A Comparative Study of Aodv and DSR Routing Protocols in Mobile AD-HOC Network

  • G. Lakshmi Assistant Professor, Department of Computer Science & Applications, Sri Vidya Mandir Arts & Science College
  • M. Kasthuri Assistant Professor, Department of Computer Science & Applications, Sri Vidya Mandir Arts & Science College
  • R. Jayalakshmi Assistant Professor, Department of Computer Science & Applications, Sri Vidya Mandir Arts & Science College
  • T. Balasubramanian Head of Computer Science, Sri Vidya Mandir Arts and Science College, Katteri, Uthangarai.
Keywords: Network, Protocol, Packet, Hijacking, Node

Abstract

Application for wireless networking has been evolving rapidly and is becoming n integral part in our everyday life. Also with the recent performance Networkadvancement in wireless communication Technologies, mobile wireless ad-hoc networks have been used in many areas such as military, health and commercial applications. Mobile ad hoc networks utilize radio waves and microwaves to maintain communication channel between computers. 802.11 (Wi-Fi) is the pre-eminent technology for building general purpose wireless networks. Mobile ad-hoc networking (MANET) utilizes the Internet Protocol (IP) suite andaims at supporting robust and efficient operation by incorporating routing functionality into the mobile nodes. MANET is among one of the wireless networks that uses 802.11 to transmit data from the source to the destination. Since MANET is used in applications like defense, security is of vital importance due to its wireless nature.
The Wireless networks are vulnerable to attacks like eavesdropping, Man-In-The-Middle-Attack (MITM), hijacking, and so are MANETs. A malicious node can get within the wireless range of thenodes in the MANET and can disrupt the communication process. Various routing protocols have been tested using some tools techniques to protect routing in MANETs. But here I am going to compare two reactive protocols AODV and DSR in following aspects like packet delivery ratio, packet dropping, end-to-end delay, throughput, and then false packet ratio using Network Simulator 2.

Published
2016-10-30