Study of Network Characteristics Incorporating Different Routing Protocols



Similar documents
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Security Threats in Mobile Ad Hoc Networks

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Manju, Ranjana Thalore, Jyoti, M.K Jha

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

IJMIE Volume 2, Issue 7 ISSN:

LIST OF FIGURES. Figure No. Caption Page No.

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

An Extended AODV Protocol to Support Mobility in Hybrid Networks

An Efficient AODV-Based Algorithm for Small Area MANETS

Keywords: DSDV and AODV Protocol

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

SBSCET, Firozpur (Punjab), India

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

International Journal of Advanced Research in Computer Science and Software Engineering

Internet Connectivity for Ad hoc Mobile Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Routing with Load Balancing in Wireless Ad hoc Networks

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

Optimized Load Balancing Mechanism Using Carry Forward Distance

Security in Ad Hoc Network

International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 2, April 2012

A Survey: High Speed TCP Variants in Wireless Networks

other. A B AP wired network

Performance Evaluation of Mobility Speed over MANET Routing Protocols

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

Performance Evaluation and Investigation of Energy in AODV, OLSR Protocols through Simulation

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

A Review of Secure Ad-hoc Routing

Energy Efficiency of Load Balancing in MANET Routing Protocols

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

Wireless Mesh Networks under FreeBSD

International Journal of Advanced Research in Computer Science and Software Engineering

Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

Simulation Based Analysis of VOIP over MANET


Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Load balanced routing in mobile ad hoc networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Deployment of VoIP in the IEEE s Wireless Mesh Networks

SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS

Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance

Congestion control in Mobile Ad-Hoc Networks (MANETs)

Transcription:

Study of Network Characteristics Incorporating Different Routing Protocols Sumitpal Kaur #, Hardeep S Ryait *, Manpreet Kaur # # M. Tech Student, Department of Electronics and Comm. Engineering, Punjab Technical University, Jalandhar, India * Head of Department, Department of Electronics and Comm. BBSBES, Fatehgarh Sahib, Punjab, India Abstract Wireless mesh networks (WMNs) offer much promise for communication. The routing protocols are designed basically to establish correct and efficient paths between users. In the recent years several routing protocols have been proposed and many of them studied through extensive simulation at different network characteristics. In this paper various protocols like Bellman-Ford, Ad-Hoc on- Demand Routing (AODV), Dynamic Source Routing (DSR), and Ad hoc On Demand Distance Vector (DYMO)have been discussed and compare their Average End-to-End Delay (sec.),throughput (bits/sec.) and Jitter (sec.). Keywords Wireless mesh network, Routing Protocols, EXata GUI link 5.1. I. INTRODUCTION As various wireless networks evolve into the next generation to provide better services, a key technology, wireless mesh networks (WMNs), has emerged recently. In WMN nodes are comprise of mesh routers and mesh clients. Each node operates not only as a host but also as a router, forwarding packets on behalf of other nodes that may not be within direct wireless transmission range of their destinations. A WMN is dynamically self-organized and self-configured, with the nodes in the network automatically establishing and maintaining mesh connectivity among themselves. This feature brings manyadvantages to WMNs such as low up-front cost, easy network maintenance, robustness and reliable service coverage [1]. A wireless mesh network (WMN) is composed of a large number of nodes that are densely deployed in communicating over radio. It is specifically designed for discrete data sent occasionally [2]. Routing protocols play an important role in wireless network to managing the configuration, formation, and maintenance of the network topology [3]. The goal of routing protocol is to determine paths with reduced overhead and also faster reconfiguration when a broken link is identified [2]. Every node has the responsibility to determine the best route to its destination. A lot of research study is performed on various routing protocols but this paper represents a comparison of Bellman-Ford, AODV, DSR and DYMO. The performance analysis is based on different network metrics such as Endto-End delay(s), Average Jitter(s), and Throughput. II. THEORY A. Ad-hoc routing protocols: An ad hoc routing protocol is a convention, or standard, that controls how nodes decides which way to route packets between computing devices in a mobile ad hoc network.in ad hoc networks, nodes are not familiar with the topology of their networks. Instead, they have to discover it: typically, a new node announces its presence and listens for announcements broadcast by its neighbors. Each node learns about others nearby and how to reach them, and may announce that it too can reach them [1]. Mobile ad hoc network does not have any fixed infrastructure. In ad hoc network node move arbitrarily so topology changes in ad hoc network is rapid and unpredictable therefore routing is very important in ad hoc network[4]. Routing protocols can be classified in three parts: (i) Table driven (Proactive) routing protocols (ii) Reactive routing protocols (iii) Hybrid routing protocols. [4]. 1) Proactive (Table driven) routing protocol [4] In table driven routing protocols, every nodes maintains the network topology information in the form of routing tables by periodically exchanging routing information. Routing information is generally flooded in the whole network. Whenever a node requires a path to a destination, it runs an appropriate path-finding algorithm on the topology information it maintains. 2) Reactive (On demand) routing protocol Protocols that fall under this category do not maintain the network topology information. They obtain the necessary path when it is required, by using a connection establishment process. Hence these protocols do not exchange routing information periodically [4]. If a node wants to send a packet to another node then this protocol searches for the route in an on-demand manner and establishes the connection in order to transmit and receive the packet. The route discovery occurs by flooding the www.ijcsit.com 4500

route request packets throughout the network. Examples of reactive routing protocols are the Ad-hoc On-demand Distance Vector routing (AODV), and Dynamic Source Routing (DSR) [5]. 3) Hybrid routing protocol Protocols belonging to this category combine the best features of the above two categories. Nodes within a certain distances from the node concerned, or within a particular geographical region, are said to be within the routing zone of the given node. For routing within this zone, a tabledriven approach is used. For nodes that are located beyond this zone, an on-demand approach is used [4]. III. STUDIED PROTOCOLS A. Bellman-Ford Routing Protocol Bellman-Ford Routing Algorithm, also known as Ford- Fulkerson Algorithm, is used as a distance vector routing protocol. Routers that use this algorithm have to maintain the distance tables, which tell the distances and shortest path to sending packets to each node in the network. The information in the distance table is always updated by exchanging information with the neighboring nodes [4]. Advantages [4]: Easy to implement Disadvantages [4]: It does not scale well. Changes in network topology are not reflected quickly since updates are spread node-by-node. Count to infinity (if link or node failures render a node unreachable from some set of other nodes, those nodes may spend forever gradually increasing their estimates of the distance to it, and in the meantime there may be routing loops). B. Adhoc On-demand Distance Vector (AODV): This protocol performs route discovery using control messages route request (RREQ) and route reply (RREP) whenever a node wishes to send packets to destination. When source node receives the route error (RERR) message, it can reinitiate route. Neighborhood information is obtained from broadcasted hello packets. It is a flat routing protocol which does not need any central administrative system to handle the routing process. AODV tends to reduce the control t r a f f i c m e s s a g e s o v e r h e a d at the cost of increased latency in finding new routes. The AODV protocol is a loop free and uses sequence numbers to avoid the infinity counting problem which is typical to the classical distance vector routing protocols [7]. AODV uses a broadcast route discovery mechanism as it also use(with modifications) in DSR algorithm. instead of source routing, however, AODV relies on dynamically establishing route table entries at intermediate nodes. This difference pays off in networks with many nodes, where a large overhead is incurred by carrying source routes in each data packet [6]. Advantages [7]: Routes are established on demand and destination sequence numbers are used to find the latest route to the destination. Lower delay for connection setup. Disadvantages [7]: AODV doesn t allow handling unidirectional links. Multiple Route Reply packets in response to a single Route Request packet can lead to heavy control overhead. Periodic beaconing leads to unnecessary bandwidth consumption [4]. C. Dynamic Source Routing (DSR): DSR is a reactive uniform routing protocol that uses a concept called source routing [8]. Each node maintains a route cache where it lists the complete routes to all destinations for which the routes are known. In dynamic source routing, source node sends a route request to all nodes which are in the wireless transmission range. Source routing protocol is composed of two main mechanisms to allow the discovery and maintenance of source routes in the ad hoc networks. To commence the route discovery mechanism, wireless node floods a route request to all nodes which are in the wireless transmission range. The initiator (source) and target (destination) of the route discovery is identified by each route request packet. The source node also provides a unique request identification number in its route request packet. For responding to the route request, the target node generally scans its own route cache for a route before sending the route reply toward the initiator node. However, if no suitable route is found, target will execute its own route discovery mechanism in order to reach toward the initiator [9]. The route maintenance mechanism is used when the source node is unable to use its current route to the destination due to changes in the network topology. In such case, the source has to use any other route to the destination. However, it may invoke the route discovery mechanism again to discover a new route. A routing entry in DSR contains all the intermediate nodes of the route rather than just the next hop information. A source puts the entire routing path in the data packet and the packet is sent through the intermediate nodes specified in the path. If the source does not have a routing path to the destination, then it performs a route discovery by flooding the network with a route request (RREQ) packet. Any node that has a path to the destination in question can reply to the RREQ packet by sending a route reply (RREP) packet. The reply is sent using the route recorded in the RREQ packet [9]. Advantages [9]: Provide multiple routes and avoid loop formation. Disadvantages [9]: Large end-to-end delay, Scalability problems caused b y f l o o d i n g a n d source routing mechanisms. D. Dynamic MANET On-demand Protocol (DYMO): The Dynamic MANET On demand (DYMO) is a reactive or on demand, multihop, unicast routing protocol that not update route information periodically. The DYMO is a small memory stores routing information and generated Control Packets when a node receives the data packet from route path. The basic operations of Dynamic MANET On www.ijcsit.com 4501

demand source router generates Route Request (RREQ) messages and floods them for Destination routers for whom it doesn t have route information. Intermediate nodes store a route to the originating router by adding it into its routing table during this dissemination Process [4]. The target node after receiving the RREQ responds by sending Route Reply (RREP) Message. RREP is sent by unicast technique towards the source. An intermediate node that receives the RREP creates a route to the target and so finally it reaches to originator. Then Routes have been established between source and destination in both directions. The DYMO nodes monitors link over which traffic is flowing in order to cope up with dynamic network topology. A Route Error (RERR) message is generated when a node receives a data packet for the destination for which route is not known or the route is broken. Is RERR notifies other nodes about the link failure. The source node reinitiate route discovery quickly as it receives this RERR.Hello messages are used by all nodes to maintain routes to its neighbor nodes The sequence numbers are used in DYMO to make it loop free. These sequence numbers are used by nodes to determine the order of route discovery messages and so avoid propagating stale route information [4]. Type of Cast: Unicast [4]: Unicast forwarding means one to one communication. i.e., one source transmits data packets to a single destination. Multicast [4]: Multicast means one to many i.e. when a node needs to send same data to multiple destinations. IV. SIMULATION SETUP The four routing protocols (Bellman-ford, AODV, DSR and DYMO) are used to evaluate and compare the effectiveness of Mobile Ad-Hoc network; by performing extensive simulations in EXata 5.2[10] each simulation is carried out under a linear mobility. The simulation parameters are listed in Table 1. V. NETWORK SIMULATION This Section enables to analyze temporal assessment of different routing protocol under the specified terrain conditions in wireless mesh networks. A. Simulation Scenario The scenario under consideration is constructed in EXata version 5.1 over Windows platform for simulation and emulation studies. EXata is a discrete event simulator [10].It is equally capable of simulating various wired or wireless scenarios from simple to complex conditions. In the simulation model, there are 200 nodes and all of these are connected to one wireless station. The terrain condition we have set as 1000m 1000m as flat area. The entire area is further divided into 100 square shaped cells. Simulation time used is 90s. All the nodes are assumed as dynamic one. The type of wireless propagation model is Two Ray ground propagation. The numbers of constant bit rate (CBR) connections are 20.The entire connection set up has been done randomly. Parameter Value Area size (flat area) 1500 1500 Attitude Range Above & Below Sea Level 1500m Simulation Time 90sec Energy Model Traffic Type Mobility Model MAC Protocol Network protocol Routing protocol MicaZ CBR Random Waypoint MAC802.15.4 IPV4 No of Nodes 200 Node Placement Number of CBR 20 Data rate Path Loss Model No. of Channels 1 Channel Frequency Table 1.Simulation Parameters Fig. 1 Simulation Scenario Bellman-Ford, AODV,DSR,DYMO Random 2Mbps Two Ray Model 2.4GHz Packet Size (bytes) 512 No. of times Experiment Single simulated MAC Protocol IEEE 802.11 Battery Model Antenna Model Linear Omni directional www.ijcsit.com 4502

VI. SIMULATION PARAMETERS The following three performance metrics are used to compare Bellman-ford, AODV, DSR and DYMO protocols. A. Throughput [4]: Throughput is defined as total number of packets received by the destination. It is a measure of effectiveness of a routing protocol (Reddy and Reddy 2006). Throughput is determined as the ratio of the total data received to required propagation time. The throughput (messages/second) is the total number of delivered data packets divided by the total duration of simulation time (Al-Maashri and Ould-Khaoua, 2006). B. Average End-to-End Delay [4]: Average end-to-end delay is the average time it takes a data packet to reach to destination in seconds. It is calculated by subtracting time at which first packet was transmitted by source from time at which first data packet arrived to destination. C. Jitter [4]: Jitter is the variation in the time between packets arriving, caused by network congestion, and route changes. VII. SIMULATION RESULTS The simulation is done for the performance analysis of different routing protocols using the EXata 5.1 which is developed by Scalable Network Technology [9]. EXata 5.1 provides a comprehensive environment for designing protocols, creating and animating network scenarios, and analyzing their performance. On the basis of the above mentioned simulation scenario and parameters, have obtained the following results. The results are shown as under in the form of various analyses from Fig.1 to Fig.12. A. Results and Discussions Bellman-Ford has throughput of 550066 bits/sec which is less than AODV and DYMO because the changes in network topology are not reflected quickly since updates are spread node-by-node and in the meantime there may be routing loops. AODV protocol has highest throughput of 751447bits/sec because it establishes routes on demand and the destination sequence numbers are applied to find the latest route to the destination. So the connection setup delay is lower. Hence has higher throughput. DSR has lowest throughput 217457 bits/sec because the performance degrades rapidly with increasing mobility as route cache information could also result in inconsistencies during the route reconstruction phase. The connection setup delay is higher than in table-driven protocols. But the protocol performs well in static and low-mobility environments. DYMO is an advancement of existing AODV protocol. DYMO operates similar to the AODV but operation is moreover quite simpler. In DYMO routes are computed on demand. Unlike AODV, DYMO does not support unnecessary HELLO messages; operation is purely based upon the sequence number assigned to all the packets. As DYMO is the advanced version of AODV but still it has low throughput than later. The throughput of DYMO is 719922bits/sec and of AODV is 751447bits/sec. This is because DYMO does not perform well with low mobility as for the low mobile networks the control messages overhead is high and unnecessary. So the throughput get reduced.b. Results at CBR server using AODV, Bellman- Ford, DSR and DYMO Fig.2.Throughput www.ijcsit.com 4503

Fig.3.Average End to End Delay Fig.4. Jitter VIII. CONCLUSION Throughput should be higher for better performance in a network whereas average end to end delay and jitter both should be minimum. Here Jitter and Average end to end delays are minimum for AODV therefore it has better performance than rest all of the protocols. But DSR has maximum values for both jitter and average end to end delay hence have least throughput. REFERENCES [1] Ian F. Akyildiz, Xudong Wang, Weilin Wang ba, Wireless mesh networks: a survey, 2004, pp.-1-41. http://macs.cs.cityu.edu.hk/reference/wirelessmesh.pdf [2] Jin Peng Li A mobile ECG monitoring system with context collection, In Proceeedings of the 4th European Conference of the International Federation for Medical and Biological Engineering Springer 2009, pp.-1222-1225 http://arrow.dit.ie/teapotcon/24/ [3] P. Hu, R. Robinson, M. Portmann, and J. Indulska, Context-Aware Routing in Wireless Mesh Networks, In Proceedings of the 2 nd ACM International Workshop on Context-Awareness for Self- Managing Systems (CASEMANS), (Pervasive'08 Workshop), 2008, Sydney,Australia. http :// arrow.dit. ie /cgi /viewcontent.cgi?article=1040&context=commcon [4] Seema Rahul, Sanjay kumar Maurya,Yashi Rajwanshi, Sandip Vijay. Performance Analysis of AODV, DYMO and Bellman Routing Protocols in Mobile Ad-Hoc Network. Conference on Advances in Communication and Control Systems, Volume 41,2013,pp.-346-349. [5] Syed Basha Shaik, S. P. Setty, Performance Comparison of AODV, DSR and ANODR for Grid Placement Model International Journal of Computer Applications (0975 8887), Volume 11, No.12, 2010, pp.-6-9. http :// www.ijcaonline.org / volume11 /number12 /pxc3872201.pdf [6] Charles Perkins and Elizabeth Royer. Ad hoc on demand distance vector (AODV)routing, pp.-1-11, http://www.utdallas.edu/~kxs028100/papers/aodv.pdf [7] C. E. Perkins and E. M. Royer, Ad Hoc On-demand Distance Vector Routing, Volume 11, No.12, 1999, pp.-6-9. http :// www.ijcaonline.org /archives /volume 28 /number5/3385-4696 [8] D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks In T. Imielinski and H. Korth, editors, Mobile computing.kluwer Academic,1996, pp.-1-18. http://monarch.cs.rice.edu/monarch-papers/kluwer- adhoc.pdf [9] D. Johnson, D.Maltz and Yih, Dynamic Source Routing Protocol for Mobile AdHoc, 2003. http://tools.ietf.org/html/draftietf-manet-dsr-10 [10] Scalable Network Technologies, EXATA simulator, Software Package, August 2013. http:// www.scalable- networks.com www.ijcsit.com 4504