Design of an Ad-hoc Network Model for Disaster Recovery Scenario Using Various Routing Protocols

Similar documents
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

AODV-PA: AODV with Path Accumulation

Performance Evaluation of MANET through NS2 Simulation

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

Power aware Multi-path Routing Protocol for MANETS

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Performance Analysis of DSDV, AODV, DSR and OLSR MANET Routing Protocols

2013, IJARCSSE All Rights Reserved Page 85

PNR: New Position based Routing Algorithm for Mobile Ad Hoc Networks

Impact of Hello Interval on Performance of AODV Protocol

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Suman Kumari et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (4), 2011,

Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks

Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

A Simulation study : Performance comparison of AODV and DSR

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Performance Evaluation and Comparison of AODV and AOMDV

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

LECTURE 9. Ad hoc Networks and Routing

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Performance Analysis of AODV, DSDV and DSR by using Different Mobility Models

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Figure 1: Ad-Hoc routing protocols.

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Performance of Route Caching Strategies in Dynamic Source Routing

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

A Review of On-Demand Routing Protocols for Mobile Ad-Hoc Networks

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

PERFORMANCE ANALYSIS OF AODV, DSR AND DSDV IN MANET USING NS-2

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

A Performance Comparison of MDSDV with AODV and DSDV Routing Protocols

Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Ad-hoc Network

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

CA-AODV: Congestion Adaptive AODV Routing Protocol for Streaming Video in Mobile Ad Hoc Networks

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

Maharishi Markandeshwar University

Performance Evaluation of Routing Protocols for MAC Layer Models

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

A COMPARISON STUDY OF DSDV AND SEAD WIRELESS AD HOC NETWORK ROUTING PROTOCOLS

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Adhoc

Efficient On-Demand Routing Protocols to Optimize Network Coverage in Wireless Sensor Networks

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Performance of DSDV Protocol over Sensor Networks

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

POLITECNICO DI TORINO Repository ISTITUZIONALE

Performance Evaluation of Various Routing Protocols in MANET

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

A Study on MANET Routing Protocol Performance with Node Mobility

Performance Analysis and Enhancement of Routing Protocol in Manet

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Energy Saving and Survival Routing Protocol for Mobile Ad Hoc Networks

Performance Analysis of Routing Protocols in Mobile Ad-hoc Network (MANET)

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Routing Protocols in Mobile Ad-Hoc Network

Transcription:

International Conference on Advances in Computing, Communication and Control (ICAC3 9) Design of an Ad-hoc Network Model for Disaster Recovery Scenario Using arious Routing Protocols Suresh Kumar Deptt. Of CSE, Career Institute of Technology and Management, Faridabad 91-129-224445 enthusk@yahoo.com R K Rathy Deptt. Of CSE, Career Institute of Technology and Management, Faridabad 91-129-225814 Rathy.citm@yahoo.co.in D Pandey Deptt. Of Computer Science & Mathematics, CCS University, Meerut 91-941275626 Pandey.divakar@yahoo.in ABSTRACT Ad-hoc networks are infrastructure less networks and can be established in any environment without pre-existing infrastructure with ease of deployment. The nodes in the network can communicate freely while being in motion. Several routing protocols such as DSR,, and DSD etc. have been developed for communication in these networks. Ad-hoc networks are especially deployable in situations like disaster management, as we need to act very fast in adverse conditions to save the lives of the victims or minimize losses. In this paper we have analyzed the performance of these protocols for a disaster scenario. We have taken a fixed size terrain 15x1m 2, organizing it into equal sized symmetrically placed four sub-regions of 5x3m 2, each(group of rescue teams) and a few fast moving nodes (communication system on transport vehicles) moving randomly. It is observed form the simulation results that for stable networks performance of proactive protocols is better than reactive protocols in the terms of e-e delay, But with increase in the mobility reactive protocols starts outperforming the proactive protocols. Performance of DSR and is comparable for low mobility and low load scenarios but always performs better than DSR for high load scenarios Keywords Adhoc networks, routing protocols, PDF, overheads, disaster scenario 1. INTRODUCTION There are various usages of ad-hoc networks are: emergency search-and-rescue operations and data transfer in inhospitable terrain. The terrorist attacks and natural disasters have drawn ever increasing attention to improve rescue operations following a disaster in no time. One of the technologies that can be effectively used during disaster recovery is wireless ad-hoc networking [2]. The rescue teams can use a Mobile Ad-hoc Network in that situation without requiring a fixed infrastructure. This type of Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ICAC3 9, January 23 24, 29, Mumbai, Maharashtra, India. Copyright 29 ACM 978-1-6558-351-8 $5.. networks can be quickly deployed. Disasters are very dangerous and resulted in the loss of both lives and valuables. For example in August 28, flood in Bihar affect more than million people. Terrorist Attack in September 21 on the World Trade Center resulted in loss of millions of lives and millions of dollars business. Thus no one can ignore the importance of improving rescue techniques. Some techniques are already available [1]. For the rescue operation at the World Trade Centre site, the Wireless Emergency Response Team (WERT) tried to locate survivors through signals from their mobile phones [13]. 2. RELATED WORK Some of the previous work regarding networks in these applications focused on energy efficient routing [16] algorithms and also concentrate on performance comparison of existing routing protocols such as DSR,,DSD [5] with respect to energy consumption [13]. In addition an algorithm (GAF) is designed to reduce energy consumption in the network by turning off unnecessary nodes[14]. [1]have discussed scenario based performance analysis of routing protocols using CBR traffic by keeping the number of nodes fixed. 3. PROTOCOLS DESCRIPTION This section gives short descriptions of the three ad-hoc routing protocols studied in this work. 3.1 DSD The Destination-Sequenced Distance-ector (DSD) Routing Algorithm is based on the idea of the classical Bellman-Ford Routing Algorithm with certain improvements. Every node maintains a routing table that contains all available destinations, the number of hops to reach the destination and the sequence number assigned by the destination node. The sequence number is used to distinguish stale routes from new ones and thus avoid the formation of loops. The mobile nodes periodically transmit their routing tables to their immediate neighbors. A node also transmits its routing table if a significant change has occurred in its table from the last update sent. So, the update is both timedriven and event-driven. When the network is relatively stable, incremental updates are sent to avoid extra traffic and full dump are relatively infrequent. In a fast-changing network, incremental packets can grow big so full dumps will be more frequent. 1

International Conference on Advances in Computing, Communication and Control (ICAC3 9) 3.2 Ad Hoc On-Demand Distance ector Routing (): Ad hoc On-Demand Distance ector () algorithm enables dynamic, self-starting, multihop routing between participating mobile nodes wishing to establish and maintain an ad hoc network. allows mobile nodes to obtain routes quickly for new destinations, and does not require nodes to maintain routes to destinations that are not in active communication. To find a route to the destination, the source broadcasts a route request packet. This broadcast message propagates through the network until it reaches an intermediate node that has recent route information about the destination or until it reaches the destination. When intermediate nodes forwards the route request packet it records in its own tables which node the route request came from. This information is used to form the reply path for the route reply packet as uses only symmetric links. As the route reply packet traverses back to the source, the nodes along the reverse path enter the routing information into their tables allows mobile nodes to respond to link breakages and changes in network topology in a timely manner. When links break, causes the affected set of nodes to be notified so that they are able to invalidate the routes using the lost link. 3.3 DSR The key distinguishing feature of DSR is the use of source routing. That is, the sender knows the complete hop-by-hop route to the destination. These routes are stored in a route cache. The data packets carry the source route in the packet header. When a node in the ad hoc network attempts to send a data packet to a destination for which it does not already know the route, it uses a route discovery process to dynamically determine such a route. Route discovery works by flooding the network with route request (RREQ) packets. Each node receiving an RREQ rebroadcasts it, unless it is the destination or it has a route to the destination in its route cache. Such a node replies to the RREQ with a route reply (RREP) packet that is routed back to the original source. RREQ and RREP packets are also source routed. The RREQ builds up the path traversed across the network. The RREP routes itself back to the source by traversing this path backward. the route carried back by the RREP packet is cached at the source for future use. If any link on a source route is broken, the source node is notified using a route error (RERR) packet. The source removes any route using this link from its cache. A new route discovery process must be initiated by the source if this route is still needed. DSR makes very aggressive use of source routing and route caching. No special mechanism to detect routing loops is needed. Also, any forwarding node caches the source route in a packet it forwards for possible future use. 4 SCENARIO DESCRIPTION We have taken terrain region of 15x1m 2 for the simulation study. This region is organized into four equal sized, symmetrically placed sub-regions of size 5x3m 2 as shown in Figure 1. The nodes in the regions 1-4, represent members of the rescue teams having personal communication devices, with very low random speed of 1m/s. These nodes are continuously moving within the specified area and communicate with each other using CBR traffic. There is another set of nodes (fixed at 5) moving with the speed of 2m/s. These nodes represent the vehicles of the rescue operation. These nodes communicate with each other for locating positions of each and to inform one another the location of the disaster. In the study we have taken both the directional movement and random movement of vehicular nodes as discussed below. Directional Movement: The 5 nodes are placed on the diagonal with the node on the centre is fixed. The other four nodes are moving on the diagonal with 2m/s towards the centre node and again go back towards the corner. These four nodes are communicating with the centre node and also with the nodes in the adjacent regions. Random Movement: In this scenario the vehicle nodes are moving randomly with 2m/s. Eight scenarios have been created with varying number of nodes. Each scenario consists of five sets of nodes dispersed in the area of 15x1m 2 as shown in Figure 1.The rectangular region of each region is 5x3m 2 and the number of nodes in each region is varied from 5,8,1 and 15 for both the cases. With increase in the number of nodes, the network connectivity, number of traffic sources and number of CBR flows is also increased as shown in Table 1. Table 1 : Number of nodes and CBR flows Total nodes Nodes in each region CBR flows sources 25 5 2 14 37 8 3 18 45 1 4 22 65 15 52 26 The network is designed in such a way so that the network include diverse mobility (95% of the nodes have low mobility and 5% very high). All the three protocols are applied on all the discussed scenarios and their performance is evaluated for these. Region 4 Region 3 Region 1 Region 2 Figure 1: Disaster Scenario Simulation Area 11

International Conference on Advances in Computing, Communication and Control (ICAC3 9) 5. SIMULATION SETUP For simulation we have used NS-2[3] developed by Monarch research group in CMU [4]. It has the support for simulating multi hop wireless networks. The protocols maintain a send buffer of 64 packets. It contains all data packets waiting for a route, such as packets for which route discovery has started, but no reply has arrived yet. To prevent buffering of packets indefinitely, packets are dropped if they have to wait in the send buffer for more than 3s. All packets (both data and routing) sent by the routing layer are queued at the interface queue until the MAC layer can transmit them. The interface queue has a maximum size of 5 packets and is maintained as a priority queue with two priorities each served in FIFO order. Routing packets get higher priority than data packets. Figure 2 shows the flow of packets within a node after being generated by application (upper layers). AGT Table 2: Simulation Parameters S. No. Parameter alue 1 Routing Protocols DSR,, DSD 2 Packet rate 4p/s 3 Terrain Size 15*1m 2 4 Nodes 25,37,45,65 5 Node Placement Random/diagonal (ehicle nodes ) 6 Node Placement Random (rescue team members ) 6 Mobility Model Random Waypoint Buffer RTR 7 Data Traffic CBR 8 Simulation Time 2s 9 Speed 1m/s, 2m/s MAC IFQ Figure 2: Flow of packets in a node 5.1 The Traffic and Mobility Model We have done simulation of the scenario for 2 simulated seconds in a rectangular field of 15x1 with varying number of nodes.. The source-destination pairs are spread randomly over the network. The size of data packets is 512 bytes. Changing the number of sources and data-rate we can vary the load in the network. The mobility model uses the random waypoint model [12]. Here, each node starts its journey from a random location to a random destination with a randomly chosen speed. Once the destination is reached, another random destination is targeted after a pause. In this scenario the nodes in the four regions are continuously moving without pausing ( pause time) and the vehicle nodes are moving with speed of 2m/s (randomly in one scenario and in specified directions in another scenario) with pause time of 5s. Identical mobility and traffic scenarios are used across all the protocols. 6. SIMULATION RESULTS AND OBSERATIONS In a disaster management scenario, it is very important to deploy the nodes in such a manner that PDF, routing overheads, packetloss and end-end delay are minimum. Simulations were carried out for both random motion and pre-defined directional motion of the vehicular nodes, with varying number of traffic sources and CBR flows as shown in Table 1. It is also observed from the Tables 3 and 4 that all the three protocols perform better, when the movement of the vehicular nodes is along the diagonals as compared to their random movement for the above said metrics. However Performance of and DSR is better than DSD for all the considered scenarios. On the other hand we observe that average end-to-end delay is lowest in DSD as compared to both DSR and (figure 4 & 7). This is due to the fact that packets are dropped, rather than queued if DSD does not have a route. Simulation results also reveal that for PDF and throughput both DSR and performs similar (figure 3 & 6). The End-to-end delay in DSR increases with the increase in the network load, but the packet loss in DSR is lowest (figure 5 & 8). DSR also has low overhead packets, but due to source route, byte overhead increases in DSR with increase in the number of hops in the path. 12

International Conference on Advances in Computing, Communication and Control (ICAC3 9) Random Movement Diagonal Movement Packet Delivery Ratio Packet Delivery Ratio DSR DSD DSR DSD PDF 7 6 5 4 3 2 1 Scenario PDF 8 7 6 5 4 3 2 1 Scenario Figure 3: PDF in the four scenarios for various protocols Figure 6: PDF in the four scenarios for various protocols Avg. E-E Delay (ms) DSR DSD Avg. E-E Delay DSR DSD 25 25 2 2 delay 15 1 delay 15 1 5 5 Figure 4: Avg E-E delay in the four scenarios (Delay is significantly increased for scenario 4 having large number of nodes 65 ) Figure 7: Avg E-E delay in the four scenarios (Delay is significantly increased for scenario 4 having large number of nodes 65 ) loss 1 8 6 4 2 Packet Loss DSR DSD loss 7 6 5 4 3 2 1 Packet Loss DSR DSD Figure 5: Packet-loss in the four scenarios. Packet-loss for DSR is negligible for first scenario and very low for the other three Figure 8: Packet-loss in the four scenarios. Packet-loss for DSR is negligible for first scenario and very low for the other three scenarios 13

International Conference on Advances in Computing, Communication and Control (ICAC3 9) Table3: Directional (Along The Diagonal) Movement Of Fast Moving Nodes Number of Nodes 25 37 45 65 Protocol DSR DSD DSR DSD DSR DSD DSR DSD Avg Throughput[kbps] 153.99 155.14 13.14 156.75 155.86 134.55 23.12 196.9 165.13 243.49 211.74 214.26 PDF 7.53 71.28 59.79 55.55 55.26 47.82 65.29 62.97 52.91 64.3 55.32 56.18 NRL.21.12.68.33.64 1.3 1.3 1.97 Routing Overhead 14.76 9.43 33.17 19.36 33.38 37.11 46.11 51.19 Avg e-e delay(ms) 4.47 598.2 18.45 527.1 847.85 297.75 412.7 99.2 184.3 599.72 278.54 518.38 Packet Loss [%] 3.33.52 58.17 45.72 1.13 65.82 36.3 1.3 59.64 4.45 2.26 56.5 RTG PKTS 216 1298 9186 4546 9629 1553 23893 36387 RTG packets forwarded 13 667 565 243 473 11299 1334 26356 Data packets forwarded 4986 5214 2286 1616 12142 791 916 13281 465 15665 23586 9448 dropped RTG packets 7 785 9 687 268 389 361 dropped data packets 3192 3248 6626 6219 6756 988 5443 6489 1196 7414 1112 12337 Table4: Random Movement Of Fast Moving Nodes Number of Nodes 25 37 45 65 Protocol DSR DSD DSR DSD DSR DSD DSR DSD Avg Throughput[kbps] 128.2 131.33 14.1 168.33 167.6 127.43 191.36 172.49 74.32 243.49 19.3 19.38 PDF 59.9 6.22 47.96 59.58 59.37 45.12 61.27 55.24 43.68 64.3 49.76 49.8 NRL.37.32.74.35.96.65 1.3 1.16 Routing Overhead 26.34 22.42 32.69 18.86 34.8 26.31 46.11 36.27 Avg e-e delay(ms) 436.27 649.81 13.1 42.4 633.6 232 363.53 754.79 31.13 599.72 2245.6 453.19 Packet Loss [%] 39.82.47 66.15 41.24.93 77.93 4.7 1.13 51.36 4.45 2.51 57.77 RTG PKTS 3859 3367 121 481 14519 9782 23893 21412 RTG packets forwarded 174 2182 623 2864 834 6337 1334 13436 Data packets forwarded 4413 5777 2691 12174 12614 673 17264 2993 236 15665 33667 1599 dropped RTG packets 64 2 7 17 566 49 389 77 dropped data packets 4157 4439 7446 5616 6143 11613 633 7692 2252 7414 11811 12727 14

International Conference on Advances in Computing, Communication and Control (ICAC3 9) 7. CONCLUSIONS From the simulations It is observed that by organizing the terrain region into four (say) equal sized symmetrically placed sub-regions provide optimum results in the terms of routing overheads, packet-loss and end-to-end delay. Further we find that overall disaster recovery operation monitored from centre of terrain with four fast moving (vehicle) nodes moving along the diagonal and communicating with the nodes in subregions(members of rescue teams) provide better results as compared to random motion of all the five fast moving nodes. It is interesting to note that the packet-loss is very low for the DSR protocol. The simulation results reveal that DSR should be considered for a scenario where paths are limited to few hops and there is a requirement of less number of control overheads. 8. REFERENCES [1] Federal Emergency Management Agency-The National Urban Search and Rescue Response System, Documentation available at URL http://www.fema.gov/usr, Dec. 22 [2] The MIT µamps Project, Documentation available at URL http://www-mtl.mit.edu /research/icsystems/uamps, Dec. 22. [3] Fall Kevin, aradhan Kannan, editors, NS-Documentation [4] The CMU Monarch Project. http://www. monarch.cs.cmu.edu/. Computer Science Department, Carnegie Mellon University [5] Broch J., Maltz D.A., Johnson D.B., Hu Y.C.,Jetcheva J., A Performance Comparison of Multi-Hop Wieless Ad Hoc Network Routing Protocols, Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), October 1998. [6] Broustis Ioannis, Jakllari Gentian, Repantis Thomas, Molle Mart, A Comprehensive Comparison of Routing Protocols for Large-Scale Wireless MANETs, http://www.cs.ucr.edu/~mart /preprints/iwwan6.pdf [7] Dyer Thomas D., Boppana Rajendra. A Comparison of TCP Performance over three Routing Protocols for Mobile AdHoc Networks, ACM Symposium on Mobile Ad Hoc Networking & Computing (Mobihoc), October 21 [8] Feeney L. M., An Energy Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks, Mobile Networks and Applications, ol. 6, pp. 239-249, June 21. [9] Johnson D. B., Maltz D. A., Hu YihChun, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), <draft- ietf-manet-dsr-1.txt> draft, July 24. [1] Johansson P., Ericsson Tony Larsson, Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks [11] Perkins Charles E, Bhagwat Pravin, Highly dynamic Destination-Sequenced Distance-ector routing (DSD) for mobile computers, Proc. of the SIGCOMM 94. [12] Perkins C., Belding-Royer E., Das S., Adhoc On-Demand Distance ector () Routing, RFC 3561, July 23. [13] Rauscher K. F., Wireless Emergency Response Team Final Report for the Sep. 11, 21 NYC WTC Terrorist Attack, Oct. 21 [14] Xu Y., Heidemann J., Estrin D., Geography-informed Energy Conservation for Ad-hoc Routing, Proc. ACM MOBICOM 1, July 21. [15] Yusof Z. M., Flint J.A., Datta S., Performance of CBR and TCP Traffics in arious MANET Environments, Springer, pages 541-545, Sept 27. [16] Zussman Gil, Segall Adrian, Energy Efficient Routing in Ad Hoc Disaster Recovery Networks IEEE INFOCOM 23 15