Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
International 
OPEN ACCESS Journal 
Of Modern Engineering Research (IJMER) 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 36| 
Comparing: Routing Protocols on Basis of sleep mode Sukhdeep Kaur1 Rohit Kumar2, Lokesh Pawar 3 1Post Graduate Student, Dept. of Information Technology, Chandigarh University, Mohali, Punjab, 140413 2,3Assistant Professor, Dept. of Computer Science Engineering, Chandigarh University, Mohali, Punjab, 140413 
I. Introduction 
Routing means, to choose a suitable path from source to destination. Routing is used in different networks like telephony network, internet network, electronic data network. Routing protocols will help to route the packet from source to destination in correct path. In most of the routing algorithms routing is done through routing tables. When routing is going on there are three main mechanisms i.e. unicast, broadcast and multicast. The wireless networks are classified as Infrastructure or Infrastructure less. In Infrastructure wireless networks, the mobile node can move while communicating, the base stations are fixed and as the node goes out of the range of a base station, it gets into the range of another base station. In Infrastructure less or Ad Hoc wireless network, the mobile node can move while communicating, there are no fixed base stations and all the nodes in the network act as routers. The mobile nodes in the Ad Hoc network dynamically establish routing among themselves to form their own network „on the fly‟. Mobile Ad Hoc Network is a collection of wireless mobile nodes forming a temporary network without any fixed infrastructure where all nodes are free to move about arbitrarily and where all the nodes configure themselves. In this network, each node acts both as a router and as a host & even the topology of network may also change rapidly. Some of the key challenges in the area of MANET include stable uncast/multicast routing, dynamic network topology, network overhead, scalability, security and power aware Routing. In this research paper, intend is to study the mobility patterns of two prominent MANET routing protocols i.e. DSR and AODV using simulation modeling over varying number of UDP/TCP connections. Rest of the paper is organized as: gives description of routing protocols for MANET, about critique analysis of AODV and DSR, elaborates on mobility metrics, discusses experimental analysis of DSR, AODV using network simulator. At last, concludes the paper and provides an idea to researchers about challenges in the field of ad hoc wireless networks that may be carried out as research work in future. 
Figure.1 RREQ and RREP messages send in AODV 
II. Reactive Routing Protocols 
Reactive routing protocols are called on-demand routing protocols so these routing protocols are called when they are needed and the routes are built. These routes can be acquired by sending route requests through the network. Disadvantage of this algorithm is that it offers high latency in searching a network 
Abstract: The architecture of ad hoc wireless network consists of mobile nodes for communication without the use of fixed-position routers. The communication between them takes place without centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver the packet in significant delay. There are different protocols for handling the mobile environment like AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols. The performance of these protocols is analyzed on two metrics: time and throughput. 
Keywords: WSN ,MANET, UDP ,TCP,OLSR ,AODV.
Comparing: Routing Protocols on Basis of sleep mode 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 37| 
a) Dynamic Source Routing (DSR) 
Dynamic Source Routing (DSR) is a reactive kind of protocol which reacts on-demand. The main feature of DSR is source routing in which the source always knows the complete route from source to destination. It frequently uses source routing and route caching. Route Discovery and Route Maintenance are two main methods used in DSR. It is uncomplicated and efficient protocol. It does not depend on timer-based activities. It allows multiple routes to destination node and routing is loop-free here. Any broken link is notified to the source node with an error message. It works well in large networks where routes change quickly and mobility of routes is higher. In DSR, intermediate nodes do not need to preserve the routing information. Instead the packets themselves contain every routing decision. DSR uses a route discovery process to find a route when a node in the network tries to send a data packet to a destination for which the route is unknown. A route is found by flooding the network with route requests. When a node receives this request, it broadcasts it again until it itself is the destination or it has the route to the destination. This node then replies to the request to the original source. The request and response packets are source routed. Request packet creates the path of traversal. Response packet creates the reverse path to the source by traversing backwards. 
Figure.2 Route discovery procedure in DSR 
b) Ad hoc On-Demand Distance Vector Routing (AODV) 
AODV is an on –Demand routing protocol which is confluence of DSDV and DSR.Route is calculated on demand, just as it is in DSR via route discovery process. However, AODV maintains a routing table where it maintains one entry per destination unlike the DSR that maintains multiple route cache entries for each destination.AODV provides loop free routes while repairing link breakages but unlike DSDV, it doesn‟t require global periodic routing advertisements. 
Figure.3 Route discovery procedure in AODV 
III. Proactive Routing Protocol 
The routing information about all the nodes is build and maintained by the proactive protocols. The proactive routing protocols are independent of whether or not the route is needed There are many advantages and disadvantages of proactive routing protocols. One of its advantages is that the nodes can easily get routing information, and it easily starts a session. The disadvantages are, too much Performance Analysis of AODV, DSR and OLSR in MANET data kept by the nodes for route maintenance, when there is a particular link failure its reform is too slow.
Comparing: Routing Protocols on Basis of sleep mode 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 38| 
a. Optimized link –state routing (OLSR) 
The Optimized Link State Routing (OLSR) protocol is an optimization of the classical link state algorithm, adapted to the requirements of a MANET ([10]). Because of their quick convergence, link state algorithms are somewhat less prone to routing loops than distance vector algorithms, but they require more CPU power and memory. They can be more expensive to implement and support and are generally more scalable. OLSR operates in a hierarchical way (minimizing the organization and supporting high traffic rates). The key concept used in OLSR is that of multipoint relays (MPRs). MPRs are selected nodes which forward broadcast messages during the flooding process. This technique substantially reduces the message overhead as compared to a classical flooding mechanism (where every node retransmits each message received). This way a mobile host can reduce battery consumption. In OLSR, link state information is generated only by nodes elected as MPRs. An MPR node may choose to report only links between itself and its MPR selectors. Hence, contrarily to the classical link state algorithm, partial link state information is distributed in the network. This information is then used for route calculation. OLSR provides optimal routes .The protocol is particularly suitable for large and dense networks as the technique of MPRs works well in this context. 
Figure. 4 Routing table of OLSR 
Optimized Link State Routing (OLSR) protocol is a table-driven proactive routing protocol for wireless mobile ad hoc networks. This protocol optimizes the flooding process and reduces the control message overheads by marking subset of neighbors as multi-point relays (MPRs). In OLSR, each node periodically broadcasts two types of messages: HELLO messages and Topology Control (TC) messages. A HELLO message contains two lists in which one list includes the addresses of the neighbors to which there exists a valid bi- directional link and the other list includes the addresses of the neighbors from which control traffic has been heard but bidirectional links are not confirmed. Upon receiving HELLO message, a node examines list of addresses, if its own address is in the list, it is confirmed that bidirectional communication has been established with the sender. HELLO messages also allow each node to maintain information describing link between neighbor node and nodes which are two-hop away. The set of nodes among the one-hop neighbors with a bi- directional link are chosen as multipoint relays (MPRs). Only these nodes forward topological information about the network. On the reception of HELLO messages, each node maintains a neighbor table which contains one- hop neighbor information, their link status information and a list of two hop neighbors. Each node also maintains a set of its neighbors which are called the MPR Selectors of the node. When these selectors send a broadcast packet, only its MPR nodes among its entire neighbors forward the packet. The MPR nodes periodically broadcast its selector list throughout the network. The smaller set of multipoint relay provides more optimal routes. The path to the destination consists of a sequence of hops through the multipoint relays from source to destination. A TC message contains the list of neighbors who have selected the sender node as a multipoint relay and is used to diffuse topological information to the entire network. Based on the information contained in the neighbor table and the TC message, each node maintains a routing table which includes destination address, next-hop address, and number of hops to the destination. Fisheye State Routing (FSR) protocol is a proactive (table driven) ad hoc routing protocol and its mechanisms are based on the Link State Routing protocol used in wired networks. FSR is an implicit hierarchical routing protocol. It reduces the routing update overhead in large networks by using a fisheye technique. Fish eye has the ability to see the objects better when they are nearer to its focal point that means each node maintains accurate information about near Nodes and not so accurate about far-away nodes. The scope of fisheye is defined as the set of nodes that can be reached within a given number of hops. The number of levels and the radius of each scope will depend on the size of the network. Entries corresponding to nodes within the smaller scope are propagated to the neighbors with the highest frequency and the exchanges in smaller scopes are more frequent than in larger. That makes the
Comparing: Routing Protocols on Basis of sleep mode 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 39| 
topology information about near nodes more precise than the information about farther nodes. FSR minimized the consumed bandwidth as the link state update packets that are exchanged only among neighboring nodes and it manages to reduce the message size of the topology information due to removal of topology information concerned far-away nodes. Even if a node doesn‟t have accurate information about far away nodes, the packets will be routed correctly because the route information becomes more and more accurate as the packet gets closer to the destination. This means that FSR scales well to large mobile ad hoc networks as the overhead is controlled and supports high rates of mobility. The FSR concept originates from Global State Routing (GSR). GSR can be viewed as a special case of FSR, in which there is only one fisheye scope level and the radius is infinite. As a result, the entire topology table is exchanged among neighbors that consume a considerable amount of bandwidth when network size becomes large. 
Figure .5 Communication in OLSR Problem Statement: Energy conservation is one of most happening and hot issue in the wireless sensor network. Wireless sensor network refers to a network where a lot of nodes share similar network architecture and follow routing algorithms to save energy of the system. There are two different architecture types namely AODV and OLSR .The routing overhead associated with dissemination of routing packets is quite huge. The aim of the research work is to design a sophisticated protocol which can save maximum amount of energy and can increase the throughput of the system. The proposed routing algorithm is supposed to achieve by combining two algorithms namely AODV and OLSR. The overall aim of this thesis is to design novel energy efficient AODV +OLSR protocol for Wireless Sensor network. 
IV. Mobility Metrics 
We have selected the energy consumption and accuracy as a metrics during the simulation in order to evaluate the performance of the different protocols. V. Result and Conclusion The following figures describe the results of this research work. Step1:
Comparing: Routing Protocols on Basis of sleep mode 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 40| 
The above figure represents the node movement in the proposed system architecture. When a network node fails,OLSR is called. The till now operation is performed using AODV network topology. Instead of checking for another active node through AODV, the network opt for OLSR. Step 2: 
The above figure represents the end to end delay versus the number of rounds. Till now, no extra dead node is found Step 3: 
The above figure represents the scenario of dead node .When the dead node occurs OLSR is called and the transmission of data continued. VI. Conclusion The research work performed concludes that the AODV and OLSR both are optimal protocols for any kind of routing and energy conservation schemes but AODV can be optimized using OLSR protocol if they are combined. The research work has computed its results over different aspects like packet delivery ratio, end to end delay and through put. VII. Future work The current research work opens up a lot of possibilities for the future research works like combination of AODV with NEURAL NETWORKS or combination of OLSR with NEURAL NETWORK. The current research work only actives one dead packet or node scenario. It does not deal with multiple node failure system which can become one of the future research works.
Comparing: Routing Protocols on Basis of sleep mode 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 41| 
REFERENCES [1] C.Sivaram murthy, B.S. Manoj, Adhoc wireless networks: Architectures, and protocols, Pearson Education,2004. [2] Pankaj Palta and Sonia Goyal , “Comparison of OLSR and TORA routing protocols using OPNET Modeler” in International Journal of Engineering Research and technology Vol. 1 Issue 5, July - 2012 Nehra et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(5), May - 2013, pp. 984-990 © 2013, IJARCSSE All Rights Reserved Page | 990 [3] C.Parkins, E.B.Royer, S.Das, A hoc On-Demand Distance Vector (AODV) Routing, July 2003, [Online]. Available: http://www.faqs.org/rfcs/rfc3561.html. [Accessed: April. 10, 2010] [4] Gagangeet singh aujla and Sandeep singh kang “Comparative analysis of AODV, DSR, GRP, OLSR and TORA by varying number of nodes with FTP and HTTP Applications over MANETs” in International Journal of Computer Applications Vol 65 No 2, March 2013. [5] Ashish Shrestha and Firat Tekiner, “On MANET Routing Protocols for Mobility and Scalability.” In International Conference on Parallel and Distributed Computing, Applications and Technologies, p.p. 451-456, November 2009. IEEE Computer Society. [6] N Vetrivelan and A V Reddy, “Performance Analysis of Three Routing Protocols for Varying MANET Size.” In Proceedings of the International Multi Conference of Engineers and Computer Scientists (IMECS 2008), Vol. II, 19- 21 March 2008, Hong Kong. [7] Harmanpreet kaur and Jaswinder singh “Performance comparison of OLSR, GRP and TORA using OPNET” in International Journal of Advanced Research in Computer Science and Software Engineering Vol 2 Issue 10 October 2012. [8] N. Adam, M.Y. Ismail et al., "Effect of Node density on Performances of Three MANET Routing Protocols." In International Conference on Electronic Devices, Systems and Applications (ICEDSA2010), p.p. 321-325, October 2010. [9] R. Al-Ani, “Simulation and performance analysis evaluation for variant MANET routing protocols”, International Journal of Advancements in Computing Technology, Volume 3, Number 1, February 2011 [10] Mr. L Raja, Capt. Dr. S Santhosh Baboo “Comparative study of reactive routing protocol AODV, DSR, ABR and TORA” in International Journal Of Engineering And Computer Science Vol 2 Issue 3 March 2013 Page No. 707-718

More Related Content

What's hot

Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
ijasuc
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
Rehan Hattab
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
As33259263
As33259263As33259263
As33259263
IJERA Editor
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
ijceronline
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
paperpublications3
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ijwmn
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantification
ijwmn
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
IOSR Journals
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
IJCNCJournal
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
E04402030037
E04402030037E04402030037
E04402030037
ijceronline
 
E010322531
E010322531E010322531
E010322531
IOSR Journals
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
IAEME Publication
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
شيماء شقيرة
 
Q01821111115
Q01821111115Q01821111115
Q01821111115
IOSR Journals
 

What's hot (18)

Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...Performance Evalution of MANET Routing Protocols using Reference Point Group ...
Performance Evalution of MANET Routing Protocols using Reference Point Group ...
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
As33259263
As33259263As33259263
As33259263
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantification
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
E04402030037
E04402030037E04402030037
E04402030037
 
E010322531
E010322531E010322531
E010322531
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Q01821111115
Q01821111115Q01821111115
Q01821111115
 

Viewers also liked

Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 
Study of Performance of Different Blends of Biodiesel Prepared From Waste Co...
Study of Performance of Different Blends of Biodiesel Prepared  From Waste Co...Study of Performance of Different Blends of Biodiesel Prepared  From Waste Co...
Study of Performance of Different Blends of Biodiesel Prepared From Waste Co...
IJMER
 
Significancy Test For The Control Parameters Considered In Weld Bead Geometry...
Significancy Test For The Control Parameters Considered In Weld Bead Geometry...Significancy Test For The Control Parameters Considered In Weld Bead Geometry...
Significancy Test For The Control Parameters Considered In Weld Bead Geometry...
IJMER
 
Influence of the Powder of Pozzolana on Someproperties of the Concrete: Case ...
Influence of the Powder of Pozzolana on Someproperties of the Concrete: Case ...Influence of the Powder of Pozzolana on Someproperties of the Concrete: Case ...
Influence of the Powder of Pozzolana on Someproperties of the Concrete: Case ...
IJMER
 
391 506-1-pb
391 506-1-pb391 506-1-pb
391 506-1-pb
Leonardo Bravo
 
Apstyleppt 140104202730-phpapp02
Apstyleppt 140104202730-phpapp02Apstyleppt 140104202730-phpapp02
Apstyleppt 140104202730-phpapp02
joycefeuerborn
 
Photography powerpoint
Photography powerpointPhotography powerpoint
Photography powerpoint
joycefeuerborn
 
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsA Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
IJMER
 
Sistema contra fuego usg tablaroca
Sistema contra fuego usg tablarocaSistema contra fuego usg tablaroca
Sistema contra fuego usg tablaroca
Victor Hugo Hernandez Ramirez
 
What is twitter
What is twitterWhat is twitter
What is twitter
denise2228
 
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
IJMER
 
Seo word press basics
Seo word press basicsSeo word press basics
Seo word press basics
denise2228
 
Information Communication Technology: Practices for Academia
Information Communication Technology: Practices for AcademiaInformation Communication Technology: Practices for Academia
Information Communication Technology: Practices for Academia
IJMER
 
Bk31212217
Bk31212217Bk31212217
Bk31212217
IJMER
 
Shareware
SharewareShareware
Shareware
Bayar Faisal
 
Estimation of Manufacturing Costs in the Early Stages of Product Development ...
Estimation of Manufacturing Costs in the Early Stages of Product Development ...Estimation of Manufacturing Costs in the Early Stages of Product Development ...
Estimation of Manufacturing Costs in the Early Stages of Product Development ...
IJMER
 
New Horizons in ICT for Women
New Horizons in ICT for WomenNew Horizons in ICT for Women
New Horizons in ICT for Women
EWIL_EU
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor Networks
IJMER
 
An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggr...
An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggr...An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggr...
An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggr...
IJMER
 

Viewers also liked (20)

Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 
Study of Performance of Different Blends of Biodiesel Prepared From Waste Co...
Study of Performance of Different Blends of Biodiesel Prepared  From Waste Co...Study of Performance of Different Blends of Biodiesel Prepared  From Waste Co...
Study of Performance of Different Blends of Biodiesel Prepared From Waste Co...
 
Significancy Test For The Control Parameters Considered In Weld Bead Geometry...
Significancy Test For The Control Parameters Considered In Weld Bead Geometry...Significancy Test For The Control Parameters Considered In Weld Bead Geometry...
Significancy Test For The Control Parameters Considered In Weld Bead Geometry...
 
Influence of the Powder of Pozzolana on Someproperties of the Concrete: Case ...
Influence of the Powder of Pozzolana on Someproperties of the Concrete: Case ...Influence of the Powder of Pozzolana on Someproperties of the Concrete: Case ...
Influence of the Powder of Pozzolana on Someproperties of the Concrete: Case ...
 
391 506-1-pb
391 506-1-pb391 506-1-pb
391 506-1-pb
 
Apstyleppt 140104202730-phpapp02
Apstyleppt 140104202730-phpapp02Apstyleppt 140104202730-phpapp02
Apstyleppt 140104202730-phpapp02
 
Photography powerpoint
Photography powerpointPhotography powerpoint
Photography powerpoint
 
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsA Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
 
Karu.form
Karu.formKaru.form
Karu.form
 
Sistema contra fuego usg tablaroca
Sistema contra fuego usg tablarocaSistema contra fuego usg tablaroca
Sistema contra fuego usg tablaroca
 
What is twitter
What is twitterWhat is twitter
What is twitter
 
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
Development of Algorithm for Voice Operated Switch for Digital Audio Control ...
 
Seo word press basics
Seo word press basicsSeo word press basics
Seo word press basics
 
Information Communication Technology: Practices for Academia
Information Communication Technology: Practices for AcademiaInformation Communication Technology: Practices for Academia
Information Communication Technology: Practices for Academia
 
Bk31212217
Bk31212217Bk31212217
Bk31212217
 
Shareware
SharewareShareware
Shareware
 
Estimation of Manufacturing Costs in the Early Stages of Product Development ...
Estimation of Manufacturing Costs in the Early Stages of Product Development ...Estimation of Manufacturing Costs in the Early Stages of Product Development ...
Estimation of Manufacturing Costs in the Early Stages of Product Development ...
 
New Horizons in ICT for Women
New Horizons in ICT for WomenNew Horizons in ICT for Women
New Horizons in ICT for Women
 
Structural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor NetworksStructural Monitoring Of Buildings Using Wireless Sensor Networks
Structural Monitoring Of Buildings Using Wireless Sensor Networks
 
An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggr...
An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggr...An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggr...
An Experimental Investigation on Mode-II Fracture of Light Weight Pumice Aggr...
 

Similar to Comparing: Routing Protocols on Basis of sleep mode

A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
pijans
 
H01115155
H01115155H01115155
H01115155
IOSR Journals
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IOSR Journals
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
IJERA Editor
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Narendra Singh Yadav
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
International Journal of Engineering Inventions www.ijeijournal.com
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
 
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
ijwmn
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
IOSR Journals
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
Editor IJCATR
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
BRNSSPublicationHubI
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
inventionjournals
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
cscpconf
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Narendra Singh Yadav
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
IJERA Editor
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Sitamarhi Institute of Technology
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
IJERA Editor
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
ijsrd.com
 

Similar to Comparing: Routing Protocols on Basis of sleep mode (20)

A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
 
H01115155
H01115155H01115155
H01115155
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
Energy and Performance Evaluation of Reactive, Proactive, and Hybrid Routing ...
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)International Journal of Pharmaceutical Science Invention (IJPSI)
International Journal of Pharmaceutical Science Invention (IJPSI)
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
Application of Parabolic Trough Collectorfor Reduction of Pressure Drop in Oi...
 

Recently uploaded

SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
rameshqapcba
 
SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )
Tsuyoshi Horigome
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
dulbh kashyap
 
East Carolina University diploma. ECU diploma
East Carolina University diploma. ECU diplomaEast Carolina University diploma. ECU diploma
East Carolina University diploma. ECU diploma
College diploma
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
Online train ticket booking system project.pdf
Online train ticket booking system project.pdfOnline train ticket booking system project.pdf
Online train ticket booking system project.pdf
Kamal Acharya
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
sathishkumars808912
 
natural gas transmission pipeline safety related presentation.pdf
natural gas transmission pipeline safety related presentation.pdfnatural gas transmission pipeline safety related presentation.pdf
natural gas transmission pipeline safety related presentation.pdf
SusheelGupta16
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
Geoffrey Wardle. MSc. MSc. Snr.MAIAA
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
EMERSON EDUARDO RODRIGUES
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
LokerXu2
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
ShivangMishra54
 
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 MinutesCall Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
kamka4105
 
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
simrangupta87541
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
DharmaBanothu
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Poonam Singh
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
DharmaBanothu
 
CSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdfCSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdf
Ismail Sultan
 

Recently uploaded (20)

SMT process how to making and defects finding
SMT process how to making and defects findingSMT process how to making and defects finding
SMT process how to making and defects finding
 
SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )SPICE PARK JUL2024 ( 6,866 SPICE Models )
SPICE PARK JUL2024 ( 6,866 SPICE Models )
 
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
🚺ANJALI MEHTA High Profile Call Girls Ahmedabad 💯Call Us 🔝 9352988975 🔝💃Top C...
 
East Carolina University diploma. ECU diploma
East Carolina University diploma. ECU diplomaEast Carolina University diploma. ECU diploma
East Carolina University diploma. ECU diploma
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
Online train ticket booking system project.pdf
Online train ticket booking system project.pdfOnline train ticket booking system project.pdf
Online train ticket booking system project.pdf
 
BBOC407 Module 1.pptx Biology for Engineers
BBOC407  Module 1.pptx Biology for EngineersBBOC407  Module 1.pptx Biology for Engineers
BBOC407 Module 1.pptx Biology for Engineers
 
natural gas transmission pipeline safety related presentation.pdf
natural gas transmission pipeline safety related presentation.pdfnatural gas transmission pipeline safety related presentation.pdf
natural gas transmission pipeline safety related presentation.pdf
 
My Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdfMy Airframe Metallic Design Capability Studies..pdf
My Airframe Metallic Design Capability Studies..pdf
 
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEERDELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
DELTA V MES EMERSON EDUARDO RODRIGUES ENGINEER
 
Literature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptxLiterature review for prompt engineering of ChatGPT.pptx
Literature review for prompt engineering of ChatGPT.pptx
 
Intuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sdeIntuit CRAFT demonstration presentation for sde
Intuit CRAFT demonstration presentation for sde
 
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 MinutesCall Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
Call Girls In Tiruppur 👯‍♀️ 7339748667 🔥 Free Home Delivery Within 30 Minutes
 
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
Mahipalpur Call Girls Delhi 🔥 9711199012 ❄- Pick Your Dream Call Girls with 1...
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
 
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7Call Girls Madurai 8824825030 Escort In Madurai service 24X7
Call Girls Madurai 8824825030 Escort In Madurai service 24X7
 
This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...This study Examines the Effectiveness of Talent Procurement through the Imple...
This study Examines the Effectiveness of Talent Procurement through the Imple...
 
CSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdfCSP_Study - Notes (Paul McNeill) 2017.pdf
CSP_Study - Notes (Paul McNeill) 2017.pdf
 

Comparing: Routing Protocols on Basis of sleep mode

  • 1. International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 36| Comparing: Routing Protocols on Basis of sleep mode Sukhdeep Kaur1 Rohit Kumar2, Lokesh Pawar 3 1Post Graduate Student, Dept. of Information Technology, Chandigarh University, Mohali, Punjab, 140413 2,3Assistant Professor, Dept. of Computer Science Engineering, Chandigarh University, Mohali, Punjab, 140413 I. Introduction Routing means, to choose a suitable path from source to destination. Routing is used in different networks like telephony network, internet network, electronic data network. Routing protocols will help to route the packet from source to destination in correct path. In most of the routing algorithms routing is done through routing tables. When routing is going on there are three main mechanisms i.e. unicast, broadcast and multicast. The wireless networks are classified as Infrastructure or Infrastructure less. In Infrastructure wireless networks, the mobile node can move while communicating, the base stations are fixed and as the node goes out of the range of a base station, it gets into the range of another base station. In Infrastructure less or Ad Hoc wireless network, the mobile node can move while communicating, there are no fixed base stations and all the nodes in the network act as routers. The mobile nodes in the Ad Hoc network dynamically establish routing among themselves to form their own network „on the fly‟. Mobile Ad Hoc Network is a collection of wireless mobile nodes forming a temporary network without any fixed infrastructure where all nodes are free to move about arbitrarily and where all the nodes configure themselves. In this network, each node acts both as a router and as a host & even the topology of network may also change rapidly. Some of the key challenges in the area of MANET include stable uncast/multicast routing, dynamic network topology, network overhead, scalability, security and power aware Routing. In this research paper, intend is to study the mobility patterns of two prominent MANET routing protocols i.e. DSR and AODV using simulation modeling over varying number of UDP/TCP connections. Rest of the paper is organized as: gives description of routing protocols for MANET, about critique analysis of AODV and DSR, elaborates on mobility metrics, discusses experimental analysis of DSR, AODV using network simulator. At last, concludes the paper and provides an idea to researchers about challenges in the field of ad hoc wireless networks that may be carried out as research work in future. Figure.1 RREQ and RREP messages send in AODV II. Reactive Routing Protocols Reactive routing protocols are called on-demand routing protocols so these routing protocols are called when they are needed and the routes are built. These routes can be acquired by sending route requests through the network. Disadvantage of this algorithm is that it offers high latency in searching a network Abstract: The architecture of ad hoc wireless network consists of mobile nodes for communication without the use of fixed-position routers. The communication between them takes place without centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver the packet in significant delay. There are different protocols for handling the mobile environment like AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols. The performance of these protocols is analyzed on two metrics: time and throughput. Keywords: WSN ,MANET, UDP ,TCP,OLSR ,AODV.
  • 2. Comparing: Routing Protocols on Basis of sleep mode | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 37| a) Dynamic Source Routing (DSR) Dynamic Source Routing (DSR) is a reactive kind of protocol which reacts on-demand. The main feature of DSR is source routing in which the source always knows the complete route from source to destination. It frequently uses source routing and route caching. Route Discovery and Route Maintenance are two main methods used in DSR. It is uncomplicated and efficient protocol. It does not depend on timer-based activities. It allows multiple routes to destination node and routing is loop-free here. Any broken link is notified to the source node with an error message. It works well in large networks where routes change quickly and mobility of routes is higher. In DSR, intermediate nodes do not need to preserve the routing information. Instead the packets themselves contain every routing decision. DSR uses a route discovery process to find a route when a node in the network tries to send a data packet to a destination for which the route is unknown. A route is found by flooding the network with route requests. When a node receives this request, it broadcasts it again until it itself is the destination or it has the route to the destination. This node then replies to the request to the original source. The request and response packets are source routed. Request packet creates the path of traversal. Response packet creates the reverse path to the source by traversing backwards. Figure.2 Route discovery procedure in DSR b) Ad hoc On-Demand Distance Vector Routing (AODV) AODV is an on –Demand routing protocol which is confluence of DSDV and DSR.Route is calculated on demand, just as it is in DSR via route discovery process. However, AODV maintains a routing table where it maintains one entry per destination unlike the DSR that maintains multiple route cache entries for each destination.AODV provides loop free routes while repairing link breakages but unlike DSDV, it doesn‟t require global periodic routing advertisements. Figure.3 Route discovery procedure in AODV III. Proactive Routing Protocol The routing information about all the nodes is build and maintained by the proactive protocols. The proactive routing protocols are independent of whether or not the route is needed There are many advantages and disadvantages of proactive routing protocols. One of its advantages is that the nodes can easily get routing information, and it easily starts a session. The disadvantages are, too much Performance Analysis of AODV, DSR and OLSR in MANET data kept by the nodes for route maintenance, when there is a particular link failure its reform is too slow.
  • 3. Comparing: Routing Protocols on Basis of sleep mode | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 38| a. Optimized link –state routing (OLSR) The Optimized Link State Routing (OLSR) protocol is an optimization of the classical link state algorithm, adapted to the requirements of a MANET ([10]). Because of their quick convergence, link state algorithms are somewhat less prone to routing loops than distance vector algorithms, but they require more CPU power and memory. They can be more expensive to implement and support and are generally more scalable. OLSR operates in a hierarchical way (minimizing the organization and supporting high traffic rates). The key concept used in OLSR is that of multipoint relays (MPRs). MPRs are selected nodes which forward broadcast messages during the flooding process. This technique substantially reduces the message overhead as compared to a classical flooding mechanism (where every node retransmits each message received). This way a mobile host can reduce battery consumption. In OLSR, link state information is generated only by nodes elected as MPRs. An MPR node may choose to report only links between itself and its MPR selectors. Hence, contrarily to the classical link state algorithm, partial link state information is distributed in the network. This information is then used for route calculation. OLSR provides optimal routes .The protocol is particularly suitable for large and dense networks as the technique of MPRs works well in this context. Figure. 4 Routing table of OLSR Optimized Link State Routing (OLSR) protocol is a table-driven proactive routing protocol for wireless mobile ad hoc networks. This protocol optimizes the flooding process and reduces the control message overheads by marking subset of neighbors as multi-point relays (MPRs). In OLSR, each node periodically broadcasts two types of messages: HELLO messages and Topology Control (TC) messages. A HELLO message contains two lists in which one list includes the addresses of the neighbors to which there exists a valid bi- directional link and the other list includes the addresses of the neighbors from which control traffic has been heard but bidirectional links are not confirmed. Upon receiving HELLO message, a node examines list of addresses, if its own address is in the list, it is confirmed that bidirectional communication has been established with the sender. HELLO messages also allow each node to maintain information describing link between neighbor node and nodes which are two-hop away. The set of nodes among the one-hop neighbors with a bi- directional link are chosen as multipoint relays (MPRs). Only these nodes forward topological information about the network. On the reception of HELLO messages, each node maintains a neighbor table which contains one- hop neighbor information, their link status information and a list of two hop neighbors. Each node also maintains a set of its neighbors which are called the MPR Selectors of the node. When these selectors send a broadcast packet, only its MPR nodes among its entire neighbors forward the packet. The MPR nodes periodically broadcast its selector list throughout the network. The smaller set of multipoint relay provides more optimal routes. The path to the destination consists of a sequence of hops through the multipoint relays from source to destination. A TC message contains the list of neighbors who have selected the sender node as a multipoint relay and is used to diffuse topological information to the entire network. Based on the information contained in the neighbor table and the TC message, each node maintains a routing table which includes destination address, next-hop address, and number of hops to the destination. Fisheye State Routing (FSR) protocol is a proactive (table driven) ad hoc routing protocol and its mechanisms are based on the Link State Routing protocol used in wired networks. FSR is an implicit hierarchical routing protocol. It reduces the routing update overhead in large networks by using a fisheye technique. Fish eye has the ability to see the objects better when they are nearer to its focal point that means each node maintains accurate information about near Nodes and not so accurate about far-away nodes. The scope of fisheye is defined as the set of nodes that can be reached within a given number of hops. The number of levels and the radius of each scope will depend on the size of the network. Entries corresponding to nodes within the smaller scope are propagated to the neighbors with the highest frequency and the exchanges in smaller scopes are more frequent than in larger. That makes the
  • 4. Comparing: Routing Protocols on Basis of sleep mode | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 39| topology information about near nodes more precise than the information about farther nodes. FSR minimized the consumed bandwidth as the link state update packets that are exchanged only among neighboring nodes and it manages to reduce the message size of the topology information due to removal of topology information concerned far-away nodes. Even if a node doesn‟t have accurate information about far away nodes, the packets will be routed correctly because the route information becomes more and more accurate as the packet gets closer to the destination. This means that FSR scales well to large mobile ad hoc networks as the overhead is controlled and supports high rates of mobility. The FSR concept originates from Global State Routing (GSR). GSR can be viewed as a special case of FSR, in which there is only one fisheye scope level and the radius is infinite. As a result, the entire topology table is exchanged among neighbors that consume a considerable amount of bandwidth when network size becomes large. Figure .5 Communication in OLSR Problem Statement: Energy conservation is one of most happening and hot issue in the wireless sensor network. Wireless sensor network refers to a network where a lot of nodes share similar network architecture and follow routing algorithms to save energy of the system. There are two different architecture types namely AODV and OLSR .The routing overhead associated with dissemination of routing packets is quite huge. The aim of the research work is to design a sophisticated protocol which can save maximum amount of energy and can increase the throughput of the system. The proposed routing algorithm is supposed to achieve by combining two algorithms namely AODV and OLSR. The overall aim of this thesis is to design novel energy efficient AODV +OLSR protocol for Wireless Sensor network. IV. Mobility Metrics We have selected the energy consumption and accuracy as a metrics during the simulation in order to evaluate the performance of the different protocols. V. Result and Conclusion The following figures describe the results of this research work. Step1:
  • 5. Comparing: Routing Protocols on Basis of sleep mode | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 40| The above figure represents the node movement in the proposed system architecture. When a network node fails,OLSR is called. The till now operation is performed using AODV network topology. Instead of checking for another active node through AODV, the network opt for OLSR. Step 2: The above figure represents the end to end delay versus the number of rounds. Till now, no extra dead node is found Step 3: The above figure represents the scenario of dead node .When the dead node occurs OLSR is called and the transmission of data continued. VI. Conclusion The research work performed concludes that the AODV and OLSR both are optimal protocols for any kind of routing and energy conservation schemes but AODV can be optimized using OLSR protocol if they are combined. The research work has computed its results over different aspects like packet delivery ratio, end to end delay and through put. VII. Future work The current research work opens up a lot of possibilities for the future research works like combination of AODV with NEURAL NETWORKS or combination of OLSR with NEURAL NETWORK. The current research work only actives one dead packet or node scenario. It does not deal with multiple node failure system which can become one of the future research works.
  • 6. Comparing: Routing Protocols on Basis of sleep mode | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss.7| July. 2014 | 41| REFERENCES [1] C.Sivaram murthy, B.S. Manoj, Adhoc wireless networks: Architectures, and protocols, Pearson Education,2004. [2] Pankaj Palta and Sonia Goyal , “Comparison of OLSR and TORA routing protocols using OPNET Modeler” in International Journal of Engineering Research and technology Vol. 1 Issue 5, July - 2012 Nehra et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(5), May - 2013, pp. 984-990 © 2013, IJARCSSE All Rights Reserved Page | 990 [3] C.Parkins, E.B.Royer, S.Das, A hoc On-Demand Distance Vector (AODV) Routing, July 2003, [Online]. Available: http://www.faqs.org/rfcs/rfc3561.html. [Accessed: April. 10, 2010] [4] Gagangeet singh aujla and Sandeep singh kang “Comparative analysis of AODV, DSR, GRP, OLSR and TORA by varying number of nodes with FTP and HTTP Applications over MANETs” in International Journal of Computer Applications Vol 65 No 2, March 2013. [5] Ashish Shrestha and Firat Tekiner, “On MANET Routing Protocols for Mobility and Scalability.” In International Conference on Parallel and Distributed Computing, Applications and Technologies, p.p. 451-456, November 2009. IEEE Computer Society. [6] N Vetrivelan and A V Reddy, “Performance Analysis of Three Routing Protocols for Varying MANET Size.” In Proceedings of the International Multi Conference of Engineers and Computer Scientists (IMECS 2008), Vol. II, 19- 21 March 2008, Hong Kong. [7] Harmanpreet kaur and Jaswinder singh “Performance comparison of OLSR, GRP and TORA using OPNET” in International Journal of Advanced Research in Computer Science and Software Engineering Vol 2 Issue 10 October 2012. [8] N. Adam, M.Y. Ismail et al., "Effect of Node density on Performances of Three MANET Routing Protocols." In International Conference on Electronic Devices, Systems and Applications (ICEDSA2010), p.p. 321-325, October 2010. [9] R. Al-Ani, “Simulation and performance analysis evaluation for variant MANET routing protocols”, International Journal of Advancements in Computing Technology, Volume 3, Number 1, February 2011 [10] Mr. L Raja, Capt. Dr. S Santhosh Baboo “Comparative study of reactive routing protocol AODV, DSR, ABR and TORA” in International Journal Of Engineering And Computer Science Vol 2 Issue 3 March 2013 Page No. 707-718