Académique Documents
Professionnel Documents
Culture Documents
vi
List of Tables
Table No. Table Name Page no.
Comparison of wlan, wpan and wban
Table 1.1 19
Comparision Table
Table 2.1 25
Simulation parameter under ieee 802.11
Table 4.1 39
VII
List of Figures
VIII
End to end delay vs network size
Figure 5.1 42
End to end delay vs network size
Figure 5.2 43
End to end delay with increasing speed of node
Figure 5.3 43
End to end delay vs workload
Figure 5.4 44
Throughput vs network size
Figure 5.5 45
Throughput vs network size
Figure 5.6 46
Throughput vs mobility
Figure 5.7 46
Throughput vs workload
Figure 5.8 47
End to end delay with increasing no. Of nodes
Figure 5.9 48
Delay vs network size
Figure 5.10 49
End to end delay vs mobility
Figure 5.11 50
Throughput vs mobility
Figure 5.12 51
Throughput vs network size
Figure 5.13 52
Throughput vs network size
Figure 5.14 52
IX
Abbreviations
NS 2 Network Simulator
X
RREQ Route Request
PKT Packet
IT Information Technology
HT Hotspots
XI
TABLE OF CONTENT
XII
CHAPTER 2 Literature Survey 21
CHAPTER 3 Problem Domain and Solution Domain
3.1 Problem Domain 29
3.2 Solution Domain 29
3.2.1 Algorithm (Multicast) 30
CHAPTER 4 Implementation
4.1 Introduction to NS2 34
4.2 Evaluation Platform 34
4.3 Network Simulator [18] 34
4.3.1 NS-2 35
4.3.2 Glomosim 35
4.3.3 Opnet Modeler 35
4.4 Comparison 35
4.5 Mobility Models in NS-2 36
4.6 Traffic Connection [19] in NS2 37
4.6.1 CBR traffic (constant bit rate) 37
4.6.2 TCP traffic 38
4.7 NS2 Languages [20] 38
4.8 Steps For Getting Trace And NAM Files 38
4.9 Network Simulator Setup For Simulation under IEEE 802.11 39
4.9.1 Input Parameters 39
4.9.2 Output Parameters 40
CHAPTER 5 Result Analysis
5.1. Performance Parameter For Routing Protocols 41
5.1.1 End to End Delay 41
5.1.2 Throughput 41
5.2 Simulation Results On Routing Protocols 42
5.2.1 End To End Delay Vs Network Size (0 Speed ) 42
XIII
5.2.2 End To End Delay Vs Network Size (20 Speed) 42
5.2.3 End To End Delay Vs Mobility 43
5.2.4 End To End Delay Vs Workload 44
5.2.5 Throughput Vs Network Size (20 Speed) 45
5.2.6 Throughput Vs Network Size (0 Speed) 45
5.2.7 Throughput Vs Mobility 46
5.2.8 Throughput Vs Workload 47
5.3 Simulation Results On Routing Protocols 48
5.3.1 End To End Delay Vs Network Size 48
5.3.2 End to End Delay Vs Network Size 49
5.3.3 End to End Delay Vs Mobility 50
5.3.4 Throughput Vs Mobility 51
5.3.5 Throughput Vs Network Size 51
5.3.6 Throughput Vs Network Size (0 Speed) 52
Chapter 6 CONCLUSION AND FUTURE WORK
6.1 Conclusion 54
6.2 Future Work 54
Reference 55
Appendix A: Paper Publications 57
Appendix B: Screenshots 73
Appendix C: Plagiarism Report 77
XIV
CHAPTER 1
INTRODUCTION
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
CHAPTER 1
INTRODUCTION
MANETs [1] are popular in civil and military applications. Because of the reason that the
cellular network is very costly and inappropriate as well as at the same time unreliable, the
MANET has proven its ability to provide sustainable network to deploy. Without the need of
any fix infrastructure MANET can be deployed like BTS units. In ad hoc network all the nodes
are self configured to establish the network randomly. They act as a source, destination as well
as router same time. As a node or client or host they discover the packet and as a router forward
the packet .Discovered Packets are from source to destination are transmitted in multi-hop
environment. The applications of MANET are unexplainable applications both in civil
(medical, mobile computing, disaster recovery) and military (for battlefield security).
Applications of MANET is largely dependent of the Quality of Service of routing protocol as
well as its effectiveness .Host in MANET gets power by electro-chemical batteries which have
limited capacity to operate. Power aware mechanism is a big issue in MANET because of
batteries. The Main source of power consumption in MANET is communication and
messaging. Most of the energy consumption in MANET is due to communication activities.
Therefore, there must be proper management for power awareness during communication will
enhance the network lifetime. The more power transmission means more communication is
taking place. QoS [2] aware routing protocols i.e MAODV have been pro-posed to enhance
overall QoS of a node as well as network.
Bandwidth constraint: As the intermediate of broadcast in wireless is shared by all the nodes
in the broadcast region the available bandwidth per nodes is limited in nature. The available
bandwidth per wireless connection depends on the number of nodes and traffic they handle.
Lack of central-coordination: This pose a challenge in routing packet in the network. As the
nodes in MANET are mobile, this lead to frequent path break. In the absence of a central co-
coordinator, maintenance of path is a challenging task.
Page 1
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Low-quality communications: In wireless media the communication is less reliable as
compared to wired medium. The network operation is easily affectedby the environmental
factors (weather conditions, presence of obstacles, interference of radio networks, etc), which is
time varying. Thus, applications for adhoc networks should be resilient to dramatically varying
link conditions.
Limited Battery power: Nodes in MANET are mostly run by battery, whose replacement
and/or re-charging is infeasible in certain situations. To enhance network lifetime, nodes should
use the minimal power during communication. Conserving nodes battery power is another
challenging issue.
Scalability: In MANET the nodes are deployed in large number in order to establish fast
network set-up. So the protocol of MANET has to control capably in the existence of large
number nodes.
Provisioning of QoS: The routing protocol in MANET should be able to provide confident level
of QoS as commanded by the nodes. The QoS limitations can be delay, jitter, packet delivery
ratio, and throughput.
Security: The routing protocol in MANET must be durable to dangers and vulnerabilities. Entry
of malicious node make the network vulnerable. It must have the capability to overcome
resource consumption.
Page 2
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Page 3
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Wireless Ad-hoc network is having a number of sensor node spreads over a specified area. Each
node has a capability of signal processing and networking of the data. Some example of
wireless ad-hoc network is as follows:
i) The network used to check the environment and notice environmental changes.
ii) The network used to notice and transmit data for services and defence point.
iii) Network used to intelligence and monitor vehicles traffic on the way.
iv) Network for observation sensor for providing safety in any place.
v) Network for tolerant monitoring system to convey data from ambulance to doctor and
receive medical advice from a distance.
Page 4
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
If every nodes of the network are moving, then structure of the network changes continuously
and connectivity may break due to node association that creates random topology and link
stability. To overcome the problem of decreasing performance due to node mobility, routing
protocol is very important necessity of mobile ad-hoc network. Routing protocol allows every
device s or node to correspond over multi-hop paths to their proposed node. Previously flooding
mechanism is used to forward the data in mobile ad-hoc network. Main requirement of ad-hoc
network is efficient routing protocol that’s why routing protocol are getting attention by the
researchers.
In order to find the route from source to its intended node, Source broadcast a RREQ and then
in between nodes also broadcast that packet to their neighbour, this process is continued until it
reaches intended node or any in between node which has a recent route information about the
destination. RREQ in AODV carries the intended node address only, whereas in DSR it bears
full routing data, it signifies that AODV routing algorithm, has probably lesser routing
overhead. RREP in AODV, carries the intended node’s IP address and destination sequence
number, but unlike AODV in case of DSR routing algorithm it carries the information of the
selected route, and at the same time it also carries the address of nodes coming in the selected
path. Therefore AODV resolves the problem of potential overhead found in DSR.
Whenever any mobile terminal needs to transmit the information packet to the intended node, it
broadcasts a RREQ in the network. When this RREQ message is received by the intermediate
nodes, they create a reversal route towards the source node and then check for an accurate path
in the route table, but if the requested route is not available, it will broadcast the RREQ
message in the network again, and the process lasts until the node finds the suitable path.
As soon as the intended terminal gets the RREQ, immediately it generates RREP. It is also
possible that the source node receives more number of RREPs, in this scenario the route with
fewer numbers of hops will be chosen for transmission of information packets. It is expected
that the information packet will reach the intended node with fewer number of hops, but in the
Page 5
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
case when the in-between devices fails to re-transmit the information packet towards the next
node in the way due to any complication, it transmits the RERR message.
If during the process source node moves, then it has to reinitiate route discovery to the intended
node and if in between node move then that node realizes a link failure to its neighbour, and
process is continued until it reaches source and in that situation source node has to again restart
the route discovery process.
The benefit in AODV routing is that, it can change in link situation very easily, but when the
network size increases at the communication may suffer the high delays during route
manipulation and require more bandwidth.
The processes of AODV routing protocol can be better understood by consider one Ad-hoc
network shown in figure 1.3.1. This network is composed of ten nodes, where source node
wishes to send the data to destination node. Firstly source node check whether the route to the
destination is present in routing cache or not. If the path to the destination is available in route
cache, source node will directly forward packet of information through that path .
Figure 1.3.2 shows that if source node after checking in routing cache found that route to the
destination are not there, and then source node broadcast RREQ in the network shown by red
arrow in the network.
Page 6
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
RREQ message contains the IP address of source and intended node with the current sequence
number of source and last known sequence number of destination. In figure 1.3.3, it is shown
that whenever any in between node receive the route request, it first check whether that request
came earlier or not.
Page 7
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
If the same request came before, intermediate node will discard that request. Each node setup a
reverse link and route entry in routing table. The process of forwarding RREQ is continued until
it reaches the intended node for packet sent by source node that process is shown in figure 1.3.4.
Figure 1.3.5 shows that destination node will not forward the RREQ message further in the
network because the destination node is the intended target for the original packet of
information being sent by source node. Each node forms a reverse path to source from it, and
update in routing protocol.
Page 8
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Figure 1.3.6 shows that forward links are setup when RREP message is reached up to source
(shown in figure by yellow dotted line) traveling along the forward path. Now source can
send packet of information through this forward link.
Page 9
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
about the destination in routing table, which is already updated with next hop node from source
to destination like here for destination (D), next hop is the node (A). Then the source node (S)
will forward message to node (A).
Figure 1.2.2 shows that source node (S) checks the route information about the destination in
routing table, which is already updated with next hop node from source to destination in
intermediate node (A) and here it found that subsequent hop is the node (B) for destination D.
Then source node (S) will forward message to node B.
Page 10
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Figure 1.2.3 shows that source node (S) checks the route information about the destination in
routing table, which is already updated with next hop node from source to destination in
intermediate node (B) and here it found that next hop is node (D) for destination D.
Figure 1.2.4 shows that source node (S) will forward message to node D that is actually an
intended node for that message from source node.
Routing protocols [13][17] are defined as a group of rules by which nodes or router sending the
packet of information from source to intended node. Whenever a path is needed from source to
destination then routing protocols allows nodes or device of the network to find and maintain
the routes up to intended nodes. Due to high mobility of mobile nodes, low bandwidth, and
limited energy make routing protocol an important part in the mobile ad-hoc network.
The routing algorithm mentions the procedure of communication between the routers. Figure
1.3 depicts the broad classification of routing algorithm with example. Routing protocol are
classified into three basic groups depending on the fact that whether routing table is updated
continuously or route request is required to send after the request from the source.
Page 12
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Here latency delay is very less as the route from source to destination is updated and available
in routing table before the actual communication requirement. When any source terminal wants
to transmit packet of information to intended node, it has to just check for particular route from
source to destination in routing table . It performs better in slow speed of mobile nodes.
Proactive routing protocols include Destination Sequenced Distance Vector (DSDV) and
Optimized link source routing (OLSR). Description of DSDV routing protocol is given in
section 3.2.3.
1.3.2 Reactive Routing Algorithm
Reactive routing protocols [15] can also be seen as on demand protocols. In this type of routing
algorithm, all mobile nodes contain the in sequence of only lively paths to the purpose nodes. If
any source terminal wants to send packet of in sequence to its intended node or terminal,
reactive routing will try to settle a route based on the request from the source. It point towards
that here latency interruption is high transmit detection process is on demand, as the route from
source to destination is settled after the request from the source terminal. It performs better in
highly dynamic movement of mobile nodes of the network. Reactive routing protocols include
Ad-hoc on Demand Distance Vector (AODV), Ad-hoc on Demand Multipath Distance Vector
(QAODV), and Dynamic Source Routing (DSR).
Page 13
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
These two mechanisms allow the source of the data packets, to discover and maintain the path
up to intended terminal in the network. In order to avert the memory overhead, the router
maintains the list of recently used routes and route requests. Route discovery and route
maintenance mechanism works completely on demand. The Route Request (RREQ) and Route
Reply (RREP) message are used to perform these mechanisms.
It is a process of finding the address of destination from source node. Route cache has all the
information regarding the active routes from any mobile node to the destination node, therefore,
if the node wants to send the information packet, it will search the route cache. If the route is
available in route cache, then that path from source to destination terminal is used to send
packet of information, otherwise the source node broadcasts the RREQ by flooding method in
the network having a specific identification number and address of the transmitter and receiver
node. When the in-between nodes in this process of broadcasting, receive the RREQ message,
they will again send the same message to the nodes in its territory along with their own address.
As soon as the RREQ reaches its intended node for that packet of information, then that
intended node will send back RREP with complete information about route to the source
terminal.
The destination considers the shortest path for RREP by selecting the smallest route used by
RREQ packet to travel from the transmitter to intended node for that message. Now as the
source receives the route reply from intended node, source node assumes that it found the path
to destination and source node start routing of packets.
Page 14
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
The process of route discovery with an example of eight nodes is shown in figure 2.2. In this
example source node (S) needs to sends the data to destination node (D). Then the source node
(S) has to send complete route information along with information packet. Every in-between
nodes resend message after adding their address in the header of the packet like here S, S to A
etc. When any intermediate node receives the route request, initially it checks whether that
request came earlier or not. If yes, intermediate node discards that request. Similarly in this
example intermediate node (B) will discard the request from node (C) because node (B) got the
same route request earlier from node
(A). The process of route reply on the same network is shown in figure 2.3. When the route
request reaches destination D, then destination node D will send route reply message with the
full path like S-A-B-D and S-G-F-E-D. Source node catches all the paths form source to
destination and select the shortest path. DSR is illustrated in the following figures:
Page 15
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Route maintenance mechanism uses two messages for maintenance that are Acknowledgement
(ACK) and Route Error (RERR) Message. When the packet of information reached
successfully to their intended node, then it will send an ACK message to the source of that
packet. If packet of information sent by the source does not reach successfully to their intended
node, then it will send a RERR Message.
As DSR routing algorithm is basically designed for wireless mobile Ad-hoc network for multi-
hop transmission from source to destination, the major disadvantage is its non-uniform packet
size, because all wireless devices support uniform packet size and if sending packet is large in
size it should be send after split into smaller parts. In case of the wireless medium it causes
problem if smaller parts of the message will not receive in correct order.
Link layer
Link layer can be defined as a group of methods and communication protocol that operate on
the link, where operated node is physically connected. The link is any interconnecting
component, which is used to interconnect nodes of the network and link protocol is a group of
methods, which operate only between adjacent nodes of the network. Link layer can also be
seen as the group of data link layer and physical layer in OSI model.
Physical layer
This is first stage of the TCP/IP, where data is physically moved across the
network interface.
It is a layer of TCP/IP model that forward data between adjacent nodes of the network over
wide area network or transfer packet between nodes of the same WLAN. It provides a
Page 16
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
functional way to transfer data between different nodes of network and also have a power to
correct errors occur in physical layer. Ethernet of LAN protocol and Point to point protocol are
the example of data link protocols .
IEEE 802.15 protocol consists of physical layer, MAC layer, and higher layer. Higher layer are
based on OSI model whereas lower layers are defined in this standard along with upper layer
using IEEE 802.2 logical link control sub layer accessing the MAC through convergence sub
layer. IEEE 802.15 protocol stack with protocol layers is shown in figure 1.5.
Page 17
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
It is a first layer of OSI reference model which provides data transmission services and
interface to higher layer through physical layer management entity that maintain a database of
WPAN. Physical layer manages the physical RF transceiver, energy and data communication.
WPAN can be work in 2.4 to 2.483 GHz unlicensed frequency band.
Page 18
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Full Function Device (FFD) and Reduced Function Device (RFD) are two types of network
node in personal area network. FFD serves as coordinators in the network which can relay
message in network, whereas RFD is simple node or device and communicate only with FFD’s
and never work as coordinator.
The comparison WLAN, WBAN and WPAN are given in the table below :
The mobile network model and a Quality oriented protocol MAODV has been designed using
IEEE 802.11 WLAN standard and its performance has been analysed with AODV and
MAODV routing protocols. Where the facility of variable speed and different trajectory is
provided by considering the node movement inside the network.
Study and analyse AODV and MAODV routing protocol under IEEE 802.11 WLAN and IEEE
802.11 Wireless Personal Area Network (WPAN).
Implement AODV and MAODV routing protocols for the Network under 802.11 WLAN
Chapter 2: The second chapter discusses the literature survey and comparison of result of
different papers.
Chapter 3: The third chapter gives detailed description of routing protocols and the detail study
of AODV and MAODV routing protocols.
Chapter 4: This chapter gives the introduction to network simulator NS2. It also describes the
setup of NS2 under different scenario used for the analysis with their parameters.
Chapter 5: The fourth chapter indicates result and discussion obtained by simulating different
routing protocols with increasing speed and number of node scenario under IEEE 802.11. A
detail description and result analysis by simulating routing protocols under IEEE 802.11 with
increasing number of node scenario.
Chapter 6: This chapter gives the conclusion to the entire thesis work carried out and the
possible future work to the research with limitation of current work.
Page 20
CHAPTER 2
LITERATURE SURVEY
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
CHAPTER 2
Literature Survey
1.Title: An Efficient Algorithm for Detecting and Removing Black hole Attack for Secure Routing in
Mobile Ad-hoc Network
Authors: Viswa Jhananie K.R, Assistant Professor, Seshaderipuram Academy of Business Studies,
Publishers: Research India Publications
Published date / year: Number 5 (2016)
Description: Securing Mobile Ad-hoc Network (MANET) is challenging because they do not have
any fixed infrastructure. In MANET, all the networking functions are performed by the nodes
themselves in a self-organizing manner. Since, the mobile nodes do not require any pre-installed
infrastructure, they can be utilized in places such as battle field, disaster recovery and where ever
there is a need for wireless network. Ad-hoc networks are highly susceptible to security attacks. Black
hole attack is one of the serious attacks in MANET. In this paper, we propose two different solutions
for detecting and removing black hole attack, which will enable a secured routing in MANET.
Drawbacks: Mobile Ad-hoc Networks (MANETs) are vulnerable to various kinds of attack because
of its dynamic infrastructure. We have given two different solutions
(i) Algorithm using watchdog and
(ii) Two way routing protocol for blackhole attack, which is one of the serious attack in MANET.
Page 17
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
routing. Since a malicious node gives false information of having shortest route to the destination
as to get all data packets and drops it. In MANET it’s hard to detect behavior anomalies espe
determine the authenticity of messages of applications including routing protocols because chang
very frequently. No central authorities or infrastructures remain in place for key management or
proactive or preventive security measures. The strict performance management including laten
inherent in any security protocol is not possible because performance cannot be guarantee
MANET.
Drawbacks: In mobile ad hoc networks (MANET), nodes rely on each other to keep the network
connected. Thus, unlike traditional wireless solutions, such networks do not require any pre-existent
(fixed) infrastructure, which minimizes their cost and deployment time. Therefore, security in Mobile
Ad-Hoc Network is the most important concern for the basic functionality of the network. The
availability of network services, confidentiality, and integrity of the data can be achieved by assuring
that security issues have been met. MANETs often suffer from security attacks because of its features
like open medium, changing its topology dynamically, lack of central monitoring and management,
cooperative algorithms and no clear defense mechanism. These factors have changed the battlefield
situation for the MANETs against the security threats. Black hole attack is the very important to type
that became as an interesting point of many researchers.
Drawbacks: After trust value is calculated and a secure route is established, the throughput of sender
is increased. Moreover, the nodes dropping packets in the initial simulation are successfully
eliminated from the route established between source node and destination node. Thus the proposed
method of excluding malicious nodes from the route used for packet transfer is fulfilled thereby
enhancing throughput of the sender node.
Page 18
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
4 Title: Securing DSR for Mobile Ad hoc Network with Message Digest Algorithm
Authors: M.Tech. Student, NCU,Gurgaon bAssistant Professor
Publishers: I.J. Wireless and Microwave Technologies
Published date / year: September 2016
Description: Mobile ad hoc networks (MANETs) are very useful in various scenarios where there is
need of fast deployment of the network and expensive set up is not required. With these benefits,
there are some issues related to these networks. One of these issues is of secure communication.
Malicious nodes can easily attack existing routing protocols for MANETs like DSR
Drawbacks: DSR protocol belongs to the group of the routing protocols which is used in a mobile ad
hoc network but it does not provide an efficient and a reliable communication. Networks with mobile
nodes are not safe and extra measures for security have to be taken. Path chosen for sending the data
packets must be efficient as well as secure. None of the nodes must drop packets. Our proposed
algorithm modified DSR in such a way that the black hole attack and gray hole attack are detected,
throughput of the network is incremented, ratio of packets delivered has shown an incredible
increment and end to end delay is lesser than the DSR protocol.
Description: A Mobile Ad-hoc network is composed of number of wireless mobile nodesthat are
capable of communicating with each other. Network is not secure, due to the mobility and dynamic
nature of Manets. In Manets nodes are free to move in anydirection due to which these networks
might be more prone to security issues as compared to wireless networks.
Drawbacks: we conclude that due to the self configuring nature of the mobile ad hoc network much
type of inside and outside attacks are possible which degrades the network performance. In this paper,
we proposed a new mechanism (by enhancing CBDS) which is based on the fake route request
packets to detect and isolate grey/collaborative black hole attacks in MANET. The proposed
technique is implemented in network simulator version 2 and results are analyzed graphically by
taking various network parameters like throughput, packet delivery ratio and packet drop. The
simulation results show that this technique is more efficient than the previous techniques.
Page 19
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Description: A Mobile ad-hoc network (MANET) is research area with practical applications. The
reason behind the fame of MANET is flexibility and independence of network infrastructure.
MANET have some inimitable characteristic like dynamic network topology, limited power and
limited bandwidth for communication. MANET has more challenge compare to any other
conservative network. Routing plays an important role in the security of the whole network. The most
common routing protocols used in ad-hoc network are AODV (ad-hoc on demand distance vector
protocol. AODV protocol is susceptible by “Black Hole” attack. In black hole attack a malicious node
advertise itself as have the shortest path to the destination node
Drawbacks: As we already know why MANET is so popular in present scenario? It has some extra
usual features due to which it is acceptable globally. MANET have so many features and as well as it
have some security issues. In this paper we have just provide a list of solutions in MANET on a
explicit attack that is black hole attack. There are so many solutions which provide better security in
case of single malicious node but these solutions are not effective in case of multiple malicious node.
Some solutions may require some special hardware like GPS
Description: The black hole is a kind of security attacks that mostly perform in mobile ad hoc
networks (MANET). Main problem in MANET is that it does not have fixed infrastructure, they have
dynamic components which regularly change as place to place. Here in this paper we will discuss
some routing protocols which used in MANET, and also going to describe our proposal work
“prevention from black hole attack using RSA algorithm”. So one question firstly strike in minds why
we chose RSA. Let me tell you RSA is the one of the best cryptographic algorithm for encryption and
decryption. We will further discuss RSA with our proposal work.
Drawbacks: Security is the important issue of routing protocols of MANET. In AODV routing
protocols, nodes having highest sequence number is selected for fresh and short route. In black hole
attack malicious node will accept RREQ from source node and drop the packet instead of sending to
the destination. MANET creates dynamic topology [7]. Main problem of dynamic topology it varies
on regular basis, there is no fixed infrastructure. The nodes of these type of networks find or search
the route dynamically when a node want to communicate with other nodes and thus use adaptive or
dynamic routing, for this mostly prefer dynamic protocols
Page 20
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Drawbacks: An efficient and simple approach for defending AODV. Proposed method can be used
to find the secured routes and prevent the black hole nodes in the MANET by identifying the node
with their sequence number; it is verified whether there is large difference between the sequence
number of source node or intermediate node that carries packet to destination.
Description: A blackhole attack is the most emerging security threat in ad-hoc network. Here,
malicious node attempt to compromise mobile nodes and drop packet respectively. Blackhole attack
may apply through internal or external mode either to disrupt the communication or degrade network
performance by dropping the packet. Here, malicious node attempt to get benefitery position into
network to compromise the victim node. In Blackhole attack, malicious node attempt to get
achievable position into network and start dropping packets respectively. Work observes that all it
happened due to weakness of AODV routing protocol.
Drawbacks: The complete work concludes that proposed solution successfully detect and mitigate
the blackhole attack in MANET. It is also observe that proposed algorithm help to improve the
network performance during attacking situation.
10 Title: Enhanced Utilization of GA to limit the Effect of Black hole Attack in MANET
Authors: Harpreet Singh Brar and Harpreet Kaur Mavi
Publishers: International Journal of Advanced Trends in Computer Applications
Published date / year: January - 2016
Page 21
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Description: In recent years, In mobile ad hoc networks (MANET), nodes rely on each other to keep
the network connected. Thus, unlike traditional wireless solutions, such networks do not require any
pre-existent (fixed) infrastructure, which minimizes their cost and deployment time. Therefore,
security in Mobile Ad-Hoc Network is the most important concern for the basic functionality of the
network. The availability of network services, confidentiality, and integrity of the data can be
achieved by assuring that security issues have been met. MANETs often suffer from security attacks
because of its features like open medium, changing its topology dynamically, lack of central
monitoring and management, cooperative algorithms and no clear defense mechanism.
Drawbacks: The issues related to security and the loopholes of AODV protocol, has been studied
specific to the network layer attacks such as packet drop Attack. An Intrusion Detection System (IDS)
is implemented using Genetic Algorithm and tested with networks of varied node configurations. The
proposed work gives an approach for secure routing algorithm AODV in black-hole attack in
MANETs. Delivering data to the base station is very important in real time applications. By having so
much base stations it must be very important to have delivery of data from source to destination in the
presence of blackhole attack
Description: Most demanding issue in MANETs is Security or Secure communication due to its
various vulnerabilities. Vulnerabilities or exclusive characteristics that make MANETs prone to
various attacks are as non appearance of authorization functionality, infrastructure less network
environment, dynamically-randomized movement of nodes. Collaborative attacks have more harsh
affects on MANETs than single particular attacks. Due to increasing demand of using MANETs
various type of protocols and secure algorithms have been developed one after other but still there is
lack of completely secured protocols which makes communication bother free. Now, in this paper an
algorithm to prevent collaborative attacks on MANETs is presented.
12 Title: Detection of Blackhole Attack Using Intrusion Detection System in AODV Based MANET
Authors: Nikita Patel1, Jay Amin2
Publishers: IJARIIE-ISSN(O)
Page 22
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Drawbacks: After that we introduce AODV protocol in MANET and the various authors have given
several techniques for detection and prevention of black hole attacks in MANET but every technique
has its own disadvantages in their respected solutions and we proposed Intrusion detection system to
detect blackhole attack which decrease packet loss rate and increase throughput as compared to
normal AODV with blackhole attack
Description: MANET stands for mobile ad-hoc network where group of mobile nodes can move
freely and communicate with each other. These nodes are not bound to fixed infrastructure. Hence are
vulnerable to attacks and one such common attack is black hole attack. Black hole attack is an attack
where one malicious node tries to disguise itself in having address and shortest path to any
destination.
Drawbacks: I compare these techniques according to the following parameters: End to end delay,
Packet Delivery ratio, Throughput, Routing overhead and whether they can detect and prevent black
hole attack and came to a conclusion that the method proposed by Latha Tamilselvan and Dr. V
Sankaranarayanan was very effective as it decreases the overhead and end to end delay and increases
packet delivery ratio.
14 Title: Prevention for Black hole attack in MANET using AODV Protocol
Authors: Amrita Parashar, Vivek Parashar
Publishers: International Journal of Advanced Research
Published date / year: 2016
Description: Black hole attack is one of the active DoS attacks possible in MANETs so has got lots
of attention by the researchers. Research focus mainly given to securing existing routing protocols,
developing new secure routing protocols, and intrusion detection techniques. Researchers have
proposed various techniques to prevent black hole attack in mobile ad-hoc networks
Page 23
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Drawbacks: Mobile Ad Hoc Networks has the ability to deploy a network where a traditional
network infrastructure environment cannot possibly be deployed. With the importance of MANET,
security of MANET is one of the important features for its deployment. In our thesis work we study
black hole attack and proposed a feasible solution to prevent single black hole attack on the AODV
routing protocol. The proposed solution is evaluated by the performance metrics - end-to-end delay,
network load and Throughput.
15 Title: Security Enhanced AOMDV Protocol to Prevent Black Hole Attack in MANET
Authors: K.Selvavinayaki #1, Dr. E. Karthikeyan
Publishers: International Journal of Engineering and Technology
Published date / year: 2015
Description: The dynamic nature of Manet will always degrade the reliability in data transmission
between the nodes. The manet is not protected against the attacks due to lack of security. The most
common attack experienced by the Manet is black hole attack. This paper address the security
oriented solution to prevent the black hole attack using the digital certificates to authenticate the
routes selected during the route discovery process. The digital certificate authentication avoids the
black hole node during the Route discovery itself. This methodology is implemented on AOMDV
protocol. The algorithm is simulated using NS2.
Page 24
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
1 Preventing node The request for link Nodes discover routes in Ankitasingh
replication attack establishment is request response cycle node
and jyotsana
in static wireless received by a node; it request a route to a
device networks, performs various destination by broadcasting Kumar
verification processes an RREQ message to any or
Mandal
before establishing a all its neighbours.
link with the requesting , the node invalidates its Moirangthem
node. route by sending AN RERR
marjit sing,
to any or all nodes that
potentially received its ,2014 IEEE
RREP.
4 Detection of If data the info the If data the info the T.Nidharshin
Duplicate node in information} gets information gets dropped i,
Wireless sensor dropped then the nodes then the nodes won’t send V.Janani,
network using won’t send the info to the info to the base station IJARCCE,
sequential chance the base station otherwise the replicated 10 December
ratio testing. otherwise the replicated nodes send the false data to 2012
nodes send the false the bottom station.
data to the base station.
Page 25
CHAPTER 3
PROBLEM DOMAIN
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
CHAPTER 3
Problem Domain and Solution Domain
3.1 Problem Domain
In MANET nodes are equipped with small, often irreplaceable batteries with limited power
capacities. They can be deployed manually or be randomly dropped. They are self-configuring,
containing one or more sensors with embedded wireless communications, data processing
components and a limited energy source. The use of wireless sensor networks is increasing day
by day but the problem of energy constraints prevails as there is limited battery life. In order to
save energy dissipation caused by communication in wireless sensor networks and to increase
the packet delivery rate. It is necessary to schedule the state of the nodes, changing the
transmission range between the sensing nodes, use of efficient routing methods and avoiding the
handling of unwanted data.
• To compare the network performances in terms of energy consumption, packet delivery ratio,
end-to-end average delay, throughput for AODV and MAODV(Modified).
• Varying network size from 20 nodes, 30nodes, 40nodes, 50nodes at different speed and
calculating different network parameters.
• Different mobility have been analyzed here which are 0m/s, 10m/s, 20m/s, 30m/s, 40m/s.
Simulation has been performed using ns-2.
Page 29
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Page 30
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Begin
if (receive RREQ packet) then
1. Determine if its address is on the list of route
record; 2.if (it is on the list of route record) then
Discard RREQ packet.
else
1. Append own address and frequency channel to route record in RREQ packet;
2. Set switching delay dswitch = td ms if the receiving frequency is fixed to the same channel as
the previous hop node’s transmitting frequency. Otherwise, theswitching delay is set to dswitch
= 0 ms;
3. Add dswitch to the delay field;
4. Add average queuing delay to the delay field where dqueue 1⁄4 n t nsend À t nreceiv e =n,
where tnsend and tnreceive are the send and receive time of the previous n packets;
5. Update MEATT field.
6. if (receiving node is destination) then
1. Creates RREP packet;
2. Send RREP packet.
7. else
Rebroadcasts the RREQ packet on
the common control channel.
endif
endif
endif
End
Route discovery
Before the beginning of the information transmission, the route cache are going to be examined
to visualize if there's a sound route to the specified destination. If a sound route can not be found
within the cache, route discovery are going to be triggered. MAOMDV performs path discovery
by implementing the whole set of route discovery mechanisms once the destination node
receives the RREQ packet, a Route Reply or RREP packet would be generated with a replica of
the accumulated route record from the RREQ packet. The RREP packet are going to be sent to
the supply node through the reverse path the RREQ packet had traversed. The route info, delay
and MEATT info inside the RREP packet are going to be accustomed update the route cache at
the sender.
Route decision
Begin
1. Identify routes with MEATT > sflow;
2. Sort route in ascending order of delay;
3. Choose minimum delay route
Page 31
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
End
Once the routes with less delay are discovered, OSDRP selects the minimum delay–maximum
stability route to fulfil the desired flow period sflow of the traffic flow.
This ensures that the SOP on the chosen route is offered throughout the transmission of the
information so as to avoid pricey route re-discovery. That is, for the complete period sflow of the
flow, the nodes on the chosen path won't got to stop transmission owing to the fulminant seem
ance of a primary user.
Transmit power control and multicast routing
Begin
switch (priority)
case ‘c1’:
1. minimum required data rate rt = 24 Mbps;(Changable)
2. OR Candidate Selection Range = 3. (Changable)
case ‘c2’:
1. minimum required data rate rt = 12 Mbps; (Changable)
2. OR Candidate Selection Range = 2. (Changable)
case ‘c3’:
1. minimum required data rate rt = 6 Mbps; (Changable)
OR Candidate Selection Range = 1. (Changable)
end switch
1. Determine corresponding SINR threshold ct for
BER 6 10À5;
Page 32
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
cache.
End if
end for
End
In this Multicast algorithm work, the random way point mobility model is used for the simulation
of routing protocols. The source-destination pairs are spread randomly over the network where
the point to point link is established between them.
In this work TCP agent with FTP traffic is used. The random packet size and rate as well as
variable node speed and variable node density is used for the transmission to evaluate the
changes in performances in the routing protocols. Multicast has great impact in wireless and
mobile networking since it overcomes the overheads of the unicast routing. The use of
multicasting with the wireless network has many benefits. Multicast can support different variety
of applications that are characterized by a close degree of collaboration typical for many mobile
ad hoc applications. Multicasting reduces the communication cost for applications by sending the
same data to many recipients. Instead of sending via multiple unicast, multicast reduces the
channel bandwidth, sender and router processing and delivery delay.
The multicast algorithm uses the same RREQ/RREP messages as previously
described. Only one new message, the Multicast Activation (MACT), is needed. As nodes join
the multicast group, a multicast tree composed of group members and nodes connecting the
group members are created. Multicast group membership follows the model of the Mbone in that
it is dynamic; nodes are able to join and leave at any time (Eriksson 1994). A multicast group
leader maintains the multicast group sequence number. Multicast group members must also
agree to be routers in the multicast tree.
Page 33
CHAPTER 4
IMPLEMENTATION
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
CHAPTER 4
IMPLEMENTATION
Ns-2 is a discrete event simulator targeted at networking research. It provides substantial support
for simulation of TCP, routing and multicast protocols over wired and wireless networks. It
consists of two simulation tools. The network simulator (ns) contains all commonly used IP
protocols.
The network animator (nam) is use to visualize the simulations. Ns-2 fully simulates a layered
network from the physical radio transmission channel to high-level applications. Version 2 is the
most recent version of ns (ns-2) .
4.3.1 NS-2
Ns-2 is an object-oriented simulator written in C++ and OTcl. The simulator supports a class
hierarchy in C++ and the OTcl interpreter. There is a one-to-one correspondence between a class
in the interpreted hierarchy and one in the compile hierarchy. The reason to use two different
programming languages is that OTcl is suitable for the programs and configurations that demand
frequent and fast change while C++ is suitable for the programs that have high demand in speed.
Ns-2 is highly extensible. It not only supports most commonly used IP protocols but also allows
the users to extend or implement their own protocols. It also provides powerful trace
functionalities, which are very important in our project since various information need to be
logged for analysis. The full source code of ns-2 can be downloaded and compiled for multiple
platforms such as UNIX, Windows and Cygwin.
4.3.2 GLOMOSIM
Glomosim is a scalable simulation environment for wired and wireless network systems.
Currently it only supports protocols for a purely wireless network. It is also built in a layered
approach; such as OSI layer network architecture. Glomosim is designed as a set of library
modules, each of which simulates a specific wireless communication protocol in the protocol
stack. The latest version of Glomosim has implemented DSR. Glomosim‘s source and binary
code can be downloaded only by academic institutions for research purposes. Commercial users
must use QualNet, the commercial version of Glomosim.
4.4 Comparison
When choosing a network simulator, we normally consider the accuracy of the simulator.
Unfortunately there is no conclusion on which of the above three simulator is the most accurate
one. David Cavin et al. has conducted experiments to compare the accuracy of the simulators and
Page 35
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
it finds out that the results are barely comparable. Furthermore, it warns that no standalone
simulations can fit all the needs of the wireless developers. It is more realistic to consider a
hybrid approach in which only the lowest layers (MAC and physical layers ) and the mobility
model are simulated and all the upper layers (from transport to application layers) are executed
on a nodes (e.g. cluster of machines).
Although there is no definite conclusion about the accuracy of the three network simulators, we
have to choose one of them as our simulation environment. We compare the simulators using
some metrics and the results. After comparing the three simulators, we decide to choose NS-2 as
network simulator for our thesis because.
(1) Random Walk Mobility Model: Random Walk Mobility model is based on random
directions and speeds. By randomly choosing a direction between 0 and 2 and a speed between 0
and Vmax, the mobile node moves from its current position. A recalculation of speed and
direction occurs after a given time . The random walk mobility model is memory less. Future
directions and speeds are independent of the past speeds and directions. This can cause
improbable movement such as sharp turns or sudden stops. If the specified time or less then, the
nodes are move in restricted area on the simulation area.
(2) Random Waypoint Mobility Model: A mobile node begins the simulation by waiting a
specified pause-time. After this time it selects a random destination in the area and a random
speed distributed uniformly between 0 m/s and Vmax. After reaching its destination point, the
movable nodes wait pause-time seconds before selecting a new way point and speed. The
movable nodes are initially scattered over the simulation area. This distribution is not
representative to the final distribution caused by node movements. To ensure a random initial
configuration for each simulation, it is necessary to discard a certain simulation time and to start
registering simulation results after that time. The Random Waypoint Mobility Model: is very
widely used in simulation studies of MANET. As described in the performance measures in
mobile ad-hoc networks are affected by the mobility model used.
Page 36
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
For the Random Waypoint Mobility Model common expectation is that the average is about half
of the maximum, because the speeds in a Random Waypoint Model are chosen uniformly
between 0 m/s and Vmax. But is this the average speed really reached in simulations? Not at all,
the studies in show that the average speed is decreasing over time and will approach 0. This
could lead to false simulation results. This phenomenon can be inactively explained as follows.
In the Random Waypoint Mobility Model a node selects its destination and its speed. The node
keeps moving until it reaches its destination at that speed. If it selects a far destination and a low
speed around 0 m/s, it travels for a long time with low speed. If it selects a speed near Vmax the
time traveling with this high speed will be short. After a certain time the node has traveled much
more time at low speed than at high speed. The average speed will approach 0 m/s. The
suggestion in to prevent this problem is choosing, e.g. 1 m/s instead of 0 m/s as Vmin. With this
approach the average speed stabilizes after a certain time at a value below 1/2 * Vmax. There are
some limitations of random waypoint mobility model:
Temporal dependency
Spatial dependency
Geographic restrictions
To reduce density waves in the average number of neighbors by the Random Waypoint Model
the Random Direction Mobility Model was created. Density waves are the bundle of nodes in
one part of the simulation area. For the Random Waypoint Mobility Model the probability of
choosing a location near the centre or a waypoint which requires travelling through the centre of
the area is high. The Random Direction Mobility Model was invented to prevent this behavior
and to promote a semi-constant number of neighbors. The mobile host choose a direction and
travels to the border of the simulation area. If the boundary is reached, the node pauses for a
specific time and then chooses a new direction and the process goes on. Because of pausing on
the border of the area, the hop count for this mobility model is much higher than for most other
mobility models.
CBR traffic indicates that the data are sent at constant rate and CBR data stream implies that the
data is sending in a packet of fixed size with uniform interval .
Page 37
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
It is a connection based, and conforming transport protocol. In this type, data is only
transmitting when establishment stage is over. TCP is having flow control and congestion
control.
Flow control works to avoid overloading at the intended node
Congestion control is works to shape the traffic according to available network capacity.
The sender of TCP data is maintaining two windows for each intended node: a receive window
represents the accessible capacity of the network and Congestion window defines the bounds of
the receiver ability. When the sender transmits a packet of information, the windows are
reduced by an amount same as the size of information sent, when any of window reaches
completely filled state.
NS2 is working on two key languages that are C++ and Object oriented
Tool Command (OTCL). Now question is “why NS2 uses two languages” because both the
languages have the own benefits like, OTCL runs slowly but easy to code whereas coding of
C++ is difficult but execution is fast. NS2 utilizes benefits of both the languages so that anyone
can vary the parameter and configure network very easily.
The internal program is written in C++ whereas OTCL is used for assembling and configuring
the object and scheduling discrete events. The C++ and OTCL are combined by using TclCL
after simulation and for getting the result graphically; Network Animator (NAM) and Trace file
analyser is used. NAM (Network Animator) is an animation tool for NS2 used to visualize the
network and packet of information tracing and Trace file (.tr) contains the overall network
simulation information.
follows:
i) Writing of the program in Object Oriented Tool Command Language (OTCL) language.
OTCL is used to write the program for generate a network, network environment, and
trajectory of mobile nodes.
Page 38
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
ii) Run the .tcl file on the terminal under the Linux mint platform.
iii) NS2 trace analyser is use to analyses trace file obtained during simulation and according to
trace file generate the respective graphs.
Page 39
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Packet Delivery Ratio: the ratio of the data packets delivered to the destination to those
generated by CBR or ftp sources.
Mean End-To-End Delay: Mean End-to-End delay related to data packets delivered to
destination.
Throughput: It is the rate of successful message delivery over a communication channel.
This data may be delivered over a physical or a wireless channel and it is usually measured
in bits per second (bit/s or bps), and sometimes in data packets.
Page 40
CHAPTER 5
RESULT ANALYSIS
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
CHAPTER 5
RESULT ANALYSIS
Processing Delay - processing delay is the time it takes routers to process the packet header.
Processing delay is a key component in network delay.
Queuing delay – The queuing delay or queuing delay is the time a job waits in a queue until
it can be executed. It is a key component of network delay.
Communication delay – The delay of a network specifies how long it takes for a bit of data to
travel across the network from one node or endpoint to another.
Propagation delay - Propagation delay is the amount of time it takes for the head of the signal
to travel from the sender to the receiver. It can be computed as the ratio
between the link length and the propagation speed over the specific
medium.
5.1.2 Throughput:
Throughput is define as the number of packet flowing through the channel at a particular instant
of time. This performance metric signifies that the total number of packets that have been
successfully delivered from source node to destination node.
Σ Packet Received
Page 41
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Figure 5.1 shows that AODV has more delay as evaluate to MAODV because every time any
link to intended node breaks, AODV tries to find any alternative path to the destination that
results in extra delay in the total time require to reach the destination whereas MAODV will not
search for alternate path and packet drop, and it has to reinitiate route discovery process.
500
450
400
350
300
150
100
50
0
20 Nodes 30 Nodes 40 Nodes 50 Nodes
Figure 5.2 shows that AODV has more delay as compare to MAODV because whenever any
link to intended node breaks, AODV tries to find any alternative path to the destination that
results in extra delay in the total time require to reach the destination whereas MAODV will not
search for alternate path and packet drop, and it has to reinitiate route discovery process.
Page 42
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
400
350
300
250
100
50
0
20 Nodes 30 Nodes 40 Nodes 50 Nodes
Figure 5.3 shows that MAODV as a less delay as compare to AODV in increasing speed of the
node situation because whenever any link to intended node breaks, AODV tries to find any
alternative path to the destination that results in extra delay in the total time require to reach
the destination whereas MAODV will not search for alternate path and packet drop, and it has
to reinitiate route discovery process.
450
400
350
300
250
AODV (1 hop )
200
MAODV
150
100
50
0
0 Mobility10 Mobility 20 Mobility 30 Mobility 40 Mobility
Page 43
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
5.2.4 End To End Delay Vs Workload
Figure 5.4 shows that MAODV as a less delay as compare to AODV in increasing speed of the
node situation because whenever any link to intended node breaks, AODV tries to find any
alternative path to the destination that results in extra delay in the total time require to reach the
destination whereas MAODV will not search for alternate path and packet drop, and it has to
reinitiate route discovery process.
350
300
250
200
AODV (1 hop )
150 MAODV
100
50
0
1 2 3 4 5
1 126 110
2 270 170
3 320 210
4 235 160
5 250 130
Page 44
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
From figure 5.5 throughput in case of AODV decreases with increasing number of nodes
because AODV require more control overhead to maintain the entire route to every other node.
Here MAODV routing protocol showing best throughput with increasing number of node
because in MAODV routing protocol, routing table is established at every node, so there is no
need to carry entire route information along with data packet that will decrease the control
overhead.
600
500
400
AODV (1 hop )
300 MAODV
200
100
0
20 Nodes 30 Nodes 40 Nodes 50 Nodes
From figure 5.6 throughput in case of AODV decreases with increasing number of nodes
because AODV require more control overhead to maintain the entire route to every other node.
Here MAODV routing protocol showing best throughput with increasing number of node
because in MAODV routing protocol, routing table is established at every node, so there is no
need to carry entire route information along th data packet that will decrease the control
overhead.
Page 45
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
500
450
400
350
300
AODV (1 hop )
250
MAODV
200
150
100
50
0
20 Nodes 30 Nodes 40 Nodes 50 Nodes
700
600
500
200
100
0
0 Mobility 10 Mobility 20 Mobility 30 Mobility
Page 46
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
TABLE 5.2 THROUGHPUT VS MOBILITY
700
600
500
200
100
0
1 2 3 4
Page 47
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
1 610 600
2 520 540
3 480 540
4 470 540
5 510 565
NS2 is chosen as the simulation software for this study. AODV, MAODV routing protocols are
simulated under IEEE 802.11 MAC layer for different cases. Distinct cases with their
discussion are given below:
Figure 5.9 shows that AODV has more delay as compare to MAODV because whenever any link
to intended node breaks, AODV tries to find any alternative path to the destination that results in
extra delay in the total time require to reach the destination whereas MAODV will not search for
alternate path and packet drop, and it has to reinitiate route discovery process.
500
450
400
350
300
AODV (1 hop )
250
MAODV(1 hop )
200
150
100
50
0
20 Nodes 30 Nodes 40 Nodes 50 Nodes
Figure 5.10 shows that AODV has more delay as compare to MAODV because whenever any
link to intended node breaks, AODV tries to find any alternative path to the destination that
results in extra delay in the total time require to reach the destination whereas MAODV will not
search for alternate path and packet drop, and it has to reinitiate route discovery process.
500
450
400
350
300
AODV (1 hop )
250
MAODV(1 hop )
200
150
100
50
0
20 Nodes 30 Nodes 40 Nodes 50 Nodes
Page 49
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Figure 5.11 shows that MAODV as a less delay as compare to AODV in increasing speed of the
node situation because whenever any link to intended node breaks, AODV tries to find any
alternative path to the destination that results in extra delay in the total time require to reach the
destination whereas MAODV will not search for alternate path and packet drop, and it has to
reinitiate route discovery process.
350
300
250
200
AODV (1 hop )
150 MAODV (1 hop)
100
50
0
0 Mobility 10 Mobility 20 Mobility 30 Mobility
Page 50
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
From figure 5.12 as AODV develops only one path in one route discovery process and if link
failure occurs, AODV has to reinitiate route discovery process that will increase the control
overhead whereas in MAODV there is multiple links from one node to other, so it has just select
another path.
600
500
400
100
0
0 Mobility 10 Mobility 20 Mobility 30 Mobility
From figure 5.13 throughput in case of AODV is least as compare to other routing protocol
because the chance of link failure increases with an increase in speed of nodes, the routing table
establishment becomes more difficult and it will increase the control overhead. As MAODV
develops only one path in one route discovery process and if link failure occurs, MAODV has to
reinitiate route discovery process that will increase the control overhead whereas in AODV there
is multiple links from one node to other, so it has just select another path.
Page 51
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
600
500
400
200
100
0
20 Nodes 30 Nodes 40 Nodes 50 Nodes
From figure 5.14 throughput in case of AODV is least as compare to other routing protocol
because the chance of link failure increases with an increase in speed of nodes, the routing
table establishment becomes more difficult and it will increase the control overhead. As AODV
develops only one path in one route discovery process and if link failure occurs, it has to
reinitiate route discovery process that will increase the control overhead whereas in MAODV
there is multiple links from one node to other, so it has just select another path.
600
580
560
500
480
460
20 Nodes 30 Nodes 40 Nodes 50 Nodes
Page 52
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
TABLE 5.6 COMPARISION TABLE
Page 53
CHAPTER 6
CONCLUSION AND FUTURE WORK
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
Chapter 6
CONCLUSION AND FUTURE WORK
6.1 CONCLUSION
Nowadays, the growth in the field of information processing and wireless data broadcast for
any wireless network is in its peak. For designing the quality adjusted system, estimate of the
two routing protocols under IEEE 802.11 patterns has been done. The performance is evaluated
in terms of the end-to-end delay and throughput The AODV and MAODV routing protocols are
implemented for both the standards. It is concluded that the MAODV is best suited for
designing a enhanced quality oriented protocol for better throughput and larger coverage area
with lower delay.
This dissertation proposed a mobile ad hoc network model using WLAN environment, where
all the nodes are moving with changing speed and trajectory. The node’s movement makes
unpredictable topology and results link instability. In order to overcome such problem, the
AODV and MAODV routing protocol has been implemented and their link performance has
been analysed. It is found that under MAODV routing protocol the throughput achieved is
higher and the end-to-end delay is lesser as compared to AODV. It indicates that the MAODV
performs better for the proposed mobile ad hoc network model.
Page 54
REFERENCE
Designing, Implementation and Analysis of QoS Aware Routing Protocol for MANET
References
[1] Seryvuth Tan, Keecheon Kim, “Secure Route Discovery for Preventing Black Hole
Attacks on AODV-based MANETs”,978-1-4799-0698-7/13/$31.00 ©2013 IEEE
[5] Wu Xing-feng , Liu Yuan-an, “A Survey of WLAN QoS Systems Based on IEEE 802.11”
IJCSNS International Journal of Computer Science and Network Security,
VOL.7 No.3, March 2007
[6] https://en.wikipedia.org/wiki/IEEE_802.15
[8] Saravana sevlam, Nevatha, Nivetha, “ A Survey on Quality of Service (QoS) for Ad Hoc
Networks”, International Journal of Advanced Research in Computer and Communication
Engineering,Vol 3, Issue 10,October 2014.
[9] Himansha Sharma, Yogendra Kumar Jain, Geetika Pandey, “ QoS Oriented Reservation
based Routing Mechanism for Wireless Ad Hoc Networks”, Journal of Global Research in
Computer Science, Vol 2, No. 12, December 2011.
[12] Nilesh Bobade, Nitiket Mhala, “Performance Evaluation of AODV and DSR On Demand
Routing Protocols with Varying MANET size”, International Journal of Wireless & Mobile
Networks, Vol 4, No.1 February 2012.
[13] Alex Hinds, Michael Ngulube, Shaoying Zhu, and Hussain Al-Aqrabi, “A
Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)” ,
International Journal of Information and Education Technology, Vol. 3, No. 1, February 2013.
[15] Surendra H. Raut, Hemant P. Ambulgekar, “Proactive and Reactive Routing Protocols in
Multihop Mobile Ad hoc Network”, International Journal of Advanced Research in Computer
Science and Software Engineering, Volume 3, Issue 4, April 2013.
[16] Panda, I. (2012),” A Survey on Routing Protocols of MANETs by Using Qos Metrics.”
International Journal of Advanced Research in Computer Science and Software Engineering, 2,
120-129.
[17] Teerawat Issariyakul, and Ekram Hossain, “Introduction to network simulator NS2”
Springer, 2011.
[18] http://www.cs.virginia.edu/~cs757/slidespdf/cs757-ns2-tutorial1.pdf
[19] Lokhande S.N. ,Dr. khamitkar S.D, “Design and Simulation of Wireless Ad Hoc Network
Using NS2 Simulator”, International Journal of Engineering Research and Development,
Volume 9, Issue 12 (February 2014).
[20] Nancy Garg, “Network Simulators: A Case Study”, International Journal of Advanced
Research in Computer Science and Software Engineering, Volume 5, Issue 1, January 2015.
[21] http://www.isi.edu/nsnam/nam/
[22] https://www.isi.edu/~johnh/PAPERS/Estrin00b.pdf
Page 56