ArticlePDF Available

Mobile Ad-hoc Network Routing Protocols: A Simulation and Performance Analysis Using Multimedia Traffic

Authors:

Abstract and Figures

Mobile ad hoc Networks (MANETs) dynamically form non-permanent network without any common administration or infrastructure. Its dynamic topology requires new set of routing protocols different from traditional wired networks. Multimedia applications such as video conferencing demands consistent throughput and end-to-end delay under varying network load. This requirement is very challenging due to restrictions such as dynamic topology, bandwidth limitation, energy constraint, and autonomy. In this paper different routing protocols of MANETs have been analyzed with performance metrics of throughput, end-to-end delay and network load by simulating multimedia (video conferencing) traffic. The simulation results show that proactive protocol OLSR outperforms reactive protocol AODV and hybrid protocol TORA due to readily available routing paths.
Content may be subject to copyright.
A preview of the PDF is not available
... A method for automatic adjustment needs to be implemented when there is a difference between the volatility of the short term and the long term to maintain stable economic growth. High regional heterogeneity and nonlinear threshold features highlighted the benefits of trade openness and proved the effectiveness of economic growth (Naseer et al., 2012). The impact of trade openness on GDP growth is examined by (Chandrashekar, Sakthivel, Sampath, & CHITTEDI, 2018) using a panel data set comprising five developing market nations. ...
Article
Full-text available
Economic development is fueled by tourism through partnerships with other governments. The revolutionary potential of Vision 2030 is further increased by religious tourism, a gift for Saudi Arabia's economic growth. Better institutional qualities are what drive increased growth. Thus, evaluating the association between financial growth and Saudi Arabia's formal quality as well as the effect of religious tourism on the latter constitute the study's two key objectives. An ARDL approach, the Granger causality test, the panel cointegration approach, government consumption, savings, trade liberalization, political instability index, and religious tourism (Muslims travelling to perform the hajj and umrah) are applied to analyze the complex affiliation between these factors and financial growth from 2002 to 2019. The analysis's result identified numerous short-and long-term consequences. The paper's findings demonstrate a robust and favorable relationship between economic development and institutional quality, government saving and consumption, and both domestic and international travel. Nonetheless, both in the short and long terms, political stability is irrelevant. The study highlights the potential for developing Islamic travel itineraries that would uphold Islamic traditions at the destination.
... A political regime is a group of institutions that together form a nation's government. A political regime may be described as a particular style of government, a state organization, or a democratic system (Naseer et al., 2012). The phrase "political regime" can also refer to a particular ruler or group of rulers inside a democratic system (Diamond & Morlino, 2004). ...
Article
Full-text available
Significant problems with public health, the economy, and politics have been brought on by COVID-19 in numerous nations worldwide. We offer a preliminary comparison of monarchies, democracies, and authoritarian regimes along with policy recommendations to strengthen their governance and ability to fight the pandemic, while the global effort to combat the virus continues in their responses to COVID-19 and addresses these research gaps. The present study examines the measures implemented by several government regimes in China, the United States, Saudi Arabia, Pakistan, Germany, and the United Kingdom to counteract the global pandemic, utilizing diverse approaches. According to the findings, countries that employ authoritarian tactics are better at containing the pandemic. Although they are unhappy with the information flow, Saudi Arabia, an absolute monarchy, and China, an authoritarian regime, are more successful in containing the outbreak. Democratic administrations might find it more difficult to react rapidly to pandemics. The study also found that, in Saudi Arabia and China, the number of instances was comparatively lower than in the US, UK, and Germany when mixed approaches were employed under the constitutional, federal, and democratic governmental frameworks.
... The principle of Wimex-Bot(Naseer et al., 2012) ...
... Many performance metrics is measured such as, End to End Delay, Networks Load, and Throughput. Simulation shows that OLSR is better than other in delay time and other metrics S. Naseer et al [35]. ...
Article
Full-text available
Wireless Multimedia Sensor Networks (WMSNs) have emerged as a leading method for providing multimedia data like audio, images, and videos in recent years. Multimedia delivery data in Wireless Sensor Networks with resource limits is a significant due to its file size, notably in terms of energy consumption and Quality of Service (QoS) assurance for Wireless Sensor Networks (WSN). WSN routing protocols are in charge of providing reliable communication and preserving the best network's paths. For multimedia applications, traditional routing approaches are insufficient, so needs to improve it by new techniques. In this survey paper, a various kinds of routing protocols are described that take place in WMSNs. They are classified and compared these efficient Performance routing protocols based on their development of a new techniques. Performance metrics includes End to End packets delay, Network Load, Throughput, Reliability, QoS metrics, and network lifetime. The various routing protocols techniques using WMSN are compared.
... Many performance metrics is measured such as, End to End Delay, Networks Load, and Throughput. Simulation shows that OLSR is better than other in delay time and other metrics S. Naseer et al [35]. ...
... The DoS attacks have extended in consistency, complexity, and the pace at which they occur in the last few years. Due to extent of threats on large networks, the Internet needs urgent attention and effective countermeasures for DoS attacks (Naseer et al., 2012). In 2018, the biggest DoS attack on GitHub was released, which overwhelmed Internet traffic at a rate of 1.33 TBPS (Bouyeddou et al., 2020), which has shown in Fox News network. ...
Article
Full-text available
There are several different networking attacks but a denial of service attack (DOS) is the one that disables a server from servicing its clients. In this area, some productive hackers and professionals have built packages, methods, and scripts that trigger DoS attacks on different network types. The key phenomenon of the DoS attack is that in an effort to knock it down, it produces many false packets to the network, which implies overflowing of a large number of invalid data packets that are sent to a specific server with a wrong IP address. We will illustrate the implementation and evaluation of DoS attacks on a virtual server (in a local network) using a powerful tool named 'Xerxes'. In addition, we analyzed the attack performance using the Wireshark tool to analyze the IP address of the attacking source. The experimental results infer that Xerxes outperforms the target machine to service its clients. In this paper will show the possible damage caused by DoS attacks and examine the effects of the damage and in last, we will discuss the ways to stay safe from this kind of attack in networking infrastructure.
... We used many lifestyle related parameters to check their relationship with depression. First part of our questionnaire follows lifestyle-related questions; from these questions we have derived our variables (Naseer et al., 2012). Depression PHQ-9 is standard depression module which can diagnose patients' depression level by scoring their selected answers. ...
Article
Full-text available
The dominance of depression is common in youth of Pakistan, and it is essential to alleviate it as they are nation builders. There are probablysome lifestyle factors are intensifying depression. This research is intended to assess which lifestyle factors are leading to depression and are to be controlled to assassinate it so that adolescents can enjoy a happy and healthy life both mentally and physically. This study is based on an online random sample of 340 subjects, the majority female within the age group 18-25. Data collection was done using structured questionnaire to evaluate lifestyle of youth and modified version of the Patient Health Questionnaire (PHQ-9) is used to analyze severity of depression. KNN, SVM, Decision tree and Logistic regression are used for machine leaning analysis and Pearson’s chi-squared statistical hypothesis, Cramer’s V Statistic, Spearman rank correlation statistic and proportion testing with z-statistics are used for statistical analysis. It has been found that water intake (p=0.03<0.05), sleep duration (p=0.02<0.05), occupational satisfaction level (p=0.03<0.05), and social media usage (p=0.02<0.05) are the lifestyle factors that are dependent on depression. Controlling these factors i.e. drinking 6-8 glasses of water/day, sleeping 6-8 hours/day, high occupation satisfaction and less social media usage assists in reducing depression.
... A review about the WIMAX Technology and simulators available in the public domain and standalone was presented in [8]. The authors in [9] analyzed different routing protocols of MANETs with performance metrics of throughput, end-to-end delay and network load by simulating multimedia (video conferencing) traffic. The simulation results show that proactive protocol OLSR outperforms reactive protocol AODV and hybrid protocol TORA due to readily available routing paths. ...
Article
Worldwide Interoperability for Microwave Access (WiMAX) is one of the most efficient and well known area based networking system that provide fixed, and more newly, mobile broadband connectivity between fixed and mobile network access in a define coverage areas. There are a large number of research works that have been conducted to measure the performance of WiMAX network using different ad-hoc routing protocols. Most of them are concerned only about the protocols and how they work in WiMAX networks. There are no such comparisons purely based on the nature of protocols, whether they are reactive or proactive, or distance vector or link state. If the most suited approach of routing can be determined, research area can be narrowed to that particular approach. In this paper, four different protocols are taken, namely, Destination Sequence Distance Vector (DSDV) routing protocol, which is a proactive distance vector routing protocol; Dynamic Source Routing (DSR), which is a reactive distance vector protocol; Optimized Link State Routing Protocol (OLSR), which is a proactive link state routing protocol. For simulation of WiMAX network, Network Simulator-3 (NS-3) simulation software in Linux environment is used. For measuring and comparing performances of the protocols, primarily Packet Delivery Ratio, Throughput, End-to-End Delay, Normalized Routing overhead, Number of dropped data packets have been used. Results of simulation shows that, OLSR, as well as, Proactive Link State routing approach outperform other two approaches in simulated WiMAX network. Then also tried to improve the performance of WiMAX by analyzing the network with and without mobility.
... Naseer et.al (2012) [14] , a performance comparison of the protocols AODV, OLSR and TORA on real-time video traffic using OPNET simulation was performed. In that study, the results of the simulation show that OLSR outperforms AODV and TORA routing protocols in terms of higher network load and minimal delay. ...
Article
Full-text available
Transmitting video over Mobile Ad-hoc networks (MANETs) is a challenging task because it is severely affected by the various properties of the MANETs such as mobility, dynamic change in topology, lack of fixed infrastructure, resource constraints and limited bandwidth. Most of the existing MANETs routing protocols are not cope with QoS metrics (E2E-delay, jitter, Packet Delivery Ratio (PDR%)) required to efficiently transmitted video contents. This paper investigates the efficient MANETs routing protocols that can provide a high QoS for video conferencing over MANETs through simulation experiments that vary in network sizes and density of mobile nodes. The simulation carried out through OPNET 14.5 modular. The routing protocols under the investigation are Ad hoc on Demand Distance Vector (AODV) as the reactive routing protocol, Optimized Link State Routing (OLSR) as proactive, and Geographic Routing Protocol (GRP) as position-based. The goal of our simulation is to evaluate the impact of the mobility and scalability on the performance of the above routing protocols for video conferencing over MANET in order to identify which MANET routing protocols grantee the desirable QoS metrics. From our simulation study we found that OLSR outperforms AODV and GRP when MANETs scalable and becomes dense.
... (Meenakshi, et al, 2014) presented the analysis of AODV, DSDV and ZRP by using ns-2 and illustrated that ZRP is better than AODV and DSDV in terms of metrics which has been used like throughput. (Salman et al, 2012) using multimedia application analyzed the TORA, AODV and OLSR by help of opnet. (Gupta et al, 2013) evaluated the mobility effect of manet routing protocols in terms of packet delivery ratio and end to end delay by using ns-2 simulator, and observed AODV perform better. ...
Article
Full-text available
Abstract:The center of attention of this research paper is about the performance evaluation of TDRP (table driven routing protocol) and EDRP (event driven routing protocol) by using voice and video traffic in MANET (mobile Adhoc network). Particularly OLSR (table driven) and DSR (Event driven) routing protocols are focused. The nodes of MANET establish the connections with each other energetically, and move freely in any direction. In mobile Adhoc network environment event driven and table driven protocols have significant subject matter of study. There is a mobility issue which affects the services performance due to breakage and renewal of links of mobile nodes. Protocols performances have significance on overall performance of MANET. The aim of this paper is to present the performance analysis of selected routing protocols by varying the node densities and varying WLAN physical characteristics. The voice and video traffic applications are configured discretely by using OLSR and DSR in scenarios. Moreover, for the performance observation the parameters are, jitter, traffic received, traffic sent, end-to-end delay, traffic load, and throughput. The simulation have been carried out through OPNET 14.5 modeler tool, and results have been analysed. Keywords:MANET, TDRP, EDRP, METRICS, OPNET (PDF) Performance Evaluation of TDRP and EDRP for Voice and Video Services in MANET. Available from: https://www.researchgate.net/publication/331731671_Performance_Evaluation_of_TDRP_and_EDRP_for_Voice_and_Video_Services_in_MANET [accessed Mar 14 2019].
Article
Full-text available
This paper will present building of secured intrusion detection system (IDS) infrastructure. Fo r its function IDS is often the first target of intruders and must be properly secured. Main components of IDS and principles for their hardening will be explained. A pplication of these principles in practice will be shown on th e secured IDS infrastructure that will be built using open so urce products.
Article
We report a wireless Sensor network (WSN) for monitoring patient's physiological signal continuously using Zigbee. The output of biosensor has to be transmitted via Zigbee and the same has to be sent to the remote wireless monitor for acquiring the observed patient's physiological signal. The remote wireless monitor is constructed of Zigbee and personal computer (PC). The measured signal has to be sent to the PC for data collection. When the measured signals over the standard value, the personal computer sends Global system for Mobile communication (GSM) short message to the caretaker. Although Bluetooth is better than Zigbee for transmission rate, but Zigbee has lower power consumption. Hence, Zigbee is generally used for 24 hours monitor of communication transmission system. The first procedure of the system is that the biosensor is used to measure heart rate, respiration rate and blood pressure from human body using Zigbee. This measured signal is to be sent to the PC via the RS-232 serial port communication interface. It can send the signal to remote PC or PDA from the internet. In particular, when measured signals over the standard value, the personal computer will send GSM short message to absent care taker's mobile phone.
Conference Paper
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues for such an environment. Our discussion is based on the concrete example of a thermometer that makes its readings available to other nodes over the air. Some lessons learned from this example appear to be quite general to ad-hoc networks, and rather different from what we have come to expect in more conventional systems: denial of service, the goals of authentication, and the problems of naming all need re-examination. We present the resurrecting duckling security policy model, which describes secure transient association of a device with multiple serialised owners.
Article
The process of exchange is almost continual in human interactions, and appears to have characteristics peculiar to itself, and to generate affect, motivation, and behavior that cannot be predicted unless exchange processes are understood. This chapter describes two major concepts relating to the perception of justice and injustice; the concept of relative deprivation and the complementary concept of relative gratification. All dissatisfaction and low morale are related to a person's suffering injustice in social exchanges. However, a significant portion of cases can be usefully explained by invoking injustice as an explanatory concept. In the theory of inequity, both the antecedents and consequences of perceived injustice have been stated in terms that permit quite specific predictions to be made about the behavior of persons entering social exchanges. Relative deprivation and distributive justice, as theoretical concepts, specify some of the conditions that arouse perceptions of injustice and complementarily, the conditions that lead men to feel that their relations with others are just. The need for much additional research notwithstanding, the theoretical analyses that have been made of injustice in social exchanges should result not only in a better general understanding of the phenomenon, but should lead to a degree of social control not previously possible. The experience of injustice need not be an accepted fact of life.
Data
Using Adobe Reader is the easiest way to submit your proposed amendments for your IGI Global proof. If you don't have Adobe Reader, you can download it for free at http://get.adobe.com/reader/. The comment functionality makes it simple for you, the contributor, to mark up the PDF. It also makes it simple for the IGI Global staff to understand exactly what you are requesting to ensure the most flawless end result possible. Please note, however, that at this point in the process the only things you should be checking for are: Spelling of Names and Affiliations, Accuracy of Chapter Titles and Subtitles, Figure/Table Accuracy, Minor Spelling Errors/Typos, Equation Display As chapters should have been professionally copy edited and submitted in their final form, please remember that no major changes to the text can be made at this stage. Here is a quick step-by-step guide on using the comment functionality in Adobe Reader to submit your changes. 1. Select the Comment bar at the top of page to View or Add Comments. This will open the Annotations toolbar. 2. To note text that needs to be altered, like a subtitle or your affiliation, you may use the Highlight Text tool. Once the text is highlighted, right-click on the highlighted text and add your comment. Please be specific, and include what the text currently says and what you would like it to be changed to.