routing protocols for google maps - ijser · routing protocols for google map. harshit jain ....

6
Routing Protocols for GOOGLE MAP Harshit jain Student School of CSE Lingaya’s University Haryana, India [email protected] Deepshikha ratra Student School of CSE Lingaya’s University Haryana, India [email protected] Aastha Budhiraja Assistant Professor School of CSE Lingaya’s University Haryana, India. [email protected] ABSTRACT This paper exhibits an exhaustive study on the execution of normal MANET (portable adhoc organize) steering conventions under practical system situations. The expansion in accessibility and notoriety of versatile remote gadgets has lead specialists to build up a wide assortment of Mobile Ad-hoc Networking (MANET) conventions to misuse the one of a kind correspondence openings introduced by these gadgets. Gadgets can convey straightforwardly utilizing the remote range as a part of a distributed form, and course messages through transitional hubs, however the way of remote shared correspondence and cell phones result in numerous directing and security challenges which must be tended to before sending a MANET. This paper is a study of dynamic research takes a shot at steering conventions for MANET. Different research groups are working in field of MANET and attempting to receive the conventions and innovation in different applications also. In this paper, an endeavor has been made to think about three surely understand conventions AODV, DSR and DSDV by utilizing three execution measurements parcel conveyance proportion, normal end to end defer and directing overhead. The examination has been finished by utilizing reenactment instrument NS2 which is the principle test system, NAM (Network Animator) and exceed expectations diagram which is utilized for setting up the charts from the follow files. Keywords MANET, NS-2, routing protocols (DSDV, DSR, Mobility, AODV). 1. INTRODUCTION A MANET system is a group of mobile (or temporarily stationary) devices which need to provide the ability to stream voice, data, and video between arbitrary pairs of devices utilizing the others as relays to avoid the need for infrastructure. There are many techniques which are employed in order to provide robust MANET capability, including the following: Self-Forming / Self-Healing is a crucial characteristic of MANET systems. In a true mesh network, radios can join or leave the network at any time, and the network will continuously adapt its topology as nodes move in relation to one another. This implies a decentralized architecture in that there are no central “master” hub radios required to administer control of the network, and communications will continue to persist even when one or more nodes are lost. Link Adaptation is the ability for each radio to optimally configure its transmission parameters (constellation, FEC coding, and MIMO techniques) to maximize the data rate and robustness of the links to each of the other radios it is communicating with. A particular radio may communicate with another close by radio using a data rate of over 50 Mbps, while using a rate of only 2 Mbps to provide a robust link to a radio much further away. These are packet burst rates, where using a 50Mbps burst is very useful even for a much lower rate data stream because it leaves free channel airtime for other nodes in the network to use. Having high potential data burst rates is important because the less airtime is consumed for the shorter links; the more airtime is left to use slower and much more robust modulation and coding on the distant links. Adaptive Routing is a mechanism for determining which potential relay paths are used when a stream of data needs to be sent between a given pair of radios. It needs to support self-forming self-healing functionality by adapting dynamically to use all radios present as potential relays and be resilient to the loss of relaying radios. It must also work in conjunction with the link adaptation because determining the optimal route for a stream of data requires consideration of other data which is flowing through the network, as well as the dynamic capacity of each link within the network. This problem is complex and requires all radios to share information about the data traffic flowing through them and the link capacity from each to the other neighbouring nodes. This sharing of information must be done in an intelligent manner so that it does not consume too much of the precious available network throughput. Transparent IP Networking means that any number of standard computer, IP video camera or other devices may be connected to each of the mobile radios and communicate through the mesh network just as if all of the devices were in a single office with wired Ethernet. There are different ways this can be accomplished within the MANET. To enable the most flexibility and ease of use, the best choice is to have the entire MANET network appear as if it is a single Layer 2 networking switch. This means that without any reconfiguration of IP addresses or other settings, a group of IP based devices that work together on a simple Ethernet switch can be connected to MANET radios and resume operations with the new freedom of wireless mobility. Multicast Traffic presents a set of unique challenges for MANET systems. The multicast support implemented in basic wired Layer 2 switches is to replicate multicast packets coming into one port on all of the other ports. For instance, if an IP video camera is connected to one port it would send its video using packets tagged as multicast. Then computers wired to any of the other ports of the switch can tap into the wireless video stream. This simplistic method turns out to not work very well in a wireless network acting as a Layer 2 switch because many devices within the network might not need to see a particular multicast, and blindly sending the multicast to all devices thus congests the limited throughput of the wireless network unnecessarily. More advanced MANET systems allow manual and/or automatic optimization, limiting the transmission of multicast to only those devices that need a particular multicast stream. International Journal of Scientific & Engineering Research Volume 7, Issue 12, December-2016 ISSN 2229-5518 1 IJSER © 2016 http://www.ijser.org IJSER

Upload: others

Post on 08-Jun-2020

33 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Routing Protocols for Google Maps - IJSER · Routing Protocols for GOOGLE MAP. Harshit jain . Student . School of CSE . ... Deepshikha ratra . Student . School of CSE . Lingaya’s

Routing Protocols for GOOGLE MAP

Harshit jain

Student

School of CSE

Lingaya’s University

Haryana, India

[email protected]

Deepshikha ratra

Student

School of CSE

Lingaya’s University

Haryana, India

[email protected]

Aastha Budhiraja

Assistant Professor

School of CSE

Lingaya’s University

Haryana, India.

[email protected]

ABSTRACT This paper exhibits an exhaustive study on the execution of normal

MANET (portable adhoc organize) steering conventions under

practical system situations. The expansion in accessibility and

notoriety of versatile remote gadgets has lead specialists to build up a

wide assortment of Mobile Ad-hoc Networking (MANET)

conventions to misuse the one of a kind correspondence openings

introduced by these gadgets. Gadgets can convey straightforwardly

utilizing the remote range as a part of a distributed form, and course

messages through transitional hubs, however the way of remote

shared correspondence and cell phones result in numerous directing

and security challenges which must be tended to before sending a

MANET. This paper is a study of dynamic research takes a shot at

steering conventions for MANET. Different research groups are

working in field of MANET and attempting to receive the

conventions and innovation in different applications also. In this

paper, an endeavor has been made to think about three surely

understand conventions AODV, DSR and DSDV by utilizing three

execution measurements parcel conveyance proportion, normal end

to end defer and directing overhead. The examination has been

finished by utilizing reenactment instrument NS2 which is the

principle test system, NAM (Network Animator) and exceed

expectations diagram which is utilized for setting up the charts from

the follow files.

Keywords MANET, NS-2, routing protocols (DSDV, DSR, Mobility, AODV).

1. INTRODUCTION A MANET system is a group of mobile (or temporarily stationary)

devices which need to provide the ability to stream voice, data, and

video between arbitrary pairs of devices utilizing the others as relays

to avoid the need for infrastructure.

There are many techniques which are employed in order to provide

robust MANET capability, including the following:

Self-Forming / Self-Healing is a crucial characteristic of MANET

systems. In a true mesh network, radios can join or leave the network

at any time, and the network will continuously adapt its topology as

nodes move in relation to one another. This implies a decentralized

architecture in that there are no central “master” hub radios required

to administer control of the network, and communications will

continue to persist even when one or more nodes are lost.

Link Adaptation is the ability for each radio to optimally configure its

transmission parameters (constellation, FEC coding,

and MIMO techniques) to maximize the data rate and robustness of

the links to each of the other radios it is communicating with. A

particular radio may communicate with another close by radio using a

data rate of over 50 Mbps, while using a rate of only 2 Mbps to

provide a robust link to a radio much further away. These are packet

burst rates, where using a 50Mbps burst is very useful even for a

much lower rate data stream because it leaves free channel airtime for

other nodes in the network to use. Having high potential data burst

rates is important because the less airtime is consumed for the shorter

links; the more airtime is left to use slower and much more robust

modulation and coding on the distant links.

Adaptive Routing is a mechanism for determining which potential

relay paths are used when a stream of data needs to be sent between a

given pair of radios. It needs to support self-forming self-healing

functionality by adapting dynamically to use all radios present as

potential relays and be resilient to the loss of relaying radios. It must

also work in conjunction with the link adaptation because

determining the optimal route for a stream of data requires

consideration of other data which is flowing through the network, as

well as the dynamic capacity of each link within the network. This

problem is complex and requires all radios to share information about

the data traffic flowing through them and the link capacity from each

to the other neighbouring nodes. This sharing of information must be

done in an intelligent manner so that it does not consume too much of

the precious available network throughput.

Transparent IP Networking means that any number of standard

computer, IP video camera or other devices may be connected to each

of the mobile radios and communicate through the mesh network just

as if all of the devices were in a single office with wired Ethernet.

There are different ways this can be accomplished within the

MANET. To enable the most flexibility and ease of use, the best

choice is to have the entire MANET network appear as if it is a single

Layer 2 networking switch. This means that without any

reconfiguration of IP addresses or other settings, a group of IP based

devices that work together on a simple Ethernet switch can be

connected to MANET radios and resume operations with the new

freedom of wireless mobility.

Multicast Traffic presents a set of unique challenges for MANET

systems. The multicast support implemented in basic wired Layer 2

switches is to replicate multicast packets coming into one port on all

of the other ports. For instance, if an IP video camera is connected to

one port it would send its video using packets tagged as multicast.

Then computers wired to any of the other ports of the switch can tap

into the wireless video stream. This simplistic method turns out to

not work very well in a wireless network acting as a Layer 2 switch

because many devices within the network might not need to see a

particular multicast, and blindly sending the multicast to all devices

thus congests the limited throughput of the wireless network

unnecessarily. More advanced MANET systems allow manual

and/or automatic optimization, limiting the transmission of multicast

to only those devices that need a particular multicast stream.

International Journal of Scientific & Engineering Research Volume 7, Issue 12, December-2016 ISSN 2229-5518

1

IJSER © 2016 http://www.ijser.org

IJSER

Page 2: Routing Protocols for Google Maps - IJSER · Routing Protocols for GOOGLE MAP. Harshit jain . Student . School of CSE . ... Deepshikha ratra . Student . School of CSE . Lingaya’s

Multi-channel Networks is an advanced capability of some MANET

systems which allows a network to utilize multiple RF channels or

even multiple frequency bands within a network while still providing

the plug and play functionality of a single Layer 2 switch. A simple

example of the usefulness of this might be a scenario where soldiers

have radios operating on one frequency while vehicles have radios

not only operating on that frequency but also ones in a different

band. This additional band might be with higher power or higher

gain antennas to provide a high speed “backbone” layer between the

vehicles. Any soldier’s radio device can communicate with any other

soldier’s radio over the air, but the secondary layer on a different

frequency can reduce congestion on the soldier frequency and

increase to area covered by the network.

Security of MANETs is another major deployment concern; due to

the mobility and wireless nature of the network malicious nodes can

enter the network at any time, the security of the nodes and the data

transmitted needs to be considered.

Directing conventions of MANET ought to have the accompanying

Properties

A. To increment the dependability of MANET Routing

convention ought to be disseminated in such a way or in

such request.

B. A directing convention must be composed considering

unidirectional connections since remote medium may bring

about a remote connection to be opened in unidirectional

just because of physical elements.

C. The directing convention for MANET is power-productive.

D. The directing convention fundamentally considers about its

security.

E. A cross breed steering convention ought to be a great deal

more receptive than proactive to keep away from overhead.

F. A steering convention is likewise mindful of Quality of

Service (QoS)

2. ARRANGEMENT OF ROUTING

PROTOCOL FOR MANET MANET directing conventions could be comprehensively

characterized into two noteworthy classes: Proactive and Reactive.

Proactive Routing Protocols: Proactive conventions constantly take in

the topology of the system by trading topological data among the

system hubs. In this way, when there is a requirement for a course to

a goal, such course data is accessible instantly. In the event that the

system topology changes too oftentimes, the cost of keeping up the

system may be high. On the off chance that the system movement is

low, the data about real topology may even not be utilized.

Responsive Routing Protocols: The receptive steering conventions

depend on some kind of question answer exchange. Receptive

conventions continue for setting up route(s) to the goal just when the

need emerges. They don't require intermittent transmission of

topological data of the system. Cross breed Routing Protocols: Often

responsive or proactive element of a specific steering convention

won't not be sufficient; rather a blend may yield better arrangement.

Henceforth, in the late days, a few half breed conventions are

additionally proposed. In view of the strategy for conveyance of

information bundles from the source to goal, arrangement of MANET

directing conventions should be possible as takes after:

A. Unicast Routing Protocols: The directing conventions that

consider sending data bundles to a solitary goal from a

solitary source.

B. Multicast Routing Protocols: Multicast is the conveyance of data to a

gathering of goals at the same time, utilizing the most effective

system to convey the messages over every connection of the system

just once, making duplicates just when the connections to the goals

split. Multicast steering conventions for MANET utilize both

multicast and unicast for information transmission. Multicast steering

conventions for MANET can be characterized again into two classes:

Tree-based multicast convention and Mesh-based multicast

convention. Work based directing conventions utilize a few courses

to achieve a goal while the tree-based conventions keep up one and

only way.

In Wireless interchanges Wireless impromptu systems have picked

up a ton of significance. Remote correspondence is set up by hubs

going about as switches and exchanging bundles starting with one

then onto the next in specially appointed systems. Because of moving

hubs and henceforth numerous conventions have been created

directing in these systems is profoundly mind boggling. In this paper

we have chosen three fundamental and exceedingly proffered

directing conventions for investigation of their execution. Figure1

beneath speaks to the situation of MANET.

Figure 1 Ad-hoc Network Architecture

3. Applications of MANET

MANETs are valuable in spots that have no correspondences

foundation or when that framework is seriously harmed. Ordinary

applications are:

A. Emergency save operations.

B. Disaster alleviation endeavors.

C. Low implementation.

D. Military operations.

4. MANET ROUTING PRINCIPLES

A. Proactive Routing.

B. Reactive Routing.

C. Hybrid Routing.

5. Challenges of MANET

5.1 Limited remote transmission go: In

remote

It is the systems the radio band will be restricted and consequently

information rates it can offer are much lesser than what a wired

system can offer. This requires the steering conventions in remote

systems to utilize the data transfer capacity dependably in an ideal

way by keeping the overhead as low as could be expected under the

circumstances [3].

5.2 Routing Overhead

International Journal of Scientific & Engineering Research Volume 7, Issue 12, December-2016 ISSN 2229-5518

2

IJSER © 2016 http://www.ijser.org

IJSER

Page 3: Routing Protocols for Google Maps - IJSER · Routing Protocols for GOOGLE MAP. Harshit jain . Student . School of CSE . ... Deepshikha ratra . Student . School of CSE . Lingaya’s

In remote adhoc systems, hubs frequently change their area inside

system. Along these lines, some stale courses are created in the

directing table which prompts to superfluous steering overhead.

5.3 Battery requirements

This is one of the restricted assets that shape a noteworthy limitation

for the hubs in a specially appointed system. Gadgets utilized as a

part of these systems have confinements on the power source so as to

look after versatility, size and weight of the gadget. By expanding the

power and preparing capacity makes the hubs massive and less

convenient. So just MANET hubs needs to ideally utilize this asset

[4].

5.4 Asymmetric joins

Most of the wired systems depend on the symmetric connections

which are constantly altered. Be that as it may, this is not a case with

adhoc arranges as the hubs are versatile and continually changing

their position inside system. For instance consider a MANET (Mobile

Ad-hoc Network) where hub B sends a flag to hub A however this

does not inform anything regarding the nature of the association in

the turnaround course [5].

5.5 Time-changing remote connection

qualities

The remote channel is defenseless to an assortment of transmission

hindrances, for example, way misfortune, blurring, impedance and

blockage. These variables oppose the range, information rate, and the

dependability of the remote transmission. The degree to which these

elements influence the transmission relies on the natural conditions

and the versatility of the transmitter and collector. Indeed, even the

two distinctive key imperatives, Nyquist's and Shannon's hypotheses,

that represent the capacity to transmit data at various information

rates can be considered [3].

5.6 Packet misfortunes because of

transmission blunders

Ad hoc remote systems encounters a much higher bundle misfortune

because of components, for example, high piece mistake rate (BER)

in the remote channel, expanded impacts because of the nearness of

concealed terminals, nearness of obstruction, area subordinate

conflict, uni-directional connections, visit way breaks because of

versatility of hubs, and the inborn blurring properties of the remote

channel [3].

6. MANET Routing Algorithms

6.1 Based on the data used to construct

steering tables:

• Shortest separation calculations: calculations that utilization remove

data to

Construct steering tables.

• Link state calculations: calculations that utilization network data to

Fabricate a topology diagram that is utilized to manufacture directing

tables.

6.2 Based on when steering tables are

fabricated:

• Proactive calculations: keep up courses to goals regardless of the

possibility that they are not required.

• Reactive calculations: keep up courses to goals just when they are

required.

• Hybrid calculations: keep up courses to close-by hubs regardless of

the possibility that they are not required and

Keep up courses to far away hubs just when required.

7. Classification of Adhoc Routing Protocol

Steering convention in MANET can be grouped into a few courses

relying on their system structure, correspondence display, directing

Strategy, and state data thus on yet the greater part of these are done

relying upon steering technique and system structure.

7.1 Destination-Sequenced Distance-Vector

Routing (DSDV)

Goal Sequenced Distance-Vector Routing (DSDV) is a table-driven

directing plan for adhoc portable systems in light of the Bellman-

Ford calculation. It was produced by C. Perkins and P.Bhagwat in

1994.

It disposes of course circling, expands meeting speed, and decreases

control message overhead. In DSDV, every hub keeps up a next-

bounce table, which it trades with its neighbors. There are two sorts

of next-jump table trades: intermittent full-table communicate and

occasion driven incremental upgrading. The relative recurrence of the

full-table communicate and the incremental upgrading is controlled

by the hub portability. In every information parcel sent amid a next-

jump table communicate or incremental redesigning, the source hub

annexes a succession number. This arrangement number is spread by

all hubs accepting the comparing separation vector overhauls, and is

put away in the following jump table section of these hubs. A hub, in

the wake of accepting another next-jump table from its neighbor,

overhauls its course to a goal just if the new grouping number is

bigger than the recorded one, or if the new succession number is the

same as the recorded one, yet the new course is shorter. Keeping in

mind the end goal to advance decrease the control message overhead,

a settling time is evaluated for every course. A hub redesigns to its

neighbors with another course just if the settling time of the course

has terminated and the course stays ideal [8].

DSDV adjusts for portability utilizing succession numbers and

steering table redesigns, if a course overhaul with a higher grouping

number is gotten it will supplant the current course accordingly

decreasing the shot of directing circles, when a noteworthy topology

change is identified a full directing table dump will be played out,

this can add critical overhead to the system in element situations.

7.2 Dynamic Source Routing (DSR)

International Journal of Scientific & Engineering Research Volume 7, Issue 12, December-2016 ISSN 2229-5518

3

IJSER © 2016 http://www.ijser.org

IJSER

Page 4: Routing Protocols for Google Maps - IJSER · Routing Protocols for GOOGLE MAP. Harshit jain . Student . School of CSE . ... Deepshikha ratra . Student . School of CSE . Lingaya’s

The Dynamic Source Routing convention (DSR) is (Perkins, 2007),

an on request directing convention. DSR is a basic and productive

steering convention planned particularly for use in multi-bounce

remote specially appointed systems of versatile hubs. Utilizing DSR,

the system is totally self sorting out and self-arranging, requiring no

current system foundation or organization. The DSR convention is

made out of two primary instruments that cooperate to permit the

disclosure and upkeep of source courses in the specially appointed

system [7]:

DSR utilizes a source directing methodology to produce an entire

course to the goal, this will then be put away incidentally in hubs

course reserve. DSR addresses versatility issues using bundle

affirmations; inability to get an affirmation causes parcels to be

supported and course mistake messages to be sent to every upstream

hub. Course blunder messages trigger the course upkeep stage which

expels off base courses from the course reserve and embraces another

course disclosure stage.

• Route Discovery is the component by which a hub S

wishing to send a bundle to a goal hub D acquires a source course to

D.

• Route Discovery is utilized just when S endeavors to send a

parcel to D and does not definitely know a course to D.

• Route Maintenance is the component by which hub S can

identify, while utilizing a source course to D, if the system topology

has changed with the end goal that it can no longer utilize its course

to D in light of the fact that a connection along the course does not

work anymore. At the point when Route Maintenance demonstrates a

source course is broken, S can endeavor to utilize some other course

it happens to know to D, or it can summon Route Discovery again to

locate another course for resulting parcels to D. Course Maintenance

for this course is utilized just when S is really sending parcels to D.

• In DSR Route Discovery and Route Maintenance each

works completely" on demand"[7].

7.3 Ad hoc On-Demand Distance Vector

(AODV) Routing Protocol

The Ad hoc On-Demand Distance Vector (AODV) [6] calculation

empowers alterable, self-beginning, multihop steering between taking

an interest versatile hubs wishing to build up and keep up a specially

appointed system. AODV permits portable hubs to acquire courses

rapidly for new goals, and does not oblige hubs to keep up courses to

goals that are not in dynamic correspondence. AODV permits

versatile hubs to react to connection breakages and changes in system

topology in an auspicious way. The operation of AODV is without

circle, and by staying away from the Bellman-Ford" checking to

unendingness" issue offers fast union when the adhoc arrange

topology changes (regularly, when a hub moves in the system). At

the point when connections break, AODV causes the influenced set

of hubs to be informed with the goal that they can nullify the courses

utilizing the lost connection. Course Requests (RREQs), Route

Replies (RREPs) and Route Errors (RERRs) are message sorts

characterized by AODV [6].

AODV uses succession numbers and steering signals from DSDV yet

performs course revelation utilizing on-request course asks for

(RREQ); an indistinguishable procedure from the DSR convention.

AODV is diverse to DSR in that it utilizes remove vector directing;

this requires each hub in the course to keep up a transitory steering

table for the term of the correspondence. AODV has enhanced the

DSR course ask for process utilizing a growing ring seek instrument

based after increasing time-to-live (TTL) to counteract exorbitant

RREQ flooding. Hubs inside a dynamic course record the senders

address, grouping numbers and source/goal IP address inside their

directing tables, this data is utilized by course answer (RREP) to

develop switch ways.

7.4 Mobility Models

Reference thinks about the execution of DSR and DSDV utilizing

reenactments against 4 diverse versatility models; these are

mathematic models which control the movement of hubs around the

recreation; this permits specialists to gauge the impact of portability

upon the directing conventions execution. Different versatility

models are utilized to reproduce distinctive circumstances, for

example, fast vehicular systems or lower portability specially

appointed gathering clients, however inquire about by uncovers that

many studies perform convention assessment only utilizing the

arbitrary waypoint versatility show. This examination is upheld by

discoveries from who guarantee that the irregular waypoint model is

the most generally utilized portability show, however disparities were

distinguished between the models conduct and genuine situations

where clients regularly move in gatherings, because of this the model

may not be fitting for select testing.

7.5 Wireless Routing Protocol (WRP)

WRP[3] has a place with the general class of way discovering

calculations [2,4,5], characterized as the arrangement of disseminated

shortest path calculations that figure the ways utilizing data in regards

to the length and second-to-last bounce of the most brief way to every

goal. WRP decreases the quantity

of cases in which an impermanent directing circle can happen. With

the end goal of steering, every hub keeps up four things:

• A remove table.

• 2. A steering table.

• 3. A connection cost table.

• 4. A message retransmission list (MRL). WRP utilizes

occasional overhaul message transmissions to the neighbors of a hub.

The hubs in the reaction rundown of overhaul message (which is

shaped utilizing MRL) ought to send affirmations. In the event that

there is no transform from the last redesign, the hubs in the reaction

rundown ought to send a sit out of gear Hello message to guarantee

network. A hub can choose whether to redesign its steering table in

the wake of getting an upgrade message from a neighbor and

dependably it searches for a superior way utilizing the new data. On

the off chance that a hub shows signs of improvement way, it

transfers back that data to the first hubs with the goal that they can

redesign their tables. In the wake of getting the affirmation, the first

hub upgrades its MRL. Along these lines, every time the consistency

of the directing data is checked by every hub in this convention,

which disposes of steering circles and dependably tries to discover

the best answer for steering in the system.

7.6 Cluster Gateway Switch Routing

Protocol (CGSR)

CGSR [6] considers a grouped portable remote system rather than a

""level"" system. For organizing the system into isolated however

interrelated gatherings, group heads are chosen utilizing a bunch head

determination calculation. By shaping a few groups, this convention

accomplishes a disseminated preparing component in the system. In

any case, one downside of this convention is that, continuous change

or determination of group heads may be asset hungry and it may

influence the steering execution. CGSR utilizes DSDV convention as

the hidden directing plan and, consequently, it has an

indistinguishable overhead from DSDV.

International Journal of Scientific & Engineering Research Volume 7, Issue 12, December-2016 ISSN 2229-5518

4

IJSER © 2016 http://www.ijser.org

IJSER

Page 5: Routing Protocols for Google Maps - IJSER · Routing Protocols for GOOGLE MAP. Harshit jain . Student . School of CSE . ... Deepshikha ratra . Student . School of CSE . Lingaya’s

7.7 Simulation Based Analysis utilizing

Network Simulator (NS-2)

Reproduction Setup (movement situation, Mobility show) execution

measurements utilized lastly the execution of conventions is spoken

to by utilizing exceed expectations chart.

7.7.1 Simulation Tool

In this paper the reproduction device utilized for investigation is NS-

2 which is very favored by research groups.

Programming utilized for the execution investigation of taken

convention depends on NS-2 rendition 2.27. NS Simulator in light of

two dialects: a protest arranged test system, written in C++, and OTcl

(a question situated augmentation of Tcl ) translator, use to execute

clients order scripts. NS2 is a protest situated test system, written in

C++, with an OTcl mediator as a frontend. This implies the majority

of the reproduction scripts are made in Tcl (Tool Command

Language). On the off chance that the parts must be produced for ns2,

then both tcl and C++ must be utilized. The stream chart given in

figure3 demonstrates the total structure of NS2.

7.7.2 Simulation parameters are as follows

7.7.3 S

i

m

u

l

a

t

i

o

n Results

Figure4. Routing overhead versus pause time for AODV, DSR

and DSDV (Number of node = 50, Area space = 500m x 500m)

Figure5. Packet delivery ratio versus pause time for AODV, DSR

and DSDV (Number of node = 50, Area space = 500m x 500m)

Figure6. Avg. end to end delay versus pause time for AODV,

DSR and DSDV.

8. Conclusion

Here we broke down the execution of various directing convention

done in the specified versatility and activity design on various respite

time. We broke down that when interruption time set to 0 each of the

steering conventions got around 97% to 99% for parcel conveyance

proportion with the exception of DSDV which got 77%. DSR and

AODV came to approx 100% parcel conveyance proportion when

delay time equivalent to 200 while DSDV got just approx 94%

bundle conveyance ratio. DSR and DSDV has low and stable

directing overhead as correlation with AODV that differs a ton. Avg.

End to End postpone of DSDV is high for respite time 0 however it

begins diminishing as interruption time increments. DSR performs

well as having low end to end delay. This paper additionally shows

various steering conventions for MANET, which are extensively

sorted as proactive and receptive. Proactive steering conventions

have a tendency to give bring down inertness than that of the on-

request conventions, since they attempt to keep up courses to every

one of the hubs in the system constantly. Be that as it may, the

downside for such conventions is the unnecessary steering overhead

transmitted, which is occasional in nature without much Thought for

the system portability or load. When we think about the three

conventions in the broke down situation we found that general

execution of DSR is superior to anything other two directing

conventions.

Platform Windows 7,8,8.1

NS version Ns –allinone-2.27

Simulation time 200 s

Number of nodes 50 Wireless Nodes

Transmission Range 250 m

Simulation Area size 500 x 500 m

Traffic CBR(Constant Bit Rate)

Node Speed fixed to 20 m/s

Protocols DSR,AODV, DSDV and

Mobility

Pause time 0, 20, 40, 80, 120, 160, 200

International Journal of Scientific & Engineering Research Volume 7, Issue 12, December-2016 ISSN 2229-5518

5

IJSER © 2016 http://www.ijser.org

IJSER

Page 6: Routing Protocols for Google Maps - IJSER · Routing Protocols for GOOGLE MAP. Harshit jain . Student . School of CSE . ... Deepshikha ratra . Student . School of CSE . Lingaya’s

9. REFERENCES

[1] Mehran Abolhasan, Tadeusz Wysocki, and Eryk Dutkiewicz. A

review of routing protocols for mobile ad hoc networks. Technical

report, Telecommunication and Information Research Institute,

University of Wollongong,Wollongong, NSW 2522.

[2]Motorola Australia Research Centre, 12 Lord St., Botany, NSW

2525, Australia,2003.

[3] Xiaoyan Hong, Kaixin Xu, and Mario Gerla. Scalable routing

protocols for mobile ad hoc networks. 2002.

[4] C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless

Networks, Architectures and Protocols”, Second Edition, Low price

Edition, Pearson Education, 2007.

[5] International Journal of Computer Science & Engineering Survey

(IJCSES) Vol.1, No.1, August 2010“ANALYZING THE MANET

VARIATIONS, CHALLENGES, CAPACITY AND PROTOCOL

ISSUES” G. S.Mamatha1 and Dr. S. C. Sharma

[6] Jochen Schiller. Mobile Communications. Addison-Wesley, 2000.

[7] Mobile Ad Hoc Networking Working Group – AODV,

http://www.ietf.org/rfc/rfc3561.txt

[8] Mobile Ad Hoc Networking Working Group – DSR,

http://www.ietf.org/rfc/rfc4728.txt.

[9] “Wireless Ad Hoc Networks” Zygmunt J. Haas, Jing Deng, Ben

Liang, Panagiotis Papadimitratos, and S. SajamaCornell University

School of Electrical and Computer Engineering.

[10] Neeti Soni, “Exploiting the need of Comparative study of

routing protocols and Misbehaving node in wireless network”,

Published in International Journal of Advanced Engineering &

Application, June 2010 Issue

[11] Ian D. Chakeres, Luke Klein-Berndt, “AODVjr, AODV

Simplified”,Mobile Computing and Communications Review,

Volume 6, Number 3

[12] Rainer Baumann,, AODV, Presentation at ETH Zürich, April

2002

[13] Prabhakar Dhekne, “Wireless Sensor Network”, Talk at

SASTRA, Bhabha Atomic Research Centre, August 24, 2006

[14] “The Network Simulator - ns-2,” available at

http://www.isi.edu/nsnam/ns/.

[15] Trace graph website http://www. geocities.com/tracegraph

[16] E.L. Madruga, J.J. Garcia -Luna-Aceves. Scalable Multicasting:

The Core- Assisted Mesh Protocol. 1999.

[17] C-K Toh. Ad Hoc Mobile Wireless Networks, Protocols and

systems. Prentice Hall PTR. 2002. ISBN 0-13-007817-4.

[18] Anuj K. Gupta, Dr. Harsh Sadawarti, Dr. Anil K. Verma,

“Performance analysis of AODV, DSR & TORA Routing Protocols”,

IACSIT International Journal of Engineering and Technology, Vol.2,

No.2, April 2010, ISSN: 1793-8236

International Journal of Scientific & Engineering Research Volume 7, Issue 12, December-2016 ISSN 2229-5518

6

IJSER © 2016 http://www.ijser.org

IJSER