING CATEGORIES

Impact of Hello Interval on Performance of AODV Protocol

Comprehensive Study and Review Various Routing Protocols in MANET

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Performance Evaluation of Routing Protocols for MAC Layer Models

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Ad Hoc Routing Protocols and Issues

Mobile Ad-Hoc Networks & Routing Algorithms

Transcription:

ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BYAENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2017 June 11(8): pages 381-388 Open Access Journal Performance Analysis of Routing Protocols for Manet Using NS2 Simulator J. Sathiyajothi Assistant Professr, AnjalaiAmmalMahalingam Engineering College,Thiruvarur Received 28 February 2017; Accepted 22 May 2017; Available online 6 June 2017 Address For Correspondence: J. Sathiyajothi, Assistant Professr, AnjalaiAmmalMahalingam Engineering College,Thiruvarur Copyright 2017 by authors and American-Eurasian Network for ScientificInformation (AENSI Publication). This work is licensed under the Creative Commons Attribution International License (CC BY). http://creativecommons.org/licenses/by/4.0/ ABSTRACT Mobile Ad Hoc Network (MANETs) is a collection of mobile nodes connected with wireless links. MANET has no fixed topology as the nodes are moving constantly form one place to another place. In ad hoc networks, nodes can perform several actions like sending packets, forwarding packets, responding to routing messages, sending recommendations among others. The set of performed actions define the node s behavior. All the nodes must co-operate with each other in order to route the packets.a routing protocol is used to find routes between mobile nodes to preserve data integrity, delivery, throughput, delay, packet loss for trust management in mobile ad-hoc networks. Our aim is to identify the performance of four routing protocols is analyzed in terms of their Throughput, Jitter, End to End delay and Packet loss using NS2 simulator. KEYWORDS: INTRODUCTION In an increasingly distributed collaborative network world, could lead to efficient data transmission and information sharing in mobile ad hoc networks. It is composed of a set of independent devices that work as network nodes agreeing to forward packets for each other and have no central coordinator, absence of support infrastructure, dynamic topology and resource constraints and so on. These characteristics (memory size, processing power, battery life and unique wireless characters and others), force a node to be cautious when communicating with other nodes and its behavior.nodes must act as a router, server, client, compelling them to cooperate for the perfect operation of the network. Due to the link variability, motion of node, the topology of ad-hoc network changes and routing become difficult. Hence the structure of the network is much more vigorous and the changes are often unpredictable oppose to the Internet which is a wired network. This fact creates how routing should take place is often unclear because of the different resources like bandwidth, battery power and demands like latency. II. AD-HOC Routing Protocols: Routing protocols for Mobile ad hoc networks can be broadly categorized into two main categories: A.Proactive or table-driven routing protocols: Proactive protocols are also identified as wired routing protocol or table driven protocols because route to each node which are in network maintained continuously in routing table in the network.by continuously assessing the known and attempting to discover new routes, they try to maintain the most up-to-date plan of the network. The packet forwarding is done faster but routing overhead is greater because the entire route have to be defined before sending the packet.dsdv, OLSR are RREQ packet has TTL for validating time in network for a ToCite ThisArticle: J. Sathiyajothi., Performance Analysis of Routing Protocols for Manet Using NS2 Simulator. Advances in Natural and Applied Sciences. 11(8); Pages: 381-388

382 J. Sathiyajothi., 2017/Advances in Natural and Applied Sciences. 11(8) June 2017, Pages: 381-388 packet. When RREQ example of proactive protocols. The problem of concern is bandwidth and power utilization is more as it need to broadcast the routing tables. As the number of nodes in the MANET increases, the size of the table will increase. However, for highly dynamic network topology, the proactive schemes require a significant amount of resources to keep routing information up-to-date and reliable. Certain proactive routing protocols are Destination- Sequenced Distance Vector (DSDV), Optimized Link State Routing (OLSR). B. Destination Sequenced Distance Vector: The Destination Sequenced distance vector routing protocol is a proactive routing protocol which is a medications of conventional Bellman-Ford routing algorithm. This protocol adds a new attribute, sequence number, to each route table entry at each node. Routing table is maintained at each node and with this table; node transmits the packets to other nodes in the network. This protocol was motivated for the use of data exchange along changing and arbitrary paths of interconnection which may not be close to any base station. Optimized Link State Routing Protocol: OLSR is a proactive protocol. Its main functionality is to construct a routing table for each node in the MANET. The OLSR protocol is a variation of the pure LSR protocol and is designed specifically for MANETs. The OLSR protocol achieves optimization over LSR through the use of MPR (Multi Point Relay) nodes The MPR nodes are selected and designated by neighboring nodes. OLSR is type of table-driven pro-active link state routing protocol developed for mobile ad hoc network OLSR exchange information with other nodes in the network [8]. In OLSR the concept multi point relay (MRP) is used to reduce control traffic overhead. In OLSR nodes elect MRP among themselves. MRP is transmitting the control messages on the behalf of other nodes in the network. Each node in a network has a list of MPR nodes. The OLSR is suited for large and dense network. MPR helps in providing the shortest path to destination. Different types of control messages are used in OLSR. Hello message are used to find link status information and host s neighbor. III. Reactive or on-demand routing protocols: Reactive protocols decide the proper route only when essential, that is, when a packet needs to be forwarded. In this instance, the node a node initiates a route discovery throughout the network, only when it wants to send packets to its destination. This technique does not require constant broadcasts and discovery. This process is completed once a route is determined or all possible permutations have been examined. Once a route has been established, it is maintained by a route maintenance process until either the destination becomes inaccessible along every path from the source or until the route is no longer desired. In reactive schemes, nodes maintain the routes to active destinations. Examples of reactive routing protocols are the Ad Hoc on-demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR). The matter of concern is the route to destination will have to be acquired just before communication begins due to which the latency period for most applications is likely to increase drastically. A. Ad hoc On Demand Distance Vector (AODV): AODV routing algorithm is a source initiated, on demand driven, routing protocol. Since the routing is on demand, a route is only traced when a source node wants to establish communication with a specific destination. The route remains established as long as it is needed for further communication. Furthermore, another feature of AODV is its use of a destination sequence number for every route entry. This number is included in the RREQ (Route Request) of any node that desires to send data. These numbers are used to ensure the freshness of routing information. For instance, are questing node always chooses the route with the greatest sequence number to communicate with its destination node. Once a fresh path is found, a RREP (Route Reply) is sent back to the requesting node. AODV also has the necessary mechanism to inform network nodes of any possible link break that might have occurred in the network. B. Dynamic source routing (DSR): Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks and is grounded on a method well-known as source routing. It is related to AODV in that it forms a route on-demand when a transmitting computer requests one. Except that each intermediate node that shows a route request packet adds its own address identifier to a list carried in the package. The destination node produces a route reply message that contains the list of addresses expected in the route request and transmits it back beside this path to the source. Route maintenance in DSR is talented through the validations that nodes generate when they can verify that the next node successfully received a packet. These validations can be link-layer acknowledgements, passive acknowledgements or network-layer acknowledgements specified by the DSR protocol. However, it uses source routing instead of relying on the routing table at each intermediate device. When a node is not able to verify the successful reception of a packet it tries to retransmit it. When finite number of retransmissions fail,

383 J. Sathiyajothi., 2017/Advances in Natural and Applied Sciences. 11(8) June 2017, Pages: 381-388 the node generates a route error message that specifies the problematic link, transmitting it to the source node. When a node requires a Node to a destination, which it doesn t have in its route cache, it broadcasts a Route Request (RREQ) message, which is flooded throughout the network. The first RREQ message is broadcast query on neighbors without flooding. Each RREQ packet is uniquely identified by the initiator address and the request id. A node processes a route request packet only if it has not already seen the packet and its address is not present in the route record of the packet. This Minimizes the number of route requests propagated in the network. RREQ is replied by the destination node or an intermediate node, which knows the route, using the Route Reply (RREP) message. The return route for the RREP message may be one of the routes that exist in the route cache (if it exists) or a list reversal of the nodes in the RREQ packet if symmetrical routing is supported. In other cases the node may initiate it owns route discovery mechanism and piggyback the RREP packet onto it. Thus the route may be considered unidirectional or bidirectional. DSR doesn t enforce any use of periodic messages from the mobile hosts for the maintenance of routes. Instead it uses two types of packets for route maintenance: Route Error (RERR) packet sand ACKs. Whenever a node encounters fatal transmission errors so that the route becomes invalid, the source receives RERR message. ACK packets are used to verify the correct operation of the route links. This also serves as a passive acknowledgement for the mobile node. DSR enables multiple routes to relearnt for a particular destination. DSR does not require any periodic update messages, thus avoiding wastage of bandwidth. IV. Performance Metrics: a) Throughput: It basically defines as ratio of the number of packets delivered to the total number of packets sent. b) Average End to End delay: It is the total time taken by all the packets to reach the destination. This metric is calculated by subtracting time that first data take to traverse the network from time at which first data packet arrived to destination. This is a time the generate data packet by sender and it received by receiver at destination in application layer and it is measured in seconds. All delays in network is cause by node mobility, packet, retransmission and due to weak signal strength between nodes connection tearing and its making is also be included. c) Packet loss: It occurs when one or more packets of data travelling across a computer network fail to reach their destination. Packet loss is typically caused by network congestion. Packet loss is measured as a percentage of packets lost with respect to packets sent. d) Jitter: It is defined as a variation in the delay of received packets. The sending side transmits packets in a continuous stream and spaces them evenly apart. Because of network congestion, improper queuing, or configuration errors, the delay between packets can vary instead of remaining constant. V. Comparison Study: Performance Evaluation of Throughput: Network throughput refers to the average data rate of successful data or message delivery over a specific communications link. Network throughput is measured in bits per second (bps). A common misconception on measuring network throughput is that measuring the time it takes to upload or download large file is the maximum throughput of a network. This method does not take into account communications overhead such as Network receiver window size, machine limitations or network latency. Maximum network throughput equals the TCP window size divided by the round-trip time of communications data packets. Using trace files of separate routing protocol to find throughput for better performance. Performance Evaluation of Jitter: Jitter is an undesirable effect caused by the inherent tendencies of TCP/I networks and components. This topic describes the cause and effect of jitter. Jitters defined as a variation in the delay of received packets. The sending side transmits packets in a continuous stream and spaces them evenly apart. Because of network congestion, improper queuing, or configuration errors, the delay between packets can vary instead of remaining constant, as shown in the figure. This variation causes problems for audio playback at the receiving end. Playback may experience gaps while waiting for the arrival of variable delayed packets. Using trace files of separate routing protocol to find jitter for better performance.

384 J. Sathiyajothi., 2017/Advances in Natural and Applied Sciences. 11(8) June 2017, Pages: 381-388 Performance Evaluation of End To End Delay: End-to-end delay or one-way delay (OWD) refers to the time taken for a packet to be transmitted across a network from source to destination. It is a common term in IP network monitoring, and differs from round-trip time (RTT).Using trace files of separate routing protocol to find end to end delay for better performance. Performance Evaluation of Packet Loss: Packet loss is the failure of packet transmission to arrive at their destination. In TCP/IP protocol, when packet loss occurred, destination will ask to the source to resend the loss packet but it's causing a delay because the same packet will be sent twice or more. But, in UDP protocol, the loss packet will be ignored and causing improper display on destination site. The causes of packet loss include inadequate signal strength at the destination, natural or human-made interference, excessive system noise, hardware failure, software corruption or overburdened network nodes. Using trace files of separate routing protocol to find packet loss for better performance. VI. Simulation Results & Observations: Focuses on comparing the performance analysis of four routing protocols for Mobile Ad-Hoc network (MANET s). They have used NS2 simulator from Scalable Networks to perform the simulations. Performance analysis of AODV, DSR, DSDV and OLSR is evaluated based on Average end to end delay(s), Jitters(s), throughput (bits/s) and packet loss in Mobile ad hoc Networks. Table 1: Values for Simulation Parameters Parameters values Routing protocols AODV, DSDV, DSR, OLSR No. of Mobile Nodes 25,50 Interface queue type Queue/droptail/priqueue Mobility model Radio-Propagation model Simulation Period (s) 150 MAC type 802.11 Average speed (m/s) 10-20 ms Pause Time (s) 0, 10, 20, 30, 40, 50 Initial node energy (J) 1000 Max Connections 10 Connection Type CBR Simulation area 500 x 500 The simulation results are shown in the following section in the form of NS2 graph. Graphs show comparison between the four protocols by varying different numbers of sources on the basis of the abovementioned metrics as a function of pause time. Fig. 1.1: Throughput For Aodv Fig. 1.3: End To End Delay For Aodv

385 J. Sathiyajothi., 2017/Advances in Natural and Applied Sciences. 11(8) June 2017, Pages: 381-388 Fig. 1.2: Jitter For Aodv Fig. 1.4: Packet Loss For Aodv Fig. 2.1: Throughput For Dsdv Fig. 2.3: End To End Delay For Dsdv Fig. 2.2: Jitter For Dsdv Fig. 2.4: Packet Loss For Dsdv

386 J. Sathiyajothi., 2017/Advances in Natural and Applied Sciences. 11(8) June 2017, Pages: 381-388 Fig. 3.1: Throughput For Dsr Fig. 3.3: End To End Delay For Dsr Fig. 3.2: Jitter For Dsr Fig. 3.4: Packet Loss For Dsr Fig. 4.1: Throughput For Olsr Fig. 4.2: End To End Delay For Olsr

387 J. Sathiyajothi., 2017/Advances in Natural and Applied Sciences. 11(8) June 2017, Pages: 381-388 Fig. 4.3: End To End Delay For Olsr Fig. 4.4: Packet Loss For Olsr Table 2: Comparison Table Throughput Jitter End To EndDelay Packet Loss AODV Medium High High High DSDV High High Medium High DSR Medium Medium High Low OLSR High Low Medium Medium Conclusions: In this research we tested four routing protocols of mobile ad hoc network AODV, DSDV, DSR and OLSR routing protocols. Performance of this routing protocol is evaluated with respect to four performance metrics such as throughput, jitter, end to end delay and packet loss On the basis of observation, it has been observed OLSR shows best performance than AODV,DSDV and DSR in terms of throughput and jitter as a function of pause time. DSR show lowest packet loss compare to AODV and DSDV. DSDV and OLSR have less end to end delay AODV and DSR. AODV and DSDV performed the worst in case of packet loss and jitter. Over the past few years, new standards have been introduced to enhance the capabilities of ad hoc routing protocols. As a result, ad hoc networking has been receiving much attention from the wireless research community. In this paper, using the latest simulation environment NS 2, we evaluated the performance of three widely used ad hoc network routing protocols using packet-level simulation. We can summarize our final conclusion from our experimental results as follows: Increase in the concentration of nodes yields to an increase in the mean End-to-End delay. Increase in the pause time leads to a decrease in the mean End-to-End delay. Increase in the number of nodes will cause increase in the mean time for loop discovery. In short, OLSR has the best all round performance. DSRis suitable for networks with moderate mobility rate. It has low overhead that makes it suitable for low bandwidth and low power network. The major benefit is its excellent support for multiple routes and multicasting. Future Work: In the future, extensive complex simulations could be carried out using other existing performance metrics, in order to gain a more in-depth performance analysis of the adhoc routing protocols. Other new protocols performance could be studied too. REFERENCES 1. Mohapatra, S. and P. Kanungo, 2011. Performance analysis of AODV,DSR, OLSR and DSDV Routing Protocols using NS2 Simulator,in proc. International Conference on Communication Technologyand System Design, pp: 69-76. 2. Asma Tuteja, Rajneesh Gujral and Sunil Thalia, 2010. ComparativePerformance Analysis of DSDV, AODV and DSR RoutingProtocols in MANET using NS2, in proc. InternationalConference on Advances in Computer Engineering, pp: 330-334. 3. AzzedineBoukerche, 2004. Performance Evaluation of RoutingProtocols for Ad Hoc Wireless Networks, Mobile Networks andapplications, 9: 333-342. 4. Li Layuan, Li Chunlin and YaunPeiyan, 2007. Performance evaluationand simulations of routing protocols in ad hoc networks,computer Communications, Elsevier, 30: 1890-1898.

388 J. Sathiyajothi., 2017/Advances in Natural and Applied Sciences. 11(8) June 2017, Pages: 381-388 5. Gurpinder Singh and Jaswinder Singh, 2012. MANET: Issues andbehavior Analysis of Routing Protocols, International Journal ofadvanced Research in Computer Science and Software Engineering, 2(4): 219-227. 6. Mobile ad hoc networks (MANET). http: //www.ietf.org/html.charters/manet-charter.html, 1997. IETF Working GroupCharter. 7. NS-2 Network simulator http://www.isi.edu/nsnam/ns. 8. Johnson, D.B and D.A. Maltz, 1996. Dynamic Source Routing in Ad-HocAd hoc Networks," Mobile Computing, ed. T. Imielinski and H.Korth, Kluwer Academic Publishers, pp: 153-181.