Simulation-based Evaluation of Mobile Ad Hoc Network Routing Protocols: Ad hoc On-Demand Distance Vector, Fisheye State Routing, and Zone Routing Protocol
Mobile ad hoc network (MANET) is an infrastructure-less and decentralized network without any physical connections. Nodes are mobile, free to move, and independent of each other which makes routing a difficult task. Hence, a dynamic routing protocol is needed to make MANET reliable and function properly. Several routing protocols have been proposed with different working mechanisms and performance levels. Therefore, the performance study of those protocols is needed. This paper evaluates the performance of MANET routing protocols using simulation based experiments to observe the behavior of the network as the density of the nodes increases. The paper evaluates the performance of proactive (fisheye state routing), reactive (ad hoc on-demand distance vector), and hybrid (zone routing protocol) routing protocols in terms of the packet delivery fraction, average throughput, and average end-to-end delay. The simulations of protocols to analyze their performance in different conditions were performed using the network simulator 2 (NS 2).
N. Sze-Yao, T. Yu-Chee, C. Yuh-Shyan and S. Jang-Ping. “The Broadcast Storm Problem in a Mobile Ad Hoc Network”. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking. ACM, 1999.
S. T. Mohamad and K. N. Yasen. “Homomorphic encryption implementation to ensure data security in cloud computing.” Journal of Theoretical and Applied Information Technology, vol. 96, no. 7, pp. 1826-1836, 2018.
K. Young-Bae and N. H. Vaidya. “Location-aided routing (LAR) in mobile ad hoc networks.” Wireless Networks vol. 6, no. 4, pp. 307-321, 2000.
U. Muhammad, M.A. Jan, X. He and P. Nanda. “QASEC: A secured data communication scheme for mobile Ad-hoc networks”. Future Generation Computer Systems, vol. 93, pp. 737-750, 2018.
A. Mehran, T. Wysocki and E. Dutkiewicz. “A review of routing protocols for mobile ad hoc networks.” Ad Hoc Networks, vol. 2, no. 1, 1-22, 2004.
R. Stefano, K. Krużelecki, G. Heitz, D. Floreano and B. Rimoldi. “Dynamic routing for flying ad hoc networks.” IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1690-1700, 2016.
H. Alex, M. Ngulube, S. Zhu and H. Al-Aqrab. “A review of routing protocols for mobile ad-hoc networks (manet)”. International Journal of Information and Education Technology, vol. 3, no. 1, p. 1, 2013.
M. Shima, R. Hassan, A. Patel and R. Razal. “Comparative Review Study of Reactive and Proactive Routing Protocols in MANETs”. 4th IEEE International Conference on Digital Ecosystems and Technologies, 2010.
P. Guangyu, M. Gerla and T.W. Chen. “Fisheye State Routing: A Routing Scheme for ad Hoc Wireless Networks.” Vol. 1. 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record, 2000.
P. Charles, E. Belding-Royer and S. Das. “Ad Hoc on-demand Distance Vector (AODV) Routing”. No. RFC 3561. Document, 2003.
G. Prakhar, P. Gole, P. Varshney and N. Tyagi. “Reliability factor based AODV protocol: Prevention of black hole attack in MANET”. Smart Innovations in Communication and Computational Sciences. Singapore: Springer, 2019, pp. 271-279.
S. A. Rashid, M. S. Alkatheiri, S. Anamalamudi and J. Liu. “Cognitive AODV routing protocol with novel channel-route failure detection”. Multimedia Tools and Applications, vol. 2019, pp. 1-18, 2019.
B. M. Lubdha, R. L. Jain and G. D. Patil. “Study of various routing protocols in mobile ad-hoc networks”. International Journal of Scientific Research in Network Security and Communication, vol. 6, no. 1, pp. 1-5, 2018.
Y. Xueqin, Q. Chen, C. Chen and J. Zhao. “Improved ZRP routing protocol based on clustering”. Procedia Computer Science, vol. 131, pp. 992-1000, 2018.
H. J. Zygmunt, M. R. Pearlman and P. Samar. “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”. Working Group, 2002.
B. Christian, G. Resta and P. Santi. “The node distribution of the random way point mobility model for wireless ad hoc networks”. IEEE Transactions on Mobile Computing vol. 2, no. 3, pp. 257-269, 2003.
I. Teerawat and E. Hossain. “Introduction to network simulator 2 (NS2)”. Introduction to Network Simulator NS2. Boston, MA: Springer, 2009, pp. 1-18.
Copyright (c) 2019 Mohamad T. Sultan, Khaled N. Yasen, Ali Q. Saeed
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).