SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290
3242
Packet Transfer Rate & Robust Throughput for
Mobile Adhoc Network
Madhusudan G
Department of Computer Science, JSS University, Mysuru-06
Email: madhusudan@sjce.ac.in
Kumar TNR
Department of Computer Science, MSR University, Bangaluru
Email: tnrkumar@msrit.edu
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------
An ad-hoc wireless network is highly different considering dynamic stochastic process of its underlying links, leads
to link breaks during data transaction. Hence, to provide free flow data transaction, many routing algorithms have
the property of link recovery and maintenance procedures to minimize the loss of data during transmission.
However these routing method do not guarantee reliable data transmission in some special application conditions
with wide requirements on Packet delivery ratio and link quality of the network. Routing is a critical issue in
MANET and hence the focus of this paper is the performance analysis of different routing protocols used in the
wireless network. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust
routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery
of flow messages is based on the level of interruption experienced by the underlying transaction. We describe the
mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We
introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport
of flow transactions across mobile ad hoc wireless systems.
Keywords – MANET, AODV, DSR, RFAR, TORA.
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: May 02, 2017 Date of Acceptance: May 17, 2017
---------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
When two nodes are at the accessible distance then
packet transmission between the source and destination
node occurs. The transmission power in an ad-hoc can
change rapidly and unpredictably. The central challenge
in the design of ad-hoc network is in maintaining routes
and links between these mobile nodes. Mobile ad-hoc
networks (MANETs) are characterized by time-varying
links and network topology. There are transmission
impediments like fading, path loss, blockage and
interference that add to the inclined behavior of wireless
channels. In such situation, the network must
accommodate the changes, providing end-end packet
delivery while at the same time incurring low control
overhead. This paper proposes an improvement over the
existing routing algorithm for MANETs with the primary
goal of maximize network connectivity while limiting
operating cost by finding those routes which can stay
intact for a period of time, failures as well as by
fluctuations in the communication transport quality
experienced across the network’s communications links.
When an active route is broken, an on-demand routing
mechanism acts to discover an alternate route considering
the same souce and destination. At that time, forwarding
entries are configured in the routing tables of the routers
located across the new route. In turn, under a proactive
routing scheme, routing entries are refreshed periodically
at all (active or inactive) routers. At such a refresh instant,
link failures may be discovered, and the routing entries are
updated. The alternate routing of packets occurring under
a corresponding proactive routing base datagram-oriented
(connectionless) packet switching operation, the re-
configuration of the route executed by connection-oriented
packet switching networks (including connection-oriented
and on-demand ad hoc wireless routing schemes, such as
AODV or DSR, and IP-MPLS label switching methods)
may induce unacceptably long excess delays. Latencies
may be adversely perceived at the impacted layer, and for
many applications cause significant degradations in the
quality of the provided transport service. Induced by such
perceivable re-routing delays, the reception of data packets
embedded in flows (or within bursts of such flows) that
use routes that are prematurely terminated or altered may
be of reduced value to their intended receivers. An
application may generate a program (or file, or burst of
messages) that must be delivered, as a whole, across the
network in a critically timely manner. Kaixin Xu et al. [6]
have proposed a Scalable QoS architecture suitable for
large scale mobile ad-hoc networks. Xiaoqin Chen et al.
[1] have proposed congestion-aware routing protocol for
mobile ad-hoc networks which uses a metric incorporating
data-rate, MAC overhead, and buffer delay to combat
congestion. Ming Yu et al. [2] have proposed a link
availability-based QoS-aware (LABQ) routing protocol for
mobile ad-hoc networks based on mobility prediction and
link quality measurement, in addition to energy
consumption estimate. The packets which are equipped to
be transmitted are buffered by the Network Interface
Queues (IFQ) implemented by AODV [3], TORA [4], and
DSR [5] and the network protocol stack receives these
packets.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290
3243
ROBUST THROUGHPUT: We evaluated the ability of
a mobile ad hoc wireless network to distribute flows
across robust routes by introducing the robust throughput
measure as a performance metric. It describes the rate at
which robust data is received by intended destinations.
we investigate robust routing in MANETs. Throughput is
defined as; the ratio of the total data reaches a receiver
from the sender. The time it takes by the receiver to
receive the last message is called as throughput.
Throughput is expressed as bytes or bits per sec (byte/sec
or bit/sec). Some factors affect the throughput as; if there
are many topology changes in the network unreliable
communication between nodes, limited bandwidth
available and limited energy. A high throughput is
absolute choice in every network. By “robust” we mean
that although a particular routing configuration (in our
case, a set of multi-path routes) may not be optimal for a
single specific configuration (e.g.,specific network
topology and link characteristics), it will perform well
over a larger set of likely network configurations: i.e.,it is
robust to changes without requiring global recomputation
of the network. For example, only transactions that are
completed without being prematurely interrupted may
convey data to their intended users that are of acceptable
utility and are thus accounted (as ‘robust’). In the
following, we illustrate the mathematical calculation of a
network’s robust throughput measure, as well as its robust
throughput capacity. Different algorithms have been
developed to improve the link quality. A large amount of
work has been done to improve the quality of service in
Manets, as well as extending existing protocols with QoS
features. Most of the performance analysis work is based
on simulation studies with several design parameters in
commercial settings. Through simulation, we compare the
reliability of braided routing and various other MANET
routing protocols, including AODV, and quantify the
relative amounts of control overhead incurred by braided
routing and AODV. Routing means to choose a path.
Routing in MANET means to choose a right and suitable
path from source to destination. Routing has two basic
types, which are as under as follows;
Static routing: It is done by the administrator manually to
forward the data packets in the network and it is
permanent. None of the administrator can change this
setting. These static routers are configured by the
administrator, which means there is no need to make
routing tables by the router itself. The Destination-
Sequenced Distance-Vector (DSDV) protocol [17] is a
proactive routing algorithm and is an enhanced version of
the distributed Bellman-Ford algorithm Jangeun Jun and
Mihail L. Sichitiu [7] have exposed a significant fairness
problem existent practically in all wireless multi hop
networks. Examples include Destination-Sequenced
Distance-Vector (DSDV) Routing [11], Wireless Routing
Protocol (WRP) [12], Global State Routing (GSR) [13],
and Fisheye State Routing (FSR) [14] On the contrary, in
on-demand routing protocols, routes are discovered
between source and destination pair only when data is
to be sent. This provides reduced overhead but high
path finding latency as whenever the route is to be found
between source and destination, route discovery procedure
is initiated. And reSchumacher et al. [7] have approached
the problem of load balancing for wireless multihop
networks by distributed optimization. Examples include
Ad hoc On-demand Distance Vector Routing (AODV) [8],
Dynamic Source Routing (DSR) [9], and C luster Based
Routing protocol (CBRP)[10].
Hybrid routing protocols combine the merits of both
proactive and reactive routing protocols and overcome
their short comings. Normally, hybrid routing protocols
for mobile ad hoc networks exploit hierarchical network
architectures. Proper proactive routing approach and
reactive routing approach are exploited in different
hierarchical levels, respectively. Examples of hybrid
routing protocols for mobile ad hoc networks are the Zone
Routing Protocol (ZRP) [15], Zone-based Hierarchical
Link State routing (ZHLS) [16].
Dynamic Routing: is automatically done by the choice
of router. It can route the traffic on any route depend on
the routing table. Dynamic routing allows the routers to
know about the networks and the interesting thing to add
information in their routing tables. There are several kinds
of routing protocols for wireless ad hoc networks. The
first kind of protocol is simply called Reactive MANET
Protocol(RMP). In these kinds of protocols,
communication is only possible when the source node
requests to communicate with the other node. Reactive
MANET Protocols are mostly suited for nodes with high
mobility or nodes that transmit data rarely. These reactive
routing protocols include the protocol AODV. The routing
information about all the nodes is build and maintained
by the proactive protocols. The proactive routing protocols
are independent of whether or not the route is needed.
Control messages are transmitted with periodically
intervals. Even if there is no data flow still control
messages are transmitted. Because of these control
messages proactive routing protocols are not bandwidth
efficient. These proactive routing protocols include DSDV
etc.
II. AODV(Ad-hoc On-demand Distance Vector):
AODV is an on-demand routing protocol. The Ad Hoc
On-demand Distance Vector Routing (AODV) protocol is
a reactive unicast routing protocol for mobile ad hoc
networks [5] in which a route is established only when
required by a source node for transmitting data packets.
The AODV algorithm gives an easy way to get change in
the link situation. For example if a link fails notifications
are sent only to the affected nodes in the network .This
notification cancels all the routes through this affected
node. It builds unicast routes from source to destination
and that’s why the network usage is least. Since the routes
are build on demand so the network traffic is minimum.
AODV does not allow keeping extra routing which is not
in use. If two nodes wish to establish a connection in an
ad hoc network then AODV is responsible to enable them
to build a multi hop route. AODV uses Destination
Sequence Numbers (DSN) to avoid counting to infinity
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290
3244
that is why it is loop free. When a node send request to a
destination, it sends its DSNs together with all routing
information. It also selects the most favorable route based
on the sequence number. There are three messages
i.e.,Route Request (RREQs), Route Replies (RREPs), and
Route Errors (RERRs). By using UDP protocol.
III AODV Protocol with implementation steps:
1] Begin If intermediate node k receives RREQ from
node I.
2] Determine the RREQ Discard limit (or D Lim) of
RREQ receives in all sessions on each node from their
neighbors node.
3] AVG_VAL = AVG [S1, S2, S3, S4, S5]
4] RATE_LIMIT =max no of RREQ [Si] - AVG_VAL
5] RREQ Discard limit (DLim) =
(AVG_VAL+RATE_LIMIT)+1
6] If received RREQ >RREQ Discard limit Drop the
RREQ packet Set the node a UNKNOWN NODE.
7] If received RREQ <RREQ Discard limit Process the
packet Set as KNOWN NODE
Figure.1 Mobile Node Creations: with source S and
Destination D is specified
After creating the nam file and trace file, we set up
topography object. set node_ ($i) [$ns node] is used to
create the nodes- Node Creation is shown in Figure1.
Packet Transmission: Every node transmits a packet only
up to a limited transmission range. This provides multi-
hop functionality.
Data transfer rate is a measurement of the amount of data
sent between two points on a network in a given time
period. It is a highly important concept in modern business
networking, with high data transfer rates allowing
networks to be used for complex tasks, such as on line
streaming. Understanding data transfer rate could help you
improve the performance of your business's own network.
It is shown in Figure 2.
Figure 2 Packet Transmission between nodes
Mobility of Nodes: Number of nodes is fixed in the
program. Nodes are configured with specific parameters of
a mobile wireless node. Initial location of the nodes is
fixed. Specific X, Y coordinates are assigned to every
node. Nodes are given mobility with fixed speed and
specific destination location which is generated randomly.
Nodes’ mobility will change time to time. Here we set the
initial size for the every node by using initial_node_pos.
AODV routing protocol is used here. $val(stop)
specifies the end time of the simulation.
Figure 3. Mobility of Nodes from source S to
Destination D
Throughput: Throughput: is a measure of how many
units of information a system can process in a given
amount of time. It is applied broadly to systems ranging
from various aspects of computer and network systems to
organizations. Related measures of system productivity
include the speed with which some specific workload can
be completed, and response time, the amount of time
between a single interactive user request and receipt of the
response.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290
3245
The cumulative throughput plot is much smoother and
fairness plot does not show any improvement when pacing
is on. Throughput is the number of successfully received
packets in a unit time and it is represented in bps.
Throughput is calculated using awk script which
processes the trace.
Throughput=No of packets received from application
layer with No of packets generated in application file and
that produces the result.
Figure 4. Throughput of a graph
IV CONCLUSION:
We proposed robust throughput and packet transfer
capacity measures to characterize the ability of a mobile
ad hoc wireless network to provide highly survivable
transport of flows. Such a service is critically required
for supporting applications that often required flow
transactions to be carried out to completion without
interruption to yield maximum benefit. We note that a
network system that is designed to yield a high throughput
rate does not necessarily provide its users with a high
measure of robust service and consequently may be
characterized by low robust throughput performance.
V REFERENCES
[1] Xiaoqin Chen, Haley M. Jones, A .D .S. Jayalath,
"Congestion-Aware Routing Protocol for Mobile Ad
Hoc Networks", in proceedings of 6th IEEE Conference
on Vehicular Technology,30 September-3October,
Baltimore, 2007, pp: 21- 25.
[2] Ming Yu , Aniket Malvankar , Wei Su , Simon Y. Foo
, "A link availability-based QoS-aware routing protocol
for mobile ad hoc sensor networks",Journal on Computer
Communications, vol. 30, no. 18, December 2007, pp:
3823- 3831.
[3] Charles E. Perkins and Elizabeth M. Royer, "Ad-hoc
On-Demand Distance Vector Routing", in proceedings of
2nd workshop on Mobile Computing Systems and
Applications, 25-26 Feb., New Orleans, LA USA, 1999,
pp: 90- 100.
[4] Vincent D. Park and M. Scott Corson, "A Highly
Adaptive Distributed Routing Algorithm for Mobile
Wireless Networks", in Proc. Of IEEE INFOCOM'97,
vol. 3, 7-12 April, Kobe, Japan, 1997, pp: 1405-1413.
[5] David B. Johnson and David A. Maltz, "Dynamic
Source Routing in AdHoc Wireless Networks", in
proceedings of International Series in Engineering and
Computer Science, vol. 353,1996, pp: 153- 181.
[6] Kaixin Xu, Ken Tang, Rajive Bagrodia, Mario Gerla
and Michael Bereschinsky, "Adaptive Bandwidth
Management and QoS Provisioning in Large Scale Ad
Hoc Networks", in proceedings of IEEE Conference
on Military Communications, vol. 2, 13-16, 2003,pp:
1018- 1023.
[7] Jangeun Jun and Mihail L. Sichitiu, "Fairness and QoS
in Multihop Wireless Networks", in proceedings of 58th
IEEE Conference on Vehicular Technology, vol. 5, 6-
9 October 2003, pp: 2936- 2940.
[8] C. E. Perkins, B. Royer and S.R. Das, "Ad hoc On
Demand Distance Vector (AODV)
Routing,”http://www.ietf.org/internet-draft s/draf t-ietf-
manet-aodv-13.txt, IETF Internet draft, Feb2003.
[9] D. Johnson, D.A. Maltz and J. Broch, "The Dynamic
Source Routing Protocol for Mobile adhoc
Networks,”http://www.ietf.org/internetdra fts/draft-ietf-
manet-dsr-10.txt, IETF Internet draft, 19 July2004.
[10] M. Jiang, J. Li, Y.C. Tay, "Cluster Based Routing
Protocol," August 1999 IETF
Draft.http://www.ietf.org/internet-drafts/draft-ie tf-
manet-cbrp-pec-01.txt.
[11]. C. E. Perkins and P. Bhagwat, “ Highly Dynamic
Destination- Sequenced Distance-Vector Routing
(DSDV) for Mobile Computers,” in Proceedings of
ACM SIGCOMM, pp. 234-244, 1994.
[12] S. Murthy and J.JGarcia-Luna-Aceves, “An efficient
routing protocol for wireless networks,” ACM Mobile
Networks and Applications Journal, pp.183-197, 1996.
[13] T..Chen and M. Gerla, “Global state routing: A new
routing scheme for ad hoc wireless networks,” in
Proceedings of IEEE ICC’98, Vol. 1, pp.171-175,7-11
June 1998.
[14] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W.
Chen, "Scalable Routing Strategies for Ad Hoc
Wireless Networks," IEEE Journal on Selected Areas
in communications, Special Issue on Ad-Hoc Networks,
pp.1369-79, Aug 1999.
[15]Z.J.Haas, “The Zone Routing Protocol (ZRP) for ad
hoc networks,” Internet Draft, Nov. 1997.
[16] M. Joa-Ng and I-Tai Lu, “ A peer-to-peer zone-
based two- level link state routing for mobile ad hoc
net-works,” IEEE on Selected Areas in Communications,
Vol.17,No.8,pp. 1415-1425,1999.
[17] C.E. Perkins and P. Bhagwat, “Highly, Dynamic
Destination-Sequenced Distance-Vector Routing (DSDV)
for Mobile Computers.” in Procedings of ACM
SIGCOMM. pp.234-244,1994
[18] C.E. Perkins, B. Royer and S.R. Das, “Ad hoc on
Demand Distance Vector (AODV)
Routing,”http://www.ietf.org/internet-drafts/draft-ietf-
manet-aodv-13.txt, IETF Internet draft, Feb 2003.

More Related Content

PDF
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
PDF
Source routing in Mobile Ad hoc NETworks (MANETs)
PDF
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
PDF
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
PDF
Load aware and load balancing using aomdv routing in manet
PDF
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
PDF
Traffic-aware adaptive server load balancing for softwaredefined networks
PDF
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
EFFICIENT PACKET DELIVERY APPROACH FOR ADHOC WIRELESS NETWORKS
Source routing in Mobile Ad hoc NETworks (MANETs)
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
Load aware and load balancing using aomdv routing in manet
Quality of Service Routing in Mobile Ad hoc Networks Using Node Mobility and ...
Traffic-aware adaptive server load balancing for softwaredefined networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks

What's hot (16)

PDF
A survey on energy aware routing issues and cross layering in mane ts
PDF
Rough set based QoS enabled multipath source routing in MANET
PDF
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
PDF
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
PDF
Efficient Load Balancing Routing in Wireless Mesh Networks
PDF
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
PDF
A comparative study in wireless sensor networks
PDF
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
PDF
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
PDF
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
PDF
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
PDF
A scalable and power efficient solution for routing in mobile ad hoc network ...
PDF
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
PDF
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
PDF
CONGESTION AWARE LINK COST ROUTING FOR MANETS
PDF
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
A survey on energy aware routing issues and cross layering in mane ts
Rough set based QoS enabled multipath source routing in MANET
Link Stability Based On Qos Aware On - Demand Routing In Mobile Ad Hoc Networks
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
Efficient Load Balancing Routing in Wireless Mesh Networks
IRJET- Proactive Neighbor Knowledge-based Hybrid Broadcasting in MANET
A comparative study in wireless sensor networks
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
A scalable and power efficient solution for routing in mobile ad hoc network ...
An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
CONGESTION AWARE LINK COST ROUTING FOR MANETS
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
Ad

Similar to Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network (20)

PDF
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
PDF
A survey on routing algorithms and routing metrics for wireless mesh networks
PDF
A02100108
PDF
IRJET- Survey on Enhancement of Manet Routing Protocol
PDF
Load aware and load balancing using aomdv routing in manet
PDF
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
PDF
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
PDF
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
PDF
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PDF
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
PDF
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
PDF
R045059297
PDF
Kz3618761878
PDF
Eb35725731
PDF
Multipath qos aware routing protocol
PDF
Mq3624532158
PDF
Performance comparison of mobile ad hoc network routing protocols
PDF
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
PDF
A Link’s Fineness Based on Spatial Relation for Multipoint Relays Selection A...
PDF
A Link’s Fineness Based on Spatial Relation for Multipoint Relays Selection A...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
A survey on routing algorithms and routing metrics for wireless mesh networks
A02100108
IRJET- Survey on Enhancement of Manet Routing Protocol
Load aware and load balancing using aomdv routing in manet
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
SNR/RP Aware Routing Algorithm: Cross-Layer Design for MANETS
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
IRJET-A_AODV: A Modern Routing Algorithm for Mobile Ad-Hoc Network
IRJET- Aggregate Signature Scheme and Secured ID for Wireless Sensor Netw...
R045059297
Kz3618761878
Eb35725731
Multipath qos aware routing protocol
Mq3624532158
Performance comparison of mobile ad hoc network routing protocols
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
A Link’s Fineness Based on Spatial Relation for Multipoint Relays Selection A...
A Link’s Fineness Based on Spatial Relation for Multipoint Relays Selection A...
Ad

More from Eswar Publications (20)

PDF
Content-Based Image Retrieval Features: A Survey
PDF
Clickjacking Attack: Hijacking User’s Click
PDF
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
PDF
Android Based Home-Automation using Microcontroller
PDF
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
PDF
App for Physiological Seed quality Parameters
PDF
What happens when adaptive video streaming players compete in time-varying ba...
PDF
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
PDF
Spreading Trade Union Activities through Cyberspace: A Case Study
PDF
Identifying an Appropriate Model for Information Systems Integration in the O...
PDF
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
PDF
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
PDF
A Literature Survey on Internet of Things (IoT)
PDF
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
PDF
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
PDF
Impact of Technology on E-Banking; Cameroon Perspectives
PDF
Classification Algorithms with Attribute Selection: an evaluation study using...
PDF
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
PDF
Network as a Service Model in Cloud Authentication by HMAC Algorithm
PDF
Explosive Detection Approach by Printed Antennas
Content-Based Image Retrieval Features: A Survey
Clickjacking Attack: Hijacking User’s Click
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Android Based Home-Automation using Microcontroller
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
App for Physiological Seed quality Parameters
What happens when adaptive video streaming players compete in time-varying ba...
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Spreading Trade Union Activities through Cyberspace: A Case Study
Identifying an Appropriate Model for Information Systems Integration in the O...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
A Literature Survey on Internet of Things (IoT)
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Impact of Technology on E-Banking; Cameroon Perspectives
Classification Algorithms with Attribute Selection: an evaluation study using...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Explosive Detection Approach by Printed Antennas

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Weekly Chronicles - August'25 Week I
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290 3242 Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network Madhusudan G Department of Computer Science, JSS University, Mysuru-06 Email: madhusudan@sjce.ac.in Kumar TNR Department of Computer Science, MSR University, Bangaluru Email: tnrkumar@msrit.edu ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------- An ad-hoc wireless network is highly different considering dynamic stochastic process of its underlying links, leads to link breaks during data transaction. Hence, to provide free flow data transaction, many routing algorithms have the property of link recovery and maintenance procedures to minimize the loss of data during transmission. However these routing method do not guarantee reliable data transmission in some special application conditions with wide requirements on Packet delivery ratio and link quality of the network. Routing is a critical issue in MANET and hence the focus of this paper is the performance analysis of different routing protocols used in the wireless network. We evaluate the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. The utility gained by the delivery of flow messages is based on the level of interruption experienced by the underlying transaction. We describe the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. We introduce the robust flow admission and routing algorithm (RFAR) to provide for the timely and robust transport of flow transactions across mobile ad hoc wireless systems. Keywords – MANET, AODV, DSR, RFAR, TORA. --------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: May 02, 2017 Date of Acceptance: May 17, 2017 --------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION When two nodes are at the accessible distance then packet transmission between the source and destination node occurs. The transmission power in an ad-hoc can change rapidly and unpredictably. The central challenge in the design of ad-hoc network is in maintaining routes and links between these mobile nodes. Mobile ad-hoc networks (MANETs) are characterized by time-varying links and network topology. There are transmission impediments like fading, path loss, blockage and interference that add to the inclined behavior of wireless channels. In such situation, the network must accommodate the changes, providing end-end packet delivery while at the same time incurring low control overhead. This paper proposes an improvement over the existing routing algorithm for MANETs with the primary goal of maximize network connectivity while limiting operating cost by finding those routes which can stay intact for a period of time, failures as well as by fluctuations in the communication transport quality experienced across the network’s communications links. When an active route is broken, an on-demand routing mechanism acts to discover an alternate route considering the same souce and destination. At that time, forwarding entries are configured in the routing tables of the routers located across the new route. In turn, under a proactive routing scheme, routing entries are refreshed periodically at all (active or inactive) routers. At such a refresh instant, link failures may be discovered, and the routing entries are updated. The alternate routing of packets occurring under a corresponding proactive routing base datagram-oriented (connectionless) packet switching operation, the re- configuration of the route executed by connection-oriented packet switching networks (including connection-oriented and on-demand ad hoc wireless routing schemes, such as AODV or DSR, and IP-MPLS label switching methods) may induce unacceptably long excess delays. Latencies may be adversely perceived at the impacted layer, and for many applications cause significant degradations in the quality of the provided transport service. Induced by such perceivable re-routing delays, the reception of data packets embedded in flows (or within bursts of such flows) that use routes that are prematurely terminated or altered may be of reduced value to their intended receivers. An application may generate a program (or file, or burst of messages) that must be delivered, as a whole, across the network in a critically timely manner. Kaixin Xu et al. [6] have proposed a Scalable QoS architecture suitable for large scale mobile ad-hoc networks. Xiaoqin Chen et al. [1] have proposed congestion-aware routing protocol for mobile ad-hoc networks which uses a metric incorporating data-rate, MAC overhead, and buffer delay to combat congestion. Ming Yu et al. [2] have proposed a link availability-based QoS-aware (LABQ) routing protocol for mobile ad-hoc networks based on mobility prediction and link quality measurement, in addition to energy consumption estimate. The packets which are equipped to be transmitted are buffered by the Network Interface Queues (IFQ) implemented by AODV [3], TORA [4], and DSR [5] and the network protocol stack receives these packets.
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290 3243 ROBUST THROUGHPUT: We evaluated the ability of a mobile ad hoc wireless network to distribute flows across robust routes by introducing the robust throughput measure as a performance metric. It describes the rate at which robust data is received by intended destinations. we investigate robust routing in MANETs. Throughput is defined as; the ratio of the total data reaches a receiver from the sender. The time it takes by the receiver to receive the last message is called as throughput. Throughput is expressed as bytes or bits per sec (byte/sec or bit/sec). Some factors affect the throughput as; if there are many topology changes in the network unreliable communication between nodes, limited bandwidth available and limited energy. A high throughput is absolute choice in every network. By “robust” we mean that although a particular routing configuration (in our case, a set of multi-path routes) may not be optimal for a single specific configuration (e.g.,specific network topology and link characteristics), it will perform well over a larger set of likely network configurations: i.e.,it is robust to changes without requiring global recomputation of the network. For example, only transactions that are completed without being prematurely interrupted may convey data to their intended users that are of acceptable utility and are thus accounted (as ‘robust’). In the following, we illustrate the mathematical calculation of a network’s robust throughput measure, as well as its robust throughput capacity. Different algorithms have been developed to improve the link quality. A large amount of work has been done to improve the quality of service in Manets, as well as extending existing protocols with QoS features. Most of the performance analysis work is based on simulation studies with several design parameters in commercial settings. Through simulation, we compare the reliability of braided routing and various other MANET routing protocols, including AODV, and quantify the relative amounts of control overhead incurred by braided routing and AODV. Routing means to choose a path. Routing in MANET means to choose a right and suitable path from source to destination. Routing has two basic types, which are as under as follows; Static routing: It is done by the administrator manually to forward the data packets in the network and it is permanent. None of the administrator can change this setting. These static routers are configured by the administrator, which means there is no need to make routing tables by the router itself. The Destination- Sequenced Distance-Vector (DSDV) protocol [17] is a proactive routing algorithm and is an enhanced version of the distributed Bellman-Ford algorithm Jangeun Jun and Mihail L. Sichitiu [7] have exposed a significant fairness problem existent practically in all wireless multi hop networks. Examples include Destination-Sequenced Distance-Vector (DSDV) Routing [11], Wireless Routing Protocol (WRP) [12], Global State Routing (GSR) [13], and Fisheye State Routing (FSR) [14] On the contrary, in on-demand routing protocols, routes are discovered between source and destination pair only when data is to be sent. This provides reduced overhead but high path finding latency as whenever the route is to be found between source and destination, route discovery procedure is initiated. And reSchumacher et al. [7] have approached the problem of load balancing for wireless multihop networks by distributed optimization. Examples include Ad hoc On-demand Distance Vector Routing (AODV) [8], Dynamic Source Routing (DSR) [9], and C luster Based Routing protocol (CBRP)[10]. Hybrid routing protocols combine the merits of both proactive and reactive routing protocols and overcome their short comings. Normally, hybrid routing protocols for mobile ad hoc networks exploit hierarchical network architectures. Proper proactive routing approach and reactive routing approach are exploited in different hierarchical levels, respectively. Examples of hybrid routing protocols for mobile ad hoc networks are the Zone Routing Protocol (ZRP) [15], Zone-based Hierarchical Link State routing (ZHLS) [16]. Dynamic Routing: is automatically done by the choice of router. It can route the traffic on any route depend on the routing table. Dynamic routing allows the routers to know about the networks and the interesting thing to add information in their routing tables. There are several kinds of routing protocols for wireless ad hoc networks. The first kind of protocol is simply called Reactive MANET Protocol(RMP). In these kinds of protocols, communication is only possible when the source node requests to communicate with the other node. Reactive MANET Protocols are mostly suited for nodes with high mobility or nodes that transmit data rarely. These reactive routing protocols include the protocol AODV. The routing information about all the nodes is build and maintained by the proactive protocols. The proactive routing protocols are independent of whether or not the route is needed. Control messages are transmitted with periodically intervals. Even if there is no data flow still control messages are transmitted. Because of these control messages proactive routing protocols are not bandwidth efficient. These proactive routing protocols include DSDV etc. II. AODV(Ad-hoc On-demand Distance Vector): AODV is an on-demand routing protocol. The Ad Hoc On-demand Distance Vector Routing (AODV) protocol is a reactive unicast routing protocol for mobile ad hoc networks [5] in which a route is established only when required by a source node for transmitting data packets. The AODV algorithm gives an easy way to get change in the link situation. For example if a link fails notifications are sent only to the affected nodes in the network .This notification cancels all the routes through this affected node. It builds unicast routes from source to destination and that’s why the network usage is least. Since the routes are build on demand so the network traffic is minimum. AODV does not allow keeping extra routing which is not in use. If two nodes wish to establish a connection in an ad hoc network then AODV is responsible to enable them to build a multi hop route. AODV uses Destination Sequence Numbers (DSN) to avoid counting to infinity
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290 3244 that is why it is loop free. When a node send request to a destination, it sends its DSNs together with all routing information. It also selects the most favorable route based on the sequence number. There are three messages i.e.,Route Request (RREQs), Route Replies (RREPs), and Route Errors (RERRs). By using UDP protocol. III AODV Protocol with implementation steps: 1] Begin If intermediate node k receives RREQ from node I. 2] Determine the RREQ Discard limit (or D Lim) of RREQ receives in all sessions on each node from their neighbors node. 3] AVG_VAL = AVG [S1, S2, S3, S4, S5] 4] RATE_LIMIT =max no of RREQ [Si] - AVG_VAL 5] RREQ Discard limit (DLim) = (AVG_VAL+RATE_LIMIT)+1 6] If received RREQ >RREQ Discard limit Drop the RREQ packet Set the node a UNKNOWN NODE. 7] If received RREQ <RREQ Discard limit Process the packet Set as KNOWN NODE Figure.1 Mobile Node Creations: with source S and Destination D is specified After creating the nam file and trace file, we set up topography object. set node_ ($i) [$ns node] is used to create the nodes- Node Creation is shown in Figure1. Packet Transmission: Every node transmits a packet only up to a limited transmission range. This provides multi- hop functionality. Data transfer rate is a measurement of the amount of data sent between two points on a network in a given time period. It is a highly important concept in modern business networking, with high data transfer rates allowing networks to be used for complex tasks, such as on line streaming. Understanding data transfer rate could help you improve the performance of your business's own network. It is shown in Figure 2. Figure 2 Packet Transmission between nodes Mobility of Nodes: Number of nodes is fixed in the program. Nodes are configured with specific parameters of a mobile wireless node. Initial location of the nodes is fixed. Specific X, Y coordinates are assigned to every node. Nodes are given mobility with fixed speed and specific destination location which is generated randomly. Nodes’ mobility will change time to time. Here we set the initial size for the every node by using initial_node_pos. AODV routing protocol is used here. $val(stop) specifies the end time of the simulation. Figure 3. Mobility of Nodes from source S to Destination D Throughput: Throughput: is a measure of how many units of information a system can process in a given amount of time. It is applied broadly to systems ranging from various aspects of computer and network systems to organizations. Related measures of system productivity include the speed with which some specific workload can be completed, and response time, the amount of time between a single interactive user request and receipt of the response.
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 06 Pages: 3242-3245 (2017) ISSN: 0975-0290 3245 The cumulative throughput plot is much smoother and fairness plot does not show any improvement when pacing is on. Throughput is the number of successfully received packets in a unit time and it is represented in bps. Throughput is calculated using awk script which processes the trace. Throughput=No of packets received from application layer with No of packets generated in application file and that produces the result. Figure 4. Throughput of a graph IV CONCLUSION: We proposed robust throughput and packet transfer capacity measures to characterize the ability of a mobile ad hoc wireless network to provide highly survivable transport of flows. Such a service is critically required for supporting applications that often required flow transactions to be carried out to completion without interruption to yield maximum benefit. We note that a network system that is designed to yield a high throughput rate does not necessarily provide its users with a high measure of robust service and consequently may be characterized by low robust throughput performance. V REFERENCES [1] Xiaoqin Chen, Haley M. Jones, A .D .S. Jayalath, "Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks", in proceedings of 6th IEEE Conference on Vehicular Technology,30 September-3October, Baltimore, 2007, pp: 21- 25. [2] Ming Yu , Aniket Malvankar , Wei Su , Simon Y. Foo , "A link availability-based QoS-aware routing protocol for mobile ad hoc sensor networks",Journal on Computer Communications, vol. 30, no. 18, December 2007, pp: 3823- 3831. [3] Charles E. Perkins and Elizabeth M. Royer, "Ad-hoc On-Demand Distance Vector Routing", in proceedings of 2nd workshop on Mobile Computing Systems and Applications, 25-26 Feb., New Orleans, LA USA, 1999, pp: 90- 100. [4] Vincent D. Park and M. Scott Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks", in Proc. Of IEEE INFOCOM'97, vol. 3, 7-12 April, Kobe, Japan, 1997, pp: 1405-1413. [5] David B. Johnson and David A. Maltz, "Dynamic Source Routing in AdHoc Wireless Networks", in proceedings of International Series in Engineering and Computer Science, vol. 353,1996, pp: 153- 181. [6] Kaixin Xu, Ken Tang, Rajive Bagrodia, Mario Gerla and Michael Bereschinsky, "Adaptive Bandwidth Management and QoS Provisioning in Large Scale Ad Hoc Networks", in proceedings of IEEE Conference on Military Communications, vol. 2, 13-16, 2003,pp: 1018- 1023. [7] Jangeun Jun and Mihail L. Sichitiu, "Fairness and QoS in Multihop Wireless Networks", in proceedings of 58th IEEE Conference on Vehicular Technology, vol. 5, 6- 9 October 2003, pp: 2936- 2940. [8] C. E. Perkins, B. Royer and S.R. Das, "Ad hoc On Demand Distance Vector (AODV) Routing,”http://www.ietf.org/internet-draft s/draf t-ietf- manet-aodv-13.txt, IETF Internet draft, Feb2003. [9] D. Johnson, D.A. Maltz and J. Broch, "The Dynamic Source Routing Protocol for Mobile adhoc Networks,”http://www.ietf.org/internetdra fts/draft-ietf- manet-dsr-10.txt, IETF Internet draft, 19 July2004. [10] M. Jiang, J. Li, Y.C. Tay, "Cluster Based Routing Protocol," August 1999 IETF Draft.http://www.ietf.org/internet-drafts/draft-ie tf- manet-cbrp-pec-01.txt. [11]. C. E. Perkins and P. Bhagwat, “ Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” in Proceedings of ACM SIGCOMM, pp. 234-244, 1994. [12] S. Murthy and J.JGarcia-Luna-Aceves, “An efficient routing protocol for wireless networks,” ACM Mobile Networks and Applications Journal, pp.183-197, 1996. [13] T..Chen and M. Gerla, “Global state routing: A new routing scheme for ad hoc wireless networks,” in Proceedings of IEEE ICC’98, Vol. 1, pp.171-175,7-11 June 1998. [14] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies for Ad Hoc Wireless Networks," IEEE Journal on Selected Areas in communications, Special Issue on Ad-Hoc Networks, pp.1369-79, Aug 1999. [15]Z.J.Haas, “The Zone Routing Protocol (ZRP) for ad hoc networks,” Internet Draft, Nov. 1997. [16] M. Joa-Ng and I-Tai Lu, “ A peer-to-peer zone- based two- level link state routing for mobile ad hoc net-works,” IEEE on Selected Areas in Communications, Vol.17,No.8,pp. 1415-1425,1999. [17] C.E. Perkins and P. Bhagwat, “Highly, Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers.” in Procedings of ACM SIGCOMM. pp.234-244,1994 [18] C.E. Perkins, B. Royer and S.R. Das, “Ad hoc on Demand Distance Vector (AODV) Routing,”http://www.ietf.org/internet-drafts/draft-ietf- manet-aodv-13.txt, IETF Internet draft, Feb 2003.