Abstract
The performance of proactive routing protocols in a highly Mobile Ad hoc NETwork (MANET) is questionable due to the resulting link failures caused by the high mobility. Since the routing protocols require a certain time to achieve stable performance due to the periodic route discovery and maintenance mechanisms, it is not suitable to use them in a communication scenario such as a very short time military rescue operation that may end in seconds. Here the routing protocol should provide better performance from the very starting instance of the operation. In this work, proactive protocols DSDV and OLSR are evaluated and their behaviour is studied while using TCP and UDP traffic under short term communication scenario in a typical, small mobile ad hoc network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perkins CE, Bhagwat P (1994) Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. In: Proceeding of the ACM special interest group on data communications, London, vol 24, pp 234–244
Clausen T, Jacquet P (2003) Optimized link state routing protocol (OLSR). RFC 3626, IETF Network Working Group. (online) Available from http://www.ietf.org/rfc/rfc3626.txt. Accessed 20 Dec 2011
Rahman A, Islam S, Talevski A (2009) Performance measurement of various routing protocol in ad-hoc network. In: International MultiConference of engineers and computer scientists, vol 1, pp 321–323
Boukerche A (2001) Performance comparison and analysis of ad hoc routing algorithms. In: Proceeding of IEEE international conference on performance, computing and communications, pp 171–178
Das SR, Perkins CE, Royer EE (2000) Performance comparison of two demand routing protocols for ad hoc networks. In: Proceeding of IEEE INFOCOM, pp 3–12
Giannoulis S et al (2007) ZRP versus DSR and TORA: a comprehensive survey on ZRP performance. IEEE Trans Ind Inf 3(1): 63–72
Usop NSM et al (2009) Performance evaluation of AODV, DSDV and DSR routing protocol in grid environment. Int J Comput Sci Network Secur 9(7): 261–268
Gowrishankar S et al (2008) Theoretical analysis and overhead control mechanisms in MANET: a survey. In: Proceeding of the world congress on engineering London, UK, vol 1, pp 204–210
Van Der Merwe J, Dawoud D, McDonald S (2007) A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comput Survey 39(1). doi: 10.1145/1216370.1216371
Liang Y, Poor H, Ying L (2009) Secrecy throughput of manets with malicious nodes. In: International symposium information theory, pp 1189–1193
Kant L et al (2008) Network science based approaches to design and analyze MANETS for military applications. IEEE Commun Mag 46(11): 56–61
Yavuz AA, Alag oz F, Anarim E (2010) A new multi-tier adaptive military manet security protocol using hybrid cryptography and signcryption. Turkish J Electr Eng Comput Sci 18: 1–22
Ns-2 network simulator (2012) Available from http://www.isi.edu/nsnam/ns/. Accessed 5 Jan 2012
Singh R et al (2011) Performance evaluation of ACO based on demand routing algorithm for mobile ad hoc networks. Int J Eng Sci Technol 3(3): 1809–1815
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Janani, A.P., Sakthivel, M., Baskaran, K. (2013). A Competitive Performance Analysis of Proactive Routing Protocols of MANET Under Short Time Communication Scenario. In: S, M., Kumar, S. (eds) Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012). Lecture Notes in Electrical Engineering, vol 221. Springer, India. https://doi.org/10.1007/978-81-322-0997-3_14
Download citation
DOI: https://doi.org/10.1007/978-81-322-0997-3_14
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-0996-6
Online ISBN: 978-81-322-0997-3
eBook Packages: EngineeringEngineering (R0)