scholarly journals Dampak dari Parameter Variasi Koneksi, Node dan Kecepatan Node Terhadap Delay pada Routing Protocol AODV dan BATMAN Jaringan MANET

2020 ◽  
Vol 8 (2) ◽  
Author(s):  
Dodon Turianto Nugrahadi ◽  
M Reza Faisal ◽  
Liling Triyasmono ◽  
Muhammad Janawi

Mobile ad-hoc Network (MANET) is a multihop wireless network that a many collection of mobile nodes that are dynamic. MANET each node on the network have the same position, so it needs the appropriate routing protocol, to support the exchange of data to be optimal. In this study, the routing protocol to be tested is AODV and BATMAN based scenario increasing the number of connections, nodes and speed. Simulation parameter scenarios is number connection 1 UDP, 2 UDP, 3 UDP, and number of node 25 node, 50 node, 100 node, and then number node speed 20 m/s, 50 m/s. in this AODV routing protocol will establish a rute from the source node to the destination only if there is a request from the source node. BATMAN routing protocols, all decisions and information disseminated throughout the node and will regularly update on each node. The performance parameters to be measured such as delay by using OMNET ++ 4.6. Output of simulation will analysis with two way anova and multivariate to know correlation between variation scenario impact to delay. The results obtained in this study AODV and BATMAN have their respective advantages, analisys with two-way anova show that both AODV and BATMAN get the impact of the scenario from incrising the number of connections, the number of nodes and the number of nodes speed with a p-value of 0.012212 (<0.05) with two-way anova. From all scenarios, the number of UDP connections has the greatest impact, from UDP 1, UDP 2 and UDP 3. Followed by the number of speed 50 and node 100. So it can be concluded that the connection has an effect on increasing delay. The increasing number of speed and nodes can contribute to an increase in delay if number of nodes above 100 and speed above 50. With multivariate analysis, the BATMAN protocol had the most impact on the delay under the scenario then AODV.

2017 ◽  
Vol 3 (12) ◽  
Author(s):  
Aslam Khan

A mobile ad hoc network (MANET) may be a self-configured, infrastructure-less network of mobile nodes that move independently. Owing to this movement, links can change often and can require special routing techniques to handle this. Every node acts as an intermediate router to receive and transmit packets. in this paper, the impact of varying transmission range on different propagation model and queue model on 3 routing protocols specifically AODV, DSR and DYMO is analyzed. The simulations were done on Qualnet. The significant metrics used for comparative analysis are- throughput, end-to-end delay and average jitter. The nodes of designed scenario communicate all the way through constant bit rate (CBR) application traffic. It is found that AODV is best performer under CBR traffic for MANET nodes operated through Okumura Propagation Model with queue technique as well as DYMO performs well in free space propagation model using queuing technique. This paper also summarize as the node density increases in network throughput performance decreases. Further in this paper DRAODV routing protocol is designed and implemented in order to improve the QoS over AODV routing protocol under variable transmission range.


Author(s):  
Naseer Ali Husieen ◽  
Suhaidi Hassan ◽  
Osman Ghazali ◽  
Lelyzar Siregar

This paper evaluates the performance of Reliable Multipath Dynamic Source Routing Protocol (RM-DSR) protocol with different network size compared to DSR protocol. RM-DSR developed in the mobile ad-hoc network to recover from the transient failure quickly and divert the data packets into a new route before the link is disconnected. The performance of RM-DSR protocol is tested in the Network Simulator (NS-2.34) under the random way point mobility model with varying number of mobile nodes. The network size parameter is used to investigate the robustness and the efficiency of RM-DSR protocol compared to DSR protocol. The network size affects the time of the route discovery process during the route establishment and the route maintenance process which could influence the overall performance of the routing protocol. The simulation results indicate that RM-DSR outperforms DSR in terms of the packet delivery ratio, routing overhead, end-to-end delay, normalized routing load and packet drop.


2020 ◽  
Vol 17 (6) ◽  
pp. 2483-2487
Author(s):  
Nippun Kamboj ◽  
Dalip ◽  
Munishwar Rai

Current time represents the era of communication technology and in this revolution MANET is widely used and act as a key star for data communication in real life decisive scenario for e.g., disaster management, traffic control, military services etc. MANET is infrastructureless data communication network comprising of mobile nodes. For MANET it requires secure and energy efficient framework for the underlying routing protocol. To meet the need of efficient data communication in MANET, an Energy Efficient and Secure AODV (EES-AODV) protocol is proposed. In the projected routing protocol, first the order of network nodes happen dependent on energy and afterward encryption has been done. Simulation of projected protocol is performed for such as Average Delay, PDR and Throughput. Simulated results shows that modified AODV gives optimized performance and provides a more secure and energy aware protocol.


2021 ◽  
pp. 104-110
Author(s):  
Le Duc Huy ◽  
◽  
Luong Thai Ngoc ◽  
Nguyen Van Tam ◽  

On-demand routing protocol is designed to work efficiently on mobile ad hoc networks (MANET). They operate with the belief that all nodes in the network are friendly, thus hackers exploiting security vulnerabilities to carry out some form of cyber attacks, especially Flooding attacks. This form of attack is easily accomplished by overflowing route request packets into the network. Once the attack frequency is large enough, it shall interfere with the route discovery of other network nodes, damaging network performance. In this article, we will analyze and evaluate the impact of flood attacks on the performance of two routing protocols AOMDV. Thereby, we describe a security solutions using the One Time Password (OTP) authentication mechanism (OAM) and implementing AOMDV-OAM security protocol, which is improved from the AOMDV protocol by using OAM to reduce the harmful effects of flood attacks. Using NS2, we assess the security effectiveness of the AOMDV-OAM protocol in random waypoint network topologies where has flooding attacks. Simulation results show that AOMDV-OAM protocol is very effective in minimizing the harmful effects of flood attacks, the rate of successful packet delivery reached over 99% when the one malicious node attacked with a frequency of 20pkt/s and 50pkt/s for Grid network topology.


Author(s):  
Salma S. Mohamed ◽  
Abdel-Fatah I. Abdel-Fatah ◽  
Mohamed A. Mohamed

Routing selection and supporting Quality of Service (QoS) are fundamental problems in Mobile Ad Hoc Network (MANET). Many different protocols have been proposed in the literature and some performance simulations are made to address this challenging task. This paper discusses the performance evaluation and comparison of two typical routing protocols; Ad Hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance-Vector (DSDV) based on measuring the power consumption in network with varing of the QoS parameters. In this paper, we have studied and analyzed the impact of variations in QoS parameter combined with the choice of routing protocol, on network performance. The network performance is measured in terms of average throughput, packet delivery ratio (PDR), average jitter and energy consumption. The simulations are carried out in NS-3. The simulation results show that DSDV and AODV routing protocols are less energy efficient. The main aim of this paper is to highlight the directions for the future design of routing protocol which would be better than the existing ones in terms of energy utilization and delivery ratio.


Integrating the Mobile Ad-Hoc Network (MANET) with Internet has many advantages. The Data collected from the Mobile nodes can be broadcasted to the world by connecting the Internet to it via Gateway. Clustering is a practical way to enhance the system performance. Security is a significant issue in the Integrated MANETInternet climate in light of the fact that in this climate we need to think about the assaults on Internet availability. So, to overcome this issue, we have proposed Secure and Authenticated routing protocol (SARP) to enhance security performance of the networks. This routing protocol is used to discover a secure route and to transmit data packets securely. In this protocol clusters are formed and security relies on the hardness of the symmetric and asymmetric key algorithms. We show the practicality of this convention as for the security prerequisites and security investigation against different assaults. The estimations and reproductions are given to show the security of the proposed convention. The outcomes show that, the proposed convention have preferred execution over the current secure conventions for Cluster based Internet Integrated with MANETs, in terms of security.


Mobile ad hoc network is appealing mechanization in many applications, including disaster recovery and communication systems and rescue due to the flexibility offered by the diverse network. An equivalent network, although it has been found that legitimate can operate independently, or may link to the wider Internet. A framework has been introduced in recent years operators and attackers, have used this network environment. Mobile Ad hoc Network is the main concern about dynamic routing access. Mobile ad hoc network provides several well-known protocols for routing responsive like DSR, AODV, TORA, etc. AODV can route both unicast and multicast. AODV routing protocol cannot protect against a wormhole attack. In this paper, we implement a technique of pseudo-DNA cryptography, focused on the molecular biology’s central dogma. In this approach, we simulate the central dogma's transcription and translation process, and even some extra features to make it difficult to crack the resulting ciphertext and defense against wormhole attack. In the sense of ratio for packet drop, throughput and the delay between two nodes we also examine the impact of the wormhole attack on a parameter of ad hoc network.


2011 ◽  
Vol 2 (4) ◽  
pp. 82-94
Author(s):  
Pavan Kumar Pandey ◽  
G. P. Biswas

The Mobile Ad hoc Network (MANET) is a collection of connected mobile nodes without any centralized administration. Proactive routing approach is one of those categories of proposed routing protocol which is not suitable for larger network due to their high overhead to maintain routing table for each and every node. The novelty of this approach is to form a binary tree structure of several independent sub-networks by decomposing a large network to sub-networks. Each sub-network is monitored by an agent node which is selected by several broadcasted regulations. Agent node maintains two routing information; one for local routing within the sub-network and another for routing through all other agent node. In routing mechanism first source node checks for destination within sub-network then source sends destination address to respective parent agent node if destination is not available in local routing, this process follows up to the destination node using agent mode. This approach allowed any proactive routing protocol with scalability for every routing mechanism. The proposed approach is thoroughly analyzed and its justification for the connectivity through sub-networks, routing between each source to destination pair, scalability, etc., are given, which show expected performance.


Author(s):  
Pavan Kumar Pandey ◽  
G. P. Biswas

The Mobile Ad hoc Network (MANET) is a collection of connected mobile nodes without any centralized administration. Proactive routing approach is one of those categories of proposed routing protocol which is not suitable for larger network due to their high overhead to maintain routing table for each and every node. The novelty of this approach is to form a binary tree structure of several independent sub-networks by decomposing a large network to sub-networks. Each sub-network is monitored by an agent node which is selected by several broadcasted regulations. Agent node maintains two routing information; one for local routing within the sub-network and another for routing through all other agent node. In routing mechanism first source node checks for destination within sub-network then source sends destination address to respective parent agent node if destination is not available in local routing, this process follows up to the destination node using agent mode. This approach allowed any proactive routing protocol with scalability for every routing mechanism. The proposed approach is thoroughly analyzed and its justification for the connectivity through sub-networks, routing between each source to destination pair, scalability, etc., are given, which show expected performance.


A mobile ad hoc network (MANET) is a combination of multiple mobile nodes, which are interconnected by radio link. In MANET, sensor nodes are free to move, and each node can act as a host or router. Routing is one of the most challenging tasks because nodes move frequently. Therefore, in MANET, the routing protocol plays an important role in selecting the best route to efficiently transmit data from the source node to the destination node. In this paper, the best path with efficient Ad Hoc on Demand Distance Vector (AODV) routing protocol is chosen as the routing mechanism. The properties of each node are categorized using firefly algorithm. The Artificial Neural Network (ANN) is trained as per these properties and hence in case if the gray hole node is detected within the route, it is identified and the route between the source and the destination is changed. At last, to show how effectively the proposed AODV with Firefly and ANN works is computed in terms of performance parameters. The throughput and PDR is increased by 4.13 % and 3.15 % compared to the network which is affected by gray hole attack. The energy up to 44.02 % has been saved.


Sign in / Sign up

Export Citation Format

Share Document