Performance Evaluation of Proactive Routing Protocol For Ad-Hoc Networks
Performance Evaluation of Proactive Routing Protocol For Ad-Hoc Networks
Performance Evaluation of Proactive Routing Protocol For Ad-Hoc Networks
PERFORMANCE EVALUATION OF
PROACTIVE ROUTING PROTOCOL FOR
AD-HOC NETWORKS
Diwakar Yadav1
Abstract
An ad-hoc network is self organized network without
any fixed infrastructure and consists of wireless mobile
nodes. The nodes in the network work like a
transreceiver as well as a router. As the network is
dynamic in nature the topology changes rapidly and
unpredictavely which creates a challenge in establishing
a route between the source and the destination nodes. A
number of protocols are already purposed by the
researchers till date. The purposed routing protocols
can be classified in three different groups namely
Proactive routing protocol, Reactive routing protocol,
Hybrid routing protocol. In reactive routing protocol
the information about the routes to all the destinations
are maintained by periodic routes update process
whereas the routes are calculated through route
discovery process when they are required in reactive
routing protocol and hybrid routing protocol combined
the fundamental properties of both the protocols. In my
work two proactive routing protocols, i.e. The fish-eye
state routing protocol (FSR), optimized linked state
Routing Protocol (OLSR), Intrazone routing protocol
(IARP) and Bellman-Ford routing protocol are taken
for performance evolution in different parameters in
simulated environment. The better performance of
these protocols than other routing protocols in networks
having infrastructure inspired me to explore further
and implement each of them in ad hoc networks. We
investigated the performance of proactive routing
protocols in terms of packet delivery ratio, average end
to end delay, throughput by simulating in QualNet.
Key words: MANET, FSR, OLSR,
Wellman-Ford, Multihop, QualNet.
IARP,
1 INTRODUCTION
[1] Mobile ad hoc network are composed nodes those
are self-managed without any fixed infrastructure
.they contained dynamic topology by this way they
690
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555
Vol. 2, No.3, June 2012
691
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555
Vol. 2, No.3, June 2012
25
50
75
100
Bellman
Ford
IARp
0.8979592
0.8010204
0.869898
0.625
0.5586735
0.5994898
0.6071429
0.5943878
OLSR
INRIA
Fish
EYE
0.7831633
0.8137755
0.7602041
0.6352041
0.8188776
0.8061224
0.744898
0.127551
20 Sec
40 Sec
100 Sec
Bellman_Ford
0.8163265
0.7653061
0.7704082
0.7704082
IARP
0.6683673
0.5943878
0.6020408
0.6020408
OLSR_INRIA
0.7755102
0.7270408
0.7372449
0.7372449
Fish_Eye
0.8061224
0.755102
0.7653061
0.7627551
Value
692
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555
Vol. 2, No.3, June 2012
50
75
100
Bellman
Ford
IARp
0.0129915
0.0166353
0.019694
0.027239
0.00661
0.0069463
0.0068898
0.0074905
OLSR
INRIA
Fish EYE
0.0099789
0.0096766
0.0116932
0.0183684
0.0112432
0.0690683
0.368785
0.795938
Nodes
20 sec
40 sec
100 sec
Bellman_Ford
0.0124023
0.0122418
0.0125517
0.0125517
IARP
0.0069791
0.006529
0.0080303
0.0080351
OLSR_INRIA
0.0089752
0.0091388
0.0095143
0.0095142
Fish_Eye
0.071868
0.064061
0.0679574
0.0662429
Value
Value
10 sec
20 sec
40 sec
100 sec
Bellman_Ford
13383
12547
12630.5
12630.5
IARP
15303.5
13706.5
13896
13896
OLSR_INRIA
14043.5
13163
13348
13348
Fish_Eye
14174.5
13277.5
13457
13412
693
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555
Vol. 2, No.3, June 2012
Nodes
25
50
75
100
Bellman
Ford
14867.5
13129.5
14265.5
10290.5
IARp
13924
13773.5
13946
13705.5
OLSR
INRIA
14255
14727
13829
11569
Fish EYE
14333
13717.5
12723.5
2298.5
694
IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), ISSN: 2249-9555
Vol. 2, No.3, June 2012
695