The Design and Implementation of a Novel Skew Scenario Model in Mobile Ad Hoc Networks
نویسندگان
چکیده
Problem statement: In this research, it had been presented a novel Skew Scenario Model that has been developed and implemented for mobile ad hoc networks. There exist several mobility patterns that try to capture the behavior of the mobile devices under different circumstances, whereas in our work, the direction movement of the nodes is significantly specified horizontally, vertically and diagonally in the simulation area. Approach: Our novel Skew Scenario Model and the impact of mobility on MANET protocols had been compared and analyzed. The performance of DSDV and DSR under SSM in terms of packet delivery fraction, routing load and latency for varying source and destination traffic from 10, 20, 30, 40 and 50 under 100 nodes environment had been analyzed. Apart from this, our SSM with the existing waypoint model in 100 nodes environment had been compared. A suitable algorithm for SSM has also been developed. Results: Our simulation result showed that the functioning of our SSM had greatly influenced the performance of routing protocols in MANET environment. Simulation experiments confirm that for DSR under SSM, the PDF is highest between 93.56-99.43%, routing load is lowest between 1.005-1.068 and Latency is very less between 0.01630.049 sec, in the case of DSDV under SSM, the PDF is 63.22-79.104%, routing load is 1.20-1.58 and latency is 0.018-0.050 sec. The result revealed the fact that the reactive routing protocol DSR outperforms much more than the Proactive routing protocol DSDV. Our Novel Model has performed well when we compared it with existing waypoint mobility model while setting many source-destination connections. In DSR under SSM and waypoint model, PDF is between 93.56-99.43% in SSM and in waypoint 94.20-98.88%. Routing load in SSM is 1.0056-1.068, waypoint 1.01-1.06 seconds. Latency is between 0.026-0.063 in SSM and in waypoint 0.026-0.1235 sec. Conclusion: This study revealed the fact that the DSR discovers new routes faster and more effectively to the destination when the old route is broken as it invokes route repair mechanism locally also high route cache hit ratio in DSR, whereas in DSDV there is no route repair mechanism. In DSDV, if no route is found to the destination, the packets are dropped. While our novel SSM is compared with the existing waypoint model, the performance of SSM is better as far as PDF, Normalized Routing Load and latency are concerned. The reasons are velocity of mobile nodes are memory less random process and they move independently over other nodes also mobile node can move with a restriction in accordance with the given direction.
منابع مشابه
Design and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کامل