Open Access Open Access  Restricted Access Subscription or Fee Access

Analysis of Optimum Routing Protocol and Mobility Model for Mobile Ad Hoc Network

B. Vishnu Prabha, R. Vanathi Priyadharshini


Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicate with each other without any centralized access points, infrastructure, or centralized administration. This paper presents an analysis of various quality of service metrics (QoS) of mobile ad hoc network nodes like Throughput , Delay , Packet Delivery Ratio (PDR), Hop Count (HC) and Control Overhead (CO) in varying routing protocol (AODV,DSR,DYMO,ZRP). The goal of this paper is to provide an insight on how various routing protocol and mobility model affects quality of service metrics in mobile ad-hoc networks. A comparative study of the routing protocol and mobility model is made to determine the optimum routing protocol and mobility model for mobile ad hoc environment to produce the optimum quality of service metrics. The analysis is performed in the simulation environment and graphical results are explained.


AODV, DSR, DYMO, ZRP, RWPM, FILE, GROUP, Throughput, Delay, Hop Count, Packet Delivery Ratio, Control Overhead.

Full Text:



Balakrishnan, V. Varadharajan, V. Tupakula, U. Lucs, P. Macquarie Univ., Sydney.: Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks. In IEEE Wireless Communication Systems ISWCS 2007. 4th International Symposium on Publication Date: 17-19 Oct. 2007 pp 592--596 (2007).

Patwardhan, A. Perich, F. Joshi, A. Finin, T. Yesha, Y. Dept. of Comput. Sci. & Electr. Eng., UMBC, Baltimore, MD , “Active collaborations for trustworthy data management in ad hoc networks ” Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on Issue Date: 7-7 Nov. 2005 On page(s): 9 pp. – 421.

Feng Yunfang, HuangShi Institute of Technology Huangshi College of Computer Huangshi, Hubei, China,” Adaptive Trust Management in MANET” IEEE , International Conference on Computational Intelligence and Security. pp 804-808 (2007).

In-Sung Han Jin-Mook Kim Hwang-Bin.: Service Discovery and Delivery System Based on Trust in Mobile Ad-Hoc Network. In Information Science and Security, 2008. ICISS. International Conference on Publication Date: 10-12 Jan. 2008 pp 171--176 (2008).

Balakrishnan, V. Varadharajan, V. Tupakula, U. Lucs, P. Macquarie Univ., Sydney.: TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks” In 15th IEEE International Conference on Networks, 2007. ICON 2007. pp 182--187 (2007).

Celeste Campo, Florina Almenarez, Daniel Dıaz, Carlos Garcıa-Rubio, Andres Marın Lopez.: Secure Service Discovery based on Trust Management for ad-hoc Networks. In Journal of Universal Computer Science, vol. 12, publication date: 28 mar 2006 © J.UCS pp 340--356 (2006).

Ngai, E.C.H. Lyu, M.R.: Trust- and clustering-based authentication services in mobile ad hoc networks. In IEEE 24th International Conference on Distributed Computing Systems Workshops, 2004. Publication Date: 23-24 March 2004 pp 582--587 (2004).

Animesh Kr Trivedi1, Rajan Arora1, Rishi Kapoor, Sudip Sanyal1 and Sugata Sanyal.: A Semi-distributed Reputation-based Intrusion Detection System for Mobile Adhoc Networks. In India Journal of Information Assurance and Security pp 265--274 (2006).

Tracy Camp, Jeff Boleng, Vanessa Davies.: A survey of mobility models for ad hoc network research. In interscience conference on Wireless Communications and Mobile Computing Volume 2 Issue 5, Published Online: 11 Sep 2002 Pages 483--502 (2002).

Ranveer Chandra, Venugopalan Ramasubramanian, Kenneth P. Birman.: Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks. In 21st IEEE International Conference on Distributed Computing Systems , 2001 pp 275.(2001).

V.R. Sarma Dhulipala, RM.Chandrasekaran, and R.Prabakaran Anna University Tiruchirappalli/Center for Convergence of Technologies, Tiruchirappalli, India “Timing Analysis and Repeatability Issues of Mobile Ad-Hoc Networking Application traffics in Large Scale Scenarios” International Journal of Recent Trends in Engineering, Vol. 1, No. 1, May 2009

S. Gomathi et. al. “Guaranteed Packet Transfer in MANET In and Out of Coverage Areas and Energy Saving Using Random Casting” / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, pg 865-869

Hsu et al. “Performance of mobile ad hoc networking routing protocols in realistic scenarios”, vol.2, pages 1268-1273, IEEE MILCOM-2003.

Lidong Zhou Haas, Z.J. Cornell Univ., Ithaca, NY “Securing ad hoc networks” appears in: Network IEEE Nov/Dec 1999 Volume : 13 , Issue:6 On page(s): 24 - 30

Zhiyuan Liu Shejie Lu Jun Yan Huazhong Univ. of Sci. & Technol., Wuhan “Secure Routing Protocol based Trust for Ad Hoc Networks” appears in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. Eighth ACIS International Conference on July 30 2007-Aug. 1 2007 On page(s): 279-283.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.