You are on page 1of 6

Performance Of Ad Hoc Wireless Routing Protocol

Dhrumil B Shah1, Cyber Security Researcher., Ashu Sanghavi2 and Vishakha Shetye3

1. Dwarkadas J Sanghavi College of Engineering{dhrumilshah49@gmail.com}


2. Dwarkadas J Sanghavi College of Engineering{ashuawesome12@gmail.com}
3. Dwarkadas J Sanghavi College of Engineering{vishakhashetye@gmail.com}

KEYWORDS
ABSTRACT
Wireless technology based on the IEEE Wireless; IEEE; standard; QoS; adhoc;
MANET; DV; LS; AODV; DSR; NS2; mobile
802.11 standard is used to support multiple
radio; routing protocols; Arbitrary; topology;
types of communication services (data,
bandwidth; NS2; security; interference;
voice, and image) with different QoS
requirements. Node mobility creates a
continuously changing communication
topology in which paths break and new one INTRODUCTION
form dynamically. The routing table of each MANET routing protocols are IP based and
router in an adhoc network must be kept up- may use unicast, multicast or hybrid approaches
to-date. MANET uses Distance Vector or and should allow for interaction with standard
Link State algorithms which insure that the wired IP services rather than being regarded as
route to every host is always known. a completely separate entity. Since the nodes in
However, this approach must take into a MANET are highly mobile, the topology
account the adhoc networks specific changes frequently and the nodes are
characteristics: dynamic topologies, limited dynamically connected in an arbitrary manner.
bandwidth, energy constraints, and limited The rate of change depends on the velocity of
physical security. A main routing protocol the nodes. Moreover, the devices are small and
category is studied in this paper: reactive the available transmission power is limited.
protocols (e.g. Ad hoc On Demand Consequently, the radio coverage of a node is
Distance Vector - AODV, Dynamic Source small. The low transmission power limits the
Routing - DSR). The present paper focuses number of neighbor nodes, which further
on study and on how to improve the increases the rate of change in the topology as
performance of this category using NS2 the node moves. Because of interference and
simulations. It concerns distributed fading due to high operating frequency in an
operation, loop-freedom, security, sleep urban environment, the links are unreliable. Ad-
period operation. It is used to assess hoc networks are further characterized by low
performance of different routing protocols bandwidth links. Because of differences in
presented in this paper. We can list end-to- transmission capacity, some of the links may be
end data delay, packet delivery ratio, unidirectional. As a result of link instability and
routing load. Comparative study will be node mobility, the topology changes frequently
presented with number of networking and routing is difficult.
context consideration and the results show
the appropriate routing protocol for two
kinds of communication services (data and LITERATURE REVIEW
voice).
I have surveyed many of the papers for the
current work carried out by most of the
researchers. The abstract, methodology,
parameters focused for performance
evaluation of Ad-hoc routing protocols is QoS Models, Signaling Protocols and QoS
briefly discussed below: Routing that have been proposed for
MANets.
Paper [1] depicts reverse AODV protocol. Although QoS MAC Protocols are
Rapid change of topology causes that the equivalently important to achieve a
route reply could not arrive to the source complete QoS
node, i.e. after a source node sends several Architecture they are out of the scope of this
route report.
request message, the node obtains a reply
message, especially on high speed mobility. In this paper [5] propose a novel way of
This transmission with stability using a
increases both in communication delay and technique
power consumption as well as decrease in called Optimized Power Reactive Routing
packet delivery ratio. To avoid these (OPRR) and for more splendid
problems, this paper proposed a reverse performances. This
AODV which proposed protocol avoids new route
tries multiple route replies. discovery process in AODV with low
power
In this paper [2] authors focus on working consumption and maintain the stability of
implementation of AODV routing protocol node and to improve scalability of the
by means of certain design possibilities and network.
possible opportunities for obtaining needed Performance Evaluation of Ad Hoc
AODV events. Authors discuss the socket Networking Protocol with QoS (Quality of
based mechanism particularly when AODV Service)
routing Preliminary the simulation using
daemon communicates changes to the IP GloMoSim simulator was provided and the
route table. The paper suggests the need of result shows the
implementation of Generic Netlink Family. performance enhancements of the
Optimized Power Reactive Routing.
In this paper [3] propose a reverse AODV
which tries multiple route replies. The
extended AODV is called reverse AODV
(R-AODV), which has a novel aspect OBJECTIVES
compared to other on-demand routing
3.1. Performance Evaluation of Ad Hoc
protocols on Ad-hoc Networks. Authors
Network Protocol
design the R-AODV protocol and
implement simulation models using NS-2. The aim of this research is to improve
Simulation results show that the reverse performance of the normal AODV protocol
AODV provides good experimental results by means
on packet delivery ratio, power of QOS-enabled routing strategies. This
consumption and communication delay. thesis presents an QoS-Enabled
AODV(Ad-hoc On
In this paper [4], author have a glance at Demand Distance Vector) Routing Protocol
successful QoS Models and Protocols of the & compare it with normal AODV protocol.
IP network such as Int Serv, Diff Serv and QoS is
RSVP and see how they have affected the a term widely used in the last recent years
evolution in the area of wireless networks. QoS stands
of Models and Protocols in the Wireless for
Ad-Hoc world. The report is mainly Quality of Service. The primary goal is to
concentrated on increase the overall utility of the network by
granting priority to higher-value or more networks. It is designed to be self-starting
performance-sensitive flows. Quality of in an environment of mobile nodes,
service withstanding
(QoS) is usually defined as a set of service a variety of network behaviors such as node
requirements that needs to be met by the mobility, link failures and packet losses. So,
network while transporting a packet stream it
from a source to its destination. QoS found wide use in mobile ad-hoc networks.
routing Whenever streaming of multimedia based
protocols search for routes with sufficient data
resources in order to satisfy the QoS such as video, audio and text is performed
requirements of a flow. The QoS routing traffic will be more and network becomes
protocol should find the path that consume congested in mobile ad hoc networks. The
minimum resources. normal routing protocols are not able to
Depending on the application involved, the cope up
QoS constraints could be available with this situation. It is observed that
bandwidth, network congestion is the dominant reason
cost, end-to-end delay, delay variation for packet
(jitter), throughput, probability of packet loss, longer delay and delay jitter in
loss, battery charge, processing power, streaming video. So, by improving the QoS,
buffer space and so on. AODV
AODV currently does not support Quality Performance Evaluation of Ad Hoc
of Service (QoS) and also has no load Networking Protocol with QoS (Quality of
balancing mechanism. The thesis proposed Service)
some enhancements to the AODV protocol protocol would be promising way to
to improve performance for heavy traffic load
provide QoS by adding some extensions to in
Route Discovery messages. This thesis multimedia based mobile ad hoc networks.
focuses on
three of the parameters namely Traffic 3.2. Implementation Objectives & Prior
Rate, Speed of nodes & Pause Time of Knowledge Requirement
mobile nodes.
For evaluation purpose the performance The implementation section discusses how
metrics used are 1) Average end-to end AODV protocol will be implemented and
Delay, 2) analysed for the comparison. This includes
Packet Delivery Ratio (PDR), 3) the tool such as NS2 (Network Simulator
Normalized Overhead Load (NOL), 4) version 2). Then the core implementation of
Throughput. NS2 is discussed.
Accordingly, with three of the parameters
& four performance metrics we are trying
to 3.2.1. NS2
generate the 12 graphs, which in turn will
evaluate the AODV protocol for QoS as After setting up the platform, a software
well as named NS2is set up on it which is used for
Non-QoS. all the analysis and simulation work apart
from other tools used. NS2 is the de facto
AODV (Ad-hoc On-demand Distance standard for network simulation. Its
Vector) is a loop-free routing protocol for behavior is highly trusted within the
ad-hoc networking
community. It is developed at ISI, the OTcl interpreter. The two hierarchies
California, and is supported by the DARPA are closely related to each other; from the
and NSF. It is user’s
collaboration between researchers at UC perspective, there is a one-to-one
Berkeley, LBL, USC/ISI, and Xerox correspondence between a class in the
PARC. interpreted
NS2 is an object oriented simulator, written Performance Evaluation of Ad Hoc
in C++, with an OTcl interpreter as a Networking Protocol with QoS (Quality of
front-end. This means that most of the Service)
simulation scripts are created in OTcl. If the hierarchy and one in the compiled
components have to be developed for NS2, hierarchy. The root of this hierarchy is the
then both OTcl and C++ have to be used. class Tcl
NS2 Object. Users create new simulator objects
uses two languages because any network through the interpreter; these objects are
simulator, in general, has two different instantiated within the interpreter, and are
kinds of closely mirrored by a corresponding object
things it needs to do. On the one hand, in the
detailed simulation of protocols requires a compiled hierarchy. The interpreted class
systems hierarchy is automatically established
programming language, which can through
efficiently manipulate bytes, packet methods defined in the class Tcl Class. User
headers, and instantiated objects are mirrored through
implement algorithms that run over large methods defined in the class Tcl Object.
data sets. For these tasks run-time speed is There are other hierarchies in the C++ code
important and turn-around time (run and OTcl
simulation, find bug, fix bug, recompile, re- scripts; these other hierarchies are not
run) is less mirrored in the manner of Tcl Object.
important. On the other hand, a large part of
network research involves slightly varying
parameters or configurations, or quickly 3.2.2. Setting up NS2
exploring a number of scenarios. In these
cases, There are two methods of downloading and
iteration time (change the model and re- installing NS2. The first one is to use the
run) is more important. Since configuration bits and pieces and install each one of this
runs and the second one is to download and
once (at the beginning of the simulation), install one
run-time of this part of the task is less single package i.e. ‘all in one’ package.
important. Although it is quite cumbersome to install
NS2 meets both of these needs with two each and
languages, C++ and OTcl. C++ is fast to run every piece manually, but on the other
but slower to change, making it suitable for hand, it gives more flexibility to the user as
detailed protocol implementation. OTcl the user
runs can select which piece is needed and to
much slower but can be changed very install that one only, whereas the ‘all in one’
quickly (and interactively), making it ideal package installs every component,
for irrespective of the fact that it is needed or
simulation configuration. An Illustration of not.
the Working of NS2 is shown in Fig3.1.
The simulator supports a class hierarchy in
C++, and a similar class hierarchy within
PROPOSED METHODOLOGY As soon as the Base Stations update their
topology table with the new incremental
Just, as the wired protocol BGP (Border update, now, the end device can change the
Gateway Protocol), has its own many attributes connection paths from one location to another
such as AS (Autonomous) Set tag, Weight without breaking the continued connection
(Cisco Proprietary Protocol), Local Preference, from the stations.
Metric, Networks, Path, etc which are very
important in breaking or avoiding loops or Advantage :
detecting loops in a multi access network. The
wireless Ad Hoc protocol should also include - The end devices can enjoy a full fledged
connection wherever the device travels.
such parameters or attributes. That way, we can
No such crisis as discontinuation of
not only detect which routes or which mobile
connectivity.
devices are changing their respective paths or - This procedure is only performed once
locations to connect to a new connection path and only when the mobile device needs to
from dis-connecting to old connection path, but change handoff connection between
also break the discontinuity of not providing different Mobile Stations (MS) as
seamless connection throughout the working of the “Current ID” is set up on
transactions between the end devices and the only the inter gateway routers of mobile
Mobile Station (MS) or the Base Station (BS). stations and not the base station.
- This, can also be taken to a global level
where the attribute is only needed at inter
gateway routers of SP situated across the
IMPLEMENTATION country boundaries enabling the devices
What our service providers (SP) can offer us, to only use this working when travelling
end users is a seamless data connection for our between countries.
mobile devices by using a new attribute (as we
Disadvantage :
have discussed earlier), for instance, “Current
ID” which will hold all the addresses (IP add) i. The Inter Gateway Routers needs to be
of our mobile devices or any other end device. very fast in creating a new table with a new
For our respective Mobile Station to do this : Attribute. So, routers with high processing
power, high CPU utilization, high memory
i. It will first need to create a table in its are required.
topology table making a device’s entry as
soon as the device requests for a change in
the connection path to the mobile station. REFERENCES
ii. The “Current ID” attribute will have each
device’s IP. 1. C. Perkins, E. Royer, S. Das and K.
iii. In a few seconds, after the Mobile Station Marina, "Performance comparison of
has updated this in its topology table, it will two on-demand routing protocols for ad
then transfer this change as an incremental hoc networks,"' in IEEE Personal
update to all is Base Station (BS) through Communications, February 2001.
the control plane of its Inter Gateway
Routers (IGW) as a control packet. 2. Clausen, T., Jacquet, P., Laouiti, A., Minet,
P., Qayyum, A., Viennot, L.: "Optimized
Link State Routing Protocol", Sept 2001,
CONCLUSION IETF Internet Draft, draft-ietf- manet-olsr-
06.txt
The following comments and observations can
be made : 3. Perkins, C. E., Royer, E. M.: "Ad-hoc
On-Demand Distance Vector Routing",
February 1999, Proc. 2 IEEE Workshop
on Mobile Computer Systems and
Applications, pp. 90-100

4. Fan Bai, Narayanan Sadagopan , Ahmed


Helmy, "The IMPORTANT framework for
analyzing the Impact of Mobility on
Performance Of RouTing protocols for
Adhoc NeTworks", INFOCOM, 2003.

You might also like