Performance Analysis For Routing Protocols in
Performance Analysis For Routing Protocols in
Abstract—A Mobile Ad-Hoc Network [MANETs] is a collection from one rescue team member to another over a small hand
of wireless mobile nodes forming a temporary network without held [2]. Other commercial scenarios include e.g. ship-to-
using any centralized access point, infrastructure, or ship ad hoc mobile communication, law enforcement, etc.
centralized administration. In a MANET network topology can 3.Local Level: Ad hoc networks can autonomously link an
dynamically change in an erratic manner since nodes are free
to move. In this paper, we analyse Ad-hoc On-Demand
instant and temporary multimedia network using notebook
Distance Vector (AODV) and Dynamic Source Routing (DSR) computers or palmtop computers to spread and share
Reactive Routing Protocols in mobile ad hoc networks to information among participants at e.g. conference or
determine the best equipped circumstances for each protocol. classroom [2]. Another appropriate local level application
The simulation results of two routing protocols are analyzed might be in home networks
by using Network Simulator(ns-2) by considering the
performance metrics such as End-to End delay, Packet III. CLASSIFICATION OF ROUTING PROTOCOLS
delivery ratio,Throughput. Routing is the process of information exchange from one
host to other host in the network.Routing is the mechanism
Keywords—MANETS, AODV, DSR, NS-2
of forwading packets to the destination using efficient path
is measure by various metrices like no.of
I.INTRODUCTION:
hops,traffic,security,...etc[3].In ADHOC network each host
A Mobile adhoc network (MANET)[1],sometimes called a
node acts as a specialized route itself. It is act of moving
mobile mesh network,is a self-configuring network of
information from source to destination in and inter network.
mobile devices connected by wireless links.In otherwords,a
Atleast one intermediate node within the inter network is
MANET is a collection of communication nodes that wish
encountered during the transfer of information.
to communicate with each other.Adhoc networks require no
1.PROACTIVE ROUTING PROTOCOLS:
centralized Administration or fixed network infrastructure
Proactive protocols perform routing operations between all
such as base stations or access points and can be quickly and
source destination pairs periodically, irrespective of the need
inexpensively setup as needed. A MANET is an autonomous
of such routes. These protocols attempt to maintain shortest
group of mobile users that communicate over reasonably
path routes by using periodically updated views of the
slow wireless links.The network topology vary rapidly and
network topology[4]. These are typically maintained in
unpredictably over time because the nodes are mobile
routing tables in each node and updated with the acquisition
.Manet is kind of wireless adhoc network and it is a self-
of new information. Proactive protocols have the advantage
configuring network of mobile routers connected by
of providing lower latency in data delivery and the
wireless links the union of which forms an arbitrary
possibility of supporting applications that have quality-of-
topology .The earlier manets are called “Packet radio
service constraints. Their main disadvantage is due to the
networks” and were sponsored by DARPA in the earlier
wastage of bandwidth in sending update packets periodically
1970’s.
even when they are not necessary, such as when there are no
link breakages or when only a few routes are needed
II. MANETS APPLICATIONS:
Examples of Proactive MANET Protocols include:
1.Military Battlefield: Military equipment now routinely
Optimized Link State Routing (OLSR), Fish-eye State
contains some sort of computer equipment[2]. Ad- hoc
Routing (FSR), Destination-Sequenced Distance Vector
networking would allow the military to take advantage of
(DSDV) etc.
common place network technology to maintain an
2.REACTIVE ROUTING PROTOCOLS:
information network between the soldiers, vehicles, and
Reactive protocols are designed to minimize routing
military information headquarters. The basic techniques of
overhead. Instead of tracking the changes in the network
ad hoc network came from this field.
topology to continuously maintain shortest path routes to all
2.Commercial Sector: Ad hoc can be used in
destinations, these protocols determine routes only when
emergency/rescue operations for disaster relief efforts, e.g.
necessary[4]. Typically, these protocols perform a route
in fire, flood, or earthquake. Emergency rescue operations
discovery operation between the source and the desired
must take place where non-existing or damaged
destination when the source needs to send a data packet and
communications infrastructure and rapid deployment of a
the route to the destination is not known. As long as a route
communication network is needed. Information is relayed
is live, reactive routing protocols only perform route
www.ijcsit.com 724
B.Nageswara Rao et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 724-727
maintenance operations and resort to a new route discovery V.DYNAMIC SOURCE ROUTING PROTOCOL:
only when the existing one breaks. Dynamic source routing protocol (DSR) [6] is simple and
robust routing protocol designed specially for use in multi
hop wireless adhoc networks.Dynamic source routing(DSR)
is based on source routing,which means that the source
must specify the path of orderd nodes through which the
packet must pass on its way to reach the destination.DSR
protocol consists of two basic mechanisms:Route Discovery
and Route Maintainance.
1)ROUTE DISCOVERY:
Route discovery is used only when the source attempts to
send a packet to the destination node and when it does not
the route to destination node.To initiate Route Discovery the
source transmitts route request with unique ID as a single
local broadcast packet.When some intermediate node
Figure1:classification of Routing Protocols in MANETS receives the route request, it first checks whether it had seen
route request earlier or not.If the node had already seen the
IV. AODV ROUTING PROTOCOL: request it will discard the packet.Otherwise it will check the
The main aim of AODV routing algorithm is to provide route cache whether there is a route to the packet.If it has a
reliable and secure data transmission over the MANETS. route to target node in the cache it will return Route Reply
The AODV[5] Routing Protocol uses an on demand to originator of the packet.
approach for finding routes ,that is a route is established 2)ROUTE MAINTAINANCE:
only when it is required by a source node for transmitting DSR implements route maintainance when the packets are
data packets.It employs destination sequence numbers to communicating from source to destination.But when a
identify the most recent path the major difference AODV communication link between the source and destination is
and DSR trunk out from the fact that DSR uses source broken or change in the topology leads to failure of
routing in which a data packet carries the complete path to communication between the source and destination.In sach
be traversed. In AODV the source node and the intermediate scenario DSR protocol uses route mechanism to detect any
nodes store the next-hop information analogous to each other possible route to transmitt the data to the desired
flow for data packet transmission. In reactive routing target.If the route maintainance mechanism fails to find the
protocol ,the source node floods the Route Request(RREQ) alternative route to establish communication,then it will
packet in the network when a route is not available for the invoke route discovery to find new route to the destination.
preferred destination. AODV and other on-demand routing
protocols is that it uses a destination sequence number to Protocol property DSR AODV
determine an up-to-date path to the destination. Loop free Yes Yes
Multicast routes Yes No
A Route Request carries the source identifier,destination
Distributed Yes Yes
identifier, source sequence number, destination sequence
Unidirectional link support Yes No
number, broadcast identifier, and time to live Multicast No Yes
field.Destination sequence number indicates indicates the Periodic broadcast No Yes
freshness of the route that is accepted by the source.when an QoS support No No
intermediate node receives a RouteRequest,it forwards a Routes maintained in Route Cache Route Table
route reply if it has a valid route to the destination.The Route cache/table timer No Yes
validity of a route at the intermediate node is detemined by Reactive Yes Yes
comparing the sequence number at the intermediate node is
determined by comparing the sequence number at the VI. PERFORMANCE METRICS
intermediate node with the destination sequence number in Packet delivery ratio:
the Route Request packet. The ratio of the data packets delivered to the destinations to
those generated by the continuous bit rate sources.packets
delivered and packets lost are taking in to consideration.
PDR= No.Of received packets/No. Average Of sent packets
End-to-end delay:
The time taken by the packet to reach the destination is
called end to end delay so it is the time taken to travel
between two ends i.e. source and destination.
AED= ∑ (Received time – sent time)/Total data packets received
Throughput:
One of the representation of throughput is the amount of
data transferred over the period of time expressed in kilobits
per second(kbps).
Figure2:AODV Path Discovery Process Throughput = Total Received Bytes / Elapsed Time
www.ijcsit.com 725
B.Nageswara Rao et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 724-727
CONCLUSION
The above outcomes are viewed by considering 50,100,125 We have compared two reactive routing protocols AODV
and 150 nodes and their related Xgraphs are generated and DSR.Using NS-2 simulator, the simulation of these
below. protocols has been carried out.
www.ijcsit.com 726
B.Nageswara Rao et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 724-727
www.ijcsit.com 727