Simulation Technique of Steady-State Network based on AODV Routing Protocol

  • Authors

    • Kolade T. Ayanwuyi
    • Megat F. Zuhairi
    • C. L. Zheng
    • Irma S.C Alias
    2018-11-26
    https://doi.org/10.14419/ijet.v7i4.29.21959
  • AODV, MANET, NS-2 simulator, Routing Protocol, Wireless network.
  • Wireless network refers to any characteristic of a computer network that does not depend on line connectors or physical connections. One of the outstanding characteristic of wireless Mobile Ad hoc Network (MANET) that is significantly different compared to the traditional wired networks is mobility. A user i.e. typically represented by a mobile station or nodes can freely move, whilst being connected to the network. Generally, MANET is a collection of wireless mobile nodes that possess the ability to intercommunicate with one another without any predefined infrastructure or centralized administration support [1]. They are self-organized, autonomous and decentralized multi-hop wireless system of mobile nodes [2]. As such, a reliable MANET routing protocol is needed to enable data to be propagated multi-hops. An example of such routing protocol is Ad hoc On Demand Distance Vector (AODV). Using AODV as the basis of this work, this research paper discusses the best approach to conduct simulation experiment particularly for discrete-event based simulator such as Network Simulator. The underlying principle in MANET simulation is to ensure results are as credible to the empirical experiment. Therefore, iteration of experiment is essential to determine the final result. Much research work also fails to identify the existence of transient phase in simulation work. Failure to address the issue may cause inconsistent result. In addition, a validation methodology based on comparison method is also presented. Although such technique is fairly common, it is one of the most effective method to assess the reliability of the simulation tool.

  • References

    1. [1] K. S. Patel and J. Shah, “Study the Effect of Packet Drop Attack in AODV Routing and MANET and Detection of Such Node in MANET†in Proceedings of International Conference on ICT for Sustainable Development, 2016, pp. 135-142.

      [2] C. Singh, “A Review: Comparative Study of Routing Protocols for Ad hoc Networks†International Journal of Advance Research in Computer and Communication Engineering–IJARCCE, vol. 4, 2015.

      [3] A. Ahmed, et al., “AODV Routing Protocol Working Process†Journal of Convergence Information Technology, vol. 10, p. 1, 2015.

      [4] P. Mitra and S. Mukherjee, “A review of trust based secure routing protocols in MANETs†in Computing and Communication (IEMCON), 2015 International Conference and Workshop on, 2015, pp. 1-7.

      [5] G. He, “Destination-sequenced distance vector (DSDV) protocol†Networking Laboratory, Helsinki University of Technology, pp. 1-9, 2002.

      [6] H. L. Bin Deng, Minghua Zheng, “Overview of QoS Routingâ€, Virginia Tech2003.

      [7] M. A. Bonuccelli, et al., “Real-time video transmission in vehicular networks†in 2007 Mobile Networking for Vehicular Environments, 2007, pp. 115-120.

      [8] P. Ghosekar, et al., “Mobile ad hoc networking: imperatives and challengesâ€, IJCA Special Issue on MANETs, vol. 3, pp. 153-158, 2010.

      [9] M. Chitkara and M. W. Ahmad, “Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols†International Journal of Computer Science and Mobile Computing, 3 (2), pp. 432-437, 2014.

      [10] J. Loo, et al., “Mobile ad hoc networks: current status and future trendsâ€, CRC Press, 2016.

      [11] P. Gupta, “A Literature Survey of MANET†2016.

      [12] C. Perkins, et al., “Ad hoc on-demand distance vector (AODV) routing†2070-1721, 2003.

      [13] I. D. Chakeres and C. E. Perkins, “Dynamic MANET on-demand routing protocol†IETF Internet Draft, draft-ietf-manet-dymo-12. txt2008.

      [14] P. Sharma, et al., “Routing in Mobile Ad hoc Networksâ€, Expansion, Impact and Challenges of IT & CS, p. 113, 2015.

      [15] Lokhande S.N. and Dr. khamitkar S.D, “Design and Simulation of Wireless Ad Hoc Network Using NS2 Simulator†International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 9, Issue 12 (February 2014), PP. 30-33.

      [16] “OTcl-Object Tcl Extensionsâ€, http://bmrc.berkeley.edu/research/cmt/cmtdoc/otcl

      [17] T. Wu, “Design of Implicit Routing Protocols for Large Scale Mobile Wireless Sensor Networksâ€, PhD Thesis, Univ. of Strathclyde, April 2011.

      [18] S. Kurkowski, T. Camp, M. Colagrosso, “MANET Simulation Studies: The Incrediblesâ€, Special Issue on Medium Access and Call Admission Control Algorithms for Next Generation Wireless Networks: Mobile Computing and Communications Review, 2005.

      [19] “The CMU Monarch Project's Wireless and Mobility Extensions to NSâ€, August 1998, http://www.monarch.cs.rice.edu/cmu-ns.html

      [20] “NS-2 (The Network Simulator 2)â€, http://www.isi.edu/nsnam/ns/

      [21] “GloMoSim (Global Mobile Information Systems Simulation Library)â€, http://pcl.cs.ucla.edu/projects/glomosim/

      [22] “QualNet, Scalable Network Technologiesâ€, http://www.scalable networks.com/

      [23] “OPNET (Optimized Network Engineering Tool)â€, http://www.opnet.com/

      [24] “OMNeT++ (Objective Modular Network Testbed in C++) Community Siteâ€, http://www.omnetpp.org

      [25] M. Halvardsson, P. Lindberg, “Reliable Group Communication in Military Ad hoc Networkâ€, Technical Report, 2004.

      [26] L. Begg, W. Liu, K. Pawlikowski, S. Perera, H. Sirisena, “Survey of Simulators of Next Generation Networks for Studying Service Availability and Resilienceâ€, Technical Report , University of Canterbury, New Zealand, February 2006.

      [27] R. Yang, Z.Y. Li, “A Stablity Routing Protocols Base on Reverse AODV,†International Conference on Computer Science and Network Technology, Harbin, China, December 2011, pp. 2419-2423.

      [28] I. Glover; P. Grant, Digital Communications 2/e, Pearson Education Ltd., 2004.

      [29] “Cisco Aironet 350 Client Adapterâ€, http://www.cisco.com/

      [30] B. Tuch, “Development of WaveLAN, an ISM Band Wireless LANâ€, AT&T Technical Journal, 1993, pp. 27–33.

      [31] W. D. Kelton, “Simulation Analysisâ€, Conference on Winter Simulation, Berlin, Germany, December 1983.

      [32] D. Goldsman, G. Tokol, “Output Analysis Procedure for Computer Simulationsâ€, Winter Simulation Conference, Orlando, USA, December 2000, pp. 39-45.

      [33] M.K. Nakayama, “Statistical Analysis of Simulation Outputâ€, Winter Simulation Conference, December 2008, pp. 62–72.

      [34] R. Jain, “The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modellingâ€, Wiley- Interscience, April 1991.

      [35] R. Sargent, “Verification and Validation of Simulation Modelsâ€, Proceedings of the Winter Simulation Conference, Phoenix, USA, December 2011, pp. 183-198.

      [36] M. Marina, S. Das, “Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networksâ€, International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, June 2002.

      [37] J. Broch, D.A. Maltz, D.B. Johnson, Y. Hu, J. Jetcheva, “A Performance Comparison of Multi-hop Wireless Ad hoc Network Routing Protocolsâ€, ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, USA, October 1998, pp. 85–97.

      [38] C. Perkins, M. Royer, S. Das, M. Marina, “Performance Comparison of Two On-demand Routing Protocols for Ad hoc Networksâ€, IEEE Personal Communications, February 2001, pp. 16-28.

  • Downloads

  • How to Cite

    Ayanwuyi, K. T., Zuhairi, M. F., Zheng, C. L., & Alias, I. S. (2018). Simulation Technique of Steady-State Network based on AODV Routing Protocol. International Journal of Engineering & Technology, 7(4.29), 140-147. https://doi.org/10.14419/ijet.v7i4.29.21959