Department Of Computer Science And Technology

Permanent URI for this communityhttps://kr.cup.edu.in/handle/32116/79

Browse

Search Results

Now showing 1 - 6 of 6
  • Thumbnail Image
    Item
    A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model
    (IJRET, 2014) Kaur, Amandeep; Mittal, Meenakshi
    Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified into two categories: Infrastructure based and Infrastructure less. Mobile ad hoc networks (MANET) fall under infrastructureless category in which nodes are able to move thereby making the topology of the network highly dynamic. Due to the dynamically changing topology, efficient routing mechanisms needed to be developed, which led to the foundations of various mobile ad hoc routing protocols. There are a number of mobile ad hoc routing protocols proposed to serve different purposes like security and transmission efficiency. These protocols are divided into two categories: Table based and Demand based. Through this work, table based traditional routing protocol DSDV and demand based routing protocol AODV have been assessed through simulation using Manhattan Grid mobility model. Comprehensive analysis was carried out to analyze which protocol performs better in the assumed scenarios. The performance metrics evaluated for the two protocols are Throughput, Average End to End delay, Routing Overhead and Packet Delivery Ratio
  • Thumbnail Image
    Item
    Performance evaluation of manet routing protocols dsdv, tora enhanced tora
    (Central University of Punjab, 2014) Kaur, Amandeep; Meenakshi
    Wireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access and share a wide pool of resources and information across the globe. Mobile ad hoc networks (MANETs) are a kind of infrastructure less wireless networks in which all the nodes act as peers and themselves configure the network. Mobile ad hoc networks are an open area of research because of its applicability in a number of areas like tactical networks, emergency services and education. One of the major challenges in networking is the efficient, accurate, reliable, secure and immediate delivery of data from source to destination. Therefore, the efficient routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been developed to send data efficiently across mobile ad hoc networks. These protocols have been divided into three categories- Proactive, Reactive and Hybrid. The performance evaluation of these protocols has been going on since a long time. Most of the current research focuses on the pause times, simulation times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models and traffic patterns. This dissertation work is focused on the improvement of the poor performance of TORA with the rise in number of traffic connections. This behavior has been credited to the link sensing mechanism of Internet MANET Encapsulation protocol (IMEP). IMEP is a multi-purpose network-layer protocol that supports the operation of many routing protocols including TORA. It provides mechanism for sensing the status of links in TORA. This link sensing mechanism has been investigated and proposed modification by K. H. Lim and A. Datta has been implemented to observe improvement in the overall performance of Enhanced-TORA protocol in comparison with original TORA. iv Through this research, investigations have been made into the behavior of DSDV, and TORA mobile ad hoc routing protocols by varying the underlying mobility models (Random Waypoint, Random Direction and Manhattan Grid model) and Traffic patterns (FTP, TELNET, HTTP). The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead, Packet Delivery Ratio and Packet Loss. This research draws an analysis whether under which mobility model and traffic pattern combination these protocols give the best performance. Results show that DSDV gives best performance under Manhattan Grid Mobility model and FTP traffic pattern. Whereas, TORA and Enhanced-TORA give best performance under Random Direction Mobility model and FTP traffic. The performance of Enhanced-TORA is then compared with original TORA using 10 traffic connections under Random Direction mobility model and FTP Traffic and it was observed that Enhanced-TORA outperformed original TORA thereby eliminating the problem of performance degradation with rise in number of connections
  • Thumbnail Image
    Item
    Security in AODV protocol using and hybrid cryptography
    (Central University of Punjab, 2014) Singh, Khushmeet; Kaur, Amanpreet
    A mobile Ad hoc network (MANET) is a wireless decentralized self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. These unique features (self-configuring, infrastructure-less, decentralized) make MANET suitable for use in emergency situations, military operations, education, entertainment, sensor networks etc. Besides the various advantages, the open medium, rapidly changing topology and lack of centralized monitoring make MANETs vulnerable to various attacks. This dissertation work focuses on network layer attacks. Network layer attacks in MANET are categorized into two basic types namely active and passive. In active attack, an attacker disrupts the regular operation of the network, change the data or harm the system. In passive attack, the attacker does not disturb the operation of network but attempts to seek some valuable information. So, it is vital to develop some security mechanism to protect MANETs from attacks. This dissertation work focuses on providing solution to prevent MANETs from two active attacks namely Blackhole and Malicious Packet Dropping and one passive attack namely Eavesdroping attack. The existing AODV Protocol is modified to prevent these attacks. Solution is proposed and simulated to prevent Blackhole and Eavesdropping attack. Malicious packet dropping attack is prevented by using Watchdog Intrusion Detection System (IDS). Performance of AODV and Modified AODV protocol is analysed with respect to Packet Delivery Ratio, Average End-to-End Delay and Routing Overhead. To prevent Eavesdropping attack, a hybrid cryptography technique has been developed which combines best features of both symmetric key cryptography and asymmetric key cryptography i.e. speed and security. Simulation has been done in Network Simulator version 2.35.
  • Thumbnail Image
    Item
    Performance evaluation of AODV based congestion control protocols in manet
    (Central University of Punjab, 2014) Bhatia, Bandana; Sood, Neha
    The network in which the users communicate with each other by forming a temporary network without any centralized administration is known as ad hoc network. Every node in ad hoc network acts both as a host as well as a router. The topology of these networks is highly deployable, dynamic and self-configurable. Because of the dynamic topology of Mobile Ad hoc Networks (MANETs), routing is an extremely challenging task in them. For ensuring reliable and efficient routing in MANETs, different routing protocols are defined. These routing protocols may follow proactive, reactive or hybrid approach. As many number of mobile nodes are transmitting the packets over the network, the chances of losing the packets over the network increases to a great extent due to link failures or may be due to congestion over the network because of large traffic flowing over the network. Also, when the size of data packets increases, it may lead to the congestion over the network which ultimately leads to the loss of packets. The existing routing protocols for MANETs do not support congestion control as they are not congestion adaptive. Many authors have proposed protocols based on Ad hoc On demand Distance Vector Routing Protocol (AODV) which are congestion adaptive and deal with the congestion over the network. This dissertation work discusses the congestion control protocols in MANETs and focuses on two congestion control protocols, AODV-I and EDAODV. Simulation results are gathered for AODV, AODV-I and EDAODV by varying the number of nodes and size of the data packets for four performance metrics, namely, routing overhead, throughput, end- to-end delay and packet delivery ratio (PDR).
  • Thumbnail Image
    Item
    Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models
    (Institute of Electrical and Electronics Engineers Inc., 2015) Kaur, Amandeep; Mittal, Meenakshi
    The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead. ? 2014 IEEE.
  • Item
    Analysis of MAODV MANET routing protocol on different mobility models
    (Institute of Electrical and Electronics Engineers Inc., 2018) Kaur, N.
    MANET is an infrastructure less network. It has various applications in fields like military, commercial sector, local level, etc. MANET is easy to setup, configure and build. Due to infrastructure less network, MANET relies on the cooperation of nodes for communication. In MANET, communication between the nodes is possible with the help of protocols which are categorized into three types like reactive, proactive and hybrid. In the reactive category of protocol, a path is established at the real time. In the proactive category, protocols have predefined routing tables for each node. The hybrid category is the combination of both these categories. Modified Ad-hoc On-Demand Distance Vector (MAODV) is the reactive protocol which defines all possible routes among source node and the destination node which are maintained during data transmission. In the case of a disappointment of definite route, the data packets are transferred through secondary routes which were established with the help of routing tables that stores the multiple route paths to the destination. In the real world, nodes in MANET are allowed to transfer in any direction. Thus movement models like Random Way Point (RWP), Random Walk (RW), Random Direction (RD) and Gauss-Markov (GM) are taken as they have different mobility patterns. Therefore, M-AODV is implemented over different mobility models to compute parameters like End to End Delay (E2E Delay), Average Hop Count (AHC), and Throughput. ? 2017 IEEE.