SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. III (Jan. - Feb .2016), PP 74-79
www.iosrjournals.org
DOI: 10.9790/2834-11127479 www.iosrjournals.org 74 | Page
Design and Simulation of Mobile Ad Hoc Network for Multiple
Mobility Management
Anubhuti Jain1
, Shashank Mane2
1,2
(Electronics and communication, SBITM Betul, RGPV University Bhopal, India)
Abstract: Now a days many countries are facing a serious problem of mobile signal strength. It has also
become a major issue in many parts of the world. In order to solve this problem use of MANET (mobile ad hoc
network) through WiMAX has popularized. In this paper I will show the complete scenario of MANET network.
In this three conditions are included: when the users are fixed, when the users are movable away from the base
station and the last one is when the users are movable towards the base station. These three conditions are
shown one by one by routing protocol both AODV and DSDV and results are simulated with NS2.
Keywords: AODV, Ad hoc network, DSDV, MANET, NS2, Simulation, WiMAX
I. Introduction
1.1 Mobile Ad Hoc Network(MANET)
Mobile Ad hoc network is a group of wireless equipments knows as wireless nodes, that vigorously
links and transmit information .Wireless nodes can be personal computer with wireless LAN card, Personal
digital assistant (PDA) or additional types of wireless or mobile communication equipments. A wireless node in
general is any computing device that utilizes the air as broadcasting medium.
Fig.1 In this fig we can see there is one base station, through which all the devices like mobiles and laptops are
connected. Base station transfers the data to all devices.
In MANET, a wireless node can be the basis, the target, or transitional node of data broadcasting . A
node playing the task of in between node, functions as a router that can obtain and forward data packets to its
near the objective node. The nature of Ad hoc is the reason because of which wireless nodes have a propensity
to keep moving in place of being still. Consequently, the network topology alters from time to time.
1.2 WiMAX
Worldwide interoperability microwave access includes wireless standards initially formed to give 30-
40 megabit/second data rates and after having 2011 update it allocates up to 1 gigabit/second for stationary
stations. It was named WIMAX by WIMAX Forum which started in June 2001 led and forwarded the
conformity and interoperability of standard IEEE 802.16 or wireless man advanced is nominee for the 4G, in
contest with LTE advanced.
1.3Conditions Related To MANET
In this scenario of MANET, there are eight nodes out of which four users are there, three are relay
stations and one is base station.
1) When users are fixed- In this the base station is fixed along with relay station and users i.e. the users are fixed
on their position and neither move towards the base station nor away from it.
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 75 | Page
2) When the users move towards the base station- In this the base station and relay stations are fixed however,
the users are in continuous motion towards the base station. Time the user takes to reach to the base station
depends on the speed which might be defined by us. It can be changed as per users wish.
3) When the users are moving away from the base station- In this the users are continuously moving away from
the base stations but the base and relay stations are fixed. The time taken depends on the speed of the user
defined earlier.
II. Protocols Used
Here we use two protocols the first one is AODV and the other is DSDV.
2.1 Aodv
AODV is a routing protocol for Ad hoc mobile networks with many mobile nodes. AODV stands for
Ad hoc on demand distance vector. As its name suggests it creates routes on demand by the users. Thus, it is a
reactive protocol. The information about the next hop to the destination and the sequence number is obtained
from the destination are stored by routing table showing the freshness of information obtained.
Furthermore the information about the lively neighbors is collected throughout the discovery of the
target host. When the equivalent route breaks, then the neighbors can be notified. The avoidance of source
routing decreases the routing burden in a large network. It is the main advantage of AODV. In addition another
useful feature of AODV is its application of enlarging ring search to manage the deluge of RREQ (Route
Request) packets and look for routes to strange destinations. Along with this it also supplies destination
sequence numbers, permitting the nodes to have up to date routes.
On the other hand few nodes have to be taken into concern when using AODV. Firstly, it needs
bidirectional links and periodic link layer acknowledgements to become aware of broken links. Then, it needs to
sustain routing tables for maintenance unlike DSR.
2.2 Dsdv
It stands for Destination sequenced distance vector routing. It creates routes automatically and is active
all the time. It checks for updates itself without users demand. DSDV requires more data packets than AODV.
It adds attributes, sequence number, to each route table entry of the conventional routing information protocol
(RIP). Utilizing the initially linked sequence number, the mobile nodes can differentiate stale route information
from the latest and thus prevent the formation of routing loops.
In DSDV, every mobile node belonging to an ad hoc network sustains a routing table, which registers
all existing destinations, the metric and next hop to each destination and a sequence made by the destination
node. Using such routing table which is piled up in each mobile node, the packets are broadcasted between the
nodes of an ad hoc network. Sporadically routing table is updated with advertisement by nodes on an ad hoc
network or when important new information is available to sustain the stability of the routing table with the
vigorously altering topology of the ad hoc network.
At times or at once when network topology modification are sensed, each mobile node advertises
routing information using transmitting or multicasting a routing table update packet. The update packet launch
out with a metric of one to direct connected nodes.It shows that each neighbor is at a distance of one metric
(hop) from the node. It is dissimilar from that of the conventional algorithm. After having the update packet,
routing table is updated by the neighbor with rise in the metric by one and recovery the update packet to the
equivalent neighbors of each of them.
This process will be go over till all the nodes of Ad hoc network get a copy of the update packet with a
equivalent metric. Before updating routing table and retransmitting the update packet for each destination node,
the update data is maintained for a short time till the arrival of the best route. If a node obtains more than one
update packets for the same destination during waiting time duration, the routes with more fresh sequence
numbers are always chosen as the source for packet forwarding decisions. If the update packet with same
sequence number is found with the same node, then the update packet with the smallest metric is utilized and the
existing route will be deleted or stored as less favorable. Interpreting the advertisement of probably unstable root
can moisten the rise and fall of the routing table and decrease the number of retransmission of possible route
entries that enter in with same sequence number.
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 76 | Page
III. Simulation Parameter
Table.1 shows simulation parameters and their description. It shows channel type, protocols, packet size and
other parameters.
IV. Simulation Result
The simulation results are shown below.
Fig.2 In this fig user are fixed at their position
In this figure the red point shows base stations or server, the blue ones are relay stations and green ones are
users. We can see in above diagram, users are fixed at their position i.e. they can’t move towards or away from
the base station. And black circle indicates the coverage area.
Fig. 3 In this fig we can see that the users are moving towards the base station
In this figure the red point shows base stations or server, the blue ones are relay stations and green ones
are users .We can see in this diagram users are moving towards the base station. And black circle indicates the
coverage area.
Parameter Description
1.Channel Wireless
2. Radio propagation Two ray ground
3.Network interface Wireless physical
4. Mac type 802.16
5. Interface queue Drop tail/pre queue
6. Antenna type Omni directional
7. Routing protocol AODV & DSDV
8. Packet size 1000 byte
9. Nodes 8
10. Area 500/500
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 77 | Page
Fig. 4 this graph shows that what happens when the users moving towards the base station in AODV
Fig 4 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate
that the maximum delay of the condition in which user are moving towards the base station for AODV protocol
is about 97 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number
of lines shoes the number of packet communicated in the network which is design using AODV protocol.
Fig.5 this graph shows that what happens when the users moving away from the base station in AODV
Fig 5 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the
maximum delay of the condition in which user are moving towards the base station for AODV protocol is about
98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines
shoes the number of packet communicated in the network which is design using AODV protocol.
Fig 6 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the
maximum delay of the condition in which user are moving away from the base station for AODV protocol is
about 98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of
lines shoes the number of packet communicated in the network which is design using AODV protocol.
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 78 | Page
Fig. 6 this graph shows that what happens when the users moving towards the base station in DSDV
Table. 2 shows the results for AODV protocol when users are moving towards the base station.
Average Throughput 797.6480 kbps
Total packet sent 1720
Total packet received 1474
Packet delivery ratio 85.697674 %
Packet loss ratio 14.302326 %
Table. 3 shows the results for AODV protocol when users are moving away from the base station.
Table.4 shows the results for DSDV protocol when users are moving towards the base station
Average Throughput 657.1686 kbps
Total packet sent 1720
Total packet received 1223
Packet delivery ratio 71.104651 %
Packet loss ratio 28.895349 %
V. Conclusion
From the above all result we can conclude that if the mobile user are fix or moving towards the base
station then the signal strength will increase and high signal to noise ratio obtain due to which we got maximum
packet delivery and less packet loss for AODV as well as DSDV protocol. But if the mobile user moves away
from the base station then the strength of the signal decreases and the result for both the protocols are degrade
than other two scenarios.
VI. Future Work
In the upcoming days we will be able to implement more nodes in MANET. The number of base stat
ion, relay station and users would be increased. Recently in this paper I have used AODV and DSDV routing
protocols but in future we would be implement by many other protocols.
Refrences
[1] Mrs.S.Madhurikkha &Dr.R.Sabitha ,Defending against packet dropping attack using DRI & cross checking mechanism in MANET.
[2] Zahian Ismail& Rosilah Hassan, Effect of packet size on AODV routing protocol implementation in homogenous and heterogenous
manet-2011
[3] S.Mangai & A.Tamilarasi ,Hybrid location aided routing protocol for gps enabled manet clusters-29 Dec 2011
[4] Zhenyu Chen, Lin Guan ,Xingang Wang, Xunli Fan “Ad hoc On-demand Multipath Distance Vector routing with Backup Route
Update Mechanism” IEEE 14TH
International Conference On High Performance Computing And Communications 2012.
[5] Prabhakar D. Dorge, Sanjay S. Dorle, Megha B. Chakole and Dhiraj K. Thote , “Improvement of QoS in VANET with Different
Mobility Patterns” Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012), SKP
Engineering College, Tiruvannamalai, TN., India. 21 - 22 December, 2012.
Average Throughput 1678.0190 kbps
Total packet sent 2375
Total packet received 1977
Packet delivery ratio 83.242105 %
Packet loss ratio 16.757895 %
Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management
DOI: 10.9790/2834-11127479 www.iosrjournals.org 79 | Page
[6] Rajan patel& nimisha patel , A comparative study and simulation of AODV & DSDV manet routing protocol in ns2 & ns3- march
2014.

More Related Content

What's hot

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET Journal
 
Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
 
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...IJCI JOURNAL
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...IJERA Editor
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network drboon
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetIOSR Journals
 
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...IRJET Journal
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
 

What's hot (19)

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
 
Ijetcas14 357
Ijetcas14 357Ijetcas14 357
Ijetcas14 357
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
 
10
1010
10
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
IRJET-	 Efficient and Secure Communication In Vehicular AD HOC NetworkIRJET-	 Efficient and Secure Communication In Vehicular AD HOC Network
IRJET- Efficient and Secure Communication In Vehicular AD HOC Network
 
L010326978
L010326978L010326978
L010326978
 
Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...
 
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
EFFICIENT APPROACH FOR DESIGNING A PROTOCOL FOR IMPROVING THE CAPACITY OF ADH...
 
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
Resource Dependent Radio Allocation For Battlefield Communications - A Data M...
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 
Routing Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in VanetRouting Algorithm for Heterogeneous Wireless Network in Vanet
Routing Algorithm for Heterogeneous Wireless Network in Vanet
 
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
IRJET- MIMO-Energy Efficient and Spectrum Analysis using Congnitive Radio Tec...
 
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...
 

Similar to J011137479

Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
 
A new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolA new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolIAEME Publication
 

Similar to J011137479 (20)

Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
E1073644
E1073644E1073644
E1073644
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
K017426872
K017426872K017426872
K017426872
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Research on performance of routing protocols in manet
Research on performance of routing protocols in manetResearch on performance of routing protocols in manet
Research on performance of routing protocols in manet
 
Cm34531538
Cm34531538Cm34531538
Cm34531538
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...
 
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...
 
Ij3415561561
Ij3415561561Ij3415561561
Ij3415561561
 
A new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocolA new parameter proposed for route selection in routing protocol
A new parameter proposed for route selection in routing protocol
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
K011138084
K011138084K011138084
K011138084
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 
C011121114
C011121114C011121114
C011121114
 
B011120510
B011120510B011120510
B011120510
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

J011137479

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 1, Ver. III (Jan. - Feb .2016), PP 74-79 www.iosrjournals.org DOI: 10.9790/2834-11127479 www.iosrjournals.org 74 | Page Design and Simulation of Mobile Ad Hoc Network for Multiple Mobility Management Anubhuti Jain1 , Shashank Mane2 1,2 (Electronics and communication, SBITM Betul, RGPV University Bhopal, India) Abstract: Now a days many countries are facing a serious problem of mobile signal strength. It has also become a major issue in many parts of the world. In order to solve this problem use of MANET (mobile ad hoc network) through WiMAX has popularized. In this paper I will show the complete scenario of MANET network. In this three conditions are included: when the users are fixed, when the users are movable away from the base station and the last one is when the users are movable towards the base station. These three conditions are shown one by one by routing protocol both AODV and DSDV and results are simulated with NS2. Keywords: AODV, Ad hoc network, DSDV, MANET, NS2, Simulation, WiMAX I. Introduction 1.1 Mobile Ad Hoc Network(MANET) Mobile Ad hoc network is a group of wireless equipments knows as wireless nodes, that vigorously links and transmit information .Wireless nodes can be personal computer with wireless LAN card, Personal digital assistant (PDA) or additional types of wireless or mobile communication equipments. A wireless node in general is any computing device that utilizes the air as broadcasting medium. Fig.1 In this fig we can see there is one base station, through which all the devices like mobiles and laptops are connected. Base station transfers the data to all devices. In MANET, a wireless node can be the basis, the target, or transitional node of data broadcasting . A node playing the task of in between node, functions as a router that can obtain and forward data packets to its near the objective node. The nature of Ad hoc is the reason because of which wireless nodes have a propensity to keep moving in place of being still. Consequently, the network topology alters from time to time. 1.2 WiMAX Worldwide interoperability microwave access includes wireless standards initially formed to give 30- 40 megabit/second data rates and after having 2011 update it allocates up to 1 gigabit/second for stationary stations. It was named WIMAX by WIMAX Forum which started in June 2001 led and forwarded the conformity and interoperability of standard IEEE 802.16 or wireless man advanced is nominee for the 4G, in contest with LTE advanced. 1.3Conditions Related To MANET In this scenario of MANET, there are eight nodes out of which four users are there, three are relay stations and one is base station. 1) When users are fixed- In this the base station is fixed along with relay station and users i.e. the users are fixed on their position and neither move towards the base station nor away from it.
  • 2. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 75 | Page 2) When the users move towards the base station- In this the base station and relay stations are fixed however, the users are in continuous motion towards the base station. Time the user takes to reach to the base station depends on the speed which might be defined by us. It can be changed as per users wish. 3) When the users are moving away from the base station- In this the users are continuously moving away from the base stations but the base and relay stations are fixed. The time taken depends on the speed of the user defined earlier. II. Protocols Used Here we use two protocols the first one is AODV and the other is DSDV. 2.1 Aodv AODV is a routing protocol for Ad hoc mobile networks with many mobile nodes. AODV stands for Ad hoc on demand distance vector. As its name suggests it creates routes on demand by the users. Thus, it is a reactive protocol. The information about the next hop to the destination and the sequence number is obtained from the destination are stored by routing table showing the freshness of information obtained. Furthermore the information about the lively neighbors is collected throughout the discovery of the target host. When the equivalent route breaks, then the neighbors can be notified. The avoidance of source routing decreases the routing burden in a large network. It is the main advantage of AODV. In addition another useful feature of AODV is its application of enlarging ring search to manage the deluge of RREQ (Route Request) packets and look for routes to strange destinations. Along with this it also supplies destination sequence numbers, permitting the nodes to have up to date routes. On the other hand few nodes have to be taken into concern when using AODV. Firstly, it needs bidirectional links and periodic link layer acknowledgements to become aware of broken links. Then, it needs to sustain routing tables for maintenance unlike DSR. 2.2 Dsdv It stands for Destination sequenced distance vector routing. It creates routes automatically and is active all the time. It checks for updates itself without users demand. DSDV requires more data packets than AODV. It adds attributes, sequence number, to each route table entry of the conventional routing information protocol (RIP). Utilizing the initially linked sequence number, the mobile nodes can differentiate stale route information from the latest and thus prevent the formation of routing loops. In DSDV, every mobile node belonging to an ad hoc network sustains a routing table, which registers all existing destinations, the metric and next hop to each destination and a sequence made by the destination node. Using such routing table which is piled up in each mobile node, the packets are broadcasted between the nodes of an ad hoc network. Sporadically routing table is updated with advertisement by nodes on an ad hoc network or when important new information is available to sustain the stability of the routing table with the vigorously altering topology of the ad hoc network. At times or at once when network topology modification are sensed, each mobile node advertises routing information using transmitting or multicasting a routing table update packet. The update packet launch out with a metric of one to direct connected nodes.It shows that each neighbor is at a distance of one metric (hop) from the node. It is dissimilar from that of the conventional algorithm. After having the update packet, routing table is updated by the neighbor with rise in the metric by one and recovery the update packet to the equivalent neighbors of each of them. This process will be go over till all the nodes of Ad hoc network get a copy of the update packet with a equivalent metric. Before updating routing table and retransmitting the update packet for each destination node, the update data is maintained for a short time till the arrival of the best route. If a node obtains more than one update packets for the same destination during waiting time duration, the routes with more fresh sequence numbers are always chosen as the source for packet forwarding decisions. If the update packet with same sequence number is found with the same node, then the update packet with the smallest metric is utilized and the existing route will be deleted or stored as less favorable. Interpreting the advertisement of probably unstable root can moisten the rise and fall of the routing table and decrease the number of retransmission of possible route entries that enter in with same sequence number.
  • 3. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 76 | Page III. Simulation Parameter Table.1 shows simulation parameters and their description. It shows channel type, protocols, packet size and other parameters. IV. Simulation Result The simulation results are shown below. Fig.2 In this fig user are fixed at their position In this figure the red point shows base stations or server, the blue ones are relay stations and green ones are users. We can see in above diagram, users are fixed at their position i.e. they can’t move towards or away from the base station. And black circle indicates the coverage area. Fig. 3 In this fig we can see that the users are moving towards the base station In this figure the red point shows base stations or server, the blue ones are relay stations and green ones are users .We can see in this diagram users are moving towards the base station. And black circle indicates the coverage area. Parameter Description 1.Channel Wireless 2. Radio propagation Two ray ground 3.Network interface Wireless physical 4. Mac type 802.16 5. Interface queue Drop tail/pre queue 6. Antenna type Omni directional 7. Routing protocol AODV & DSDV 8. Packet size 1000 byte 9. Nodes 8 10. Area 500/500
  • 4. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 77 | Page Fig. 4 this graph shows that what happens when the users moving towards the base station in AODV Fig 4 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the maximum delay of the condition in which user are moving towards the base station for AODV protocol is about 97 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines shoes the number of packet communicated in the network which is design using AODV protocol. Fig.5 this graph shows that what happens when the users moving away from the base station in AODV Fig 5 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the maximum delay of the condition in which user are moving towards the base station for AODV protocol is about 98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines shoes the number of packet communicated in the network which is design using AODV protocol. Fig 6 Indicates the graph between the simulation on X-axis and delay time on Y-axis which indicate that the maximum delay of the condition in which user are moving away from the base station for AODV protocol is about 98 µ sec and each vertical red colour line indicates the delay of each packet therefore the total number of lines shoes the number of packet communicated in the network which is design using AODV protocol.
  • 5. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 78 | Page Fig. 6 this graph shows that what happens when the users moving towards the base station in DSDV Table. 2 shows the results for AODV protocol when users are moving towards the base station. Average Throughput 797.6480 kbps Total packet sent 1720 Total packet received 1474 Packet delivery ratio 85.697674 % Packet loss ratio 14.302326 % Table. 3 shows the results for AODV protocol when users are moving away from the base station. Table.4 shows the results for DSDV protocol when users are moving towards the base station Average Throughput 657.1686 kbps Total packet sent 1720 Total packet received 1223 Packet delivery ratio 71.104651 % Packet loss ratio 28.895349 % V. Conclusion From the above all result we can conclude that if the mobile user are fix or moving towards the base station then the signal strength will increase and high signal to noise ratio obtain due to which we got maximum packet delivery and less packet loss for AODV as well as DSDV protocol. But if the mobile user moves away from the base station then the strength of the signal decreases and the result for both the protocols are degrade than other two scenarios. VI. Future Work In the upcoming days we will be able to implement more nodes in MANET. The number of base stat ion, relay station and users would be increased. Recently in this paper I have used AODV and DSDV routing protocols but in future we would be implement by many other protocols. Refrences [1] Mrs.S.Madhurikkha &Dr.R.Sabitha ,Defending against packet dropping attack using DRI & cross checking mechanism in MANET. [2] Zahian Ismail& Rosilah Hassan, Effect of packet size on AODV routing protocol implementation in homogenous and heterogenous manet-2011 [3] S.Mangai & A.Tamilarasi ,Hybrid location aided routing protocol for gps enabled manet clusters-29 Dec 2011 [4] Zhenyu Chen, Lin Guan ,Xingang Wang, Xunli Fan “Ad hoc On-demand Multipath Distance Vector routing with Backup Route Update Mechanism” IEEE 14TH International Conference On High Performance Computing And Communications 2012. [5] Prabhakar D. Dorge, Sanjay S. Dorle, Megha B. Chakole and Dhiraj K. Thote , “Improvement of QoS in VANET with Different Mobility Patterns” Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012), SKP Engineering College, Tiruvannamalai, TN., India. 21 - 22 December, 2012. Average Throughput 1678.0190 kbps Total packet sent 2375 Total packet received 1977 Packet delivery ratio 83.242105 % Packet loss ratio 16.757895 %
  • 6. Design And Simulation Of Mobile Ad Hoc Network For Multiple Mobility Management DOI: 10.9790/2834-11127479 www.iosrjournals.org 79 | Page [6] Rajan patel& nimisha patel , A comparative study and simulation of AODV & DSDV manet routing protocol in ns2 & ns3- march 2014.