0% found this document useful (0 votes)
16 views

Experiment No. 8: 1. Aim: Develop A Simple Wireless Adhoc Network Using Aodv, Aomdv & Tora. Also

The document describes an experiment to simulate and compare three routing protocols (AODV, AOMDV, and TORA) in wireless ad hoc networks using the NS-2 simulator. The objectives are to understand the different routing protocols and implement them in NS-2 to differentiate their performance. The document provides details on the theoretical process and implementation of AODV routing simulation in NS-2, including the use of timers, sending Hello packets, receiving packets, and calling different functions. It also provides a brief overview of the TORA protocol and its key features. The conclusion is that the experiment will compare the metrics of the three protocols.

Uploaded by

Anil kadam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Experiment No. 8: 1. Aim: Develop A Simple Wireless Adhoc Network Using Aodv, Aomdv & Tora. Also

The document describes an experiment to simulate and compare three routing protocols (AODV, AOMDV, and TORA) in wireless ad hoc networks using the NS-2 simulator. The objectives are to understand the different routing protocols and implement them in NS-2 to differentiate their performance. The document provides details on the theoretical process and implementation of AODV routing simulation in NS-2, including the use of timers, sending Hello packets, receiving packets, and calling different functions. It also provides a brief overview of the TORA protocol and its key features. The conclusion is that the experiment will compare the metrics of the three protocols.

Uploaded by

Anil kadam
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Experiment No.

8
1. Aim: Develop a simple wireless adhoc network using aodv, aomdv & tora. Also
compare the performance using NS-2.
2. Objectives:
• Understand different routing protocol of adhoc networks

3. Outcomes:
• Implement different routing protocols
• Differentiate different routing protocols.

4.Hardware / Software Required : NS2, linux

5. Theory:
The step by step process happening in AODV network simulation in NS2

1. In the TCL script, when the user configures AODV as a routing protocol by using the
command,

$ns node-config -adhocRouting AODV

the pointer moves to the “start” and this “start” moves the pointer to the Command function
of AODVprotocol.

2. In the Command function, the user can find two timers in the “start”

* btimer.handle((Event*) 0);

* htimer.handle((Event*) 0);

3. Let’s consider the case of htimer, the flow points toHelloTimer::handle(Event*) function
and the user can see the following lines:

agent ->sendHello();

double interval = MinHelloInterval + ((MaxHelloInterval - Min-HelloInterval) *


Random::uniform());

assert(interval -> = 0);

Scheduler::instance().schedule(this, &intr, interval);

These lines are calling the sendHello() function by setting the appropriate interval of Hello
Packets.

4. Now, the pointer is in AODV::sendHello() function and the user can


seeScheduler::instance().schedule(target , p, 0.0) which will schedule the packets.
5. In the destination node AODV::recv(Packet*p, Handler*) is called, but actually this is
done after the node is receiving a packet.

6. AODV::recv(Packet*p, Handler*) function then calls therecvAODV(p) function.

7. Hence, the flow goes to the AODV::recvAODV(Packet *p) function, which will check
different packets types and call the respective function.

8. In this example, flow can go to case

AODVTYPE HELLO:

recvHello(p);

break;

9. Finally, in the recvHello() function, the packet is received

TORA (Temporally Ordered Routing Algorithm) is a source initiated on demand


routing protocol.
TORA is a highly adaptive, efficient, loop-free and scalable routing protocol based on link
reversal algorithm.
The main objective of TORA is to limit message propagation in the highly dynamic mobile
computing environment. It means, it is designed to reduce communication overhead by
adapting local topological changes in ad hoc network. Another main feature of TORA
routing protocol is the localization of control packets to a small region (set of nodes) near
the occurrence of a topological changes due to route break. Hence, each node of the network
required to contain its local routing and topology information about adjacent nodes.
TORA supports multiple routes to transmit data packet between source and destination
nodes of mobile ad hoc network. In short, TORA exhibits multipath routing capability.
The TORA's operation can be compared to that of water flowing downhill toward a sink
node through a grid of tubes that model the routes in the real world network. The tube
junctions represent the nodes, the tube themselves represent the route links between the
nodes, the tube's water represents the packets flowing between nodes through the route
links toward the destination.

6. Conclusion:
7. Viva Questions:
• What is the difference between all 3 protocols?

• What are the metrics of all 3 protocols?

8. References:
• Ekram Hossain and TeerawatIssariyakul, ―Introduction to Network Simulator NS-2,
SpringerSecond Edition. (T1)
• Jack L.Burbank,―Introduction to Network Simulator 3,Wiley Publications(T2)
• Siva Ram Murthy and B.S. Manoj, ―Adhoc Wireless Networks Architectures and
protocols, 2ndedition, Pearson Education, 2007 (T3)
• Michael Gregg,―Build your own Security lab, Wiley India edition

You might also like