IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 270- 275

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Comparison of Existing Routing Techniques for Mobile Ad-Hoc Networks AMIT KUMAR1 , ARUP SARKAR2 1

Masters in Technology, Information Security Management, Dehradun Institute Of Technology, Dehradun-248001, Uttarakhand , INDIA Email : [email protected]

2

Asst. Professor , Department Of Information Technology , DIT University , Dehradun-248001, Email : [email protected]

Abstract Multiple routing protocols for the MANET architecture designed keeping in mind the high fidelity and mobility, bandwidth issues of this specialized hoc architecture. However all protocols use multiple schemes and metrics to arrive at a best path which leads to complication in networks with multiple protocols or gateway based networks. Here we present a comparison of existing systems for MANET routing and a need for a universal protocol capable of performing these routing calculation in this topology. Keywords: MANET, AODV, AOMDV, Routing Protocols , TORA , DSR , DSDV, Wireless Networks.

1. Introduction Mobile ad hoc networks re wireless networks formed by wireless devices in sharing or PAN arrangement and are popularly referred to as MANET. These networks are characterized by uncertainty in transmission to bandwidth issues arising from hop sequences, battery life issues, etc. Many protocols are available currently for the application specific mobile ad-hoc networks. However ad-hoc networks are characterized by uncertainty in bandwidth, resource consumption and presence of protocols with different fundamental design approaches to solve the same task. Favoring one protocol over the other is a challenging and daunting task and involves a close study in a real time MANET environment with comparisons with multiple metrics. At the same time it must also be taken care that none of the protocols dominate the network in terms of resource consumption and channel bandwidth for self-operation. This paper deals with presentation of a proposed modification to an existing ad hoc mobile network routing algorithms to improve their efficiency.

2. Types of MANET Algorithms The multiple and diverse ad hoc mobile network protocols are broadly classified in two categories: table based and source initiated. Table based MANET routing systems try to keep up to date net information map AMIT KUMAR,

IJRIT

270

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 270- 275

by maintaining a routing table for each node and updating network topology and route propagation metrics as per those stored and recomputed tables. Nodes in turn respond to these changes and direct packets on the routes as computed by the packets as per the stored network map data. Source initiated protocols generate network information only when it is required. They are kind of dynamic in approach, to be precise. When a node requires a data to be transmitted to be another node, the process of optimum route discovery begins. Once all possible permutations have been examined the best path is taken under examination and if deemed fit the data is transmitted across it. These systems always rely on a route maintenance algorithm to remove faulty or theoretical routes that have been computed.

3. Computed Metrics Against Standard Benchmarks Mobility is an important benchmark for every protocol’s comparison. At the time of conception the systems were designed and compared against the node transmission and reception speeds. However it was soon realized that such a benchmark was meaningless as topology change was not taken into account. So time consumed in node switching and topology changes were not taken into account. Moreover nodes may move away from each other with variable pause time rendering this definition useless. Larsson and his fellow researchers were quick to pick up this fault and developed a more rigorous definition. He took into account the relative node movement and patterns of movement to compute absolute mobility of a protocol in a specific topology. According to the new redesigned mobility approach, a protocols mobility was judged by the metric

Where : dist(nx , ny):The distance between nodes x and y. n: The nodes number. Ax(t): The average distance between node x and all the other nodes, at time t. Mx: The average relative mobility of node x regarding all other nodes, during the simulation time. T: Simulation time At: Time period used in computation. We use the same formula to compute the mobility of the re optimized protocol. After a fixed time interval time t during the entire time duration of the simulation. As the system is already verified to take into account topological changes either by node addition or removal from the existing topology, the route change of the system, RC, as

AMIT KUMAR,

IJRIT

271

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 270- 275

This leads to a clear simulation output which can be plotted as :

4.Benchmark Comparison The re optimized protocol will be benchmarked against five units using the Larsson formula and a final result will be presented.

4.1Data Reception Rate It is the number of received packets divided by the number of sent packets, computed at the application layer level. It reflects the routing protocol reliability which is a very important issue. High values of this parameter reflect a good reliability, i.e. low packet loss.

Where the system is defined as: TD: Packet size /bandwidth + ST ST: 185 microseconds RTR: 3.20/second RRR: 1.52/second RSR: 0.164/second Ron: Start of simulation. (Begin tuning)

Roff: Stop of simulation. (Stop tuning) AMIT KUMAR,

IJRIT

272

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 270- 275

The metric under consideration, however is the average power computed by

4.2Consumed Energy A MANET system is pretty limited in resources like bandwidth and available power. This leads to requirement of a protocol design capable of routing the system in least power consumption. According to the NCR Wavelen Radio Model, the consumed energy of a node z as per MANET energy conditions are :

4.3Consumed Overhead Formally stating, overhead consumed by a protocol, as d by a simulation, is the total number of packets generated during routing. It must be kept in mind that a superior protocol is said to be one that generates fewer control packets, i.e., fewer overhead to achieve the same routing performance.

4.4Average Packet Transfer Delay It is the average time delay between two packets transmitted from the source and arriving t the destination application layer as per

pr: Is the set of packets received by all the destination nodes npr: Received packets number tdli: Is the transfer delay of packet i, such that: dli: Packet i arrival time. This is the most dominating metric to judge the QoS a protocol when compared against and existing service/system.

5.Reception Rate Results The benchmark for comparison is RoR (Rate of Reception). The simulation results indicate that mobility does not affect existing protocols of the category AODV and LAR which have been architecturally engineered to be stable for high mobility topologies. More than 80+% AODV results and 92+% LAR results were obtained indicating the stability of these protocols in ad hoc MANET environments. On a different note, ABR’s and DSR’s have marginally better RoR as the value of mobility in the topology increases. AODV performance is a characteristic of quick response strategy to failures whereas LAR’s exceptional performance is due to presence of a broadcast option in the AMIT KUMAR,

IJRIT

273

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 270- 275

protocol design allowing to choose best paths. ABR detects failed links through means of associativity while DSR cannot detect failures until the packet reaches there, so a high mobility is must to compare against performance. It is worthy to comment on the notable fact that routing overhead is almost close for most protocols except ABR which produces an exceptionally high overhead. This is the natural and obvious cause for the resultant exponentially high packet delay in the ABR protocol scheme.

(

(

6.Conclusion The study reveals that the prime characteristic of a MANET, its mobility, is the prime reason for the performance degradation of this ad hoc architecture. The case is made worse by the fact that protocol response goes exponentially down with a topological change in the network and take a significant amount to recover to absolute state. This leads to unacceptable packet loss. However the low latency means that the phase of discovering the route is skipped.

7.References

[1] Perkins CE, Belding-Royer E, Das SR. Ad hoc on-demand distance vector (AODV) routing. [2] Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. [3] Raju J, Garcia-Luna-Aceves JJ. A new approach to on-demand loop-free multipath routing.

[4] Samar P, Wicker SB. On the behavior of communication links of a node in a multi-hop mobile environment [5] Tsirigos A, Haas ZJ. Multipath routing in the presence of frequent topological changes.

AMIT KUMAR,

IJRIT

274

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 270- 275

[6] R.L.Lagendijik, J.F.C.M.de Jongh, “Multipath Routing in Mobile Ad Hoc Networks”. [7] C. E. Perkins, E. M. Royer, and S. R. Das. Ad Hoc On Demand Distance Vector (AODV) Routing. [8] The Network Simulator ns-allinone-2.34. [9] M. K. Marina and S. R. Das, "Ad hoc On-demand Multipath Distance Vector Routing," Computer Science Department, Stony Brook University. [10] C.S.R. Murthy and B.S. Manoj, Ad Hoc Wireless Networks: Architecture and Protocols, ch. Routing Protocols for Ad hoc Wireless Network.

AMIT KUMAR,

IJRIT

275

Comparison of Existing Routing Techniques for Mobile Ad-Hoc ... - IJRIT

Mobile ad hoc networks re wireless networks formed by wireless devices in sharing or PAN ... Nodes in turn respond to these changes and direct packets on the.

107KB Sizes 1 Downloads 265 Views

Recommend Documents

Comparison of Existing Routing Techniques for Mobile Ad-Hoc ... - IJRIT
mobility, bandwidth issues of this specialized hoc architecture. However all protocols ... routes as computed by the packets as per the stored network map data.

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
In this particular paper, we define stronger privacy requirements relating to ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

Secure Adhoc Routing Protocol for Privacy Preservation - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 9, .... Communication anonymity in data management has been discussed ..... “Rumor riding: anonymizing unstructured peer-to-peer systems,” IEEE Trans.

Factors Influencing QoS in Mobile Adhoc Networks - IJRIT
Abstract—The major constraint in MANETs is to maintain the Quality of Service. ... Load balancing. This is scenario where, the load traffic is balanced in all the possible routes. Unbalanced network traffic may influence the high power ... followin

Comparison of Square Comparison of Square-Pixel and ... - IJRIT
Square pixels became the norm because there needed to be an industry standard to avoid compatibility issues over .... Euclidean Spaces'. Information and ...

comparison of techniques
Zircon. Zr [SiO4]. 1 to >10,000. < 2 most. Titanite. CaTi[SiO3](O,OH,F). 4 to 500. 5 to 40 k,c,a,m,ig,mp, gp,hv, gn,sk. Monazite. (Ce,La,Th)PO4. 282 to >50,000. < 2 mp,sg, hv,gp. Xenotime. YPO4. 5,000 to 29,000. < 5 gp,sg. Thorite. Th[SiO4]. > 50,000

Comparison of Symmetric Key Encryption Algorithms - IJRIT
Today it becomes very essential to protect data and database mostly in .... within today's on-chip cache memory, and typically do so with room to spare. RC6 is a ...

Comparison of Symmetric Key Encryption Algorithms - IJRIT
In this paper we provides a comparison between most common symmetric key cryptography algorithms: DES, AES, RC2, ... Today it becomes very essential to protect data and database mostly in e-transaction. The information has .... For most applications,

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
CGSR Cluster head Gateway Switch Routing protocol [9] is a multichannel operation ..... protocols of mobile ad-hoc networks”, International Journal of Computer ...

Multipath Routing process for enhancement of base station ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, April 2014, Pg: 653- 658. Deepika ... Computer Science and Engineering.

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
The infrastructure less and the dynamic nature .... faster convergence, it employs a unique method of maintaining information regarding the shortest distance to.

Multipath Routing process for enhancement of base station ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, ... Index Terms—Wireless Sensor Networks, Sensor Nodes, Secure Routing, ... In topical years WSN found a prodigious number of applications in the turf of ...

Automatic Configuring Of Mobile Sink Trail for Data Gathering ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 642- 647 ... 1Dept. of CSE, CMRIT, Bangalore, India.

Performance Evaluation of Equalization Techniques under ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue ... Introduction of wireless and 3G mobile technology has made it possible to ...

Automatic Configuring Of Mobile Sink Trail for Data Gathering ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 642- 647 ... 1Dept. of CSE, CMRIT, Bangalore, India.

Performance Evaluation of Equalization Techniques under ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue ... Introduction of wireless and 3G mobile technology has made it possible to ...

Comparison of Dimensionality Reduction Techniques ...
In many domains, dimensionality reduction techniques have been shown to be very effective for elucidating the underlying semantics of data. Thus, in this paper we investigate the use of various dimensionality reduction techniques (DRTs) to extract th

Comparison of Diversity Combining Techniques for ...
MRC, is not bounded as increasing signal-to-noise ratio (SNR). ... diversity gain, i.e. reliability of a wireless link, as compared to a conventional single-input ...

A Study Of Various Techniques For The Brain Tumor ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3 ..... assignment and there is a need and wide degree for future examination to ... Journal of Advanced Research in Computer Science and Software Engineering, Vol.

A Study Of Various Techniques For The Brain Tumor ... - IJRIT
A Study Of Various Techniques For The Brain Tumor ..... Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, No. 3, issue 3 ...