SlideShare a Scribd company logo
Ex.no.11 PERFORMANCE EVALUATION OF ROUTING PROTOCOLS
AIM:
To Study of performance evaluation of routing protocols using simulation tool
ROUTING PROTOCOLS
There are many routing protocols available. Among them all we are
working with AODV and DSR for performance analysis.
A. Ad-hoc On demand Distance Vector (AODV)
It is purely On-Demand route acquisition routing protocol. It is better
protocol than DSDV network as the size of network may increase depending on
the number of vehicle nodes.
1) Path Discovery Process: In order to discover the path between source
and destination, a Route Request message (RREQ) is broadcasted to all the
neighbours in radio range who again continue to send the same to their neighbours
in there radio range, until the destination is reached. Every node maintains two
counters: sequence number and broadcast-id in order to maintain loop-free and
most recent route information. The broadcast-id is incremented for every RREQ
the source node initiates. If an intermediate node receives the same copy of
request, it discards it without routing it further. When a node forwards the RREQ
message, it records the address of the neighbour from which it received the first
copy of the broadcast packet, in order to maintain a reverse path to the source
node. The RREQ packet contains: the source sequence number and the last
destination sequence number know to the source. The source sequence number is
used to maintain information about reverse route and destination sequence
number tells about the actual distance to the final node.
2) Route Maintenance: A source node sends a new moving request packet
RREQ to find a new route to the destination. But, if an intermediate node moves
from its place, its upstream neighbor noticed the move and sends a message
notification failure of the link to each of its active upstream neighbors to inform
them about the move to source nodes is achieved. After the detection process is
again initiated.
B. Dynamic Source Routing (DSR)
It is an On-Demand routing protocol in which the sequence of nodes
through which a packet needs to travel is calculated and maintained as an
information in packet header. Every mobile node in the network needs to maintain
a route cache where it caches source routes that it has learned. When a packet is
sent, the route-cache inside the node is compared with the actual route needs to
be covered.
1) Route Discovery: The source node broadcasts request-packets to all the
neighbours in the network containing the address of the destination node, and a
reply is sent back to the source node with the list of network-nodes through which
it should propagate in the process. Sender initiates the route record as a list with
a single element containing itself followed by the linking of its neighbour in that
route. A request packet also contains an identification number called request-id,
which is counter increased only when a new route request packet is being sent by
the source node. To make sure that no loops occur during broadcast, the request
is processed in the given order. A route reply is obtained in DSR by two ways:
Symmetric-links (bidirectional), in which the backward route is followed again
to catch the source node. Asymmetric-links (unidirectional) needs to discover the
route up to the source node in the same manner as the forward route is discovered.
2) Route Maintenance: In the hop by hop acknowledgement at data link
layer allows the early detection and retransmission of lost or corrupt packets in
the data-link layer. If a transmission error occurs, a route error packet containing
the address of node detecting the error and the host address is sent back to the
sender. Whenever a node receives a route error packet, the hop in error is
removed from the route cache and all routes containing this hop are truncated at
that point. When the wireless transmission between two nodes does not work
equally well in both directions, and then end-to-end replies on the application or
transport layer may be used to indicate the status of the route from one host to
the other
RESULT
Thus the performance evaluation of routing protocols was studied.

More Related Content

PDF
Research Inventy : International Journal of Engineering and Science
researchinventy
 
PDF
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
PDF
C 16
Pratik waghmare
 
PDF
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
PPT
Wireless routing protocols
barodia_1437
 
PPT
Unit VIII wireless sensor networks
sangusajjan
 
PDF
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
ijtsrd
 
PDF
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
IJCNCJournal
 
Research Inventy : International Journal of Engineering and Science
researchinventy
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Wireless routing protocols
barodia_1437
 
Unit VIII wireless sensor networks
sangusajjan
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
ijtsrd
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
IJCNCJournal
 

Similar to ex11-routing-performance.pdf (20)

PPTX
Dynamic source routing in ad hoc wireless networks
huda2018
 
PDF
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
IJERA Editor
 
PDF
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
PDF
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
PDF
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
PDF
On the routing overhead in infrastructureless multihop wireless networks
Narendra Singh Yadav
 
PDF
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
ijasuc
 
PDF
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
ijsrd.com
 
PDF
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
PDF
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
PDF
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
PPTX
AODV routing protocol
Varsha Anandani
 
PDF
Unit8 tgb
Vivek Maurya
 
DOC
Distributed cache updating for the dynamic source routing protocol(synopsis)
Mumbai Academisc
 
PDF
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Computer Science Journals
 
PDF
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
IJMER
 
DOC
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
ijcnes
 
PDF
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
PPTX
Routing protocol
AmzadKhn
 
PDF
Ijarcet vol-2-issue-4-1318-1321
Editor IJARCET
 
Dynamic source routing in ad hoc wireless networks
huda2018
 
A Simulated Behavioral Study of DSR Routing Protocol Using NS-2
IJERA Editor
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
On the routing overhead in infrastructureless multihop wireless networks
Narendra Singh Yadav
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
ijasuc
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
ijsrd.com
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
AODV routing protocol
Varsha Anandani
 
Unit8 tgb
Vivek Maurya
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Mumbai Academisc
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Computer Science Journals
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
IJMER
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
ijcnes
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
Routing protocol
AmzadKhn
 
Ijarcet vol-2-issue-4-1318-1321
Editor IJARCET
 

More from Jayaprasanna4 (20)

PDF
web programming javascriptconditionalstatements.pdf
Jayaprasanna4
 
PDF
hyper text markup language ppt-100605011058-phpapp02.pdf
Jayaprasanna4
 
PPTX
web essentials - simple message flow and loo.pptx
Jayaprasanna4
 
PPTX
web essentials - Working principle of a Website.pptx
Jayaprasanna4
 
PPTX
software project in MONTE CARLO SIMULATION.pptx
Jayaprasanna4
 
PPT
Cost effort in softwrae project management.ppt
Jayaprasanna4
 
PDF
software project management cocomomodel.pdf
Jayaprasanna4
 
PPT
software project management Activity planning.ppt
Jayaprasanna4
 
PDF
software project management montecarloscheduleanalysis.pdf
Jayaprasanna4
 
PPT
casestudy on distributionnetworkformichaelshardwaregroupgate.ppt
Jayaprasanna4
 
PPT
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
PPT
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
PDF
Human computer Interaction ch1-the human.pdf
Jayaprasanna4
 
PPT
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
PPT
HUman computer Interaction Socio-organizational Issues.ppt
Jayaprasanna4
 
PPT
human computer Interaction cognitive models.ppt
Jayaprasanna4
 
PPT
World wide web and Hyper Text Markup Language
Jayaprasanna4
 
PPT
CI-Monte-Carlo.ppt
Jayaprasanna4
 
PPT
Activity planning.ppt
Jayaprasanna4
 
PPT
Cost effort.ppt
Jayaprasanna4
 
web programming javascriptconditionalstatements.pdf
Jayaprasanna4
 
hyper text markup language ppt-100605011058-phpapp02.pdf
Jayaprasanna4
 
web essentials - simple message flow and loo.pptx
Jayaprasanna4
 
web essentials - Working principle of a Website.pptx
Jayaprasanna4
 
software project in MONTE CARLO SIMULATION.pptx
Jayaprasanna4
 
Cost effort in softwrae project management.ppt
Jayaprasanna4
 
software project management cocomomodel.pdf
Jayaprasanna4
 
software project management Activity planning.ppt
Jayaprasanna4
 
software project management montecarloscheduleanalysis.pdf
Jayaprasanna4
 
casestudy on distributionnetworkformichaelshardwaregroupgate.ppt
Jayaprasanna4
 
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Human computer Interaction ch1-the human.pdf
Jayaprasanna4
 
computer Networks Error Detection and Correction.ppt
Jayaprasanna4
 
HUman computer Interaction Socio-organizational Issues.ppt
Jayaprasanna4
 
human computer Interaction cognitive models.ppt
Jayaprasanna4
 
World wide web and Hyper Text Markup Language
Jayaprasanna4
 
CI-Monte-Carlo.ppt
Jayaprasanna4
 
Activity planning.ppt
Jayaprasanna4
 
Cost effort.ppt
Jayaprasanna4
 

Recently uploaded (20)

PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PDF
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Information Retrieval and Extraction - Module 7
premSankar19
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
Cryptography and Information :Security Fundamentals
Dr. Madhuri Jawale
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
Zero Carbon Building Performance standard
BassemOsman1
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 

ex11-routing-performance.pdf

  • 1. Ex.no.11 PERFORMANCE EVALUATION OF ROUTING PROTOCOLS AIM: To Study of performance evaluation of routing protocols using simulation tool ROUTING PROTOCOLS There are many routing protocols available. Among them all we are working with AODV and DSR for performance analysis. A. Ad-hoc On demand Distance Vector (AODV) It is purely On-Demand route acquisition routing protocol. It is better protocol than DSDV network as the size of network may increase depending on the number of vehicle nodes. 1) Path Discovery Process: In order to discover the path between source and destination, a Route Request message (RREQ) is broadcasted to all the neighbours in radio range who again continue to send the same to their neighbours in there radio range, until the destination is reached. Every node maintains two counters: sequence number and broadcast-id in order to maintain loop-free and most recent route information. The broadcast-id is incremented for every RREQ the source node initiates. If an intermediate node receives the same copy of request, it discards it without routing it further. When a node forwards the RREQ message, it records the address of the neighbour from which it received the first copy of the broadcast packet, in order to maintain a reverse path to the source node. The RREQ packet contains: the source sequence number and the last destination sequence number know to the source. The source sequence number is used to maintain information about reverse route and destination sequence number tells about the actual distance to the final node. 2) Route Maintenance: A source node sends a new moving request packet RREQ to find a new route to the destination. But, if an intermediate node moves from its place, its upstream neighbor noticed the move and sends a message notification failure of the link to each of its active upstream neighbors to inform them about the move to source nodes is achieved. After the detection process is again initiated. B. Dynamic Source Routing (DSR) It is an On-Demand routing protocol in which the sequence of nodes through which a packet needs to travel is calculated and maintained as an information in packet header. Every mobile node in the network needs to maintain a route cache where it caches source routes that it has learned. When a packet is
  • 2. sent, the route-cache inside the node is compared with the actual route needs to be covered. 1) Route Discovery: The source node broadcasts request-packets to all the neighbours in the network containing the address of the destination node, and a reply is sent back to the source node with the list of network-nodes through which it should propagate in the process. Sender initiates the route record as a list with a single element containing itself followed by the linking of its neighbour in that route. A request packet also contains an identification number called request-id, which is counter increased only when a new route request packet is being sent by the source node. To make sure that no loops occur during broadcast, the request is processed in the given order. A route reply is obtained in DSR by two ways: Symmetric-links (bidirectional), in which the backward route is followed again to catch the source node. Asymmetric-links (unidirectional) needs to discover the route up to the source node in the same manner as the forward route is discovered. 2) Route Maintenance: In the hop by hop acknowledgement at data link layer allows the early detection and retransmission of lost or corrupt packets in the data-link layer. If a transmission error occurs, a route error packet containing the address of node detecting the error and the host address is sent back to the sender. Whenever a node receives a route error packet, the hop in error is removed from the route cache and all routes containing this hop are truncated at that point. When the wireless transmission between two nodes does not work equally well in both directions, and then end-to-end replies on the application or transport layer may be used to indicate the status of the route from one host to the other RESULT Thus the performance evaluation of routing protocols was studied.