Analysis of AOMDV and OLSR Routing Protocols Under Levy-Walk Mobility Model and Gauss-Markov Mobility Model for Ad Hoc Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
In this paper we have compared AOMDV and OLSR routing protocol using Levy-Walk Mobility Model and Gauss-Markov Mobility Model. OLSR is a proactive, table-driven, link state routing protocol while AOMDV is a reactive routing protocol. Besides eyeing the details of comparing a proactive routing protocol with reactive routing protocol we try to address the circumstantial effect of these mobility models on the routing protocols. Mobility models should symbolize the precise movement of nodes. A thorough investigation of these routing protocols over mobility models which reflect real world scenarios are very important as it affects the overall performance of the network. Part of the results obtained in this paper is in conjugation with [20] thus providing a thorough reference for other research works. Various metrics like packet delivery ratio, average network delay, network hroughput, routing overhead and average energy onsumption have been considered by varying the mobility speed and the traffic load in the network. Under traffic load scenario the esults obtained for AOMDV and OLSR routing protocols contradicted each other for Levy-Walk and Gauss-Markov Mobility Models. But the same could not be said for the two routing protocols when compared under varying mobile speed. We also claim that our paper is the first to compare these two routing protocols with Levy-Walk and Gauss-Markov as the underlying Mobility odels.
Authors and Affiliations
Gowrishankar. S, , SubirKumarSarkar , T. G. Basavaraju
Trust Worthy Architecture Implementation for Mobile Ad hoc Networks
A mobile ad hoc network is a wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. The wireless and distributed nature of mobile ad hoc networks poses greater...
Secure Web Service Using Call by Contract
A methodology for designing and composing services in a ecure manner. In particular, it’s concerned with safety roperties of service behavior. Services can enforce security olicies locally and can invoke other service...
Iris Recognition Based On Its Texture Patterns
A biometric system uniquely identifies and authenticates humans based on their physical or behavioural features. Iris recognition is one of the most reliable methods of biometric authentication that recognizes a person b...
Source Feature Based Gender Identification System Using GMM
In this paper, through different experimental studies it is demonstrated that the excitation component of speech can be exploited for text independent gender identification system. Linear prediction (LP) residual is used...
Mobile Wireless Enhanced Routing Protocol in Adhoc Networks
Adhoc network consists of peer-to-peer communicating nodes that are highly mobile. As such, an ad-hoc network lacks nfrastructure and the topology of the network changes ynamically. The task of routing data from a source...