Professional Documents
Culture Documents
A Performance Evaluation of Proactive and Reactive Protocols Using NS2 Simulation
A Performance Evaluation of Proactive and Reactive Protocols Using NS2 Simulation
`
A PERFORMANCE EVALUATION OF PROACTIVE AND REACTIVE
PROTOCOLS USING NS2 SIMULATION
Abstract
Distance Vector(DSDV). In this paper the Reactive protocols DSR and AODV as
well as a Proactive Protocol DSDV were studied and their characteristics with
respect to different mobility are analyzed based on packet delivery fraction,
routing load, end-to-end delay, number of packets dropped, throughput and jitter
using Network Simulator (NS2) .
1. Introduction
In General, the network can be divided into two types based on their operation
namely infrastructure and infrastructure less. The infrastructure network (i.e. a
network with fixed and wired gateways) uses the fixed network topology and it
consists of nodes and base stations. The bridges of the network are known as base
stations. A mobile unit within the network connects the nearest base station for the
communication. In this infrastructure network, communication between nodes by
switching from one base station to another base station.
In infrastructure less network there are no such fixed infrastructures for nodes to
communicate with each other and each node acts as routers and cooperates with
other nodes for communication process. The Internet Engineering Task Force
created a MANET Working Group (WG) to deal with issues related to the
constructing MANET routing protocols. MANET [1] is a kind of wireless
network architecture that can be flexibly deployed in almost any environment
(e.g., conference rooms, forests, battlefields, disaster relief, vehicular services
such as transmission of news, road conditions, location award services,
emergency services, commercial environment, educational applications,
entertainment, sensor networks, home and enterprise networking etc.) without the
need of network infrastructure or centralized administration.
The fundamental difference between fixed networks and MANET is that the
computers in a MANET are mobile. Due to the mobility of these nodes, there are
some characteristics that are only applicable to MANET. Some of the key
3
In general routes between nodes in an ad hoc network may include multiple hops
and hence it is appropriate to call such networks as “multi-hop wireless ad-hoc
networks [2]”. Each node will be able to communicate directly with any other
node that resides within the transmission range. For communication with nodes
that reside beyond this range the node needs to use intermediate nodes to relay the
messages hop by hop. Ad hoc networks are useful in wide area of applications
such as military and other rescue application. Commercial applications are also
like where there is a need for ubiquitous communications without the presence of
fixed infrastructure.
2. Related Work
Several researchers have done the qualitative and quantitative analysis of Ad Hoc
Routing Protocols by means of different performance metrics. They have used
different simulators for this purpose.
4
♦ Samir R. Das , Charles E. Perkins et al. [3] evaluated the DSR and AODV on-
demand routing protocols with three performance metrics : Packet delivery
fraction, Average End-to-End Delay and Normalized routing load with varying
pause times. They have used ns-2 simulator. Based on the observations,
recommendations were made as to how the performance of either protocol can be
improved.
♦ J. Broch et al. [4], in their paper have compared the DSDV, TORA, DSR and
AODV Protocols using ns-2 simulator. The simulation was done with 50 nodes
with varying pause times. The results were obtained for the metrics: Packet
delivery ratio, Routing overhead, Number of hops taken by the packet to reach the
destination.
♦ Jyoti Raju and Garcia-Luna-Aceves [5], in their paper have compared WRP-Lite
a revised version of Wireless Routing Protocol with DSR. The performance
parameters used are end-end delay, control overhead, percentage of packets
delivered and hop distribution. The evaluation of the performance metrics was
done with respect to varying pause time. It was observed that WRP-lite has much
better delay and hop performance while having comparable overhead to DSR.
♦ Samir R. Das et al. [6] evaluated the performance of routing protocols with
respect to fraction of packets delivered, end-to-end delay, and routing load by
varying the number of conversation per node. The evaluation was done with 30
and 60 nodes using Maryland Routing Simulator. The protocols used in the
simulation are SPF, DSDV, TORA, DSR, AODV.
♦ Azzedine Boukerche [7] , in his paper has done the performance comparison of
AODV,CBRP and DSR Ad Hoc routing protocols using ns-2 simulator. The key
performance metrics evaluated in his experiments are Throughput, Average End-
to-end delay of data packets and Normalized routing overhead for different data
sources and varying pause times of mobile nodes. As per his observation DSR and
5
CBRP has high throughput than in comparison with AODV.CBRP has high
routing overhead than DSR.
One way to categorize the routing protocols is to divide them into centralized and
distributed algorithms. In centralized algorithms, all route choices are made at a
central node, while in distributed algorithms, the computation of routes is shared
among the network nodes. In static algorithms, the route used by source
destination pairs is fixed regardless of traffic condition. It can only change in
response to a node or link failure. This type of algorithm cannot achieve high
throughput under a broad variety of traffic input patterns. In adaptive routing, the
routes used to route between source-destination pairs may change in response to
congestion. A third classification that is more related to ad-hoc networks is to
classify the routing algorithms as either proactive or reactive.
It maintain one or more routing tables in every node in order to store routing
information about other nodes in the MANET. These routing protocols attempt to
update the routing tables information either periodically or in response to change
6
It initiate a route discovery mechanism by the source node to discover the route to
the destination node when the source node has data packets to send to the
destination node. After discovering the route, the route maintenance is initiated to
maintain this route until the routes no longer required or the destination is not
reachable.The main advantage of these protocols is that overhead messaging is
less. One of the drawbacks of these protocols is the delay of discovering a new
route. The different types of Reactive routing protocols are : Dynamic Source
Routing (DSR) , Ad hoc On-Demand Distance Vector routing (AODV) and
Temporally Ordered Routing Algorithm(TORA).
The Dynamic Source Routing protocol (DSR) [8] is a simple and efficient routing
protocol designed specifically for use in multi-hop wireless ad hoc networks of
mobile nodes. Using DSR, the network is completely self-organizing and self-
configuring, requiring no existing network infrastructure or administration.
Network nodes cooperate to forward packets for each other to allow
communication over multiple "hops" between nodes not directly within wireless
7
transmission range of one another. The DSR protocol is composed of two main
mechanisms that work together to allow the discovery and maintenance of source
routes in the ad hoc network.Route Discovery is the mechanism by which a node
S wishing to send a packet to a destination node D obtains a source route to D.
Route Discovery is used only when S attempts to send a packet to D and does not
already know a route to D. Route Maintenance is the mechanism by which node S
is able to detect, while using a source route to D, if the network topology has
changed such that it can no longer use its route to D because a link along the route
no longer works. When Route Maintenance indicates a source route is broken, S
can attempt to use any other route it happens to know to D, or it can invoke Route
Discovery again to find a new route for subsequent packets to D. When a node
requires a route to a destination, which it doesn’t have in its route cache, it
broadcasts a Route Request (RREQ) message, which is flooded throughout the
network. The first RREQ message is a broadcast query on neighbors without
flooding. Each RREQ packet is uniquely identified by the initiator’s address and
the request id. A node processes a route request packet only if it has not already
seen the packet and its address is not present in the route record of the packet.
This minimizes the number of route requests propagated in the network. RREQ is
replied by the destination node or an intermediate node, which knows the route,
using the Route Reply (RREP) message. The return route for the RREP message
may be one of the routes that exist in the route cache (if it exists) or a list reversal
of the nodes in the RREQ packet if symmetrical routing is supported. In other
cases the node may initiate it owns route discovery mechanism and piggyback the
RREP packet onto it. Thus the route may be considered unidirectional or
bidirectional. DSR doesn’t enforce any use of periodic messages from the mobile
hosts for maintenance of routes. There are two types of packets for route
maintenance: Route Error (RERR) packets and ACKs. Whenever a node
encounters fatal transmission errors so that the route becomes invalid, the source
receives a RERR message. The source node then removes the erroneous hop from
8
all of its route cache entries, and selects a new route, or if there are no more
available routes, it initiates a new route discovery. ACK packets are used to verify
the correct operation of the route links. This also serves as a passive
acknowledgement for the mobile node.
RERR propagates towards the source, each intermediate node invalidates routes to
any unreachable destinations. When the source of the data receives the RERR, it
invalidates the route and reinitiates route discovery if necessary.
3.5 Destination Sequenced Distance Vector(DSDV)
DSDV [11] is a Table driven routing protocol based on the classical Bellman-Ford
routing algorithm. The improvement made to the Bellman-Ford algorithm
includes freedom from loops in routing tables by using sequence numbers. In this
routing protocol, each mobile node in the system maintains a routing table in
which all the possible destinations and the number of hops to them in the network
are recorded. A sequence number is also associated with each route/path to the
destination. The route labeled with the highest sequence number is always used.
This also helps in identifying the stale routes from the new ones, thereby avoiding
the formation of loops. Also, to minimize the traffic generated, there are two types
of packets in the system. One is known as “full dump”, which is a packet that
carries all the information about a change. However, at the time of occasional
movement, another type of packet called “incremental” will be used, which will
carry just the changes, thereby, increasing the overall efficiency of the system.
The data broadcast by each mobile node will contain the new sequence number,
the destination’s address, the number of hops to reach the destination and the
sequence number of the information received regarding that destination. Each
node advertises an increasing even sequence number for itself. When Node A
determines that destination Node D is unreachable, it advertises the next odd
sequence number for the route that has failed with an infinite metric count. Any
node that receives this infinite metric count updates its table for the matching
route and waits until a greater sequence number with non-infinite metric count is
received. Every mobile host also calculates the weighted average of the time taken
to receive a route with the best metric. This time is called as settling time. A
comparison of the characteristics of the above three ad hoc routing protocols
DSDV, DSR, AODV is given in Table 1.
10
Multicast No No Yes
QoS Support No No No
Route
Routes Maintained in Route Cache Route Table
Table
End-to-End Delay: The average time interval between the generation of a packet
in a source node and the successfully delivery of the packet at the destination
node. It counts all possible delays that can occur in the source and all intermediate
nodes, including queuing time, packet transmission and propagation, and
retransmissions at the MAC layer. The queuing time can be caused by network
congestion or unavailability of valid routes.
11
Packet Delivery Fraction: The ratio of the number of data packets successfully
delivered to all destination nodes and the number of data packets generated by all
source nodes.
Routing Load: The ratio of the number of routing messages propagated by every
node in the network and the number of data packets successfully delivered to all
destination nodes. In other words, the routing load means the average number of
routing messages generated to each data packet successfully delivered to the
destination.
Number of Packets dropped: The number of data packets that are not
successfully sent to the destination during the transmission.
Jitter: Jitter describes standard deviation of packet delay between all nodes.
Throughput: The throughput metric measures how well the network can
constantly provide data to the sink. Throughput is the number of packet arriving at
the sink per ms.
There are two approaches used to evaluate routing protocols: using simulation or
performing experiments on real time. In both cases, the performance metrics as
well as the network context are equally important. In this work, the characteristics
and behavior of the AODV, DSV and DSDV routing protocols especially in the
initial condition of the communication between nodes for a very short duration.
During the initial condition, the routing protocols will behave varyingly due to the
differences in the mechanism of route discovery. The route discovery process
will be affected by the mobility of each and every nodes of the network. So during
the initial phase of communication, the behavior of the routing protocol and the
12
Number of Nodes 20
Number of Sending Nodes 10
The Pause Time 0, 10, 20, 30&40(sec)
Routing Protocol DSDV/AODV/DSR
The Maximum Node Speed 20m/s
Topography x=500 y=500
Propagation Two Ray Ground
Antenna Type Omni Antenna
The table below shows the performance of the routing protocols DSDV, AODV,
and DSR with respect to different metrics considered above.
13
Total Dropped
Routing Load
Throughput
Normalized
End to End
Delay (ms)
Pause Time(sec)
Packets
Jitter
PDF
Throughput
Normalized
End to End
Delay (ms)
Pause Time(sec)
Packets
Jitter
PDF
Total Dropped
Routing Load
Throughput
Normalized
End to End
Delay (ms)
Pause Time(ms)
Packets
Jitter
PDF
Pause-Time vs PDF
120
100
80
DSDV
PDF
60 AODV
DSR
40
20
0
0 10 20 30 40
Pause-Time
In terms of PDF with respect to varied pause time, DSR performs well when the
number of nodes is less, which is shown in Fig.1. The performance of AODV is
consistently uniform and DSDV performance is poor than reactive protocols.
2.5
Normalised Routing Load
1.5 DSDV
AODV
1 DSR
0.5
0
0 10 20 30 40
Pause-Time
In terms of Routing Load with respect to varied pause time, DSR is found to be
less when compared to AODV and DSDV because of DSR aggressive caching
techniques, which is observed in Fig.2 .
P a us e -Tim e vs E nd to E nd D e la y
25
20
End to End Delay (ms)
15 DSDV
AODV
10 DSR
0
0 10 20 30 40
P a us e -Tim e
1800
1600
1400
400
200
0
0 10 20 30 40
Paus e-Tim e
P a us e -T im e vs A ve ra g e T hro ug hp ut
120
100
80
DSDV
Throughput
60 AOD V
DSR
40
20
0
0 10 20 30 40
P a us e -Tim e
30
25
20
Jitter
DSDV
15 AODV
DSR
10
0
0 10 20 30 40
Pause-Time
With regard to jitter, DSDV and AODV showed the best average performance
than DSR. Jitter is determined by calculating the standard deviation of the latency
as shown in Fig. 6.
In terms of Power efficiency, DSDV is the best performer than reactive protocols.
AODV consumes much power while comparing with the other two, which is
observed in Fig. 7.
18
With regard to throughput versus time, DSR consumes considerable power and
gives lower throughput due to network failure, which is shown in Fig. 8. (Since
we started the simulation with very low battery power)
In this paper, we have examined simulation studies and also compared the On-
Demand (DSR and AODV) and Table-Driven (DSDV) routing protocols by
varying the pause time and measured the metrics like end-end delay, dropped
packets, routing overhead, power efficiency etc. The results indicate that the
performance of the two on demand protocols namely DSR and AODV is superior
to the DSDV in conformance with the work done by other researchers as
mentioned in section 2. It is also observed that DSR outperforms AODV in less
stressful situations, i.e smaller number of nodes. AODV outperforms DSR in
more stressful situations. The poor delay and packet delivery ratio of DSR is
mainly due to caching and lack of mechanisms to expire stale routes. The routing
overhead is consistently low for DSR and AODV than in comparison with DSDV
especially for large number of nodes. This is due to the fact that in DSDV the
routing table exchanges would increase with larger number of nodes. The results
19
indicate that as the number of nodes in the network increases DSDV would be
better with regard to the packet delivery ratio, but it may have considerable
routing overhead. As far as packet delay and dropped packets ratio are concerned,
DSR/AODV performs better than DSDV with large number of nodes. Hence for
real time traffic AODV is preferred over DSR and DSDV. For less number of
nodes and less mobility, DSDV’s performance is superior. The metric of Power
efficiency concerns, the result indicates that DSDV is best performer. As far as
throughput versus time concern, DSR consumes considerable power and gives
lower consumption due to network failure.
Acknowledgments
References
[3] S.R. Das, C.E. Perkins, and E.E. Royer, “Performance Comparison of Two
On-Demand Routing Protocols for Ad Hoc Networks,” Proc. INFOCOM,
2000, pp.3- 12.
[8] D. Johnson, Y. Hu, D. Maltz, “The Dynamic Source Routing Protocol (DSR)
for Mobile Ad Hoc Networks for IPv4” RFC 4728 February 2007