44 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
Comparative study of AODV, DSR, DSDV Routing
Protocol Using Network Simulator-2
Rahul,B.Tech(Scholar),AKGEC,Ghaziabad
Bhoomika,B.Tech(Scholar),AKGEC,Ghaziabad
Abstract
This paper report has two parts of study, the analytical study and the simulation study. From
analytical study, it is concluded that routing protocols play very important role in the
telecommunication and seamless communication. Different protocols have different qualities,
the selection of a suitable protocol definitely increase the performance of the network.
Introduction
Mobile ad-hoc network has the privilege to use two types of routing protocols/ algorithms ,
one of them is proactive routing protocols/ algorithms and the second is re-active routing
protocols/ algorithms. The assortment of these two categories is called hybrid routing
protocols. The best choice among these protocols is the torchbearer to best optimum solution
and effective performance.
This project compared the performance of DSDV, AODVand DSR routing protocols for ad
hoc networks using ns-2simulations. DSDV uses the proactive table-driven routing
Strategy in good way while on other ends AODV and DSR use the reactive strategy. Both
AODV and DSR performbetter under high mobility simulations than DSDV. High
mobility results in frequent link failures and the overheadinvolved in updating all the nodes
with the new routinginformation as in DSDV is much more than that involved
AODV and DSR, where the routes are created as and whenrequired. DSR and AODV both
use on -demand routediscovery, but with different routing mechanics
Analysis
Snapshot of AODV code
We open the text editor to write the code for AODV protocol,and then save it
45 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
Fig1 Snapshot of AODV code
1. Snapshot of execution of AODV code
Here we firstly open the terminal and by using the CD command we set the path where our
AODV code situated.after setting the path we type the following command to execute aodv
code.Ns 100aodv.tcl
46 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
When we press enter we can see the message on the terminal that show creation of the node.
Fig 2 Snapshot of terminal
2. Snapshot of initial state of AODV NAM
When code execute a nam file is created on the same location where our program situated
.and the following code in the AODV code file [open testAODV.nam] will open the nam .it
will contain 100 mobile node .the following snapshot show the location of the node before
starting transmission.
47 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
Fig 3 Snapshot of Transmission State
Here node are mobile ,all node are in movement and at the same time transmission is take
place between node 2 and node 11.
48 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
Fig 4. Snapshot of transmission
49 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
Fig 4 Snapshot of transmission at different time
This is snapshot show the transmission at some time.
50 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
Fig 5 Snapshot of Xgraph for Cwnd
CONCLUSION
Mobile ad-hoc network has the privilege to use two categories of routing protocols, one of
them is proactive routing protocols and the other is re-active routing protocols. The
assortment of these two categories is called hybrid routing protocols. The best choice among
these protocols is the torchbearer to best optimum solution and effective performance.
This project compared the performance of DSDV, AODVand DSR routing protocols for ad
hoc networks using ns-2simulations. DSDV uses the proactive table-driven routing
strategy while both AODV and DSR use the reactive Ondemandrouting strategy. Both
AODV and DSR performbetter under high mobility simulations than DSDV. High
51 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
mobility results in frequent link failures and the overheadinvolved in updating all the nodes
with the new routinginformation as in DSDV is much more than that involved
AODV and DSR, where the routes are created as and whenrequired. DSR and AODV both
use on -demand routediscovery, but with different routing mechanics
Particular. DSR uses source routing and route caches, anddoes not depend on any periodic or
timer-based activities.DSR exploits caching aggressively and maintains multipleroutes per
destination. AODV, on the other hand, usesrouting tables, one route per destination, and
destinationsequence numbers, a mechanism to prevent loops and to
determine freshness of routes. The general observationfrom the simulation is that for
application-oriented metricssuch as packet delivery fraction and delay AODV,
outperforms DSR in more “stressful” situations (i.e.,smaller number of nodes and lower load
and/or mobility),with widening performance gaps with increasing stress
(e.g., more load, high er mobility).
DSR, however,consistently generates less routing load than AODV. Thepoor performances of
DSR are mainly attributed toaggressive use of caching, and lack of any mechanism toexpire
stale routes or determine the freshness of routeswhen mult iple choices are available.
Aggressive caching,however, seems to help DSR at low loads and also keeps itsrouting load
down.
In our Project entitled performance analysis and comparison of routing protocol
In ad-hoc network. We found AODV performance is good than other two routing protocol.
LIMITATION
1. Our project is platform dependent .
2. Installation of NS2 take much amount of time.
3.Finding Error is difficult
4.Complex
FUTURE WORK
In the future, extensive complex simulations could becarried out using the project code, in
order to gain a morein-depth performance analysis of the ad hoc routing protocols. Other
new protocol performance could be studied too.
As future work in addition to end-to-end delay we propose to study the delay jitter
parameter, and investigate its impact on congestion control when the network is highly
loaded. Efficiency of mobile ad-hoc networks in terms of delay jitter would result in
decreased power consumption; therefore network life would be prolonged
52 Rahul, Bhoomika
International Journal of Engineering & Technology, Management and Applied Sciences
www.ijetmas.com Vol 1, Issue 1 June 2014
We will also like to suggest the development of enhanced simulator that could simulate the
seamless interaction of mobile nodes between two or more heterogeneous mobile ad-hoc
network and judge their performance. This will definitely establish new contemporary
research in the field of seamless communication enabled MANETs.
REFERENCES 1. D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad-hoc Wireless Netw ork”, Department of
Computer Science Carnegie University, Mellon, 1996.
2. Dr. F. Scott, Dr. A. Luiz Dr. J. Ira and Dr. P. Charles, “Mobile Ad hoc network Routing Protocols
Methodologies and Applications”, Department of Computer Engineering , Blacksburg Virginia, March 19, 2004.
3. “Mobile Ad Hoc Networks”, http://w3.antd.nist.gov/wahn_mahn.shtml. [Accessed: April,28, 2010].
4. K. Gorantala, “Routing Protocols in Mobile Ad-hoc Networks”, Department of Computer Science, Umeå
University, June 15, 2006.
.