PROTOCOLS Presented By: Sandeep Kaur Mtech CSE/ Part Time Roll No: M10/12 INTRODUCTION A Mobile Ad hoc Network (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile outers connected by wireless links. It is a wireless network without infrastructure. Self- configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. Efficient routing protocols will make MANETs reliable. Various research communities are working in field of MANET and trying to adopt the protocols and technology in other applications as well. One of the important research areas in MANET is establishing and maintaining the ad hoc network through the use of routing protocols. CATEGORIES OF MANET ROUTING PROTOCOLS Proactive: These types of protocols are called table driven routing protocols in which, all the route information is maintained in routing table. The aim is to keep consistent and up to date routing information between every pair of nodes in the network by proactively propagating route updates at fixed time intervals. Example - Destination-Sequenced Distance Vector (DSDV); Optimized Link-State Routing (OLSR); HSR (Hierarchical State Routing Protocol) etc. Reactive: This network maintains only the routes that are currently in use, so reducing the burden on the network when only a few of all available routes is in use at any time. These types of protocols are also called as On Demand Routing Protocols where the routes are not before defined for routing. Example: Dynamic Source Routing (DSR); Ad Hoc On-Demand Distance Vector (AODV) etc. Hybrid: This type of protocols combines the features of proactive and reactive routing protocols. Routing is established proactively by prospected routes and then serves the demands from additionally activated nodes through reactive flooding. Examples of hybrid protocols are: ZRP (Zone Routing Protocol); TORA (Temporally Ordered Routing Algorithm). APPLICATIONS OF MANETS There are various applications of MANETs such as: Military or police exercises. Disaster relief operations. Mine site operations. Urgent Business meetings Personal area network DSR Dynamic Source Routing The key distinguishing feature of DSR is the use of source routing. That is, the sender knows the complete hop-by-hop route to the destination. These routes are stored in a route cache. The data packets carry the source route in the packet header. When a node in the ad hoc network attempts to send a data packet to a destination for which it does not already know the route, it uses a route discovery process to dynamically determine such a route. Route discovery works by flooding the network with route request (RREQ) packets. Each node receiving an RREQ rebroadcasts it, unless it is the destination or it has a route to the destination in its route cache. Such a node replies to the RREQ with a route reply (RREP) packet that is routed back to the original source. AODV Ad-hoc OnDemand Distance Vector AODV shares DSRs on-demand characteristics in that it also discovers routes on an as needed basis via a similar route discovery process. However, AODV adopts a very different mechanism to maintain routing information. It uses traditional routing tables, one entry per destination. This is in contrast to DSR, which can maintain multiple route cache entries for each destination. Without source routing, AODV relies on routing table entries to propagate an RREP back to the source and, subsequently, to route data packets to the destination. AODV uses sequence numbers maintained at each destination to determine freshness of routing information and to prevent routing loops. These sequence numbers are carried by all routing packets. PROBLEM STATEMENT In this project, attempt is to compare two well-known protocols AODV (reactive) and DSR (reactive) using NS2 tool. The comparison will be done based on performance metrics like Throughput, and Packet delivery ratio METHODOLOGY Step:-1 Install Ubuntu 12.10 Step:-2 Update ubuntu using command Sudo-apt get update Step:-3 Install NS-2.35 Step:-4 Install xgraph Step:-5 Install Network Animator Step:-6 Create a scenario consisting of 5-10 mobile nodes, also define the node configuration for AODV protocol. Obtain graphs for Throughput and Packet Delivery ratio Step:-7 Similarly create a scenario for DSR protocol using same node configuration. Obtain graphs for throughput and packet delivery ratio. Step:-8 Show the comparison through graphs FUTURE WORK In our thesis work we will improve the security of AODV protocol using Cryptography algorithm. After improving security we will compare the modified protocol with simple AODV protocol. Further comparisons can be obtained with other protocols such as DSDV, DSR.