Performance Analysis of MANET Routing Protocols for Military Applications

被引:0
|
作者
Usha, R. [1 ]
Premananda, B. S. [1 ]
Reddy, Viswavardhan K. [1 ]
机构
[1] RV Coll Engn, Dept Telecommun Engn, Bengaluru, India
关键词
Latency; MANET routing protocols; Multi-robot Exploration; Nomadic Community Mobility Model; Overhead; Random Way Point Mobility Model; Throughput;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advancements in artificial intelligence have made human independent missions possible. These missions have to meet deadline constraints for successful implementation. So making up to a mission by multiple robots rather than a single robot is preferred. An effective communication link is required between these robots to accomplish the given mission. One such effective network which can be deployed in tactical or emergency scenarios is an ad-hoc network. Moreover, the performance of the network depends on the routing protocols used. Also, the performance of routing protocols depends on the way the nodes are moving in the given area where the network has to be setup. Thus simulation of ad-hoc routing protocols such as Ad-hoc On Demand Distance Vector (AODV), Dynamic Source Routing (DSR), Destination Sequenced Distance Vector (DSDV), and Optimized Link State Routing (OLSR) has been done in NS-2.35 with Nomadic Community Mobility Model (NCMM) and Random Waypoint Mobility Model (RWPMM) obtained from BonnMotion tool. Network performance parameters considered are throughput, latency, and overhead. It is observed that routing protocols perform better in RWPMM than NCMM. With RWPMM, DSDV routing protocol provides high throughput as well as less latency and DSR routing protocol provides low overhead.
引用
收藏
页码:1063 / 1068
页数:6
相关论文
共 50 条
  • [1] Performance Analysis of Different MANET Routing Protocols
    Mukherjee, Srijan
    Mohapatra, Hitesh
    [J]. 2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,
  • [2] Comparative Performance Analysis of MANET Routing Protocols in Military Operation Using NS2
    Katiyar, Sandhya
    Gujral, Rajneesh
    Mallick, Bhawna
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 603 - 609
  • [3] Performance analysis of AODV & DSR Routing protocols for MANET
    Bhatt, Uma Rathore
    Dangarh, Abhishek
    Kashyap, Akanksha
    Vyas, Aishwarya
    [J]. 2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 254 - 258
  • [4] Performance Analysis of MANET Routing Protocols: OLSR and TORA
    Altalhi, Abdulrahman H.
    Halawani, Sami M.
    Mahmood, Tahir
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (03): : 54 - 59
  • [5] Performance Analysis of MANET Routing Protocols in Urban VANETs
    Di Maio, Antonio
    Palattella, Maria Rita
    Engel, Thomas
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 432 - 451
  • [6] A Performance Analysis and Comparison of various Routing Protocols in MANET
    Shobana, M.
    Karthik, S.
    [J]. 2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [7] Performance Analysis of MANET Routing Protocols for UAV Communications
    Hussen, Hassen Redwan
    Choi, Sung-Chan
    Park, Jong-Hong
    Kim, Jaeho
    [J]. 2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 70 - 72
  • [8] Performance Analysis and Comparison of Different Routing Protocols in MANET
    Tamilarasan, S.
    Saleem, P. A. Abdul
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (06): : 87 - 92
  • [9] Performance Analysis of Efficient Energy Routing Protocols in MANET
    Divya, M.
    Subasree, S.
    Sakthivel, N. K.
    [J]. 3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 890 - 897
  • [10] Performance Comparison of Routing Protocols in MANET
    Kukreja, Bharti
    Kambhra, Sanjeev
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (08): : 108 - 114