QoS Analysis in Mobile Ad-hoc Networks Using Routing Protocols Deepshikha , Pragati

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
QoS Analysis in Mobile Ad-hoc Networks Using
Routing Protocols
Deepshikha#1 , Pragati#2, Nagendra Sah#3
#3
Assistant Professor & ECE Department & PEC University of Technology, Chandigarh, India
#1
B.E. Final Year, Electrical Engg, PEC University of Technology, Chandigarh,India
#2
B.E. Final Year, CCET, Sector-26, Chandigarh, India
Abstract— It is proposed to analyze the usefulness of Bandwidth
Reservation Protocol (BRP) for mobile ad-hoc networks in
improving the quality of service (QoS). There are two types of
bandwidth reservation protocols namely, priority based and
scheduling based. In this simulation the priority based bandwidth
reservation protocols are used. These are Fair End-to-end Bandwidth
Allocation (FEBA) and Priority based Bandwidth Reservation
Protocol (PBRP) algorithms. PBRP protocol consists of two phases
namely Bandwidth Request phase and Bandwidth Reply phase. In the
former Phase, a Bandwidth Request (BREQ) message is forwarded
from the node that requests the admission of a new traffic flow to its
destination. In the later Phase, a Bandwidth Reply (BREP) message
proceeds backwards, hop-by-hop, from the destination node to the
node that originated the request along the path laid down by the
corresponding BREQ message. The destination node precedes the
reply according to the priority of traffic classes and reserves the
bandwidth on the reply path. By simulation results, it is found that
the use of these protocols achieve high bandwidth utilization and
throughput with reduced delay. The simulation is done on mesh
based On Demand Multicast Routing Protocol (ODMRP) by using
QUALNET 5.0.
Keywords— Mobile ad-hoc Networks (MANETs), Quality of
services (QoS), Bandwidth Reservation Protocol (BRP), Bandwidth
Request (BREQ).
1. INTRODUCTION
Mobile Ad-hoc wireless network is a special case of
wireless network devoid of predetermined backbone
infrastructure. This feature of the wireless ad-hoc networks
makes it flexible and quickly deployable. As the nodes
correspond over wireless link, all the nodes must combat
against the extremely erratic character of wireless channels
and intrusion from the additional transmitting nodes. These
factors make it a challenging problem to exploit on data
throughput even if the user-required QoS in wireless ad-hoc
networks is achieved
Wireless mesh networks (WMN’s) contains several
stationary wireless routers which are interlinked by the
wireless links. Wireless routers acts as the access points (APs)
for wireless mobile devices. Through the high speed wired
links, some wireless routers act as a gateway for internet.
Wireless mobile devices transfer data to the corresponding
wireless router and further these data’s are transferred in a
multi-hop manner to the internet via intermediate wireless
routers. The popularity of WMN’s is due to their low cost and
ISSN: 2231-5381
auto-organizing features [1].
In this paper the focus is on the problem of providing QoS
support for real-time flows, while allocating bandwidth to
elastic flows fairly. A protocol QUOTA (quality-of-service
aware fair rate allocation) is proposed, a framework that
combines QoS support and fair rate allocation. Their proposed
framework QUOTA provides higher priority to real-time
flows than elastic flows by reserving the necessary bandwidth
for the former and fairly allocating the left-over bandwidth to
the latter [2].
In this paper a Fair End-to-end Bandwidth Allocation
(FEBA) algorithm is introduced. The FEBA algorithm is
implemented at the Medium Access Control (MAC) layer of
single-radio, multiple channels IEEE 802.16 mesh nodes,
operated in a distributed coordinated scheduling mode. FEBA
negotiates bandwidth among neighbors to assign a fair share
proportional to a specified weight to each end-to-end traffic
flow. Thus the traffic flows are served in a differentiated
manner, with higher priority traffic flows being allocated
more bandwidth on the average than the lower priority traffic
flows [3].
A low-complexity intra-cluster resource allocation
algorithm by considering the power allocation, sub-carrier
allocation, and packet scheduling is proposed. The time
complexity of their proposed scheme is on the order of O
(LMN), where L is the number of time slots in a frame, M is
the number of active links, and N is the number of sub-carriers
[4].
An efficient intra-cluster packet-level resource allocation
approach is proposed. Their approach considers power
allocation, sub-carrier allocation, packet scheduling, and QoS
support. Their proposed approach combines the merits of a
Karush-Kuhn-Tucker (KKT)-driven approach and a genetic
algorithm (GA)-based approach. Their proposed approach
achieves a desired balance between time complexity and
system performance [5].
The problems of the reservation on a single hop are
discussed. The reason for the inconsistencies in the existing
approaches which lead to admission failures and present a
protocol for preventing them is analysed. This allows for
increasing the reliability of established communication links
in WMNs. They have focused only on the local admission
control and not the various searching strategies for finding a
http://www.ijettjournal.org
Page 486
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
suitable path [6]
In this paper authors propose a new multicast protocol for
Mobile Ad Hoc networks, called the Multicast routing
protocol based on Zone Routing (MZR). MZR is a sourceinitiated on demand protocol, in which a multicast delivery
tree is created using a concept called the zone routing
mechanism [7].
In this paper, authors present a performance study of
three multicast protocols: ODMRP, ADMR, and SRMP.
Multicast Routing in Mobile Ad hoc NETworks (MANETs) is
a recent research topic. Source Routing-based Multicast
Protocol, (SRMP) is a new on-demand multicast routing
protocol that applies a source routing mechanism and
constructs a mesh to connect group members [8].
In this paper, authors focus on one critical issue in
Mobile Ad hoc Networks (MANETs) that is multicast routing.
In fact, optimal routes, stable links, power conservation, loop
freedom, and reduced channel overhead are the main features
to be addressed in a more efficient multicast mechanism [9].
In this paper, the authors describe the reliability of
the On-Demand Multicast Routing Protocol (ODMRP) in
terms of the delivery of data packets in response to the
important role that multicasting plays in wireless mobile multi
hop ad hoc networks. Using GloMoSim2.0, the simulation
results have shown that using ODMRP, the average miss ratio
does not always increase with increasing the speeds of
mobility of the mobile hosts in the ad hoc network. Instead,
there is a "sweet spot" of values of the mobility speeds of the
mobile hosts. In addition, the averages miss ratio decreases
with increasing the number of multicast group members,
which indicates that ODMRP has more packet delivery
capabilities for denser multicast groups. [10]
In this paper, authors present a comparative
performance evaluation of three general-purpose on demand
multicast protocols, namely ADMR, MAODV, and ODMRP,
focusing on the effects of changes such as increasing number
of multicast receivers or sources, application sending pattern,
and increasing number of nodes in the network [11].
In this paper, authors analyse the performance of
multicast routing protocol PIM-SM to provide suggestions of
improving this protocol. PIM-SM is preferred among the
current intra domain multicast routing protocols. But it is not
widely deployed in Internet till now [12].
destination node to the node that originated the request along
the path laid down by the corresponding (BREQ) message.
The destination node precedes the reply according to the
priority of traffic classes and reserves the bandwidth on the
reply path.
In the Bandwidth Request Phase the bandwidths are not
reserved and only the necessary messages are transmitted to
the destination. The source is required to select the Traffic
flow Identification (TFID) of any new flow in such a way that
the source, destination, TFID uniquely identifies the traffic
flow in the network.
In this phase, the destination sends back to the source a
BREP message and it is routed through the same path that has
been enclosed by the BREQ message. This is obtained by
using the list of intermediate node IDs included in the BREQ
message. On receiving the BREP message, each node reserves
the bandwidths according to the priority of the traffic.
If the nodes do not receive packets until the traffic flow is
dropped for a particular amount of time Ts, then the
bandwidth remains allocated. The source generates probe
packets to guarantee an established traffic flow state on each
node in the path to prevent premature termination of the traffic
flow. Probe packets are the messages which include the
information about their traffic and these packets are discarded
by the receivers in the MAC layer. The generation interval of
the probe packets must be smaller than the Ts. Generally, by
transmitting the probe packets it consumes the bandwidth
which is already reserved for the traffic flow in the data subframe.
B. Fair end-to-end Bandwidth Allocation Algorithm
This algorithm is implemented at the medium access control
layer of single-radio, multiple channel IEEE 802.16 mesh
nodes, operated in a distributed coordinated scheduling mode.
FEBA negotiates bandwidth among neighbours to assign a fair
share proportional to a specified weight to each end-to-end
traffic flow. Thus the traffic flows are served in a differential
manner, with higher priority traffic flows being allocated
more bandwidth on the average than the lower priority traffic
flows.
III. PROPAGATION MODELS
There is greater interest in characterizing the radio
II. BANDWIDTH RESERVATION PROTOCOL
communication channel inside a building. The indoor
propagation model differs from the outdoor propagation
A. Priority Based Bandwidth Reservation Protocol
because of variation in fading rate and type of interference.
Basically, the proposed protocol consists of two phases For example floor attenuation factor and penetration
namely Bandwidth Request phase and Bandwidth Reply phase. attenuation factor are two main parameters of indoor
In the Bandwidth Request Phase, a Bandwidth Request propagation models. The ITU Model is applicable for
(BREQ) message is forwarded from the node that requests the frequency range 900 MHz to 5.2 GHz. The ITU indoor path
admission of a new traffic flow to its destination. During this loss model is formally expressed as
phase bandwidths are not reserved. The BREQ message
L = 20 log f + N log d + Pf (n) – 28
consists of traffic flow specifications and the requested Where, N is distance power loss coefficient, Pf (n) is the floor
bandwidth [13].
loss penetration factor. Propagation loss prediction model
Next in the Bandwidth Reply Phase, a Bandwidth Reply plays an important role in design of cellular mobile radio
(BREP) message proceeds backwards, hop-by-hop, from the communication system. Propagation models are used
ISSN: 2231-5381
http://www.ijettjournal.org
Page 487
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
extensively in network planning, particularly for conducting
feasibility studies and during initial deployment. These are
also very important for performing interference studies as the
deployment proceeds. Propagation loss modelling of cellular
mobile system is important for site planning; the transmission
loss and signal coverage can be predicted by set of
propagation loss modelling equations [14].
Propagation models in wireless communication have
traditionally focused on predicting the average received signal
strength at a given distance from the transmitter, as well as the
variability of the signal strength in close proximity to a
particular location. Propagation models that predict the mean
signal strength for an arbitrary transmitter – receiver
separation distance are useful in estimating the radio coverage
area of transmitter and are called large scale propagation
models, since they characterize signal strength over large T-R
separation distance. On the other hand, propagation model that
characterize the rapid fluctuation of the received signal
strength over very short travel distances or short time duration
are called small scale or fading models. As mobile moves over
very small distances, the instantaneous received signal
strength may fluctuate rapidly giving rise to small scale fading.
The reason for this is that received signal is sum of many
contributions coming from different directions [15].
B. Mesh Topology
A mesh topology offers multiple paths for messages within
the network. This lends itself to greater flexibility than other
topologies. If a particular router fails, then the self healing
mechanism allows the network to search for an alternate path
for messages to be passed. Mesh topology is highly reliable
and robust. The advantages being that if any individual router
becomes inaccessible, then alternate routes can be
rediscovered and used. The drawback of this topology has
higher communications overheads than the star topology,
which can result in increased latency and lower end-to-end
performance.
C. Tree topology
A tree topology consists of a coordinator, to which other
nodes are connected as follows:
1.
2.
The coordinator is linked to a set of routers and ends
devices- its children.
A router may then be linked to more routers and end
devices-its children. This can continue to a number
of levels.
For every child router connected, additional child routers can
also be connected, creating different levels of nodes. In order
The propagation models are generally used to characterize the the messages to be passed to other nodes in the same network,
quality of mobile communication. It can be used as prediction the source node must pass the messages to its parent, which is
tool for those telecommunication engineers who deal with the the node higher-up by one level of the source, and the
site planning for base station. These models can be broadly messages is continually relayed higher-up in the tree until it is
categorized into three types: empirical, deterministic and passed back down to the destination node. Because the
stochastic. Empirical models are based on observation and number of potential paths a message can take is only one, a
measurement alone. These are mainly used to predict path loss. router therefore can be used in place of an end device in a
The deterministic models make use of the laws governing Tree network, but the message relay functionality of the router
electromagnetic wave propagation to determine the received will not be used- only its applications will be relevant.
signal power at a particular location. Stochastic models, on
other hand, model the environment and use much less D. ODMRP
processing power to generate prediction. The concept of
It is a soft state reactive mesh based and uses a forwarding
constraint satisfaction programming has been implemented on group concept i.e. only a subset of nodes forwards the
empirical wireless propagation models in order to predicting multicast packets. In ODMRP, multicast group members are
and optimizing the propagation loss [16].
maintaining a soft state approach. No explicit control message
is required to leave the group and group membership and
multicast routes are established and updated by the source on
IV. NETWORK TOPOLOGIES
Topology refers to the configuration of the hardware demand [17].
components and how the data is transmitted through that
The sources, desiring to send packet to a multicast group
configuration. They describe the physical and logical
but
having no route to the multicast group, will broadcast a
arrangement of the network nodes. There are three network
JOIN-DATA control packet to the entire network. This
topologies.
JOIN_DATA packet is periodically broadcast to refresh the
membership information and update routes. When an
A. Star Topology
The star topology consists of a coordinator and several end immediate node receives the JOIN_DATA packet, it stores the
devices. In this topology, the end device communicates only source ID and the sequence number in its message cache to
with the coordinator. Any packet exchange between ends detect any potential duplicates. The routing table is updated
devices go through coordinator. The main advantages of star with the appropriate node ID from which the message was
topology are its simplicity and predictable and energy efficient received for the reverse path back to the source node. If the
behavior. The limitations and drawbacks are scalability and message is not duplicate and time to live (TTL) is greater than
zero, it is rebroadcast. When the JOIN_DATA packet reaches
coordinator as a single point of failure.
a multicast receiver, it creates and broadcasts a JOIN_TABLE
ISSN: 2231-5381
http://www.ijettjournal.org
Page 488
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
to its neighbours. When a node receives a JOIN_TABLE, it
checks to see if the next hop node ID of one of the entries
matches its own ID.
If it does, the node realizes that it is on the path to the
source and thus is a part of the forwarding group and sets the
forwarding group flag (FG_FLAG). It then broadcasts its own
join table built on matched entries. The next hop node ID field
is filled by extracting information from its routing table. In
this way, each forward group member propagates the
JOIN_TABLE until it reaches the multicast source s via the
shortest path.
On receiving JOIN_TABLE, a node also has to built is
multicast table for forwarding future multicast packets. This
whole process constructs (or updates) the routes from sources
to receivers and builds a mesh of nodes called the forwarding
group.
Fig4.1. ODMRP Join Query
After the forwarding group establishment and route
construction process, sources can multicast packets to
receivers via selected routes and forwarding groups. While it
has data to send, the source periodically sends JOIN_DATA
packets to refresh the forwarding group and routes. When
receiving the multicast data packet, a node forwards it only
when it is not a duplicate and the setting of the FG_FLAG for
the multicast group has not expired. This procedure minimizes
the traffic overhead and prevents sending packets through the
state routes. In ODMRP, no explicit control packet needs to be
sent to join or leave the group. If a multicast source wants to
leave the group, it simply stops sending JOIN_DATA packets,
since it does not have any multicast data to send the group. If
a receiver no longer wants to receive from a particular
multicast group, it does not send the join reply for that group.
Fig4.2. ODMRP Join Table
PROTOCOL ILLUSTRATION
Following figures illustrate ODMRP forwarding path setup
and multicast data forwarding. Figure 4.1 illustrates Join
Query packet forwarding, while Figure 4.2 illustrates
forwarding path setup by Join Table packets. Finally, Figure
4.3 shows multicast data forwarding through previously
established forwarding path. In Figure 4.1 Node A broadcasts
a Join Query packet as a multicast source, and all the
surrounding nodes (B, C, D, E, and F) rebroadcast the
received Join Query packet. In addition, intermediate nodes
retain a unique identifier of the last Join Query and the
information of their immediate parent towards the multicast
source. In the Figure 4.1, these packets open two possible
forwarding paths from the source to multicast receiver L. L
selects the path from J, and replies a Join Table packet back to
the source reinforcing the selected path. While the Join Table
packets travel toward the source, nodes K, J and C update
their routing tables as forwarding nodes for multicast sender A
(Figure 4.2). Once the Join Table packets reach the multicast
sender A, it initiates sending of multicast data through the
forwarding path (Fig 4.3)
ISSN: 2231-5381
Fig4.3. ODMRP data forwarding
The On-Demand Multicast Routing Protocol
(ODMRP) falls into the category of on-demand protocols
http://www.ijettjournal.org
Page 489
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
since group membership and multicast routes are established
and updated by the source whenever it has data to send.
Unlike conventional multicast protocols which build a
multicast tree, ODMRP is mesh based. It uses a subset of
nodes, or forwarding group, to forward packets via scoped
flooding. ODMRP consists of a request phase and a reply
phase. When a multicast source has data to send but no route
or group membership information is known, it piggybacks the
data in a Join-Query packet. When a neighbor node receives a
unique Join-Query, it records the upstream node ID in its
message cache, which is used as the node’s routing table, and
re-broadcasts the packet. This process’ side effect is to build
the reverse path to the source. When a Join-Query packet
reaches the multicast receiver, it generates a Join-Table packet
that is broadcast to its neighbors. The Join-Table packet
contains the multicast group address, sequence of pairs, and a
count of the number of pairs. When a node receives a JoinTable it checks if the next node address of one of the entries
matches its own address. If it does, the node realizes that it is
on the path to the source and thus becomes a part of the
forwarding group for that source by setting its forwarding
group flag. It then broadcasts its own Join-Table, which
contains matched entries. The next hop IP address can be
obtained from the message cache. This process constructs the
routes from sources to receivers and builds the forwarding
group. Membership and route information is updated by
periodically sending Join-Query packets.
Fig.4.4 Mesh Formation in ODMRP
Nodes only forward (non-duplicate) data packet if they belong
to the forwarding group or if they are multicast group
members. By having forwarding group nodes flood data
packets, ODMRP is more immune to link/node failures (e.g.,
due to node mobility). This is in fact an advantage of mesh-
ISSN: 2231-5381
based protocols. Figure 4.4 illustrates how the mesh is created
in ODMRP.
E. Management Of Route Request, Route Reply And Route
Error Packets
To create multicast mesh and a stable route in a
mesh from source to destination, various control packets such
as route request (RR), route reply and route error (RE) packets
are used. Some of the fields on the control packets required
for multicast mesh creation, stable path establishment and
handling link failure situations are described. The fields of RR
packet are as follows:

Source address: it is the address of the node
originating packet.
 Multicast group address: it is the address of the
multicast group.
 Sequence number: the sequence number assigned to
every packet delivered by the source that uniquely
identify the packet.
 Route request flag (RR Flag): this flag is set for the
duration of forward travel of RR packet from source
to destination.
 Previous node address: it is the address of the
previous node that RR packet has visited during its
forward movement. It is the route request phase, a
node receiving RR packet stores this address with
multicast address in its Multicast Routing
Information Cache (MRIC) as next hop-node to send
the packet to RR source. This field is updated after
every movement to the next node until it reaches the
receiver with multicast address.
 Power: this is the power at which a node has
transmitted the packet to neighbor.
 Antenna Gain: this is the gain of antenna at the
forwarding node to forward RR packet to its
neighbor.
F. QoS Routing
If only two hosts are involved in ad-hoc network, no real
routing decision is necessary. In many adhoc networks two
hosts that want to communicate may not be within wireless
transmission range of each other, but could communicate if
other hosts between them are willing to forward packets for
them. Routing problem in real adhoc network may be more
complicated due to non uniform propagation characteristics of
wireless transmission and due to possibility that any of the
host may move at any time.
QoS routing protocols search for routes with sufficient
resources for QoS requirements. QoS routing protocols should
work with resource management to meet QoS requirements
such as delay bounds, bandwidth demand. QoS routing is
difficult in MANETs due to following reasons:
(a) Overhead of QoS routing is too high for bandwidth
limited MANETs because mobile host should have
mechanism to store and update link state information.
(b) Due to dynamic nature of MANET, maintaining link
state information is difficult.
http://www.ijettjournal.org
Page 490
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
V. RESULTS AND DISCUSSION
The QUALNET-5.0 simulator has been used for proposed
protocol. It has the facility to include multiple channels and
radios. It supports different types of topologies such as chain,
ring, multi ring, grid, binary tree, star, hexagon, mesh and
triangular. The supported traffic types are CBR and MCBR.
In this simulation, 50 mobile nodes are arranged in a topology
of size 1500 meter x 1500 meter region. All nodes have the
same transmission range of 250 meters. In our simulation, the
speed is set as 5m/s.
Performance matrices used:1. Control packet load: the average number of control
packet transmission by node in the network. Control
packets include any of QUERY, REPLY, PASSREQ,
CONFIRM, HELLOW and ACK packets.
2. Packet delivery ratio: the ratio of data packet sent by
all the sources that is received by a receiver.
3. Data packet overhead: the number of data
transmissions performed by the protocols per
successfully delivered data packet.
4. Control packet overhead: the number of controlled
transmissions performed by the protocols per
successfully delivered data packet.
5. Total packet overhead: the total control and data
overheads per successfully delivered data packet.
This matrix represents the multicast routing
efficiency.
6. End-to-End Delay: It is the average time it takes a
data packet to reach the destination. This metric is
calculated by subtracting time at which first packet
was transmitted by source from time at which first
data packet arrived to destination. This includes all
possible delays caused by buffering during route
discovery latency, queuing at the interface queue,
retransmission delays at the MAC, propagation and
transfer times. This metric is significant in
understanding the delay introduced by path
discovery.
7. Throughput: It is the average rate of successful
message delivery over a communication channel. It is
defined as the amount of data successfully delivered
from the source to the destination in a given period of
time. It is the amount of data per time unit that is
delivered from one node to another via a
communication link. The throughput is measured in
bits per second (bit/s or bps). and
8
9
Bandwidth Utilization: It is the ratio of bandwidth
received into total available bandwidth for a traffic
flow.
Routing overhead: This metric describes how many
routing packets for route discovery and route
maintenance need to be sent so as to propagate the
data packets.
ISSN: 2231-5381
10 Media access delay: The time a node takes to access
media for starting the packet transmission is called as
media access delay. The delay is recorded for each
packet when it is sent to the physical layer for the
first time.
11 Path optimality: This metric can be defined as the
difference between the path actually taken and the
best possible path for a packet to reach its destination.
Here, we have considered end-to-end delay, throughput
and bandwidth utilization as the performance metrics and
no. of nodes and data flow rates as the variables.
The simulation environment for the proposed
work consists of four models:a) Network model
b) Channel model-fading channels.
c) Mobility model-random, grid and uniform.
d) Traffic model-CBR and MCBR.
Table.1. Experimental set-up
Area
Transmission
range
Number of nodes
Physical / Mac
layer
Mobility model
Maximum
mobility speed
Simulation
duration
Pause time
Packet size
Traffic type
1500X1500 m2
500 m
200
IEEE 802.11 at 2 Mbps
Random waypoint
model with no pause
time
1-20 m/s
500 s
0
512 bytes
CBR (Constant Bit
Rates)
5/second
Number of
packets
Number of
1,2,5,10,15 nodes
multicast sources
Number of
10,20,30,40,50 nodes
multicast receivers
No. of simulations 20
A. Effect of Varying no of nodes
In the first experiment, the no. of nodes is varied as 10, 20,
30, 40 and 50 and the above metrics are examined.
http://www.ijettjournal.org
Page 491
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
Fig.5.3 shows the bandwidth utilization obtained, when the
number of nodes is increased. It shows that PBRP utilizes
more bandwidth than the FEBA algorithm. As far as the
bandwidth utilization is concerned, the FEBA protocol is less
effective in comparison to PBRP.
END-TO-END
DELAY(s)
4.5
4
3.5
3
2.5
2
1.5
1
0.5
0
PBRP
In the second experiment, we vary the number of data flows as
2,4,6,8 and10 MBPS..
10
20
30
40
50
y
NO. OF NODES
Fig.5.1 nodes Vs Delay
END-TO-END
0.6
It is evident from Fig.5.1 that the end-to-end delay
increases as the number of nodes is increased. It is clear that
PBRP has less delay when compared to FEBA algorithm. The
priority based protocol is more effective for wireless mobile
ad-hoc network in mesh configuration.
THROUGHOUT
P
A
C
K
E
T
S
B. Effect of varying data Flows
FEBA
D
E 0.5
L
A 0.4
Y
PBRP
(s 0.3
) 0.2
FEBA
0.1
8000
DATA FLOWS
0
2
6000
4
6
8
10
PBRP
4000
Fig.5.4 Flow Vs Delay
FEBA
2000
Fig. 5.4 shows the end-to-end delay values when the
number of flow is increased. It is clear that PBRP has less
delay when compared to FEBA algorithm. Here the delay is
taken in second and data flow rate in MBPS.
0
10
20
30
40
50
NO. OF NODES
Fig.5.2 no of nodes Vs Throughput
THROUGHOUT
Fig.5.2 shows the throughput values when the number of
nodes is increased. From the figures, it can be seen that the
throughput is more in the case of PBRP and outperforms the
FEBA algorithm in mesh configuration of wireless mobile adhoc networks. Since the connection in wireless mobile ad-hoc
network is unpredictable, the bandwidth utilization protocols
save the bandwidth and reduce the delay in packet delivery.
7000
P 6000
A 5000
C
4000
K
E 3000
T 2000
S 1000
PBRP
FEBA
0
BANDWIDTH
2
BANDWIDTH
UTILISATION
UTILISATION
1.4
4
6
8
10
DATA FLOWS
1.2
Fig.5.5 Flow Vs Throughput
1
0.8
PBRP
0.6
FEBA
0.4
0.2
0
10
20
30
40
NO. OF NODES
50
Fig. 5.5 shows the throughput values when the number of
data flow rates are increased. From the figures, it can be seen
that the throughput is more in the case of PBRP and
outperforms the FEBA algorithm. Overall, the use of
bandwidth utilization protocol improves the quality of service
parameters.
Fig.5.3 no of nodes Vs Bandwidth Utilization
ISSN: 2231-5381
http://www.ijettjournal.org
Page 492
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
BANDWIDTH
THROUGHPUT VS
MOBILITY
BANDWIDTH UTILISATION
0.6
0.5
6000
0.4
0.3
PBRP
0.2
FEBA
4000
THROUG
HPUT VS
MOBILITY
2000
0.1
0
0
2
4
6
8
DATA FLOWS
10 30 50 70
10
Fig.5.6 Flow Vs Bandwidth Utilization
Fig5.8 Throughput Vs Mobility Values
Figure.5.6 shows the bandwidth utilization obtained,
when the number of flows are increased. It shows that PBRP
utilizes more bandwidth than the FEBA algorithm.
Seeing above graph, it is observed that mobility of nodes is
directly proportional to throughput, as here the value of
throughput goes on increasing when mobility(m/s) increased
from 10 to 70.
As the analysis shows that the PBRP algorithm outperforms
the FEBA algorithm, hence all the following has been done by
using FBRP algorithm.
PACKET DELIVERY
RATIO VS NODES
1
The performance of ODMRP is investigated and analyzed
based on the results obtained from the simulation. A number
of experiments are performed to explore the performance of
these protocol with respect to a number of parameters such as
traffic load, mobility speed and node placement. Taking CBR
as traffic model and uniform placement model the values of
Throughput,Packet delivery ratio,End to End delay with
respect to No of nodes and Mobility of nodes have been
observed.
PACKET
DELIVER
Y RATIO
VS…
0.5
0
15
30
45
60
Fig5.9 Packet Delivery Ratio Vs No Of Nodes
THROUGHPUT VS NODES
5000
4000
3000
THROUGH
PUT VS
NODES
2000
1000
PDR value increases at very fast rate as the no of nodes
changes from 15 to 30, after that the value of PDR increases at
constant rate. Analysis is done when nodes vary from
15,30,45,60.
END TO END DELAY VS
NODES
0.08
0.06
0
END TO
END
DELAY VS
NODES
0.04
15 30 45 60
0.02
Fig5.7 Throughput(Bits/S) Vs Nodes Values
It is observed that on increasing the nodes from 15 to 30
throuput slides down but after that when nodes are increased
in numbers throughput also increases.
ISSN: 2231-5381
0
15 30 45 60
Fig5.10 End To End Delay Vs No. Of Nodes
End to end delay in uniform model increases with the no. of
nodes. It is observed that the variation of end to end delay
with the nodes variation is very large.
http://www.ijettjournal.org
Page 493
International Journal of Engineering Trends and Technology (IJETT) – Volume 12 Number 10 - Jun 2014
PACKET DELIVERY
RATIO VS MOBILITY
access. Simulation results show that ODMRP is effective and
efficient in dynamic environments and scales well to a large
number of multicast members.
1
References
PACKET
DELIVERY
RATIO VS
MOBILITY
0.5
0
10
30
50
70
[1]
[2]
[3]
Fig5.11 Packet Delivery Ratio Vs Mobility
It shows that the packet delivery ratio value is improved as the
mobility of the node is increased. This factor is benificial for
any Adhoc network.
END TO END DELAY VS
MOBILITY
0.04
END TO
END
DELAY VS
MOBILITY
0.02
0
10
30
50
70
FIG5.12 END TO END DELAY VS MOBILITY(M/S)
This factor also shows benificiary to any Adhoc network as
the mobility is varied from 10 to 30. The end to end delay
value slumps abruptly but decreases furthur at constant rate.
VI. CONCLUTION
Least available bandwidth and end-to-end latency along
with congestion around a link are integrated in a QoS-based
routing metric for mobile ad-hoc networks. By simulation
results, it is shown that the proposed method achieves high
bandwidth utilization and throughput with reduced delay,
when compared with existing technique. Our results states that
on increasing the no of nodes in the network leads to
congestion which further degrades the performance of the ad
hoc network. For better performance a trade off is made
between different parameters.
To this end, we conducted extensive simulations employing a
wide range of mobility models and traffic load conditions. We
also compared the performance of this protocol with different
node placement strategies and node speed variations.
Topology, number of network nodes and node mobility are
important parameters that can significantly affect the
performance of the protocols being evaluated. Simulation
results showed that more data packets were delivered to
destinations, less control packets were produced in low
mobility, control packets were utilized more efficiently in
high mobility, and end-to-end delay was shorter. The ODMRP
was scalable, robust to host mobility, and efficient in channel
ISSN: 2231-5381
[4]
[5]
[6]
Letor, Blondia, Bouckaert, Moerman and Demeester, "A cluster driven
channel assignment mechanism for wireless mesh networks", 5th IEEE
International conference on Mobile Ad Hoc and Sensor Systems,
Oct.2008
Bo Wang and Matt Mutka, “QoS-aware fair rate allocation in wireless
mesh networks”, Elsevier, Computer Communications 31, 2008
Gahng-Seop Ahn, Andrew T. Campbell, Andras Veres and Li-Hsiang
Sun, “SWAN: Service Differentiation in Stateless Wireless Ad Hoc
Networks”, In the Proceedings of the 21st Annual Joint Conference of
the IEEE Computer and Communications Societies, INFOCOM 2002.
Ho Ting Cheng and Weihua Zhuang, “Joint Power-Frequency-Time
Resource Allocation in Clustered Wireless Mesh Networks”, IEEE
Network, vol. 22, no. 1, pp. 45-51, Jan/Feb 2008.
Ho Ting Cheng and Weihua Zhuang, “Novel Packet-Level Resource
Allocation with Effective QoS Provisioning for Wireless Mesh
Networks”, IEEE Transactions on Wireless Communications, Vol. 8,
No. 2, February 2009
Andre Herms and Georg Lukas, “Preventing Admission Failures of
Bandwidth Reservation in Wireless Mesh Networks”, IEEE/ACS
International Conference on Computer Systems and Applications, 2008
[7]. Vijay Devarapalli, Deepinder Sidhu “MZR: A Multicast Protocol
for Mobile Ad Hoc Networks”, 0-7803-7097-1/01/$10.00 2001 IEEE.
[8] Hasnaa MOUSTAFA and Houda LABIOD “A Performance
Comparison of Multicast Routing Protocols In Ad hoc Networks” The
14m IEEE 2003 International Symposium on Persona1, lndoor and
Mobile Radio Communication Proceedings, 0-7803-7822-9/03/$17.00@
2003 IEEE.
[9] Hasnaa Moustafa and Houda Labiod, “A Performance Analysis of
Source Routing-based Multicast Protocol (SRMP) Using Different
Mobility Models”, CNRS. 0-7803-8533-0/04/$20.00 (c) 2004 IEEE.
[10]Ahmed Sobeih, Hoda Baraka, Aly Fahmy, “On the Reliability of
ODMRP in Mobile Ad Hoc Networks” 0-7803-8396-6/041$20.00 ©
2004 IEEE.
[11] Jorjeta G. Jetcheva and David B. Johnson, December 15, 2004,
CMU-CS-04-176, “A Performance Comparison of On-Demand Multicast
Routing Protocols for Ad Hoc Networks” This work was supported in
part by NASA under grant NAG3-2534 at Rice University; by NSF under
grants CNS-0209204, CNS-0325971, CNS-0338856, and CNS-0435425
at Rice University; by a gift from Schlumberger to Rice University; and
by the Air Force Materiel Command (AFMC) under DARPA contract
number F19628-96-C-0061 at Carnegie Mellon University.
[12] Dan Li, Jianping Wu, Ke Xu, Xiaoping Zhang, Yong Cui1, Ying Liu,
“Performance Analysis of Multicast Routing Protocol PIM-SM” 0-76952388-9/05 $20.00 © 2005 IEEE
[13] K.valarmathiand N. Malmurugan, “A priority Based Bandwidth
Reservation Protocol for Wireless Mesh Networks”, in the proceeding of
international journal of computer science issue Vol.9, issue-1, No.-1, January,
2012, Page No. 90-95.
[14] Tiong Sieh Kiong, Zeti Akma, Loo Hooi KAR, poh Tzye Perng,
“Propagation Loss models characterization for GSM 900MHz at Kaula
Lumpur and putrajaya”, College of Engineering, Universiti Tenaga
Malaysia
[15] Theodore S. Rappaport, “Wireless Communication System: Principles
and Practice”, Second Edition, Prentice Hall of India Private Limited,
2005.
[16] V.S Abhayawardhana, I.J Wassell, D. Crosby,M.P. Sellars,M.G. Brown
“Comparison of Empirical propagation path Loss Models for Fixed
Wireless Access Systems”, BT Mobility Research Unit, U.K.,
University of Cambridge.
[17] Nagendra Sah, Neelam Rup Prakash and Deepak Bagai, “Performance
Evaluation and Optimization of ODMRP Routing Protocols over 802.11
Based Wireless Mobile Ad-hoc Network” in the international journal of
computer science and technology(IJCST),Vol.3, issue 4, October-December,
2012, ISSN-2229-4333, PAGE NO.643-646.
http://www.ijettjournal.org
Page 494
Download