Performance Analysis of MANET Routing Protocols in Different Mobility Models
Performance Analysis of MANET Routing Protocols in Different Mobility Models
Performance Analysis of MANET Routing Protocols in Different Mobility Models
2, February 2009
with the two different routing approaches. Different proto- 2.2 Ad-Hoc On Demand Distance Vector Routing
cols are specialized in different aspects of the routing. – AODV
Other aspects than finding a short path are low overhead
communication and load-balancing. The Ad-hoc On-demand Distance Vector routing proto-
The AODV, TORA and DSR are source-initiated or on- col [7][1] enables multihop routing between the partic-
demand routing protocols and DSDV is a table driven ipating mobile nodes wishing to establish and maintain
protocol. The ad hoc routing protocols considered in this an ad-hoc network. AODV is a reactive protocol
study are explained below. based upon the distance vector algorithm.
The algorithm uses different messages to discover and
2.1 Destination - Sequenced Distance Vector – maintain links. Whenever a node wants to try and
DSDV find a route to another node it broadcasts a Route Re-
quest (RREQ) to all it’s neighbors. The RREQ propa-
DSDV [2] belongs to the class of pro-active routing gates through the network until it reaches the destina-
protocols. This protocol is based on the classical Bell- tion or the node with a fresh enough route to the des-
man-Ford routing algorithm [2] to apply to mobile ad tination. Then the route is made available by uncasing
hoc networks. DSDV also has the feature of the dis- a RREP back to the source.
tance-vector protocol [3] in that each node holds a The algorithm uses hello messages (a special RREP)
routing table including the next-hop information for that are broadcasted periodically to the immediate
each possible destination. Each entry has a sequence neighbors. These hello messages are local advertise-
number. If a new entry is obtained, the protocol prefers ments for the continued presence of the node, and
to select the entry having the largest sequence number. neighbors using routes through the broadcasting node
If their sequence number is the same, the protocol will continue to mark the routes as valid. If hello
selects the metric with the lowest value. messages stop coming from a particular node, the
Routing information is transmitted by broadcast. Up- neighbor can assume that the node has moved away
dates have to be transmitted periodically or immediate- and mark that link to the node as broken and notify
ly when any significant topology change is available. the affected set of nodes by sending a link failure noti-
Sequence numbers are assigned by destination, means fication (a special RREP) to that set of nodes.
the destination gives a sort of default even sequence
number, and the emitter has to send out the next up- 2.3 Temporally - Ordered Routing Algorithm –
date with this number. TORA
Packets are transmitted between the stations of the
network by using routing tables which are stored at TORA protocol [10] belongs to the class of reactive proto-
each station of the network. Each routing table, at each cols. The protocol is highly adaptive, efficient and it is
of the stations, lists all available destinations, and the used to establish the “temporal order” of topological
number of hops to each. Each route table entry is change events which is used to structure the reaction
tagged with a sequence number which is originated by to topological changes. The protocol is designed to mi-
the destination station. To maintain the consistency of nimize reaction to topological changes. The protocol is
routing tables in a dynamically topology, each station distributed in that nodes need only maintain informa-
periodically transmits updates, and transmits updates tion about adjacent nodes. The protocol is “source in-
immediately when significant new information is avail- itiated” and quickly creates a set of routes to a given
able. destination only when desired.
Routing information is advertised by broadcasting or The protocol accomplishes three functions through the
multicasting the packets which are transmitted periodi- use of three distinct control packets[8] such as query
cally and incrementally as topological changes are (QRY), update (UPD) and clear (CLR). QRY packets
detected - for instance, when stations move within the are used for both creating and maintaining routes, and
network. Data is also kept about the length of time CLR packets are used for erasing routes.
between arrival of the first and the arrival of best
route for each destination. Based on this data, a deci- 2.4 Dynamic Source Routing-DSR
sion may be made to delay advertising routes which
are about to change soon, thus damping fluctuations of Dynamic Source Routing(DSR) [5], belongs to the class of
the route tables. reactive protocols and allows to dynamically discover a
route across multiple network hops to any destination.
Source routing means that each packet in its header carries
the complete ordered list of nodes through which the pack-
et must pass. DSR uses no periodic routing of messages.,
there by reducing network bandwidth overhead, conserv-
24 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009
ing battery power and avoiding large routing updates calculated. The movement trace of a mobile node using the
throughout the ad-hoc network. Instead DSR relies on Random Walk model is shown in figure 2.
support from the MAC layer.
1000
The following are the three models with the traveling pat-
tern of the mobile nodes during the simulation time.
Figure 1 Node Movement in Random Way Point.
node then travels to the border of the simulation area in 4.1 Speed vs Packet Delivery Fraction
that direction. Once the simulation boundary is reached,
the node pauses for a specified time, chooses another an- The Performance of the routing protocols in terms of
gular direction (between 0 and 180 degrees) and continues packet delivery ratio is examined with respect to the mo-
the process. bility of nodes. Tow different network traffic density
The Random Direction Mobility Model was created to scenarios are considered one with 10 connections and
overcome clustering of nodes in one part of the simulation another with 20 connections. The simulation results are
area. produced by the Random Waypoint Mobility Model. shown in the figure 4.
In the case of the Random Waypoint Mobility Model, this In Random Way point model, packet delivery ratios pro-
clustering occurs near the center of the simulation area. In duced by all the protocols are very close when the speed is
the Random Waypoint Mobility Model, the probability of low. The slight difference in the ratio is produced for with
an MN choosing a new destination that is located in the 10 connections and 20 connections. When the speed is
center of the simulation area, or a destination which re- increased to 20 m/s. the packet delivery ratio s produced
quires travel through the middle of the simulation area, is by the protocols differ sharply and this difference becomes
high. In this model, MNs choose a random direction in more with 20 connections.In the case of Random walk and
which to travel similar to the Random Walk Mobility and Random Direction mobility models, the packet deli-
Model. An MN then travels to the border of the simulation very ratio differ heavily for lower mobility and higher mo-
area in that direction. Once the simulation boundary is bility.
reached, the MN pauses for a specified time, chooses
another angular direction [0, 180] and continues the 4.2 Traffic vs Packet delivery fraction
process. In a slightly modified version MNs continue to
The performance of the routing protocols in terms of pack-
choose random directions but they are no longer forced to
et delivery ratio is examined with respect to traffic load.
travel to the simulation boundary before stopping to
Tow different network traffic density scenarios are consi-
change direction. Instead, an MN chooses a random direc-
dered one with 10 connections and another with 20 con-
tion and selects a destination any where along that direc-
nections. The simulation results are shown in the figure 5.
tion of travel. The movement trace of a mobile node using
The packet delivery ratos obtained from the simulation sho
the Random Direction model is shown in figure 3.
sharp decrease when the number of packets is increased
from 1 to 4 and number of connections is increased form
600
10 to 20. The differences in packet delivery ratios pro-
500 duced by the routing protocols are very less in Random
400 Waypoint mobility model. Larger differences in packet
300 delivery ratio are obtained in Random walk and random
200
Direction mobility models.
100
100
0
0 50 100 150 200 250 300
Avg. Packet Delivery Ratio
AODV 10
90
AODV 20
DSDV 10
DSDV 20
Figure 3 Node Movement in Random Direction 80 TORA 10
TORA 20
DSR 10
DSR 20
70
4.Performance Results
60
This section discusses the various predominance metrics 10 20
used and the Performance differentials analyzed. The per- Speed in m /s
100
100
95 90
AODV 10
90 80
AODV 20 AODV 10
85 AODV 20
DSDV 10 70
80 DSDV 10
DSDV 20 DSDV 20
75 TORA 10 60 TORA 10
70 TORA 20 TORA 20
50 DSR 10
65 DSR 10
DSR 20
DSR 20 40
60
55 30
50 20
10 20
1 4
Speed in m /s Packets per second
c) Random Direction
b) Random Walk
Figure 5 Packet Delivery Fraction for varying number of sources
100
Avg. Pkt. Delivery Ratio
100
90 100
Avg. Pkt. Delivery Ratio
AODV 10
80 AODV 20 95 AODV 10
70 DSDV 10 90 AODV 20
DSDV 20 85 DSDV 10
60 TORA 10
80 DSDV 20
50 TORA 20 TORA 10
DSR 10 75
40 TORA 20
DSR 20 70 DSR 10
30
65 DSR 20
20
60
1 4
400 x 400 1000 x 600
Packets per second Simulation Area
100
100
90 AODV 10 90 AODV 10
Avg Pkt Delivery Ratio
80 AODV 20 80 AODV 20
DSDV 10 DSDV 10
70
DSDV 20 70 DSDV 20
60 TORA 10 TORA 10
60
50 TORA 20 TORA 20
40 DSR 10 50 DSR 10
30 DSR 20 40 DSR 20
20 30
1 4 400 x 400 1000 x 600
Simulation Area
Packets per second
b) Random Walk
b) Random Walk
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 27
100
90 2700
AODV 10
Avg Pkt Delivery Ratio
AODV 20 2400
80 AODV 10
DSDV 10 2100
AODV 20
AODV 10
DSDV 10 600 AODV 20
Avg. Delay in m/s
900
DSDV 20 DSDV 10
TORA 10 DSDV 20
600 400
TORA 20 TORA 10
DSR 10 TORA 20
300 DSR 20 200 DSR 10
DSR 20
0
10 20 0
Speed in m/s 1 4
Packets per second
1500 DSDV 10
2500 DSDV 10
DSDV 20
1200 DSDV 20
TORA 10 2000
TORA 10
900 TORA 20
1500 TORA 20
600 DSR 10
1000 DSR 10
DSR 20
300 DSR 20
500
0
0
10 20 1 4
Speed in m/s Packets per second
b) Random Walk
b) Random Walk
28 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009
2000 1400
1800
AODV 10 1200
1600 AODV 10
AODV 20
Avg. Delay in m/s
AODV 20
DSDV 10
the routing information quickly as uses the fresh informa-
900
DSDV 20 tion about the routing becomes mandatory. The simulation
600
TORA 10 results show that the AODV performs better than DSR,
TORA 20
DSR 10 TORA and DSDV. One of the reason here is the average
300 DSR 20 hop distance between the source-destination becomes high,
0
and this will increase packet overhead. The usage of the
400x400 1000x600 fresh route information and quickly adapting nature of
Simulation Area
AODV are reasons for better results produced by the
AODV. DSDV produces better results than TORA and
a) Random way point can be used as the routing protocol under low mobili-
ty conditions.
2700
2400
The Random Direction Model is an unrealistic model
AODV 10
2100 AODV 20
because it is unlikely that people would spread them-
Avg. Delay in m/s