Performance analysis of routing protocols of mobile ad hoc networks for VoIP applications
|
|
|
- Nicholas McLaughlin
- 10 years ago
- Views:
Transcription
1 Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), June Edition, 2012 Performance analysis of routing protocols of mobile ad hoc networks for VoIP applications Mohammed Shaffatul Islam, Adnan Riaz and Mohammed Tarique, Members, IEEE Abstract Mobile Ad hoc Networks (MANETs) have been an active field of research for the last few years. Many ground breaking applications have been suggested for MANETs including the Voice over Internet Protocol (VoIP). In order to support VoIP application over MANETs a suitable routing protocol is essential. Several routing protocols have been proposed for MANETs. In this paper, the performances of different routing protocols have been investigated and compared for VoIP application. Some popular routing protocols namely Dynamic Source Routing (DSR), Ad hoc On-demand Distance Vector (AODV), Temporally-Ordered Routing Algorithm (TORA), Optimized Link State Routing Protocol (OLSR), and Geographic Routing Protocol (GRP) have been considered in this investigation. The OPNET simulation results show that the TORA protocol is a good candidate for VoIP application. Index Terms Ad hoc networks, routing, DSR, AODV, TORA,OSLR, GRP, VoIP M I. INTRODUCTION ODERN wireless communication systems are rapidly evolving day by day. The main objective of this evolution is to provide a user with communication services at anytime and from anywhere of the World. Technological advancements and the popularity of the portable computing devices have made this objective an attainable one. Now-adays, a user can move around while maintaining connectivity with the rest of the World. This type of communication system, categorically known as mobile computing, has grown extensively in the last two decades [1-2]. Existing mobile computing networks can be classified into two broad categories namely (a) infrastructure based networks, and (b) Mobile Ad hoc Networks (MANETs). Infrastructure based networks are administered and maintained centrally. On the other hand MANETs are decentralized and autonomous networks consisting of liberated mobile nodes [2][3][4]. These mobile nodes can be mobile phones, laptops, personal digital assistants (PDAs), MP3 players, and personal computers. Mohammad Shaffatul Islam is with Electrical and Electronic Engineering (EEE) department, Khulna University of Science and Technology (KUET). Khulna, Bangladesh ( mashru.islam@ gmail.com). Adnan Riaz is with the Technical University of Munich, Munich, Germany ( [email protected]). Mohammed Tarique (correspondence author) is with the College of Engineering, Ajman University of Science and Technology, United Arab Emirates ( [email protected]). 26 These nodes can randomly communicate with each other and hence they can form arbitrary topologies. They not only act as a source or a destination but also forward packets for neighboring mobile nodes. The self-organizing capability of the MANET makes it suitable for certain circumstances when we need to set-up a network on an emergency basis [4]. Some of the applications of MANETs include setting up a network in natural disaster areas, in pre-planned surveillance systems, and in the battle fields [1-5]. One of the limitations of MANETs is its inherent dynamic topology because the hosts (i.e., the source and the destination) and the routers can move around. Another limitation of MANETs is the scarce bandwidth. MANETs need to support a number of simultaneous connections by using a very limited bandwidth. Several other limitations of MANETs can be found in [21]. In order to cope with these limitations an efficient routing protocol is essential for MANETs. Many routing protocols have been proposed for MANETs. In this work we have investigated, analyzed and compared the performances of these routing protocols for VoIP application via OPNET simulator. The main motivation of this paper is to suggest a suitable routing protocol for MANETs so that the performances of the same can be optimized for VoIP applications. Since there have been numerous routing protocols for MANETs we keep this work within a reasonable size by limiting ourselves only to some popular and widely investigated routing protocols namely (1) Dynamic Source Routing (DSR) [12], (2) Ad-hoc On-demand Distance Vector (AODV) [13], (3) Temporally-Ordered Routing Algorithm (TORA) [14], (4) Optimized Link State Routing Protocol (OLSR) [15], and (5) Geographic Routing Protocol (GRP)[15]. It has been shown in the literatures that the performance of a routing protocol varies with the network size. So, we have considered two cases namely (a) a small scale network, and (b) a large scale network. Some of the important performance metrics of VoIP application such as throughput, delay, Jitter, and Mean Opinion Score (MOS) have been investigated and compared. The rest of the paper is organized as follows: section II presents some of the related works found in the literatures. Section III contains brief descriptions of the investigated routing protocols. The Quality of Service (QoS) issues of VoIP application have been discussed in section IV. Section V explains the effects of codecs on voice transmission. Simulation models and results are presented in Section VI. The paper is concluded with section VII.
2 II. RELATED WORKS The performances of different codecs have been investigated and compared in [11]. It is shown in [11] that G.711 and GSM-EFR codecs are considered more effective (compared to other codecs) for both small scale and large scale networks respectively. We also considered these two voice codecs in this paper. The voice codec G.711 is a popular waveform codec based on pulse code modulation. This is an uncompressed high quality codec that requires a bandwidth of 64Kbit/s. On the other hand voice codec GSM- EFR is an Enhanced Full Rate (EFR) codec that is an improved version of GSM-FR. This code is based on Algebraic Code Excited Linear Prediction (ACELP) algorithm. It has a bit rate of 12.2Kbps [11]. At best of our knowledge no previous work has investigated the performance of VoIP application in MANET scenario by using different codecs. But the work presented in [8] is somehow related to our work. In [8] a single hop IEEE based ad hoc networks have been investigated. Network load in terms of simultaneous voice streams was varied in [8]. Two performance metrics namely delay and Jitter have been investigated. Packet polarization has been evaluated in a small scale network consisting of 40 nodes. Node mobility has been evaluated in the scenario of 40 nodes allowing direct communication between two nodes. On the other hand, node mobility case has been investigated with a node degree of approximately 11 neighbors per node and an average route length of 2.2 hops. Neither the scalability nor the Quality of Service (QoS) of voice codec performance analysis has been investigated in this work. In another study [10] the performances of MANETs for VoIP application over OSLR, have been evaluated. This work justified the suitability of OLSR as a routing protocol for MANETs running VoIP application. The major limitation of this study is that other established routing protocols have not been considered. Moreover, the performance has been analyzed based on the packet loss only. Other important performance parameters such as delay and scalability are not accounted in this work. In [6] different routing protocols have been analyzed for transmitting voice over hybrid MANET. The hybrid MANET is a special type of network that interconnects a MANET with a fixed infrastructure based IP network. Other research works have been conducted to investigate the performances of the voice transmission using VoIP applications in the MANET scenario. But none of works has made any concrete conclusion about choosing an optimum routing protocol for voice transmission. In this paper, we have investigated some of the routing protocols namely AODV, DSR, OLSR, TORA and GRP. The performances of these routing protocols have been investigated for VoIP applications in term QoS parameters namely throughput, delay, Jitter, and Mean Opinion Score (MOS). These performance parameters have also been compared with the values recommended by International Telecommunication Union (ITU). III. ROUTING PROTOCOLS FOR MANETS Designing an efficient routing protocol for MANETs is an exigent problem. Two main functions of a routing protocol are 27 (i) to discover a path between a source and a destination, and (ii) to maintain these discovered paths. These two functions should be implemented by using minimum overhead or control messages. Dynamic topology is a major obstacle that a routing protocol has to deal with. An efficient routing protocol should also have some other desired characteristics namely distributed operation, loop-free path discovery, and demand based operation. It should also support unidirectional link, maintain a set of routes and have a "Sleep" period operation [2][7][8]. Researchers have proposed several routing protocols for MANETs. These MANET routing protocols can be classified as proactive (table-driven) and reactive (on-demand) [3]. Proactive routing protocols refer to the routing protocols in which the routing information is periodically exchanged among mobile nodes. Each node is allowed to build a global knowledge of the network independently. The most typical representative of a proactive routing protocol is Dynamic Destination Sequenced Distance Vector (DSDV) [20]. On the other hand the reactive routing protocols work on-demand. It works on-demand in a sense that a mobile node discovers a route when it has some packets to send to another mobile node. The most typical representative of the reactive routing protocol is Dynamic Source Routing (DSR) protocol [12] and Ad hoc On Demand Distance Vector (AODV) routing protocol [3]. These protocols use blind flooding mechanisms during the route discovery process. According to this mechanism each mobile node is obliged to re-broadcast a route request that it receives from its neighboring mobile nodes. Hence, blind flooding wastes valuable resources like network bandwidth. To overcome this shortcoming other types of protocol have been proposed in the literatures namely (a) mixed routing protocol: it is a combination of proactive routing protocol and reactive routing protocol, and (b) position-based routing protocol: it is based on the location information of the mobile nodes. Other numerous routing protocols have also been proposed in the literatures [1-2][19]. Since we limit this effort only to Dynamic Source Routing (DSR), Ad-hoc On-demand Distance Vector (AODV), Temporally Ordered Routing Algorithm (TORA) [14], Optimized Link State Routing (OLSR)[16] and Geographic Routing Protocol (GRP) [17], brief descriptions of these investigated routing protocols have been provided in the following subsections. A. Dynamic Source Routing (DSR) Protocol The Dynamic Source Routing (DSR) [3] protocol is a reactive routing protocol proposed for MANETs. When a node generates a packet to send to a certain destination and it does not have a known route to that destination, this node initiates a route discovery process. There are two main mechanisms in DSR protocol namely route discovery and route maintenance. During the route discovery procedure mobile nodes maintain ID lists of the recently seen requests to avoid processing the same route request again and again. The route maintenance procedure is used when routes become invalid due to unpredictable movement of the routers. Each router monitors the links that it uses to forward packets. Once a link is down, a route error packet is immediately sent to the initiator of the
3 associated route. Therefore, the invalid route is quickly discarded. The main advantage of the DSR protocol is that no periodic routing packets are required. It has some disadvantages too. Since DSR is a reactive protocol, it cannot detect whether a destination is unreachable or the route request is lost. Therefore, it incurs more overhead if the underlying MAC layer does not support a guaranteed delivery [11]. Moreover, the DSR protocol performs poorly in the networks with high mobility and heavy traffic loads because of large overhead packets. Scalability is said to be another disadvantage of the DSR protocol because it relies on blind broadcasts (i.e., blind flooding) to discover the routes [11]. B. Ad Hoc on Demand Distance Vector Routing (AODV) The Ad hoc On-demand Distance Vector (AODV) [13] routing protocol is also a reactive routing protocol proposed for MANETs. The mechanisms of the AODV protocol are similar to those of DSR protocol. The main differences between these two protocols are in maintaining and using the routing information. In AODV, the number of hops is recorded in the route record instead of a list of intermediate router addresses. Each intermediate router sets up a temporary reverse link in the process of a route discovery. This link points to the router that forwarded the request to this intermediate router. Hence, the reply message can find its way back to the initiator during the route discovery process. When the intermediate routers receive the reply, they can also set up the corresponding forward routing entries. To prevent old routing information being used as a reply to the latest request a destination sequence number (DSN) is used in the route discovery packet and the route reply packet. A higher sequence number implies a more recent route request. The AODV protocol uses the control messages namely Route Request (RREQ), Route Replies (RREP) and Route Error (RERR). The route maintenance of the AODV protocol is similar to that of the DSR protocol. One advantage of AODV is that it is a loop-free routing protocol due to the destination sequence numbers associated with the routes. Similar to DSR, poor scalability is the main disadvantage of the AODV protocol [3] [13]. C. Temporally-Ordered Routing Algorithm (TORA) The Temporally-Ordered Routing Algorithm (TORA)[14] is considered as an adaptive routing protocol for multi-hop networks. The TORA protocol is a distributed algorithm so that routers only need to maintain knowledge about their neighbors [3][14]. This protocol takes the advantages of a reactive routing protocol and a proactive routing protocol. Sources initiate route requests in a reactive mode. At the same time selected destinations may start proactive operations to build traditional routing tables. TORA supports multiple path routing. It has been investigated and proved that TORA minimizes the communication overhead associated with network topology changes [3]. The reason is that TORA maintains multiple paths and it does not need to discover a new route when the network topology changes or all routes in the local route cache fail. TORA assigns directions to all links according to the heights of their neighboring routers in terms of upstream or downstream. A link is considered as an upstream link for the lower neighboring router. At the same time, it is also a downstream link for the higher neighboring router. An upstream link of a router implies that data flows to a corresponding destination must go through this router via that link. A downstream link of a router means that the data flows can only leave this router to the neighboring router via this link. TORA is a complex routing algorithm compared to DSR protocol. It has four main operations namely (i) creating routes, (ii) maintaining routes, (iii) erasing routes, and (iv) optimizing the routes [14]. Four types of packets are used to perform these operations namely query (QRY), update (UPD), clear (CLR), and optimization (OPT) [14]. D. Optimized Link State Routing Protocol (OLSR) The Optimized Link State Routing (OLSR) protocol is a proactive link state routing protocol proposed for MANETs. One key idea is to reduce the control overhead by reducing the number of broadcasts as compared with pure blind flooding mechanisms. The basic concept of OLSR is the use of multipoint relays (MPRS) [15]. MPRS refer to the selected routers that can forward broadcast messages during the flooding process. To reduce the size of broadcast messages every router declares only a small subset of all of its neighbors. OLSR has three functions: packet forwarding, neighbor sensing, and topology discovery [15]. Packet forwarding and neighbor sensing mechanisms provide routers with information about the neighbors and offer an optimized way to flood messages in the OLSR network using MPRS. The neighbor sensing operation allows routers to diffuse local information in the whole network. Topology discovery is used to determine the topology of the entire network and to construct the routing tables. OLSR uses four message types: Hello message, Topology Control (TC) message, Multiple Interface Declaration (MID) message, and Host and Network Association (HNA) message [15] [16]. OLSR protocol is particularly suitable for large and dense networks. The larger and the more dense a network, the more optimization can be achieved as compared to the classic link state algorithm [15-16]. D. Geographic Routing Protocol (GRP) Geographic Routing Protocol (GRP) is a position-based protocol classified as Proactive Routing Protocol [18]. Each location of the node will be marked by Global Positioning System (GPS) and the flooding will be optimized by quadrants [17]. Flooding location is updated on the distance when a node moves and crosses a neighborhood. A Hello message will be exchanged among nodes to identify their neighbors and their positions. By using route locking a node can return its packet to the last node when it cannot keep on sending the packet to the next node. GRP divides an ad hoc network into many 28
4 quadrants to reduce route the flooding [17]. The entire World is divided into quadrants from Lat, Long (-90, -180) to Lat, Long (+90, +180). Every node knows the nitial position of every other accessible node once initial flooding is completed in the network. When the node moves a distance that is longer than the user has specified or when the node crosses a quadrant the routing flooding will take place [17]. IV. QUALITY OF SERVICE (QOS) FOR VOIP Traditionally circuit switching has been used for carrying voice traffic. But it requires a huge infrastructure. Hence, it is considered an expensive solution for VoIP application. Now-adays, a subscriber wants to communicate in myriad other ways such as , instant messaging and video in addition to voice traffic. Circuit switching is not considered a suitable technology for this type of multimedia communications [2]. VoIP technology is more suitable for multimedia communication. Some of the reasons are as follows (a) low equipment cost, (b) low operating expense, (c) integration of voice and data application, (d) potentially low bandwidth requirement, and (e) widespread availability of the Internet Protocol (IP). When addressing the Quality of Service (QoS) needs for VoIP the following performance parameters need to be considered (a) packet loss rate (for high quality VoIP services) should be less than 0.25 percent, (b) one-way latency should be no more than 150 ms as per the International Telecommunication Union (ITU) G.114 specifications, (c) Jitter should be less than 10 ms, and (d) kilobits per second (kbps) of guaranteed priority bandwidth is required per call. The voice quality can be interpreted as a way of evaluating speech clarity and the characteristic of the analog voice itself. However, it also depends on the underlying transport mechanism. Voice quality should be assessed from an end-toend perspective regardless of the systems, devices, and transmission methods used. In addition, voice-quality metric should also be expressed in the context of the users experience. In this work we measure the voice quality in terms of the metrics mentioned in ITU-T P.862 (Perceptual Evaluation of Subjective Quality Speech Quality Assessment) [6]. According to ITU-T P.862 Objective Mean Opinion Score (OMOS) should be used to measure the quality of speech. Because the subjective quality of speech evaluated by humans with Mean Opinion Score (MOS) or Degradation Mean Opinion Score (DMOS) scale. OMOS provides more detailed analysis compared to ordinary subjective MOS. The complete scales for speech quality assessment are listed in Table I. V. EFFECTS OF CODECS Non-linear perceptual codecs compress voice in such a way so that the perceptually important information is preserved. In other words, these codecs preserve how the voice sounds without preserving all of the frequency spectrum information. This non-linear compression might then imply that the technique of measuring the parameters stated above may not indicate a true reflection of the actual quality of an audio output. For instance, the effect of the packet loss is smaller compared to the Jitter for the codecs that uses packet loss concealment strategies. This is obvious because the codecs TABLE I SPEECH QUALITY RATING, MOS AND DMOS Rating Speech Quality (MOS) Level of Distortion (DMOS) 5 Excellent Imperceptible 4 Good Just perceptible but not annoying 3 Fair Perceptible and slightly annoying 2 Poor Annoying but not objectionable 1 Unsatisfactory Very annoying and objectionable can conceal a few consecutive packet losses by estimating a replacement for them. But the influence of Jitter cannot be concealed unless it exceeds the packet loss indication delay. The delay does not affect speech quality directly but instead affects the quality of a conversation. For example, most users will not notice a delay of 100 ms, but they will notice a slight hesitation in their partner s response for longer delay. Hence, a short delay results in better conversation quality and in a better perceived overall voice quality. When the delay is excessive, users might also notice an echo which exists in most conversations. But this echo is undetectable due to short endto-end delay in the network. Each end station in VoIP or video over IP conversation has a Jitter buffer. Jitter buffers are used to compensate the changes in the arrival times of data packets containing voice. A Jitter buffer can be dynamic and adaptive. If there are instantaneous changes in arrival times of packets that are beyond the capability of a Jitter buffer s ability to compensate, there will be jitter buffer over-runs and underruns. Both of them result in the degradation of voice quality. For our investigation we used Voice codes G.711 for transmission in smaller network and GSM-EFR in the large network. These two voice codes are used for VoIP applications as they are superior candidate for voice applications in their respective network scenario [11]. VI. SIMULATIONS AND RESULTS The performances of different routing protocols for VoIP applications have been investigated via OPNET simulator. The default parameters used in the simulations are listed in the Table II. Simulations were conducted for a moderately loaded network. We choose two different areas of operation namely 800m x 800m and 1600mx 1600m. These two different network sizes were selected so that we can measure the performances of the networks for small and large scale internode distances. The protocols used and the application settings for the simulation are listed in the Table III. The performances of the simulated networks have been analyzed based on different performance matrices namely (1) voice quality, (2) 29
5 Jitter, (3) throughput, (4) packet end-to-end delay, (5) Wireless LAN delay, and (6) packet delay variation. The voice quality has been monitored in terms of MOS scale. We only considered the packet end-to-end delay of the application. The overall end-to-end delay is calculated as the average of the delay of all packets. In the simulations we considered two cases namely (a) a small scale scenario, and (b) a large scale scenario. Parame ters Number of nodes Network size Node location Mobility Communication model Distance Threshold Simulation time TABLE II SIMULATION PARAMETERS Values 25 and m 800m and 1600m 1600m. Placed in row and column based manner. Random waypoint model with continuous movement. The maximum and the minimum speed of the mobiles were 5m/s and 10 m/s respectively. Selection by strict channel match 300m 600 simulation seconds to the voice MOS values of other protocols. The performance of DSR protocols degraded tremendously from the starting of transmission. The voice MOS values of other protocols such as AODV, GRP and OLSR also have decreased with the transmission time. For example, at 300 seconds the voice MOS value of TORA protocol is 3.54 in the scale of 5. For other protocols like OLSR, AODV and GRP have MOS values of 2.54, 1.93 and 1.62 respectively in the same scale at the same time (i.e. 300 second). The voice quality of the DSR protocol is the worst among all the investigated routing protocols which is 1.16 seconds. Fig 1: Voice quality of different MANET Protocols for G.711 codec Parame ters Physical layer MAC layer Routing Applications Codec Frame size Compression and Decompression delay Type of service(tos) TABLE III SIMULATED APPLICATION AND PROTOCOLS Values Segmented calculation of the signal power and SNR IEEE DCF with transmission rate of 12 Mbps for voice application AODV,DSR,TORA, OLSR and GRP Voice G.711 and GSM-EFR 20 ms 0.02 sec. Interactive voice Fig 2: Voice jitter For G.711 codec A. The small scale scenario In small scale scenario G.711 voice codec is used to transmit data in a MANET consisting of 25 nodes. Different routing protocols have been chosen according to Table III. The voice quality in terms of MOS values of different routing protocols is shown in Fig.1. It has been observed that the voice quality of TORA protocol outperforms other routing protocols over the transmission period. It is also observed from Fig.1 that the voice MOS value of TORA protocol is stable and it increases slightly with respect to time compared Fig 3: Throughput analysis of MANET routing protocols for G.711 codec By analyzing the voice Jitter performance as shown in Fig.2 we can conclude that TORA has the minimum and acceptable voice Jitter of sec at 200 seconds. On the other hand 30
6 AODV and OLSR have voice Jitters of sec and sec respectively. The voice Jitters are severe for DSR and GRP protocol with respect to other three routing protocols. These Jitter values are sec and sec respectively that occurred at 200 seconds. Fig. 3 shows the throughput performances of different routing protocols with respect to transmission time. It is depicted in this figure that the throughput increases as the voice transmission time increases for all the routing protocols. It is evident that the throughput of TORA protocol increased significantly with voice transmission and the highest throughput occurred at 300 sec. The figure shows that this throughput was bits/sec. At the same time AODV, OLSR and GRP have attained throughputs of bits/sec, bits/sec and bits/sec respectively. The delay performances of different routing protocols are illustrated in Fig. 4. Analyzing the delay performances of different routing protocols based on Fig. 4 we can conclude that the packet end-to-end delay, wireless LAN delay and packet delay variation are the minimum for TORA protocol. The delays for other protocols are not as much significant as that of TORA and the delay performance is the worst for DSR protocol. Analyzing all the performance matrices it is evident that TORA protocol is the best candidate for VoIP application especially with voice codec G.711 over MANET in small scale network. Analyzing the delay performances of different routing protocols presented in Fig. 4 we can conclude that the packet end-to-end delay, wireless LAN delay and packet delay variation are the minimum for TORA protocol. The delays for other protocols are not as much significant as that of TORA and the delay performance is the worst for DSR protocol. So from the study and analyzing all the performance matrices it is evident that TORA protocol is the best candidate for VoIP application especially with voice codec G.711 over MANET in small scale network. B. Large scale scenario For investigating the performance of VoIP application in a large scale scenario GSM-EFR voice codec was used. In this large scale scenario the simulated MANET contains 85 nodes. The same routing protocols (as listed in Table III) have been used in this investigation. The voice quality in terms of MOS values is depicted in Fig. 5. This figure shows that the performances of GRP, OLSR and TORA protocols are more or less same at the starting of the network operation. It is also shown in the same figure that the voice MOS value of GRP protocol is stable whereas the MOS values of OLSR and TORA decrease after 180 seconds of voice data transmission. The MOS values of the AODV and DSR protocols degraded with respect to time. The DSR protocol has the lowest MOS value compared to other protocols. This lowest MOS value is 1.34 occurred at 250 seconds in the scale of 5. Fig. 6 shows the voice Jitters of different routing protocols. It is depicted that the performance of TORA protocol is the best compared to other protocols. The TORA protocol has the least amount of Jitter during the whole transmission compared to other four investigated routing protocols. The DSR protocol has the highest Jitter among the studied routing protocols for the large scale scenario. (c) Fig 4: Delay analysis for small scale scenario for G.711 voice codec (a) Packet end to end delay (b) Wireless LAN delay and (c) Packet delay variation. (a) (b) Fig 5: The MOS values of different routing protocols 31
7 . Studying the performances of different routing protocols for the large scale scenario we can conclude that the performances of TORA, OLSR and GRP protocol are acceptable for voice transmission although the throughput and voice MOS values are not superior. Fig 6: Voice jitter for GSM-EFR codec (a) Fig 7: Throughput of GSM-EFR codec The throughput comparisons of the investigated protocols have been presented in Fig. 7. It is depicted in this that the throughputs of OLSR and GRP protocols are dominant at the starting of the data transmission. But the throughput started decreasing with the transmission time. On the other hand the throughputs of DSR, AODV and TORA protocol started increasing after 110 seconds of voice data transmission. It can also be concluded from Fig. 7 that the throughput performance of TORA protocol is the best compared to other routing protocols. On the other hand, the throughput performance is the worst for DSR protocol. The results of the delay analysis are shown in Fig. 8. These figures show that the packet end-to-end delay, wireless LAN delay and packet delay variations are the least for TORA protocol. Other protocols poorly perform compared to TORA protocol. Comparing the delay performances of different routing protocols we can conclude that the DSR protocol is not suitable for VoIP application. Because the packet delay variation of DSR protocol is as large as 100 sec and the endto-end delay is nearly 19 sec. The delay performances of other four routing protocols are also acceptable for VoIP application. But TORA protocol stands out as the best candidate compared to other protocols. For example, the packet end-to-end delay is nearly 1 sec, wireless LAN delay is zero and the packet delay variation is nearly 1 sec. These delay figures are considered excellent for VoIP application according to ITU recommendations. (b) 8(c) Figure 8: Delay comparisons of different routing protocols for 85 nodes (a) Packet end to end delay, (b) Wireless LAN delay and (c) Packet delay variation. The TORA protocol outperforms other protocols due to its adaptability and proactive nature. In large scale scenario the performance of DSR is the poorest and hence it is should not considered a suitable routing protocol for voice transmission. VII. CONCLUSIONS In this paper, the performances of different popular routing protocols have been investigated for VoIP application in MANET scenario. After studying all the performance matrices 32
8 we can conclude that TORA protocol is a good candidate compared to other protocols that we have investigated in this work. The TORA protocol uses the optimized routing algorithm to adjust the heights of routers to improve routing algorithm. This kind of adaptive routing algorithm makes TORA more suitable for VoIP application over MANETs compared to other routing protocols. The TORA protocol also minimizes the overhead control messages that results in low delay. On the other hand the performance of DSR protocol is the poorest compared to other routing protocols. Hence, the DSR protocol (in its current form) is not suitable for VoIP application over MANET in both small scale and large scale scenarios. The reactive nature and failure to control overhead messages make the DSR protocol poorly performs in terms of QoS parameters. In addition, the traffic loads and node mobility degraded the performances of the DSR protocol. In large scale condition GRP and OLSR performs better than small scale condition for their proactive nature and position based routing respectively. But, the performances of these two protocols are not comparable with those of TORA protocol. Although this investigation goes in favor of TORA protocol, for using voice codes G.711 and GSM-EFR in small and large network respectively we need do to a more comprehensive study to confirm this claim. We need to investigate the other routing protocols proposed in the literatures. In addition to this other proposed codecs also need to be investigated. These are all left as the future works. REFERENCES [1] D. Chalmers and M. Sloman, A survey of quality of service in mobile computing environments, IEEE Communications Surveys and Tutorials, Vol. 2, No. 2, Second Quarter 1999, pp [2] S. Corson. and J. Macker. Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Consideration, available at [3] E.M. Royer, C-K. Toh, A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks, IEEE Personal Communications Magazine, April 1999, pp [4] T. Camp, J. Boleng, and V. Davies, A survey of mobility models for ad hoc network research, Wireless Communications and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, Vol. 2, No. 5, 2002, pp [5] A. Shrestha, F. Tekiner. On MANET Routing Protocols for Mobility and Scalability In the Proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies(PDCAT 2009), Higashi Hiroshima, Japan, 8-11, December 2009, pp [9] I. D. Aron and S. K. S. Gupta, On the scalability of on-demand routing protocols for mobile ad hoc networks: an analytical study, Journal of Interconnection Networks, Vol. 2, No. 1, pp. 5-29, [10] Patrick Sondi, Dhavy Gantsou and Sylvain Lecomte, Performance Evaluation of Multimedia Applications over an OLSR-based Mobile Ad Hoc Network using OPNET, In the Proceedings of the 12th International Conference on Computer Modelling and Simulation, Cambridge, UK, March pp [11] Muhammad Shaffatul Islam, Md. Nazmul Islam, Md. Shah Alam, Md. Adnan Riaz, Md. Tanvir Hasan, Performance evaluation of various vocoders in Mobile Ad hoc Network (MANET), In the Proceedings of the 6th International Conference on Electrical and Computer Engineering ICECE 2010, December 2010.pp [12] J. Broch, D. B. Johnson, and D. A. Maltz, The Dynamic Source Routing (DSR) protocol for Mobile Ad hoc Networks, IETF Mobile Ad hoc Network (MANET) working groups, Dec [13] C. E. Perkins, E. M. Belding-Royer, and S. R. Das, Ad hoc On- Demand Distance Vector (AODV) routing, Internet Engineering Task Force (IETF) draft, November [14] Vincent D. Park and M. Scott Corson, A performance comparison of the Temporally-Ordered Routing Algorithm (TORA) and Ideal Link- State Routing, In the Proceedings of IEEE symposium on Computer and Communication, Athens, Greece, June 1999 [15] T. Clausen, and P. Jacquet, Optimized Link State Routing Protocol (OLSR), IETF, RFC 3626, [16] H. Badis, and K. Al Agha, QOLSR, QoS routing for Ad Hoc Wireless Networks Using OLSR. In European Transactions on Telecommunications, Vol. 16, No. 5, October 2005, pp [17] Jain, R., Puri, A. and Sengupta, R., Geographical Routing Using Partial Information for Wireless Ad Hoc Networks, IEEE Personal Communications Magazine, Vol. 8, No. 1, Feb. 2001, pp [18] M. Mauve, J. Widmer, H. Hartenstein, A Survey on Position-based Routing in Mobile Ad hoc Networks, IEEE Network Magazine, 2001, Vol. 15, No. 6, pp [19] Mohammed Tarique, Kemal E. Tepe, Sasan Adibi and Shervin Erfani, A survey on the multipath routing protocols for mobile ad hoc networks, Journal of Networks and Computer Applications, Vol. 32, No.6, November 2009, pp [20] Charles E. Perkins and Pravin Bhagwat, " Highly Dynamic Destination- Sequenced Distance Vector (DSDV) for Mobile Computers", In the Proceedings of ACM SIGCOMM conference on Conference on Applications, Technologies, Architectures, and Protocols for computer communications, London, UK, 1994, pp [21] Andrea Goldsmith and Stephen B. Wicker, Design Challenges for Energy-constrained Ad hoc Wireless Networks, IEEE Communication Magazine, August 2002, pp [6] Rajneesh Kumar Gujral, Manpreet Singh. Performance Analysis of Ad hoc Routing Protocols for Voice Communication Support over Hybrid MANETs, International Journal of Computer Applications, Vol. 22, No.3, May 2011, pp [7] Aftab Ahmad. Wireless and Mobile Data Networks. John Wiley & Sons, Inc., Hoboken, NJ, USA, [8] Anurag Malik, Shivanshu Rastogi, Sajendra Kumar, Performance Analysis of Routing Protocol in MobileAd Hoc Network using NS-2. MIT International Journal of Computer Science & Information Technology, Vol. 1 No. 1 January 2011, pp
PERFORMANCE ANALYSIS OF THE ROUTING PROTOCOLS FOR VIDEO STREAMING OVER MOBILE AD HOC NETWORKS
PERFORMANCE ANALYSIS OF THE ROUTING PROTOCOLS FOR VIDEO STREAMING OVER MOBILE AD HOC NETWORKS Muhammad Shaffatul Islam Md. Adnan Riaz Mohammed Tarique Khulna University of Engineering Technical University
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
IJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs
VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs Said El brak Mohammed Bouhorma Anouar A.Boudhir ABSTRACT Voice over IP (VoIP) has become a popular Internet
Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 54-61 Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK
http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,
Security Threats in Mobile Ad Hoc Networks
Security Threats in Mobile Ad Hoc Networks Hande Bakiler, Aysel Şafak Department of Electrical & Electronics Engineering Baskent University Ankara, Turkey [email protected], [email protected]
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
Achieving Energy Efficiency in MANETs by Using Load Balancing Approach
International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 88 94 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Achieving
Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs
International Research Journal of Applied and Basic Sciences. Vol., 3 (7), 1429-1436, 2012 Available online at http:// www. irjabs.com ISSN 2251-838X 2012 Performance Comparison of AODV, DSDV, DSR and
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Study of Network Characteristics Incorporating Different Routing Protocols
Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluation of
A Link-state QoS Routing Protocol for Ad Hoc Networks
A Link-state QoS Routing Protocol for Ad Hoc Networks Anelise Munaretto 1 Hakim Badis 2 Khaldoun Al Agha 2 Guy Pujolle 1 1 LIP6 Laboratory, University of Paris VI, 8, rue du Capitaine Scott, 75015, Paris,
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets
Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets Gurpreet Singh, 1 Atinderpal Singh 2, 1, 2 Department of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS
DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review
Delay aware Reactive Routing Protocols for QoS in MANETs: a Review Saad M. Adam*, Rosilah Hassan Network and Communication Technology Research Group, Faculty of Information Science and Technology, Universiti
PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA
International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS
PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of
Simulation Based Analysis of VOIP over MANET
Simulation Based Analysis of VOIP over MANET Neeru Mehta 1, leena 2 M-Tech Student 1, Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract In the last
Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol
ISSN: 2278 1323 All Rights Reserved 2014 IJARCET 2106 Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol Monika Malik, Partibha Yadav, Ajay Dureja Abstract A collection
SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 243-250 School of Engineering, Taylor s University College SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS SHEENU SHARMA
LIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks
Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks T. Jagadeepak 1, Dr. B. Prabhakara Rao 2, B. A. S. Roopa Devi 3 PG Student, Dept. of ECE, UCEK, JNTU,
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2
A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2 Alex Ali Hamidian January 2003 Department of Communication Systems Lund Institute of Technology, Lund University Box 118 S-221 00 Lund
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization
Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1
Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1 Ankit Jindal 1, Charanjeet Singh 2, Dharam Vir 3 PG Student [ECE], Dept. of ECE, DCR University of Science &
Keywords: DSDV and AODV Protocol
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison
Routing with Load Balancing in Wireless Ad hoc Networks
Routing with Load Balancing in Wireless Ad hoc Networks Hossam Hassanein and Audrey Zhou Department of Computing and Information Science Queen's University Kingston, Ontario, Canada, K7L 3N6 {hossam, zhou}@cs.queensu.ca
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node
Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node G. E. RIZOS [email protected] D. C. VASILIADIS [email protected] E. STERGIOU [email protected] Abstract: In this paper,
An Extended AODV Protocol to Support Mobility in Hybrid Networks
An Extended AODV Protocol to Support Mobility in Hybrid Networks Sèmiyou A. Adédjouma* Polytechnic School of Abomey-Calavi (EPAC) University of Abomey-Calavi (UAC) Cotonou, Benin *semiyou.adedjouma {at}
Security for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
Service Level Analysis of Video Conferencing over Wireless Local Area Network
Service Level Analysis of Video Conferencing over Wireless Local Area Network B.O. Sadiq, E. Obi, A.S. Abubakar, Y. Ibrahim & S. Saidu Department of Electrical and Computer Engineering Ahmadu Bello Unicersity
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol
Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem
Performance Evaluation of Mobility Speed over MANET Routing Protocols
International Journal of Network Security, Vol., No.3, PP.28 38, Nov. 2 28 Performance Evaluation of Mobility Speed over MANET Routing Protocols Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz 2, and Ahmed
Intelligent Agents for Routing on Mobile Ad-Hoc Networks
Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University [email protected] A. N. Zincir-Heywood Dalhousie University [email protected] Abstract This paper introduces a new agent-based
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks
A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK Mukesh Kumar Student (Ph.D) Department of Computer Engineering The Technological Institute of Textile and Science, Bhiwani-127021, Haryana
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks
Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks 1 Taifei Zhao, 2 Xizheng Ke, 3 Peilin Yang *1,Corresponding Author Department of Electronics Engineering, Xi an University of Technology,
Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol
th International Conference on Computer Engineering and Technology (ICCET ) IPCSIT vol. () () IACSIT Press, Singapore Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol Amith Khandakar
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS
`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS Divya Sharma CSE Dept, ITM Guargoan [email protected] Ashwani Kush Computer Dept, University College Kurukshetra University India [email protected]
The Analysis and Simulation of VoIP
ENSC 427 Communication Networks Spring 2013 Final Project The Analysis and Simulation of VoIP http://www.sfu.ca/~cjw11/427project.html Group #3 Demet Dilekci [email protected] Conrad Wang [email protected] Jiang
ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu
Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu AP/ECE HOD/ECE Sona College of Technology, GCE, Salem. Salem. ABSTRACT Routing protocol is a challenging issue
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 2, April 2012
PERFORMANCE EVALUATION OF DIFFERENT WIRELESS AD HOC ROUTING PROTOCOLS Niranjan Kumar Ray 1 and Ashok Kumar Turuk 2 Department of Computer Science and Engineering, National Institute of Technology Rourkela,
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, [email protected] Duaa sweity
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks
Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks
Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks T.V.P. Sundararajan 1, Karthik 2, A. Shanmugam 3 1. Assistant Professor, Bannari Amman Institute Of Technology,
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS
ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS M. Tamilarasi 1, T.G. Palanivelu 2, 1, 2 Department of ECE, Pondicherry Engineering College, Puducherry-605014. Email:
Internet Connectivity for Ad hoc Mobile Networks
Internet Connectivity for Ad hoc Mobile Networks Yuan Sun Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara suny, ebelding @cs.ucsb.edu Charles E. Perkins
Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network
Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols
Simulative Investigation of QoS parameters for VoIP over WiMAX networks
www.ijcsi.org 288 Simulative Investigation of QoS parameters for VoIP over WiMAX networks Priyanka 1, Jyoteesh Malhotra 2, Kuldeep Sharma 3 1,3 Department of Electronics, Ramgarhia Institue of Engineering
An Efficient AODV-Based Algorithm for Small Area MANETS
An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant
TORA : Temporally Ordered Routing Algorithm
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control
12 Quality of Service (QoS)
Burapha University ก Department of Computer Science 12 Quality of Service (QoS) Quality of Service Best Effort, Integrated Service, Differentiated Service Factors that affect the QoS Ver. 0.1 :, [email protected]
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Comparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
Ad hoc On Demand Distance Vector (AODV) Routing Protocol
Ad hoc On Demand Distance Vector (AODV) Routing Protocol CS: 647 Advanced Topics in Wireless Networks Dr. Baruch Awerbuch & Dr. Amitabh Mishra Department of Computer Science Johns Hopkins 4-1 Reading Chapter
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Performance comparison and analysis of routing strategies in Mobile ad hoc networks
2008 International Conference on Computer Science and Software Engineering Performance comparison and analysis of routing strategies in Mobile ad hoc networks Fu Yongsheng, Wang Xinyu, Li Shanping Department
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals
Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,
AIR FORCE INSTITUTE OF TECHNOLOGY
Voice Traffic over Mobile Ad Hoc Networks: A Performance Analysis of the Optimized Link State Routing Protocol THESIS Lady Noreen P. Santos, Captain, USAF AFIT/GCE/ENG/09-09 DEPARTMENT OF THE AIR FORCE
Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
II RELATED PROTOCOLS. Dynamic Source Routing (DSR)
ENERGY AWEAR LOAD BALANCING IN MOBILE AD HOC NETWORK Prof. Uma Nagaraj Computer Engineering Maharashtra Academy of Engg. Alandi (D) Pune, India Shwetal Patil (Student) Computer Engineering Maharashtra
Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks
A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks Young J. Lee and George F. Riley School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, GA 30332
Robust Routing in Wireless Ad Hoc Networks
Robust Routing in Wireless Ad Hoc Networks Seungjoon Lee, Bohyung Han, Minho Shin {slee, bhhan, mhshin}@cs.umd.edu Computer Science Department University of Maryland College Park, MD 2742 USA Abstract
A Survey: High Speed TCP Variants in Wireless Networks
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Survey:
Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer
International Journal of Computer Science and Telecommunications [Volume 3, Issue 1, January 2012] 23 ISSN 2047-3338 Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer K. Maheswari
VoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Quality of Service Support in Mobile ad-hoc IP Networks *
Quality of Service Support in Mobile ad-hoc IP Networks * Derya H. Cansever GTE Laboratories 40 Sylvan Road Waltham, MA 02454 Arnold M. Michelson GTE Government Systems 400 John Quincy Adams Road Taunton,
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks Khaled Alutaibi and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada E-mail: {kalutaib, ljilja}@sfu.ca Abstract
SBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol
Ashdin Publishing International Journal of Sensor Networks and Data Communications Vol. 1 (2012), Article ID X110203, 14 pages doi:10.4303/ijsndc/x110203 Research Article Ant Colony and Load Balancing
