Professional Documents
Culture Documents
Simulation Modeling of Reactive Protocols For Adhoc Wireless Network
Simulation Modeling of Reactive Protocols For Adhoc Wireless Network
259 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 8, No. 7, October 2010
every other node in the network. All nodes keep on updating Consequently, the nodes will change the entries of their
these tables to maintain latest view of the network. Some of route cache.
the existing table driven protocols are DSDV [4], GSR [9], (b) ADOV [3, 7] is a variation of Destination-Sequenced
WRP [8] and ZRP [11]. In on-demand routing protocols, Distance-Vector (DSDV) routing protocol which is
routes are created as and when required. When a transmission collectively based on DSDV and DSR. It aims to
occurs from source to destination, it invokes the route minimize the requirement of system-wide broadcasts to
discovery procedure. The route remains valid till destination is its extreme. It does not maintain routes from every node
achieved or until the route is no longer needed. Some of the to every other node in the network rather they are
existing on demand routing protocols are: DSR [5], AODV [3] discovered as and when needed & are maintained only as
and TORA [10]. The emphasis in this research paper is long as they are required. The algorithm used by AODV
concentrated on the study of mobility pattern and performance for establishment of unicast routes can be summarized
analysis of two prominent on-demand routing Protocols i.e. as. When a node wants to send a data packet to a
DSR and AODV. Surveys of routing protocols for ad hoc destination node, the entries in route table are checked to
networks have been discussed in [12, 13, 14]. A brief review ensure whether there is a current route to that destination
of DSR and AODV is presented here as these have been node or not. If it is there, the data packet is forwarded to
analyzed in this paper for their performance. the appropriate next hop toward the destination. If it is
(a) DSR [5, 7] is an Ad Hoc routing protocol which is not there, the route discovery process is initiated. AODV
source-initiated rather than hop-by-hop and is based on initiates a route discovery process using Route Request
the theory of source-based routing rather than table- (RREQ) and Route Reply (RREP). The source node will
based. This is particularly designed for use in multi hop create a RREQ packet containing its IP address, its
wireless ad hoc networks of mobile nodes. Basically, current sequence number, the destination’s IP address,
DSR protocol does not need any existing network the destination’s last sequence number and broadcast ID.
infrastructure or administration and this allows the The broadcast ID is incremented each time the source
Network to be completely self-organizing and self- node initiates RREQ. Basically, the sequence numbers
configuring. This Protocol is composed of two essential are used to determine the timeliness of each data packet
parts of route discovery and route maintenance. Every and the broadcast ID & the IP address together form a
node maintains a cache to store recently discovered unique identifier for RREQ so as to uniquely identify
paths. When a node desires to send a packet to some each request. The requests are sent using RREQ message
node, it first checks its entry in the cache. If it is there, and the information in connection with creation of a
then it uses that path to transmit the packet and also route is sent back in RREP message. The source node
attach its source address on the packet. If it is not there in broadcasts the RREQ packet to its neighbours and then
the cache or the entry in cache is expired (because of sets a timer to wait for a reply. To process the RREQ,
long time idle), the sender broadcasts a route request the node sets up a reverse route entry for the source node
packet to all of its neighbors asking for a path to the in its route table. This helps to know how to forward a
destination. The sender will be waiting till the route is RREP to the source. Basically a lifetime is associated
discovered. During waiting time, the sender can perform with the reverse route entry and if this entry is not used
other tasks such as sending/forwarding other packets. As within this lifetime, the route information is deleted. If
the route request packet arrives to any of the nodes, they the RREQ is lost during transmission, the source node is
check from their neighbor or from their caches whether allowed to broadcast again using route discovery
the destination asked is known or unknown. If route mechanism. Maintenance of routes is done using Local
information is known, they send back a route reply route repair scheme.
packet to the destination otherwise they broadcast the III. COMPARATIVE STUDY OF DSR AND AODV
same route request packet. When the route is discovered, DSR and AODV share certain salient characteristics.
the required packets will be transmitted by the sender on Specifically, they both discover routes only in the presence of
the discovered route. Also an entry in the cache will be data packets in the need for a route to a destination. Route
inserted for the future use. The node will also maintain discovery in either protocol is based on query and reply cycles
the age information of the entry so as to know whether and route information is stored in all intermediate nodes on the
the cache is fresh or not. When a data packet is received route in the form of route table entries (AODV) or in route
by any intermediate node, it first checks whether the caches (DSR). However, there are several important
packet is meant for itself or not. If it is meant for itself differences [7, 16] in the dynamics of these two protocols,
(i.e. the intermediate node is the destination), the packet which may give rise to significant performance differentials.
is received otherwise the same will be forwarded using The important differences are given below in the form of
the path attached on the data packet. Since in Ad hoc benefits and limitations of these protocols. These differences
network, any link might fail anytime. Therefore, route help in studying the pattern analysis and performance
maintenance process will constantly monitors and will evaluation of either protocol.
also notify the nodes if there is any failure in the path. Benefits and Limitations of DSR
DSR protocol has number of benefits. It does not use
periodic routing messages (e.g. no router advertisements and
260 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 8, No. 7, October 2010
no link-level neighbor status messages), thereby reducing sequence number is very old and the intermediate nodes have
network bandwidth overhead, conserving battery power, and a higher but not the latest destination sequence number,
avoiding the propagation of potentially large routing updates thereby having stale entries. The various performance metrics
throughout the ad hoc network. There is no need to keep begin decreasing as the network size grows. It is vulnerable to
routing table so as to route a given data packet as the entire various kinds of attacks as it based on the assumption that all
route is contained in the packet header. The routes are nodes must cooperate and without their cooperation no route
maintained only between nodes that need to communicate. can be established. The multiple Route Reply packets in
This reduces overhead of route maintenance. Route caching response to a single Route Request packet can lead to heavy
can further reduce route discovery overhead. A single route control overhead. The periodic beaconing leads to unnecessary
discovery may yield many routes to the destination, due to bandwidth consumption. It expects/requires that the nodes in
intermediate nodes replying from local caches. The DSR the broadcast medium can detect each others’ broadcasts. It is
protocol guarantees loop-free routing and very rapid recovery also possible that a valid route is expired and the
when routes in the network change. It is able to adapt quickly determination of a reasonable expiry time is difficult. The
to changes such as host movement, yet requires no routing reason behind this is that the nodes are mobile and their
protocol overhead during periods in which no such changes sending rates may differ widely and can change dynamically
occur. In addition, DSR has been designed to compute correct from node to node.
routes in the presence of asymmetric (uni-directional) links. IV. PERFORMANCE METRICS
In wireless networks, links may at times operate There are number of qualitative and quantitative
asymmetrically due to sources of interference, differing radio performance metrics that can be used to study the mobility
or antenna capabilities, or the intentional use of asymmetric pattern of reactive routing protocols viz. packet delivery ratio,
communication technology such as satellites. Due to the average end to end delay, protocol control overhead etc.
existence of asymmetric links, traditional link-state or distance Packet Delivery Ratio: This is the ratio of number of packets
vector protocols may compute routes that do not work. DSR, received at the destination to the number of packets sent from
however, will find a correct route even in the presence of the source. In other words, fraction of successfully received
asymmetric links. packets, which survive while finding their destination, is
DSR protocol is not totally free from limitations as it is not called as packet delivery ratio.
scalable to large networks. It is mainly efficient for mobile ad Sent and Received Packets: This refers to the number of
hoc networks with less than two hundred nodes. DSR requires packets sent over the network by the source node and the
significantly more processing resources than most other number of packets actually received by the destination node.
protocols. In order to obtain the routing information, each Average end-to-end delay: This is the average time delay for
node must spend lot of time to process any control data it data packets from the source node to the destination node.
receives, even if it is not the intended recipient. The Most of the existing routing protocols ensure the qualitative
contention is increased if too many route replies come back metrics. Therefore, we have used the packet delivery ratio as
due to nodes replying using their local cache. The Route quantitative metrics for pattern analysis and performance
Reply Storm problem is there. An intermediate node may send evaluation of aforementioned routing protocols using
Route Reply using a stale cached route, thus polluting other simulation modeling for 20 and 50 mobile nodes. The results
caches. This problem can be eased if some mechanism to have also been analyzed for DSR and AODV using sent and
purge (potentially) invalid cached routes is incorporated. The received packets with respect to varying speed and pause time.
Route Maintenance protocol does not locally repair a broken V. SIMULATION MODEL OF DSR AND AODV
link. The broken link is only communicated to the initiator. A random waypoint model [17] has been used and some
Packet header size grows with route length due to source dense/sparse medium scenarios have been generated using
routing. Flood of route requests may potentially reach all TCL. An extensive simulation model having scenario of 20
nodes in the network. Care must be taken to avoid collisions and 50 mobile nodes is used to study inter-layer interactions
between route requests propagated by neighboring nodes. and their performance implications. The Simulator used is NS
Benefits and Limitations of AODV 2.34 [18]. Packet size is 512 bytes. Same scenario has been
AODV protocol has number of benefits. The routes are used for both protocols to match the results. The performance
established on demand and destination sequence numbers are differentials are analyzed using packet delivery ratio with
used to find the latest route to the destination. The connection respect to varying speed and pause time and then sent and
setup delay is lower. It also responds very quickly to the received packets with respect to speed and pause time.
topological changes that affects the active routes. It does not Packet Delivery Ratio with respect to Speed and Pause Time
put any additional overheads on data packets as it does not for simulation of 20 mobile nodes
make use of source routing. It favors the least congested route Area considered is 750 meter × 750 meter and simulation run
instead of the shortest route and it also supports both unicast time is 500 seconds during pattern analysis of 20 nodes using
and multicast packet transmissions even for nodes in constant UDP and TCP connections both with respect to varying speed
movement. and pause time. Graph 1 shows the packet delivery ratio using
AODV has also certain limitations like DSR. The speed as a parameter. This performance metric has been
intermediate nodes can lead to inconsistent routes if the source evaluated for DSR and AODV using 20 nodes and 6 UDP
connections. Speed has been varied from 1m/s to 10 m/s. The
261 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 8, No. 7, October 2010
262 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 8, No. 7, October 2010
outperforms DSR when pause time is less and AODV protocol Sent and Received Packets with respect to Speed and Pause
gives approximately same PDR value as that of DSR protocol Time for simulation of 20 mobile nodes
when pause time is high. Graph 9 to 12 illustrate the summary of packets sent and
received for DSR and AODV protocols with respect to speed
and pause time for 20 mobile nodes having 6 UDP and TCP
connections.
Graph 10: Packets Sent and Recieved vs. Pause Time for 20
nodes with UDP Connections
263 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 8, No. 7, October 2010
Sent and Received Packets with respect to Speed and Pause In this paper, an effort has been made to concentrate on the
Time for simulation of 50 mobile nodes comparative study and performance analysis of two prominent
Graph 13 to 16 illustrate the sumamry of packets sent and on demand routing protocols i.e. DSR and AODV on the basis
received for DSR and AODV protocols with respect to speed of packet delivery ratio. The earlier work available in the
and pause time for 50 mobile nodes having 10 UDP and TCP literature has been studied carefully. An effort has been made
connections. to perform analysis on a new random way point self created
network scenario. The analysis has been reflected in graphs. It
has been analyzed that both protocols are good in performance
in their own spheres. Still the emphasis of better routing can
be on AODV as it performs better in denser mediums. DSR is
steady in sparse mediums but it just losses some ground in
denser environment and that too when more connections are
available and packet are in TCP mode. It is worth mentioning
that in the future MANETS, denser mediums will be used with
increasing applications, so it can be generalized that AODV is
better choice for routing in terms of better packet delivery.
Graph 13: Packets Sent and Recieved vs. Speed for 50 nodes Some of the aspects in this study are still under observation as
with UDP Connections
the performance is still to be compared with TORA, STAR
and ZRP. More metrics like end to end delay and throughput,
load and node life time is still to be taken into account. Power
efficiency and secure routing are other major concerns for the
future study. An effort will also be made to prove which
protocol is best as overall performer.
REFERENCES
[1] A.Kush, S. Taneja, “A Survey of Routing Protocols in Mobile Adhoc
Networks”, International Journal of Innovation, Management and
Technology, Vol. 1, No. 3, pp 279-285, August 2010.
[2] A.Kush, R.Chauhan,C.Hwang and P.Gupta, “Stable and Energy
Efficient Routing for Mobile Adhoc Networks”, Proceedings of the Fifth
International Conference on Information Technology: New Generations,
Gr ISBN:978-0-7695-3099-4 available at ACM Digital Portal, pp. 1028-
aph 14: Packets Sent and Recieved vs. Pause Time for 50 1033, 2008.
nodes with UDP Connections [3] C. Perkins, E. B. Royer, S. Das, “Ad hoc On-Demand Distance
Vector (AODV) Routing - Internet Draft”, RFC 3561, IETF Network
Working Group, July 2003.
[4] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-
sequenced distance vector routing (DSDV) for mobile computers”,
Proceedings of ACM SIGCOMM 94, pp. 34–244, 1994.
[5] D. B. Johnson, D. A. Maltz, Y.C. Hu, “The Dynamic Source Routing
Protocol for Mobile Ad Hoc Networks (DSR)”, IETF Draft,
http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt, April 2003.
[6] P. Chenna Reddy, Dr. P. Chandrasekhar Reddy, “Performance
Analysis of Adhoc Network Routing Protocols”, Academic Open Internet
Journal, Volume 17, 2006.
[7] Samir R. Das, Charles E. Perkins, Elizabeth M. Royer, “Performance
Comparison of Two On-demand Routing Protocols for Ad Hoc
Networks”, Proceedings of INFOCOM 2000, Tel-Aviv, Israel, March
Graph 15: Packets Sent and Recieved vs. Speed for 50 nodes 2000.
with TCP Connections [8] S. Murthy and J. J. Garcia-Luna-Aceves, "An Efficient Routing
Protocol for Wireless Networks", ACM Mobile Networks and App.
Journal, Special Issue on Routing in Mobile Communication Networks,
pp. 183-97, 1996.
[9] Tsu-Wei Chen and M. Gerla, "Global State Routing: A New Routing
Scheme for Ad-hoc Wireless Networks", Proceedings of International
Computing Conference IEEE ICC 1998.
[10] V. Park and S. Corson, Temporally Ordered Routing Algorithm
(TORA) Version 1, Functional specification IETF Internet draft,
http://www.ietf.org/internet-drafts/draft-ietf-manet-tora-spec-01.txt, 1998.
[11] Z. J. Hass and M. R. Pearlman, “Zone Routing Protocol (ZRP)”,
Internet draft available at www.ietf.org.
[12] J.Broch, D. A. Maltz and J. Jetcheva, “A performance Comparison of
Multi hop Wireless Adhoc Network Routing Protocols”, Proceedings of
Mobicomm’98, Texas, 1998.
[13] S. Ramanathan and M. Steenstrup, “A survey of routing techniques
Graph 16: Packets Sent and Recieved
VI. CONCLUSION ANDvs. Pause
FUTURETimeSCOPE
for 50 for mobile communications networks”, Mobile Networks and
nodes with TCP Connections Applications, pp. 89–104, 1996.
264 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 8, No. 7, October 2010
265 http://sites.google.com/site/ijcsis/
ISSN 1947-5500