You are on page 1of 13

SIMULATION AND RESULT

The tool used for simulation is NS-2 which is highly preferred by research communities. The network simulator version 2 (NS-2) is a package of tools that simulates behaviour of networks. It is a discrete event network simulator developed at UC Berkeley that focuses on the simulation of IP networks on the packet level. It can simulate both wired and wireless network. Wireless network research in the last years is often based on simulation. Ns-2 is a widely used wireless network simulation tool for this purpose [21] C++ and Tool Command Language (TCL) are the two languages used in NS-2. It uses TCL/OTCL (Tool TCL is its Command Language/ Object Oriented TCL) as a command & configuration interface. Basically scripting and frontend language and C++ is its backend language. NS-2 includes a tool for viewing the simulation results, called Network Animator (NAM) [22], [23]. It uses three types of files namely Tool Command Language file (.tcl), Trace file (.tr) and Network Animator file (.nam). Tool command language file (.tcl) has subsets of commands which are written into it for simulation. While simulator runs on .tcl, simulation trace file (.tr) and animation file (.nam) are created during the session. Trace file (.tr) is used to trace the whole process and Network Animator file (.nam) is used to visualize the traffic the model. behaviour of network protocols and

4.1

Simulation Envoirment

In our scenario we take 30 nodes .The simulation is done using NS-2, to analyze the performance of the network by varying the nodes mobility. The protocols parameters used to evaluate the performance are given below: i) ii) iii) iv) Total No. of Drop Packets: It is the difference between sending and received packets. Packet Delivery Ratio: The ratio between the numbers of packets received to the send. Throughput: Throughput is the average rate of successful message delivery over a communication channel. End to end Delay: It can be defined as the time a packet takes to travel from source to destination.

4.2

Simulation Parameter
Table 2: Simulation Parameters Considered Parameters Simulator Mobility Model Area of Map PHY/MAC Routing Protocol Network Traffic Simulation Time Values NS-2 Random Way Point 500X500 IEEE 802.11 AODV,DSDV,DSR,OLSR TCP,UDP 300sec

4.3

Simulation results on AODV


1) Send, received and dropped Packet: The graph shows the Simulation result between no. of send, received and dropped packets with the simulation time in seconds.

Fig 4.1 Simulation graph of send, received and dropped packet in


AODV 2)
node.

End to end delay: The graph shows the Simulation result

between end to end delays with respect to packet send time at source

4.2 Simulation graph of End to end delay in AODV


3) Throughput of 1) Sending packets: The graph shows the Simulation result
between of throughput of sending packets with respect to simulation time in seconds.

4.3 Simulation graph of Throughput of sending packets in AODV


2)

Receiving packets: The graph shows the Simulation

result between of throughput of receiving packets with respect to

simulation time in seconds.

4.4 Simulation graph of Throughput of receiving packets in AODV


3) Sending and Receiving packets: The graph shows the
Simulation result between throughput of sending and receiving packets with respect to simulation time in seconds.

4.5 Simulation graph of sending and receiving packets in AODV 4) Packet delivery ratio of AODV: 4.3
1)

Simulation result of DSDV


Send, received and dropped Packet: The graph shows the

Simulation result between no. of send, received and dropped packets with the simulation time in seconds.

Fig 4.6 Simulation graph of send, received and dropped packet in DSDV

1) Throughput of 1) Sending packets: The graph shows the Simulation result


between throughputs of sending packets with respect to simulation time in seconds.

4.7 Simulation of Throughput of sending packets in DSDV


2)

Receiving packets: The graph shows the Simulation

result between of throughput of receiving packets with respect to

simulation time in seconds

4.8 Simulation of Throughput of receiving packets in DSDV


3) Sending and Receiving packets: The graph shows the Simulation
result between throughput of sending and receiving packets with respect

to simulation time in seconds.

4.9 Simulation of sending and receiving packets in DSDV


2)
node.

End to end delay: The graph shows the Simulation result

between end to end delays with respect to packet send time at source

4.10 Simulation of End to end delay in DSDV

Results & Conclusion: For comparing the performance of all


the four protocols, four routing matrices have been taken. with high mobility and high traffic. Matrices Delay(Sec) Throughpu t PDR NRL AODV 39.84 251.37 92 0.003 DSR 673.65 244.54 89.3 0.005 DSDV 8.43 237.09 86.6 0.001 OLSR 6.29 177.15 64.83 0.007

By observing the table it is found that AODV has maximum throughput under low traffic and DSDV has maximum throughput under high traffic. As network becomes dense OLSR, DSR and DSDV perform well in terms of Throughput than AODV . DSR performs well in dense networks in terms of packet delivery fraction but at the same time Normalized Routing load of OLSR is maximum among all the protocols in both the networks. DSDV has least Normalized Routing load in both low and high traffic. OLSR and

DSDV give the least Jitter and Average Delay in both networks Low delay and low jitter are mainly required in voice applications (i.e. Voice over Internet Protocol (VOIP)) and real time applications (i.e. real time multi player games in mobile ad hoc environment), so OLSR and DSDV can be used there. The least the value of Normalized Routing load, least will be the wasted portion of BW that is used for exchange of routing message between nodes and more will be the BW available for transferring data between nodes. The applications like voice and video conferencing need more BW, so in this case DSDV can be used. The applications like video telephony, web games, etc. require high throughput, so in this case AODV can be used under low mobility and low traffic and DSDV can be used under high mobility and high traffic. There is high mobility of users and network nodes at the time of emergency and military operations. We have observed that as the mobility increases there is an improvement in the throughput of OLSR, DSR and DSDV. So these three protocols can be used in emergency and military applications.

CONCLUSIONS:
The performance evaluation is necessary for analyzing the shortcoming of existing approaches and making the requirement with more applicable design for MANET. This paper compares the routing protocols AODV, DSDV and DSR performance in the cluster base MANET environment with increases the mobile node in the cluster for making high traffic scenario. Finding indicates that from these any single protocol is not suitable for efficient routing in different environment. DSR protocol is more applicable in small size of cluster but as size of the cluster increased AODV protocol shows drastic changes in its performance and more applicable while DSDV evaluation results are not desirable in comparison with other two reactive routing protocols

Future work:. In the area of MANET research, there is always scope for here for future work we can suggest energy aware approach for routing. For wireless networks, energy is always vital resource, so we have to add mechanism to minimize the energy consumption as well to present study.

REFERENCES
[1] http://en.wikipedia.org/wiki/MANET. [2] Schoch, E. Ulm Univ., Ulm Kargl, F.Weber,M. Leinmuller, T. Communication patterns in MANETs Volume: 46 , Issue: 11 Page(s): 119- 125,Dated on Nover 2008. [3] Saleet, H. Dept. of Syst. Design Eng., Univ. of Waterloo, Waterloo, ON, Canada Basir,O.,Langar,R.,Boutaba,R.Region-BasedLocation-Service-Management Protocol for MANETs Volume: 59 , Issue: 2 Page(s): 917- 931,Dated on Feb. 2010. [4] Yan-Bo Wang Dept. of Electr. Eng., Tamkang Univ., Tamsui, Taiwan Tin-Yu Wu, Wei-Tsong Lee, Chih-Heng Ke A Novel Geographic Routing Strategy over MANET Page(s): 873- 879. [5] Suriyapaibonwattana, K. Fac. of Inf. Technol., King Mongkut's Inst. of Technol. Ladkrabang, Bangkok Pomavalai, C. An Effective Safety Alert Broadcast Algorithm for MANET Page(s): 247- 250 Dated on 21-23 Oct. 2008.

[6] Abedi, O. Iran Univ. of Sci. & Technol., Tehran Fathy, M. ; 229- 235,Dated on March 31 2008-April 4 2008.

Taghiloo, J.

Enhancing AODV routing protocol using mobility parameters in MANET Page(s): [7] Abedi, O. Comput. Eng. Dept., Iran Univ. of Sci. & Technol. (IUST), Tehran, Iran Berangi, R. ; Azgomi, M.A. Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for MANET Page(s): 464- 467. [8] Manvi, S.S. Dept. of Inf. Sci. Eng., REVA Inst. of Technol. & Manage., Bangalore, India Kakkasageri, M.S. ; Mahapurush, C.V. , Performance Analysis of AODV, DSR, and Swarm Intelligence Routing Protocols In Vehicular Ad Hoc Network Environment, Page(s): 21- 25 [9] Juan Angel Ferreiro-Lage ,Cristina Pereiro Gestoso,Oscar Rubios Fernando Aguado Agelet,Analysis of Unicast Routing Protocols for MANETs, Dated on April 20-April 25. [10] http://en.wikipedia.org/wiki/List_of_ad_hoc_routing_protocols. [11] http://en.wikipedia.org/wiki/Wireless_ad_hoc_network. [12] http://en.wikipedia.org/wiki/Mobile_ad-hoc_networks. [13] http://en.wikipedia.org/wiki/MANET. [14] http://www.ehow.com/list_6670042_manet-routing-protocols.html. [15] http://en.wikipedia.org/wiki/AODV. [16] http://en.wikipedia.org/wiki/DSDV.

You might also like