TABLE 1 - uploaded by Anuj Kumar Gupta
Content may be subject to copyright.
COMPARISON OF THE THREE ROUTING PROTOCOLS

COMPARISON OF THE THREE ROUTING PROTOCOLS

Source publication
Article
Full-text available
The field of Mobile Ad hoc Networks (MANETs) has gained an important part of the interest of researchers and become very popular in last few years. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. They can be studied formally as graphs in which the set of edges varies in time. The main method fo...

Context in source publication

Context 1
... the event of network partitions the protocol is able to detect the partition and erase all invalid routes. Table 1 lists some comparisons between the three routing protocols discussed above. ...

Similar publications

Article
Full-text available
Mobile Ad-hoc Networks (MANET) are self-organizing networks composed of mobile nodes without any fixed infrastructure. The design and the implementation of efficient and scalable routing protocols constitute one main issue. However, routing protocols for MANETs are mainly based on computing the shortest paths and could not be energy efficient. Node...
Chapter
Full-text available
Mobile ad hoc networks (MANETs) are a promising communication paradigm for the emerging collaborative environments which do not need an underlying stable, centralized routing and management infrastructure. In this paper we propose a particular approach for the design of a mobile routing protocol focused on the stability (measured as the transmissio...

Citations

... AODV is another variant of classical distance vector routing algorithm, a confluence of both DSDV and DSR (Gupta A.K. et al., 2010). AODV protocol doesn't have a fixed topology in a network. ...
Article
Full-text available
A Mobile Ad hoc Network (MANET) is a collection of mobile nodes, that forms on the fly a temporary wireless multi-hop network in a self-organizing way, without relying on any established infrastructure. In MANET, a pair of nodes exchange messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. For this purpose, an efficient routing protocol is required. This paper introduced performance study of three of MANET protocols (AODV, GRP and OSPFv3). This study was one of the newer studies because wireless communication played an important role in today’s application and the field of mobile ad hoc network becomes very popular for the researchers in the last years. This study was done using OPNET Modeler v14.5 and the comparison between the protocols was done in terms of throughput, routing traffic received, traffic sent, load and delay with increased number of mobile nodes from 10, 25 and 50 mobile nodes. The results showed that AODV (reactive routing protocol) was better in delay and had smaller load and smaller throughput than GRP (reactive and proactive routing protocols) and OSPFv3 (proactive routing protocols).
... It is a simple and efficient routing protocol which can be employed in wireless ad-hoc networks which span multiple nodes acting as sender or receivers. Using dynamic routing, the network is completely self-organizing and self-configuring, requiring no existing network infrastructure or administration [15]. This makes it suitable for multi-hop wireless networks. ...
Article
Full-text available
In the paper the adaptability of Dynamic Source Routing (DSR) Protocol to the changes in network topography, its ability to establish new routes and the viability in modern sensing devices is simulated and analyzed. For a dynamic network the distance between source and destination changes along with their position in respect to their neighboring nodes. In our experiments, three scenarios considering real world deployment techniques like fixed position, clustering and random mobility are designed and the behavior of the protocol has been studied in two networks consisting of 100 and 150 nodes respectively. Comparative analysis is performed considering characteristics such as Instantaneous throughput, Bandwidth consumption, Average throughput, Packet delivery ratios and Residual energy of the individual nodes and of the network. The experimental data provides valuable insight for real-world applications. Path selection in DSR protocol is based on control messages which are flooded throughout the network. As seen from our experiments, the protocol can be greatly enhanced by reducing the overhead (number of packets required for network communication) to conserve bandwidth. Before making changes to the header or the routing mechanism we need to make sure that the protocol can still accommodate the various types of payloads, options and adopt to fragmented or dynamic networks. Due to the severe limitations on the resources available, the selected protocol should provide high energy efficiency, reliability and robustness to attacks. Hence the analysis of networking/routing protocols should be considered and variations of the selected protocol can be developed to accommodate the challenges faced in such networks.
... AODV is one of the well-known On-Demand Routing techniques (Patel and Jhaveri, 2016;Gupta et al., 2010). AODV protocol is prone and unprotected against so many attacks, namely; black hole, wormhole, jellyfish, gray hole, flooding and impersonation attacks. ...
... This is because a higher mobility leads to frequent topology changes which in turn affect data being sent to different destinations. Mathematically, throughput T is expressed using equation 1 as in (Gupta et al., 2010). ...
... A higher mobility rate leads to increase in delay. The average end-to-end delay D is defined in equation 2 in (Gupta et al., 2010) as: ...
Article
Full-text available
Mobile Ad-hoc Networks (MANET) consist of mobile nodes capable of performing self-configuration, communicate wirelessly with no centralized control and require routing protocols for its operation. However, the existing routing protocols used in MANETs are not secured and faced many security challenges which degrade the performance of the network. Therefore, there is need to build security feature in the existing routing protocol to enhance its performance in the face of emerging threats. In this paper, a proposed model was formulated to provide secure routing in MANET. The model used Public key cryptography also known as RSA with MD5 for authentication and observation-based cooperation enforcement and graph theory-based trust and reputation techniques, built on AODV routing protocol to enhance its security. The simulation of the model was carried out in NS2.35. Performance evaluation of the proposed model AODVRM was carried out by comparing its performance with an existing protocol, AODV using metrics like throughput, End-to-End delay and Packet delivery ratio. Simulation result showed that the proposed AODVRM recorded throughput of 291,502,502,461,506 kilo bytes per seconds (kbps), packet delivery ratio of 94%, 95%, 95%, 86%, 83% and an end-to-end delay of 132, 235, 272, 272, 258 seconds. While AODV recorded throughput of 280, 319, 227, 223, 74 kilo bytes per seconds (kbps). packet delivery ratio of 94%, 93%, 90%, 82%, 65% and an end-to-end delay of 186, 369, 341, 292, 278 seconds. In conclusion, the proposed model AODVRM is more efficient and performs better in the presence of attacks than the conventional AODV in terms of performance metrics used.
... A dynamic learning system against black-hole attack in AODV based MANET was done by Payal and Prashant (2009). Performance analysis of AODV, DSR & TORA routing protocols was done by Gupta, et al (2010). Avoiding black hole and cooperative black-hole attacks in wireless ad-hoc networks was done by Baddache and Belmehdi (2010). ...
Conference Paper
Full-text available
Historique, des recherches archéologiques ont révélé que, l’huile d’olive était extraite de l’olive en Syrie. Les vertus des produits de l’olivier sont ainsi reconnues et exploitées de longue date et sont notamment à la base de nombreuses pharmacopées traditionnelles. L’UNESCO a intégré en 2010 le régime méditerranéen pour lequel la contribution fondamentale de l’huile d’olive est reconnue, dans la liste des héritages culturels intangibles de l’humanité. Plus récemment, l’avancée des connaissances scientifiques dans le domaine de la nutrition préventive a permis de corroborer le potentiel de l’huile d’olive pour de nombreuses cibles biologiques, y compris pour la santé osseuse (Coxam et al., 2014). Devant, cette particularité, une question pertinente est à poser : Comment l’être humain a conservé et conserve cet or liquide ? Une mutation est enregistrée dans le conditionnement de l’huile d’huile, a travers un passage de la terre cuite naturelle vers le composite dite « Compounds » purement chimique et synthétique avec la dominance de la matière plastique identifiée par des chiffres de 1 à 7 pour y arriver à « Others » dont le mélange est non identifiable. Desormais, les organismes officiaux, les chercheurs depuis (Lambert, 1976) stipulent que le matériau d’emballage quelque soit sa nature doit préserver non seulement sa qualité nutritionnelle mais aussi la qualité hygiénique (non-toxicité) et bien évidemment ses caractéristiques organoleptiques. Des recommandés sont imposés par la commission du codex alimentaires (CAC, RCP 1-1962- REV2, 1985). Nos résultats de recherche sur le comportement de l’huile d’olive dans divers matériau d’emballage confirment la réactivité de l’emballage et la contamination de l’huile d’olive.
... Such example of these protocols, ADOV, 5 DSR, 6 and TORA. 7 In contrast, Proactive protocols are ready to provide routes of paths of data before they require it. This kind of protocols is represented in RPL routing Protocol. ...
Article
Full-text available
Low-power lossy networks performance relies heavily on the wireless node battery status. Furthermore, Routing Protocol for Low-Power and Lossy Network routing protocol was not optimally designed with sustainable energy consumption in mind to suit these networks. Prolonging the lifespan of these networks is of utmost priority. This article introduces a solar energy harvesting module to power energy-constrained network devices and quantifies the effect of using harvested energy on prolonging their network lifetime when Routing Protocol for Low-Power and Lossy Network routing protocol is used. Simulation of the new developed module is conducted in three different scenarios using Contiki Cooja simulator sporting Zolertia Z1 motes. Furthermore, the harvested energy used was fed from a Cooja-based Simulation model of actual PV supercapacitor circuit design. All battery levels were set to 1% of their total capacity for all nodes in the network to speed up observing the energy harvesting effect. The performance evaluation results showed that the network with no-energy harvesting operated for time duration of 4:08:04 time units (i.e. hour:minute:second) with a dramatic decrease in connection between nodes in the network. However, the same network, when using the harvested energy to back up the battery operation, lasted for 6:40:01 in time units with improved connectivity, a total extended network lifetime of 2:31:97-time units. Furthermore, for the Routing Protocol for Low-Power and Lossy Network routing metrics, OF0 outperformed ETX in term of throughput, packet delivery ratio, energy consumption, and network connectivity. Results indicate that the developed harvested energy module fits perfectly for any Cooja-based simulation and mimics actual photovoltaic-based supercapacitor battery. It should also help researchers introduce and quantify accurately new energy consumption-based routing metrics for Routing Protocol for Low-Power and Lossy Network.
... Such example of these protocols, ADOV, 5 DSR, 6 and TORA. 7 In contrast, Proactive protocols are ready to provide routes of paths of data before they require it. This kind of protocols is represented in RPL routing Protocol. ...
... Hash affixes are utilized to get variable fields, for example, bounce tally. It is an expansion to AODV Routing Protocol [18]. To protect the Route Discovery mechanism of AODV it is used, by providing security features like integrity, authentication and nonrepudiation. ...
Preprint
Full-text available
Several types of Routing Protocols for mobile ad hoc networks have been proposed recently for their application in various areas such as military, government and many other fields. In this paper, we have proposed a comparative study of various routing protocols for mobile ad-hoc networks particularly emphasizing on its security aspect. Furthermore, we have discussed the comparison among existing routing protocols for MANET. Main factor for comparison is routing methodologies and knowledge required to make routing decisions. The comparison is made on the basis of the following factors: integrity, confidentiality, authentication, nonrepudiation and availability. Analysis of the secured version of proposed routing method has been done on the basis of the five security requirements and the same has been shown in the comparison tables.
... Hash affixes are utilized to get variable fields, for example, bounce tally. It is an expansion to AODV Routing Protocol [18]. To protect the Route Discovery mechanism of AODV it is used, by providing security features like integrity, authentication and nonrepudiation. ...
Preprint
Full-text available
Several types of Routing Protocols for mobile ad hoc networks have been proposed recently for their application in various areas such as military, government and many other fields. In this paper, we have proposed a comparative study of various routing protocols for mobile ad-hoc networks particularly emphasizing on its security aspect. Furthermore, we have discussed the comparison among existing routing protocols for MANET. Main factor for comparison is routing methodologies and knowledge required to make routing decisions. The comparison is made on the basis of the following factors: integrity, confidentiality, authentication, nonrepudiation and availability. Analysis of the secured version of proposed routing method has been done on the basis of the five security requirements and the same has been shown in the comparison tables.
... Many research studies have been carried out for the performance evaluation of routing protocols and TCP variants regarding scalability and mobility by the use of network simulators such as NS-2 and OPNET. In [1] performance evaluation of MANET routing protocols have been done with packet delivery fraction and end-to-end delay, where AODV has the best all round performance. DSR is suitable for networks with moderate mobility rate. ...
... A destination sequence number is also used for avoiding routing loops, and guaranteeing the recent routes to be selected, where the larger the number is the fresher the route is. AODV protocol is used in relatively static networks, with low byte overhead and loops free routing using the destination sequence numbers [1]. ...
... The advantage of DSR is the decrease in the overheads of the control packets of the route discovery with using route cache. On the other hand the disadvantage is that source routing can lead increase in the packet header size with route length [1]. ...
... Many research studies have been carried out for the performance evaluation of routing protocols and TCP variants regarding scalability and mobility by the use of network simulators such as NS-2 and OPNET. In [1] performance evaluation of MANET routing protocols have been done with packet delivery fraction and end-to-end delay, where AODV has the best all round performance. DSR is suitable for networks with moderate mobility rate. ...
... A destination sequence number is also used for avoiding routing loops, and guaranteeing the recent routes to be selected, where the larger the number is the fresher the route is. AODV protocol is used in relatively static networks, with low byte overhead and loops free routing using the destination sequence numbers [1]. ...
... The advantage of DSR is the decrease in the overheads of the control packets of the route discovery with using route cache. On the other hand the disadvantage is that source routing can lead increase in the packet header size with route length [1]. ...
Article
The Hankel matrix’s low-rank property derived from the noise-free seismic data describing a few linear events and has been successively leveraged in many low-rank seismic data de-noising approaches. In such rank reduction methods, the typical scheme is to determine the best low-rank estimation of the formulated Hankel matrix, and then obtain the de-noised data. However, if the noisy data has been rearranged for the low-rank approximation in a Hankel matrix, it is usually not precisely low-rank. In the presented research, we propose a multivariate generalization of the minimax-concave penalty (MCP) function inducing sparsity on seismic data in the time-space domain. Initially obtained sparse representation of data would be decomposed into semi low-rank and the sparse components with the best approximate of noisy measurement matrix would be defined. This would be performed through the low-rank matrix extraction by optimal (re)weighting of the singular vectors of the observed matrix. The efficiency of the proposed method was evaluated on synthetic and real land data examples. Results were also compared with the state-of-art methods such as the non-local means (NLM), the Optimum Shrinkage Sparse Low-Rank estimation, the Optimum Shrinkage Synchrosqueezing Wavelet Transform and the damped rank reduction (DRR) methods. Qualitative and quantitative comparison of results approved capabilities of the proposed method compared to other selected noise attenuation method.