SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41
37 | P a g e
Performance comparison of AOMDV and POR Routing Protocols
in MANETS
M.Chandrika M.tech student1
, N.Papanna Assistant professor2
1,2
Sree Vidyanikethan Engg.College, Tirupati.AP,India.
Abstract
Mobile ad hoc network (MANET) [1] is
Mobile nodes that are communicated with each
and every other hop using multi-hop wireless
nodes. Each node acts as a router in network and
no fixed infrastructure for mobile nodes and
there is no base station of it, forwarding data
packets for other nodes [2]. Without network
infrastructure is known as ad hoc network is
formed by mobile stations inside a restricted area
which communicates without the need of access
point [3]. An ad hoc network can be formed by
mobile computers with wireless interfaces that
are communicate among themselves without any
help of infrastructure. In an ad hoc network the
mobile nodes are access to serve both routers and
hosts. Performance comparison of AOMDV and
POR with ns-2 (version 2.34) simulations shows
that throughput as POR packet delivery is better
than that of AOMDV.
Keywords: MANETS, AOMDV, POR, Data
delivery, routing protocol.
I. Introduction
Mobile ad hoc networks (MANET) as a
self-configuration and less infra structure data
transmission. Due to the broadcasting nature of
wireless channel and dynamic network topology,
reliable data delivery in MANETs. In this main issue
is high mobility [1]. Most existing protocols as
topology based routing protocols used in MANETS.
There are quite easily influences to node mobility,
especially in large scale networks. Main reason is
due to the procedure of a node –node before data
transmission is predefined. Network topology is
changed very fast and it is difficult to maintain a
route.
The route recovery and route discovery
procedures are time consuming, when path link is
breaks that time data packet loss is occurred and
then the packet is reroute and transmission rate is
interrupted. Routing protocols are DSDV, DSR,
AODV and AOMDV. Here node mobility is not
easy to influence. Next will introduce the
Geographic routing (GR) protocol, this is uses the
location based data packets will be transmitted in
hop-by-hop routing. And source is alert of its own
location.
In GR, to select the next hop forwarder use
the greedy forwarding with the large positive
information to the destination and GR is very high
efficiency and scalability. If the node moves out of
sender coverage area transmission will be fail i.e.,
packet loss occur. Then GPSR (Greedy Perimeter
state less routing) is introduced and due to the
broadcasting nature of wireless medium single data
packet transmission will leads to the multiple
reception and enhance the robustness of backup
condition. It does not deliver the data packets to
sensitive applications.
In AOMDV, nodes are selected to the
destination as forwarding candidates and all
neighboring nodes request to the next neighboring
nodes. Then the path is multiple route requests to the
neighbor nodes and route reply to the destination.
When the path link is breaks then entire packet is
loss and also throughput is decreased at the same
time time-consuming and energy-consuming. Next
will introduce the POR (position based opportunistic
routing) protocol, it may achieve the multiple
receptions without losing information and collision
avoidance. Reduce the latency and duplicate
relaying packets.
II. ROUTING PROTOCOLS
2.1. Overview
Mobile Ad-hoc Network (MANET) is a
less infrastructure for mobile nodes that means
infrastructure is absent. Nodes are utilized in the
network of same random access wireless channel;
cooperate in a friendly manner to attractive their
multi hop forwarding. The nodes in the network as
not only acts as hosts but also as routers and that
route data to from other nodes in network [2].
The main features of MANET are listed some as
below [4]:
a. MANET can be formed without any pre-
existing infrastructure.
b. MANETS can follow the dynamic topology
and where nodes may join and leave the
network at any time and the multi-hop
routing. It may keep changing as nodes join
and leave from the network. It does have
very limited physical security, and
increasing security.
c. Every node in the MANET can assist in the
routing of packets in network.
d. Limited Bandwidth & Power is limited
Routing protocols can be fallowed into different
categories:
M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41
38 | P a g e
(1) Uni-cast routing protocols
a. Topology-based routing protocols
• Proactive routing protocols
• Reactive routing protocols
• Hybrid routing protocols
b. Geographical-based routing protocols
(2) Multicast routing protocols
(3) Broadcast algorithms
In this may have to discuss about reactive routing
protocols (e.g., AOMDV, POR) and simulating the
results for that protocols.
2.1.1. Ah Hoc On Demand Multicast routing
protocol [AOMDV]. [13]
Here Ad-hoc On-demand Multipath Distance
Vector Routing (AOMDV) protocol is an
enhancement part of the AODV protocol for
computing multiple loop-free and link disjoint paths
[5]. Multipath routing is provides the multiple
alternative paths between each and every source and
destination nodes in a network. The benefit of such
multipath is a fault tolerance, bandwidth increasing,
and security improvement. Overlapping, looping
(infinity loop) and optimum disjointed paths and the
main issue in such algorithms [14]. Destination
contains a number of next-hops nodes along with the
neighbor hop counts in route entries and same
sequence number is accessed to the all neighbor
nodes. For destination node, a node maintains the
hop count information, which is defined as the
maximum hop count is all the paths and uses the
sending route request of the destination.
Each duplicate route node request is
received by the neighbor node and it can be defined
as an alternate path to the destination. Loop free
node is assured by the acceptance of alternate paths
to destination and if it has a less hop count than the
advertised hop count for that destination. Because
the maximum hop count is used, the advertised hop
count therefore does not change for the same
sequence number [5]. When a route advertisement
is received for a destination with a greater sequence
number, the next hop list and advertises the hop
count is reinitialized.
Multi-path AODV can be used to find the
node-disjoint or link disjoint routes. To find node-
disjoint routes, each node does not reject the
duplicate RREQs immediately. Source node is
RREQ to the all neighboring nodes and selects the
node-disjoint path, because duplicate RREQs
packets are not broadcasted to the neighbors.
Any two RREQs are arriving at intermediate nodes
via different neighbors of the source could not have
transmitted at the same node [5]. Several changes
are required in the basic AODV route discovery
mechanism to enable computation of multiple link
disjoint routes between source destination pairs.
Note that any intermediate node I on the
route between a source S and a destination D can
also form such multiple routes to D, thus making
available a large number of routes between S and D.
In the route discovery procedure a reverse path is set
up backwards to the source via the same path the
route request (RREQ) has traversed. If duplicates of
the RREQ coming via different paths are ignored as
before, only one reverse path can be formed. To
form multiple routes, all duplicates of the RREQ
arriving at a node are examined as each duplicate
defines an alternate route. See Figure 2 each of these
alternate routes may not be disjoint [12].
Figure: 1 (a) Second copy of RREQ is transmitted
over the dotted link. (b) The second copy of RREQ
via B is suppressed at intermediate node I.
In the hope of getting link disjoint paths
(which would be more numerous than node disjoint
paths) the destination node adopts a “looser” reply
policy. It replies up to k copies of RREQ arriving via
unique neighbors, disregarding the first hops of these
RREQs.
2.1.2. Position Based Opportunistic Routing [POR]
Protocol
The POR is designed at based on
geographic routing and opportunistic forwarding.
The nodes are assumed to be aware of their own
location and the positions of their neighbors.
Neighborhood location information can be
exchanged using one-hop beacon or piggyback in
the data packet’s header. The location information of
nodes can be obtained with GPS [15] and it likes
equipment and neighbor’s coordinates are updated
periodically through one hop beacons.
When the source node S wants to sends packets to
the destination node D. It calculates the forwarder
list according to the distance between its neighbors
and the destination and inserts the list into the packet
header the neighbor. After that packet is send out,
tacking the best forwarder list can be set with respect
to the respected nodes.
All nodes within the sender’s coverage area nodes
may receive the packets and check its position in the
forwarder list, there are n nodes ahead of it, and it
M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41
39 | P a g e
will wait for n time’s slots before forwarding those
packets if the same packet was being sent by the
other node before the dedicated time slots. It will
discard the packets and sub sequent nodes will do
the same operation, until the packet reaches the
destination.
Figure2. (A) the operation of POR in normal
situation. (B) The operation of POR when the next
hop fails to receive the packet situation.
In this the above figure nodes sends the
source to destination. A source node located in the
forwarding area satisfies the two conditions: i.e., 1)
it makes positive progress toward the destination;
and 2) its distance to the next op node should not
exceed half of the transmission range in wireless
mode (i.e., R=2), so that ideally all the forwarding
candidates can hear from one another. First sender
sends the data transmits the forwarding area and
chooses the candidate selection process and the
condition is satisfied then forwards the next
forwarding area to the destination. Collect the
information to the forwarder does not forwards the
packets to the destination and same time sub-optimal
candidates has to be send the packets to the
destination in certain period of time.
III. SIMULATION MODEL
The performance of AOMDV is evaluated
in terms of Scenario and Traffic patterns using NS 2
[6] and Bonn Motion [5].
Figure3. Overview of the simulation model
The following Figure 3. Illustrates the simulation
model [7] and the simulation parameters are
described in Table 1. In our study and evaluation for
the two protocols AOMDV and POR we have used
the radio Propagation model which is the ns - 2 [12]
(Version 2.34) default model.
The result of simulation is generated as
trace files and the awk & Perl scripts are used for
report generation. In this model mobility generator is
moves to the nodes files and some of that traffic
generator and collects the information to the network
simulator and trace the file. Trace file is generated at
flow of data and speed of that particular node. Then
calculate the performance evaluation of both routing
protocols.
Table: 1 Simulation parameters
IV. PERFORMANCE METRICS
Performance Metrics [8, 9] are quantitative
measures that can be used to evaluate any MANET
routing protocol. We considered the following four
metrics. To evaluate the multi path on-demand
routing protocols AOMDV and POR. The fallowing
metrics are used in performance comparison.
4.1. Packet delivery ratio
The ratio of the number of packets is
received and the number of packets expected to
receive. Thus, for multicast packets delivery, the
ratio is equal to the total number of received packets
over the number of originated packets times the
group size. It is calculated as follows:
Packet Delivery ratio = (Number of Packets
Received/Number of Packets Sent) x 100.
4.2. Average Throughput
It is a data transmission is determined by
the amount of data moved from one node to another
in a certain period of time. And Average Throughput
[10] is the number of bytes received successfully and
is calculated by
Average Throughput= (Number of bytes received
x8)/ (Simulation time x 1000) kbps
4.3. Average End-to-End Delay (Average e2e
delay)
Average End-to-End [11] delay is the
average times of the data packet are transmitted
successfully across a MANET from source to
destination. It includes all possible delays in
networking area, such as buffer is during the route
discovery latency, queuing at the interface queue,
retransmission delay at the MAC (Medium Access
Control), the propagation and the transfer time. The
average e2e delay is computed by,
Parameter Value
Mac protocol
Propagation model
Transmission Range
Mobility model
Traffic type
Packet size
Number of nodes
Simulation time
IEEE 802.11
Two-way ground
250m
Random way
point(RWP)
Constant bit rate (CBR)
256 bytes
80
900sec
M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41
40 | P a g e
where D is the average end-to-end delay, n is the
number of data packets successfully transmitted over
the MANET, ' i ' is the unique packet identifier, Ri is
the time at which a packet with unique identifier ' i '
is received and Si is the time at which a packet with
unique identifier ' i ' is sent. The Average End-to-
End Delay should be less for high performance.
4.4. Packet Loss
Packet Loss is the difference between the
number of data packets are send and the number of
data Packets received in that location. It follows that:
Packet Loss= Number of data packets sent− Number
of data packets received.
V. V.PERFORMANCE EVOLUTION
In simulation results AOMDV and POR
routing protocols are discussed. And packet loss is
very high in AOMDV and POR is better than that of
AOMDV also throughput is calculated.
Figure: 4. (a) AOMDV- throughput (b) POR-
throughput
In this figure individual through put values
are calculated and AOMDV protocol as increasing
the throughput values at that time packet loss is
increased. And next POR protocol as increasing the
throughput values and packet loss is decreased. In
POR End-to End data delivery is better than the
AOMDV.
Figure: 5. Performance comparison of AOMDV and
POR
In this figure performance comparison of AOMDV
and POR protocols is calculated and it is time
consuming and energy consuming .and POR packet
loss is reduced and duplicate relaying packets also
reduced.
VI. CONCLUSION
The main contribution of this paper is
performance comparison of reactive protocols (e.g.,
AOMDV, POR). The simulation scenario consisting
of minimum 2 and maximum of 100 nodes is created
by writing the TCL script in NS-2 (version 2.34) and
analyzing the parameters Packet delivery ratio, End-
M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41
41 | P a g e
to-End data delivery and throughput with the help of
generated X Graph. When compare to the AOMDV
throughput POR is better. Reduce the latency and
duplicate relaying packets also reduced then enhance
the robustness of efficient data delivery. In this use
only one channel in AOMDV and POR. In future
work, we can use number of channels. One channel
will communicate with one node number of channels
increase then packet delivery time is decreased. That
means ,in existing one 50 nodes per second data
packets will send where as in future work enhance
the number of channels 100 nodes per second in
simulation results.
REFERENCES
[1] Vicomsoft, “Knowledge share whitepapers
wireless networking Q&A”, Vicomsoft
connect and protect, Jan 2003.
[2] Charles E. Perkins, Elizabeth M. Royer,
Samir R. Das and Mahesh K. Marina:
“Performance Comparison of Two On-
Demand Routing Protocols for Ad Hoc
Networks”, IEEE Personal
Communications, February 2001.
[3] Darlan Vivian, Eduardo Adilio Pelinson
Alchieri, Carlos Becker Westphall:
“Evaluation of QoS Metrics in Adhoc
Networks with the use of Secure Routing
Protocols”, Network and Management
Laboratory, Department of Computer
Sciences, Federal University of Santa
Catarina.
[4] Charles E.Perkins and Elizabeth M. Royer,
“Ad hoc on demand distance vector
(AODV) routing (Internet-Draft)”, Aug-
1998.
[5] Kevin Fall, K. Varadhan, "The ns Manual",
University of Southern California,
Information Sciences Institute (ISI),
http://www.isi.edu/nsnam/ns/ns-
documentation.html.
[6] The Network Simulator ns-allinone-2.34,
http://www.isi.edu/nsnam/ns/
[7] Elizabeth M. Royer, University of
California, Santa Barbara, “A Review of
Current Routing Protocols for Ad Hoc
Mobile Wireless Networks”, IEEE
Personal Communications, April 1999.
[8] N.Jaisankar, R.Saravanan, “An Extended
AODV Protocol for Multipath Routing in
MANETs”, August 2010, IACSIT
International Journal of Engineering and
Technology, Vol.2, No.4.
[9] Nadia Qasim, Fatin Said, Hamid Aghvami,
“Mobile Ad Hoc Networks Simulations
Using Routing Protocols for Performance
Comparisons”, WCE,Proceedings of the
World Congress on Engineering 2008 Vol I,
London, U.K. July 2 - 4, 2008.
[10] Christopher L. Barrett, Martin Drozda
Achla Marathe, Madhav V.
Marathe,”Characterizing the Interaction
Between Routing and MAC Protocols in
Ad-hoc Networks”, 3rd ACM International
Symposium on Mobile Ad Hoc Networking
and Computing (MOBIHOC), Lausanne,
Switzerland, June 2002.
[11] Md.Anisur Rahman, Md. Shohidul Islam,
Alex Talevski, “Performance Measurement
of various routing protocols in Adhoc
network”, IMECS March 18-20, 2009,
Hong Kong, Vol I, 2009.
[12] NS2 Tutorial, “NS-2” homepage
www.isi.edu/nsnam/ns/.
[13] Mahesh K Marina, Samir R Das, “On
demand distance vector routing in Adhoc
networks”, 2001, IEEE, 1092- 1658/01.
[14] Idris Skloul Ibrahim, Peter J.B King,
“Robert Pooley: Performance Evaluation of
Routing Protocols for MANET”, Fourth
International Conference on Systems and
Networks Communications, 2009.
[15] B. Karp and H.T. Kung, “GPSR: Greedy
Perimeter Stateless Routing for Wireless
Networks,” Proc. ACM MobiCom, pp. 243-
254, 2000.

Más contenido relacionado

La actualidad más candente

Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...ijwmn
 
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2IJERA Editor
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...ijasuc
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

La actualidad más candente (16)

Be31390392
Be31390392Be31390392
Be31390392
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STR...
 
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
F41023946
F41023946F41023946
F41023946
 
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
IMPROVING RELIABLE DATA TRANSFER IN MOBILE ADHOC NETWORKS USING THE PRINCIPLE...
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Destacado (20)

Br34422427
Br34422427Br34422427
Br34422427
 
Cd34484486
Cd34484486Cd34484486
Cd34484486
 
V34132136
V34132136V34132136
V34132136
 
Aj34219223
Aj34219223Aj34219223
Aj34219223
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
K346670
K346670K346670
K346670
 
C341518
C341518C341518
C341518
 
Bs34428432
Bs34428432Bs34428432
Bs34428432
 
An34236241
An34236241An34236241
An34236241
 
Al34228231
Al34228231Al34228231
Al34228231
 
Bz34466470
Bz34466470Bz34466470
Bz34466470
 
Fy3111571162
Fy3111571162Fy3111571162
Fy3111571162
 
Fm3110901095
Fm3110901095Fm3110901095
Fm3110901095
 
Fs3111311134
Fs3111311134Fs3111311134
Fs3111311134
 
Go3112581266
Go3112581266Go3112581266
Go3112581266
 
Fx3111501156
Fx3111501156Fx3111501156
Fx3111501156
 
Ff3110511053
Ff3110511053Ff3110511053
Ff3110511053
 
Gp3112671275
Gp3112671275Gp3112671275
Gp3112671275
 
Fe3110411050
Fe3110411050Fe3110411050
Fe3110411050
 
Planificacion 1
Planificacion 1Planificacion 1
Planificacion 1
 

Similar a G343741

The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR IJECEIAES
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)IJMER
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 

Similar a G343741 (20)

Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 
J0935461
J0935461J0935461
J0935461
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR Analysis of Blackhole Attack in AODV and DSR
Analysis of Blackhole Attack in AODV and DSR
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
new-Modified
new-Modifiednew-Modified
new-Modified
 
Cm34531538
Cm34531538Cm34531538
Cm34531538
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
B03406010
B03406010B03406010
B03406010
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

G343741

  • 1. M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41 37 | P a g e Performance comparison of AOMDV and POR Routing Protocols in MANETS M.Chandrika M.tech student1 , N.Papanna Assistant professor2 1,2 Sree Vidyanikethan Engg.College, Tirupati.AP,India. Abstract Mobile ad hoc network (MANET) [1] is Mobile nodes that are communicated with each and every other hop using multi-hop wireless nodes. Each node acts as a router in network and no fixed infrastructure for mobile nodes and there is no base station of it, forwarding data packets for other nodes [2]. Without network infrastructure is known as ad hoc network is formed by mobile stations inside a restricted area which communicates without the need of access point [3]. An ad hoc network can be formed by mobile computers with wireless interfaces that are communicate among themselves without any help of infrastructure. In an ad hoc network the mobile nodes are access to serve both routers and hosts. Performance comparison of AOMDV and POR with ns-2 (version 2.34) simulations shows that throughput as POR packet delivery is better than that of AOMDV. Keywords: MANETS, AOMDV, POR, Data delivery, routing protocol. I. Introduction Mobile ad hoc networks (MANET) as a self-configuration and less infra structure data transmission. Due to the broadcasting nature of wireless channel and dynamic network topology, reliable data delivery in MANETs. In this main issue is high mobility [1]. Most existing protocols as topology based routing protocols used in MANETS. There are quite easily influences to node mobility, especially in large scale networks. Main reason is due to the procedure of a node –node before data transmission is predefined. Network topology is changed very fast and it is difficult to maintain a route. The route recovery and route discovery procedures are time consuming, when path link is breaks that time data packet loss is occurred and then the packet is reroute and transmission rate is interrupted. Routing protocols are DSDV, DSR, AODV and AOMDV. Here node mobility is not easy to influence. Next will introduce the Geographic routing (GR) protocol, this is uses the location based data packets will be transmitted in hop-by-hop routing. And source is alert of its own location. In GR, to select the next hop forwarder use the greedy forwarding with the large positive information to the destination and GR is very high efficiency and scalability. If the node moves out of sender coverage area transmission will be fail i.e., packet loss occur. Then GPSR (Greedy Perimeter state less routing) is introduced and due to the broadcasting nature of wireless medium single data packet transmission will leads to the multiple reception and enhance the robustness of backup condition. It does not deliver the data packets to sensitive applications. In AOMDV, nodes are selected to the destination as forwarding candidates and all neighboring nodes request to the next neighboring nodes. Then the path is multiple route requests to the neighbor nodes and route reply to the destination. When the path link is breaks then entire packet is loss and also throughput is decreased at the same time time-consuming and energy-consuming. Next will introduce the POR (position based opportunistic routing) protocol, it may achieve the multiple receptions without losing information and collision avoidance. Reduce the latency and duplicate relaying packets. II. ROUTING PROTOCOLS 2.1. Overview Mobile Ad-hoc Network (MANET) is a less infrastructure for mobile nodes that means infrastructure is absent. Nodes are utilized in the network of same random access wireless channel; cooperate in a friendly manner to attractive their multi hop forwarding. The nodes in the network as not only acts as hosts but also as routers and that route data to from other nodes in network [2]. The main features of MANET are listed some as below [4]: a. MANET can be formed without any pre- existing infrastructure. b. MANETS can follow the dynamic topology and where nodes may join and leave the network at any time and the multi-hop routing. It may keep changing as nodes join and leave from the network. It does have very limited physical security, and increasing security. c. Every node in the MANET can assist in the routing of packets in network. d. Limited Bandwidth & Power is limited Routing protocols can be fallowed into different categories:
  • 2. M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41 38 | P a g e (1) Uni-cast routing protocols a. Topology-based routing protocols • Proactive routing protocols • Reactive routing protocols • Hybrid routing protocols b. Geographical-based routing protocols (2) Multicast routing protocols (3) Broadcast algorithms In this may have to discuss about reactive routing protocols (e.g., AOMDV, POR) and simulating the results for that protocols. 2.1.1. Ah Hoc On Demand Multicast routing protocol [AOMDV]. [13] Here Ad-hoc On-demand Multipath Distance Vector Routing (AOMDV) protocol is an enhancement part of the AODV protocol for computing multiple loop-free and link disjoint paths [5]. Multipath routing is provides the multiple alternative paths between each and every source and destination nodes in a network. The benefit of such multipath is a fault tolerance, bandwidth increasing, and security improvement. Overlapping, looping (infinity loop) and optimum disjointed paths and the main issue in such algorithms [14]. Destination contains a number of next-hops nodes along with the neighbor hop counts in route entries and same sequence number is accessed to the all neighbor nodes. For destination node, a node maintains the hop count information, which is defined as the maximum hop count is all the paths and uses the sending route request of the destination. Each duplicate route node request is received by the neighbor node and it can be defined as an alternate path to the destination. Loop free node is assured by the acceptance of alternate paths to destination and if it has a less hop count than the advertised hop count for that destination. Because the maximum hop count is used, the advertised hop count therefore does not change for the same sequence number [5]. When a route advertisement is received for a destination with a greater sequence number, the next hop list and advertises the hop count is reinitialized. Multi-path AODV can be used to find the node-disjoint or link disjoint routes. To find node- disjoint routes, each node does not reject the duplicate RREQs immediately. Source node is RREQ to the all neighboring nodes and selects the node-disjoint path, because duplicate RREQs packets are not broadcasted to the neighbors. Any two RREQs are arriving at intermediate nodes via different neighbors of the source could not have transmitted at the same node [5]. Several changes are required in the basic AODV route discovery mechanism to enable computation of multiple link disjoint routes between source destination pairs. Note that any intermediate node I on the route between a source S and a destination D can also form such multiple routes to D, thus making available a large number of routes between S and D. In the route discovery procedure a reverse path is set up backwards to the source via the same path the route request (RREQ) has traversed. If duplicates of the RREQ coming via different paths are ignored as before, only one reverse path can be formed. To form multiple routes, all duplicates of the RREQ arriving at a node are examined as each duplicate defines an alternate route. See Figure 2 each of these alternate routes may not be disjoint [12]. Figure: 1 (a) Second copy of RREQ is transmitted over the dotted link. (b) The second copy of RREQ via B is suppressed at intermediate node I. In the hope of getting link disjoint paths (which would be more numerous than node disjoint paths) the destination node adopts a “looser” reply policy. It replies up to k copies of RREQ arriving via unique neighbors, disregarding the first hops of these RREQs. 2.1.2. Position Based Opportunistic Routing [POR] Protocol The POR is designed at based on geographic routing and opportunistic forwarding. The nodes are assumed to be aware of their own location and the positions of their neighbors. Neighborhood location information can be exchanged using one-hop beacon or piggyback in the data packet’s header. The location information of nodes can be obtained with GPS [15] and it likes equipment and neighbor’s coordinates are updated periodically through one hop beacons. When the source node S wants to sends packets to the destination node D. It calculates the forwarder list according to the distance between its neighbors and the destination and inserts the list into the packet header the neighbor. After that packet is send out, tacking the best forwarder list can be set with respect to the respected nodes. All nodes within the sender’s coverage area nodes may receive the packets and check its position in the forwarder list, there are n nodes ahead of it, and it
  • 3. M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41 39 | P a g e will wait for n time’s slots before forwarding those packets if the same packet was being sent by the other node before the dedicated time slots. It will discard the packets and sub sequent nodes will do the same operation, until the packet reaches the destination. Figure2. (A) the operation of POR in normal situation. (B) The operation of POR when the next hop fails to receive the packet situation. In this the above figure nodes sends the source to destination. A source node located in the forwarding area satisfies the two conditions: i.e., 1) it makes positive progress toward the destination; and 2) its distance to the next op node should not exceed half of the transmission range in wireless mode (i.e., R=2), so that ideally all the forwarding candidates can hear from one another. First sender sends the data transmits the forwarding area and chooses the candidate selection process and the condition is satisfied then forwards the next forwarding area to the destination. Collect the information to the forwarder does not forwards the packets to the destination and same time sub-optimal candidates has to be send the packets to the destination in certain period of time. III. SIMULATION MODEL The performance of AOMDV is evaluated in terms of Scenario and Traffic patterns using NS 2 [6] and Bonn Motion [5]. Figure3. Overview of the simulation model The following Figure 3. Illustrates the simulation model [7] and the simulation parameters are described in Table 1. In our study and evaluation for the two protocols AOMDV and POR we have used the radio Propagation model which is the ns - 2 [12] (Version 2.34) default model. The result of simulation is generated as trace files and the awk & Perl scripts are used for report generation. In this model mobility generator is moves to the nodes files and some of that traffic generator and collects the information to the network simulator and trace the file. Trace file is generated at flow of data and speed of that particular node. Then calculate the performance evaluation of both routing protocols. Table: 1 Simulation parameters IV. PERFORMANCE METRICS Performance Metrics [8, 9] are quantitative measures that can be used to evaluate any MANET routing protocol. We considered the following four metrics. To evaluate the multi path on-demand routing protocols AOMDV and POR. The fallowing metrics are used in performance comparison. 4.1. Packet delivery ratio The ratio of the number of packets is received and the number of packets expected to receive. Thus, for multicast packets delivery, the ratio is equal to the total number of received packets over the number of originated packets times the group size. It is calculated as follows: Packet Delivery ratio = (Number of Packets Received/Number of Packets Sent) x 100. 4.2. Average Throughput It is a data transmission is determined by the amount of data moved from one node to another in a certain period of time. And Average Throughput [10] is the number of bytes received successfully and is calculated by Average Throughput= (Number of bytes received x8)/ (Simulation time x 1000) kbps 4.3. Average End-to-End Delay (Average e2e delay) Average End-to-End [11] delay is the average times of the data packet are transmitted successfully across a MANET from source to destination. It includes all possible delays in networking area, such as buffer is during the route discovery latency, queuing at the interface queue, retransmission delay at the MAC (Medium Access Control), the propagation and the transfer time. The average e2e delay is computed by, Parameter Value Mac protocol Propagation model Transmission Range Mobility model Traffic type Packet size Number of nodes Simulation time IEEE 802.11 Two-way ground 250m Random way point(RWP) Constant bit rate (CBR) 256 bytes 80 900sec
  • 4. M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41 40 | P a g e where D is the average end-to-end delay, n is the number of data packets successfully transmitted over the MANET, ' i ' is the unique packet identifier, Ri is the time at which a packet with unique identifier ' i ' is received and Si is the time at which a packet with unique identifier ' i ' is sent. The Average End-to- End Delay should be less for high performance. 4.4. Packet Loss Packet Loss is the difference between the number of data packets are send and the number of data Packets received in that location. It follows that: Packet Loss= Number of data packets sent− Number of data packets received. V. V.PERFORMANCE EVOLUTION In simulation results AOMDV and POR routing protocols are discussed. And packet loss is very high in AOMDV and POR is better than that of AOMDV also throughput is calculated. Figure: 4. (a) AOMDV- throughput (b) POR- throughput In this figure individual through put values are calculated and AOMDV protocol as increasing the throughput values at that time packet loss is increased. And next POR protocol as increasing the throughput values and packet loss is decreased. In POR End-to End data delivery is better than the AOMDV. Figure: 5. Performance comparison of AOMDV and POR In this figure performance comparison of AOMDV and POR protocols is calculated and it is time consuming and energy consuming .and POR packet loss is reduced and duplicate relaying packets also reduced. VI. CONCLUSION The main contribution of this paper is performance comparison of reactive protocols (e.g., AOMDV, POR). The simulation scenario consisting of minimum 2 and maximum of 100 nodes is created by writing the TCL script in NS-2 (version 2.34) and analyzing the parameters Packet delivery ratio, End-
  • 5. M.Chandrika, N.Papanna / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp. 37-41 41 | P a g e to-End data delivery and throughput with the help of generated X Graph. When compare to the AOMDV throughput POR is better. Reduce the latency and duplicate relaying packets also reduced then enhance the robustness of efficient data delivery. In this use only one channel in AOMDV and POR. In future work, we can use number of channels. One channel will communicate with one node number of channels increase then packet delivery time is decreased. That means ,in existing one 50 nodes per second data packets will send where as in future work enhance the number of channels 100 nodes per second in simulation results. REFERENCES [1] Vicomsoft, “Knowledge share whitepapers wireless networking Q&A”, Vicomsoft connect and protect, Jan 2003. [2] Charles E. Perkins, Elizabeth M. Royer, Samir R. Das and Mahesh K. Marina: “Performance Comparison of Two On- Demand Routing Protocols for Ad Hoc Networks”, IEEE Personal Communications, February 2001. [3] Darlan Vivian, Eduardo Adilio Pelinson Alchieri, Carlos Becker Westphall: “Evaluation of QoS Metrics in Adhoc Networks with the use of Secure Routing Protocols”, Network and Management Laboratory, Department of Computer Sciences, Federal University of Santa Catarina. [4] Charles E.Perkins and Elizabeth M. Royer, “Ad hoc on demand distance vector (AODV) routing (Internet-Draft)”, Aug- 1998. [5] Kevin Fall, K. Varadhan, "The ns Manual", University of Southern California, Information Sciences Institute (ISI), http://www.isi.edu/nsnam/ns/ns- documentation.html. [6] The Network Simulator ns-allinone-2.34, http://www.isi.edu/nsnam/ns/ [7] Elizabeth M. Royer, University of California, Santa Barbara, “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communications, April 1999. [8] N.Jaisankar, R.Saravanan, “An Extended AODV Protocol for Multipath Routing in MANETs”, August 2010, IACSIT International Journal of Engineering and Technology, Vol.2, No.4. [9] Nadia Qasim, Fatin Said, Hamid Aghvami, “Mobile Ad Hoc Networks Simulations Using Routing Protocols for Performance Comparisons”, WCE,Proceedings of the World Congress on Engineering 2008 Vol I, London, U.K. July 2 - 4, 2008. [10] Christopher L. Barrett, Martin Drozda Achla Marathe, Madhav V. Marathe,”Characterizing the Interaction Between Routing and MAC Protocols in Ad-hoc Networks”, 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), Lausanne, Switzerland, June 2002. [11] Md.Anisur Rahman, Md. Shohidul Islam, Alex Talevski, “Performance Measurement of various routing protocols in Adhoc network”, IMECS March 18-20, 2009, Hong Kong, Vol I, 2009. [12] NS2 Tutorial, “NS-2” homepage www.isi.edu/nsnam/ns/. [13] Mahesh K Marina, Samir R Das, “On demand distance vector routing in Adhoc networks”, 2001, IEEE, 1092- 1658/01. [14] Idris Skloul Ibrahim, Peter J.B King, “Robert Pooley: Performance Evaluation of Routing Protocols for MANET”, Fourth International Conference on Systems and Networks Communications, 2009. [15] B. Karp and H.T. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” Proc. ACM MobiCom, pp. 243- 254, 2000.