Comparative Analysis of AODV, DSR, GRP, OLSR and TORA by varying Number of Nodes with FTP and HTTP Applications over MANETs

نویسندگان

  • Gagangeet Singh Aujla
  • Sandeep Singh Kang
چکیده

Recent years have witnessed an extreme growth in research and development in the field of Wireless Networks. The special focus has been on Ad-hoc Networks especially Mobile Ad-hoc Network (MANET). Mobile ad-hoc network is a dynamic instant mutihop radio infrastructure-less temporary network of wireless mobile nodes in which each participating nodes act as host and router at the same time. Routing is a crucial activity and plays an important role in the success of the communication in these structures. Many routing protocols have been presented for Mobile Ad-hoc network since last decade. The major difference between these protocols lies in the mechanism of searching, maintenance and recovering the route path. In the recent researches, there are numerous MANET routing protocols aiming to find the most suitable path from source to destination. In this paper, a simulation based comparative analysis is performed on various types of routing protocols over MANET. Ad Hoc OnDemand Distance Vector (AODV), Dynamic Source Routing (DSR), Temporally-Ordered Routing Algorithm (TORA), Optimized Link State Routing (OLSR) and Geographic Routing Protocol (GRP) has been considered for investigation in this paper based on throughput, delay, load and data dropped performance metrics using OPNET Modeler .

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

IJASCSE Volume 2, Special Issue 1, 2013

-Wireless Mesh Networks (WMNs) are the set of wireless nodes that can communicate with each other and forwarding each other’s packets. WMNs are multi-hop networks consisting of routers, gateways and mobile nodes, they aim at guarantee connectivity. They act as a key technology for next generation WMNs due to their low cost and relative ease of deployment they are an attractive paradigm and are ...

متن کامل

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

Wireless Technology is at its peak when we talk about research and innovation. This field has become a hub of invention of new theories and structures. Mobile Ad-hoc Network is a special point of focus for the researchers. MANET is a collection of wireless mobile nodes which forms a dynamic temporary network without using any existing infrastructure. In recent time the market of mobile devices,...

متن کامل

A Comparative Study of the Various Routing Protocols in Mobile Ad- Hoc Networks Using OPNET Simulator

Mobile Ad-hoc Networks (MANET) is type of Network which built up spontaneously whenever communicating devices come into range .due to high mobility of nodes link breakage occurs frequently, Nodes In a network service as host as well as a router . MANET does not have any fixed infrastructure and inanity of central management. In spite of all these features MANET utilize under various critical co...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013