A Competitive Performance Analysis of Proactive Routing Protocols of MANET Under Short Time Communication Scenario

  • A. P. Janani
  • M. Sakthivel
  • K. Baskaran
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 221)


The performance of proactive routing protocols in a highly Mobile Ad hoc NETwork (MANET) is questionable due to the resulting link failures caused by the high mobility. Since the routing protocols require a certain time to achieve stable performance due to the periodic route discovery and maintenance mechanisms, it is not suitable to use them in a communication scenario such as a very short time military rescue operation that may end in seconds. Here the routing protocol should provide better performance from the very starting instance of the operation. In this work, proactive protocols DSDV and OLSR are evaluated and their behaviour is studied while using TCP and UDP traffic under short term communication scenario in a typical, small mobile ad hoc network.


DSDV OLSR MANET proactive routing protocols Performance analysis TCP UDP 


  1. 1.
    Perkins CE, Bhagwat P (1994) Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. In: Proceeding of the ACM special interest group on data communications, London, vol 24, pp 234–244Google Scholar
  2. 2.
    Clausen T, Jacquet P (2003) Optimized link state routing protocol (OLSR). RFC 3626, IETF Network Working Group. (online) Available from Accessed 20 Dec 2011
  3. 3.
    Rahman A, Islam S, Talevski A (2009) Performance measurement of various routing protocol in ad-hoc network. In: International MultiConference of engineers and computer scientists, vol 1, pp 321–323Google Scholar
  4. 4.
    Boukerche A (2001) Performance comparison and analysis of ad hoc routing algorithms. In: Proceeding of IEEE international conference on performance, computing and communications, pp 171–178Google Scholar
  5. 5.
    Das SR, Perkins CE, Royer EE (2000) Performance comparison of two demand routing protocols for ad hoc networks. In: Proceeding of IEEE INFOCOM, pp 3–12Google Scholar
  6. 6.
    Giannoulis S et al (2007) ZRP versus DSR and TORA: a comprehensive survey on ZRP performance. IEEE Trans Ind Inf 3(1): 63–72Google Scholar
  7. 7.
    Usop NSM et al (2009) Performance evaluation of AODV, DSDV and DSR routing protocol in grid environment. Int J Comput Sci Network Secur 9(7): 261–268Google Scholar
  8. 8.
    Gowrishankar S et al (2008) Theoretical analysis and overhead control mechanisms in MANET: a survey. In: Proceeding of the world congress on engineering London, UK, vol 1, pp 204–210Google Scholar
  9. 9.
    Van Der Merwe J, Dawoud D, McDonald S (2007) A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comput Survey 39(1). doi:  10.1145/1216370.1216371
  10. 10.
    Liang Y, Poor H, Ying L (2009) Secrecy throughput of manets with malicious nodes. In: International symposium information theory, pp 1189–1193Google Scholar
  11. 11.
    Kant L et al (2008) Network science based approaches to design and analyze MANETS for military applications. IEEE Commun Mag 46(11): 56–61Google Scholar
  12. 12.
    Yavuz AA, Alag oz F, Anarim E (2010) A new multi-tier adaptive military manet security protocol using hybrid cryptography and signcryption. Turkish J Electr Eng Comput Sci 18: 1–22Google Scholar
  13. 13.
    Ns-2 network simulator (2012) Available from Accessed 5 Jan 2012
  14. 14.
    Singh R et al (2011) Performance evaluation of ACO based on demand routing algorithm for mobile ad hoc networks. Int J Eng Sci Technol 3(3): 1809–1815Google Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  1. 1.Department of Information TechnologySri Subramanya College of Engineering and TechnologyPalaniIndia
  2. 2.Department of Mechanical EngineeringAnna University of TechnologyCoimbatoreIndia
  3. 3.Department of Computer Science and EngineeringGovernment College of TechnologyCoimbatoreIndia

Personalised recommendations