Performance parameters of protocol AOMDV under random obstacle mobility model

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that are dynamically self-configured, with no physical infrastructure nor centralized administration. In this article, we discuss which of the routing strategies for MANETs: proactive, reactive or hybrid, has a better performance. For the measurement, we have established thirty-six simulation for emergency scenarios in an urban area. This involved, in addition to quality of service (QoS) parameters defined, the calculation of the node densities and the usage of a mobility model needed to validate the results. These must determine which routing protocol has better QoS under the Random Obstacle Mobility Model. The simulator using was NS2 version 2.35.

     

     


  • Keywords


    Ad Hoc Networks; AODV; AOMDV; DSDV; MANET; QoS; Random Obstacle Mobility Model.

  • References


      [1] N. Padmavathy and S. K. Chaturvedi, “Evaluation of mobile ad hoc network reliability using propagation-based link reliability model,” Reliability Engineering System Safety, vol. 115, no. 0, pp. 1 – 9, 2013. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S0951832013000367 https://doi.org/10.1016/j.ress.2013.01.008.

      [2] S. Ahmed, N. Javaid, S. Yousaf, A. Ahmad, M. Sandhu, M. Imran, Z. Khan, and N. Alrajeh, “Co-laeeba: Cooperative link aware and energy efficient protocol for wireless body area networks,” Computers in Human Behavior, vol. 51, pp. 1205–1215, 2015, cited By 3. [Online]. Available: https://doi.org/10.1016/j.chb.2014.12.051.

      [3] K. Saleem, A. Derhab, J. Al-Muhtadi, B. Shahzad, and M. Orgun, “Secure transfer of environmental data to enhance human decision accuracy,” Computers in Human Behavior, vol. 51, pp. 632–639, 2015, cited By 3. https://doi.org/10.1016/j.chb.2015.01.023.

      [4] N. Liu and R. Yu, “Identifying design feature factors critical to acceptance and usage behavior of smartphones,” Computers in Human Behavior, vol. 70, pp. 131–142, 2017, cited By 0. https://doi.org/10.1016/j.chb.2016.12.073.

      [5] J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 562–583, 2011, cited By 208. https://doi.org/10.1109/SURV.2011.092110.00088.

      [6] L. Enciso and L. Mengual, “Assessment of throughput performance under ns2 in mobile ad hoc networks (manets),” 2013, pp. 338–343, cited By 0.

      [7] L. Enciso and L. Mengual, “Analysis of qos parameter in aodv a dsr in mobile ad hoc networks,” 2012, pp. 276–279, cited By 0. [Online]. Available: https://www.scopus.com/inward/record.uri?eid=2-s2.0- 84864877085partnerID=40md5=1ec5278a97247faad90850155c87cb05

      [8] NS2. “The Network Simulator NS-2,” http://www.isi.edu/ nsnam/ns/.

      [9] R. Amin, S. Ashrafch, M. Akhtar, and A. Khan, “Analyzing performance of ad hoc network mobility models in a peer-to-peer network application over mobile ad hoc network,” in Electronics and Information Engineering (ICEIE), 2010 International Conference On, vol. 2, aug. 2010, pp. V2–344 –V2–348. https://doi.org/10.1109/ICEIE.2010.5559795.

      [10] A. Boukerche, B. Turgut, N. Aydin, M. Z. Ahmad, L. Bo ̈lo ̈ni, and D. Turgut, “Routing protocols in ad hoc networks: A survey,” Computer Networks, vol. 55, no. 13, pp. 3032–3080, 2011. https://doi.org/10.1016/j.comnet.2011.05.010.

      [11] A. Boukerche, S. K. Das, and A. Fabbri, “Analysis of a randomized congestion control scheme with {DSDV} routing in ad hoc wireless networks,” Journal of Parallel and Distributed Computing, vol. 61, no. 7, pp. 967 – 995, 2001. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0743731500917234 https://doi.org/10.1006/jpdc.2000.1723.

      [12] T. Clausen and P. Jacquet, “Optimized link state routing protocol (olsr),” no. 3626, October 2003, RFC. [Online]. Available: http://rfc.net/rfc3626.txt https://doi.org/10.17487/rfc3626.

      [13] P. Gupta and P. Saxena, “Energy consumption in wireless ad hoc network,” in Emerging Trends in Engineering and Technology (ICETET), 2010 3rd Interna- tional Conference on, nov. 2010, pp. 831 –835. https://doi.org/10.1109/ICETET.2010.105.

      [14] D. Johnson, Y. Hu, and D. Maltz, “The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4,” ser. Request for Comments, no. 4728, Internet Engineering Task Force. IETF, February 2007. [Online]. Available: http://www.ietf.org/rfc/rfc4728.txt https://doi.org/10.17487/rfc4728.

      [15] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv) routing.” United States: RFC Editor, 2003. https://doi.org/10.17487/rfc3561.

      [16] C. Perkins, E. Royer, and S. Das, “Rfc 3561 ad hoc on-demand distance vector (aodv) routing,” 2003. [Online]. Available: http://tools.ietf.org/html/rfc3561 https://doi.org/10.17487/rfc3561.

      [17] D. B. Johnson, D. A. Maltz, and Y. C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” Feb. 2007. [Online]. Available: http://tools.ietf.org/html/rfc4728. https://doi.org/10.17487/rfc4728.

      [18] A. Radwan, T. Mahmoud, and E. Houssein, “Evaluation compari- son of some ad hoc networks routing protocols,” Egyptian Informat- ics Journal, vol. 12, no. 2, pp. 95 – 106, 2011. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S11108665 1100017X https://doi.org/10.1016/j.eij.2011.04.001.

      [19] F. D. Rango, J.-C. Cano, M. Fotino, C. Calafate, P. Manzoni, and S. Marano, “{OLSR} vs dsr: A comparative analysis of proactive and reactive mechanisms from an energetic point of view in wireless ad hoc networks,” Computer Communications, vol. 31, no. 16, pp. 3843 – 3854, 2008, ¡ce:title¿Performance Evaluation of Communication Networks (SPECTS 2007)¡/ce:title¿. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0140366408002375 https://doi.org/10.1016/j.comcom.2008.04.027.

      [20] L. Layuan, L. Chunlin, and Y. Peiyan, “Performance evaluation and simulations of routing protocols in ad hoc networks,” Computer Com- munications, vol. 30, no. 8, pp. 1890 – 1898, 2007. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0 14036640700103X https://doi.org/10.1016/j.comcom.2007.02.015.

      [21] D. Geetha and B. Revathi, “Article: Aomdv routing based enhanced security for black hole attack in manets,” vol. ICRTCT, no. 2, February 2013, pp. 20–24, published by Foundation of Computer Science, New York, USA.

      [22] M. Balachandra, P. K.v, and K. M, “Article: Enhancing the efficiency of wireless ad hoc networks by improving the quality of service routing,” vol. 3, no. 5, July 2012, pp. 51–59, published by Foundation of Computer Science, New York, USA.

      [23] H. Babaei, M. Fathi, and M. Romoozi, “Obstacle mobility model based on activity area in ad hoc networks,” vol. 4706, pp. 804–817, 2007. [Online]. Available: https://doi.org/10.1007/978-3-540-74477-1_72.

      [24] A. K. Abed, G. Oz, and I. Aybay, “Influence of mobility models on the performance of data dissemination and routing in wireless mobile ad hoc networks,” Computers Electrical Engineering, no. 0, pp.2013. [Online]. Available: http://www.sciencedirect.com/scien ce/article/pii/S0045790613000852.

      [25] E. Niewiadomska-Szynkiewicz, A. Sikora, and J. Koodziej, “Modeling mobility in cooperative ad hoc networks,” Mobile Networks and Applications, pp. 1–12, 2013. [Online]. Available: https://doi.org/10.1007/s11036-013-0450-2.

      [26] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing. Special issue on Mobile Ad Hoc Networking. Research, Trends and Applications, vol. 2, pp. 483–502, 2002. ISSN 0957-4174 https://doi.org/10.1002/wcm.72.

      [27] Liliana Enciso Quispe, Luis Mengual Galan, Behavior of Ad Hoc routing protocols, analyzed for emergency and rescue scenarios, on a real urban area, Expert Systems with Applications, Volume 41, Issue 5, 2014, Pages 2565-2573, [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0957417413008099. https://doi.org/10.1016/j.eswa.2013.10.004.

      [28] A. S. Tanenbaum, “Computer networks.” Prentice-Hall PTR, 2003.

      [29] J. M. S. Corson, “Mobile Adhoc Networking (MANET):Routing Protocol Performance Issues and Evaluation Considerations,” RFC 2501 (Standard), Internet Engineering Task Force, Aug. 1999. [Online]. Available: http://www.ietf.org/rfc/rfc2501.txt

      [30] S. Corson and J. Macker, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC 2501,” Jan. 1999. [Online]. Available: http://rfc.sunsite.dk/rfc/rfc2501 .html. https://doi.org/10.17487/rfc2501.

      [31] Y. Chenchen, L. Xiaohong, and Z. Dafang, “An obstacle avoidance mobility model,” in Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Con- ference on, vol. 3, oct. 2010, pp. 130 –134. https://doi.org/10.1109/ICICISYS.2010.5658821.

      [32] N. Aschenbruck, E. Gerhards-Padilla, and P. Martini, “A survey on mobility models for performance analysis in tactical mobile networks,” 2008.

      [33] M. Jiang, J. Li, and Y. C. Tay, “Cluster based routing protocol (cbrp) functional specification, internet draft, manet working group,” 1999.

      [34] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers,” 1994, pp. 234–244. https://doi.org/10.1145/190809.190336.

      [35] S. Kurkowski, W. Navidi, and T. Camp, “Constructing manet simulation scenarios that meet standards,” in Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on, Oct. 2007, pp. 1 –9. https://doi.org/10.1109/MOBHOC.2007.4428640.

      [36] S. Kurkowski, W. Navidi, and T. Camp, “Discovering variables that affect manet protocol performance,” in Global Telecommunications Conference, 2007. GLOBECOM ’07. IEEE, Nov. 2007, pp. 1237 –1242. https://doi.org/10.1109/GLOCOM.2007.238.

      P. Chenna Reddy and P. ChandraSekhar Reddy, “Performance analysis of adhoc net- work routing protocols,” in Ad Hoc and Ubiquitous Computing, 2006. ISAUHC ’06. International Symposium on, 2006, pp. 186 –187. https://doi.org/10.1109/ISAHUC.2006.4290671

 

View

Download

Article ID: 21426
 
DOI: 10.14419/ijet.v8i3.21426




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.