Implementation of DYMO Routing Protocol and Its Comparative Performance Analysis With DSR Protocol
Implementation of DYMO Routing Protocol and Its Comparative Performance Analysis With DSR Protocol
Abstract: Mobile host is an autonomous host which is communicating with one another by making use of different wireless ad
hoc network routing protocols. All hosts cannot communicate among themselves directly because of impediment of transmission
range. Various routing protocols that differ in their nature and properties have been evolved so far to overcome such limitations
and provide efficient routing. One of ongoing reactive Dynamic MANET On-demand (DYMO) protocol which is the successor to
Ad hoc on Demand Distance Vector Protocol (AODV) and developed by Internet Engineering Task Force (IETF) is discussed
here. In this paper, DYMO is modified by calculating the distance of neighboring nodes to the receiver node and selecting a best
neighbour node that can retransmit the RREQ packets to the target host. This modified DYMO is evaluated and its performance
is analyzed with Dynamic Source Routing (DSR) protocol against performance metrics such as throughput, end to end delay, bit
error rate and packet delivery ratio on constant bit rate traffic load. This simulation work is done by Network Simulator (NS 2)
tool where nodes were placed using random waypoint model. Clustering and data aggregation is also proposed in this paper. The
network is sub-divided into many groups of clusters and for each cluster a leader or a cluster head is selected based on LEACH
protocol. Then, a far away sink communicate with the leader node of each clusters to collect aggregated data directly through
single hop communication.
Keywords: Clustering, DSR, DYMO, MANET, Routing Protocols
I. INTRODUCTION
A Wireless Sensor Network is constructed using one or more sensor nodes deployed in any desired environment for example
airplanes (low-flying) are used to drop them. These sensing nodes are very small, low power devices and can convert the sensed
data (ex. Temperature, noise or vibration) from the sensors into a meaningful form. The nodes vary in cost, size and quantity
depending on applications. The device is made up of sensing unit, communication module, battery and memory to store the sensed
data. The information is gathered and forwarded using intermediate nodes and transmitted to other networks using a gateway.
MOBILE ad hoc networks (MANETs) are self-arranging system made of cell phones, personal computers, mobile phones and
Personal Digital Assistants (PDAs), etc connected by wireless link which moves freely in any direction. The mobile hosts
themselves double up as routers to enable multi-hop communication and are used for various applications, e.g. Automated
Battlefields, Disaster recovery, Smart office, Virtual Navigation. All nodes in this network behave both as host and router to take
part in maintenance of discovered paths for data packet transmission to other nodes. This situation becomes complicated during
increase in number of hosts within the network.
Clustering technique involves assembling many nodes into an assembly known as clusters. They use intra-cluster and inter-cluster
as routing scheme. This method proves effective in data query and broadcasting. CH is a dedicated node that represents each group.
A number of metrics are made use to find this node.
CH helps in coordinating cluster members, collects and broadcasts messages and sends collected messages to the base station. To
minimize the routing table sizes and amount of messages exchanged, each host saves all the details of its clusters and some details
from others. The efficiency of energy is distributed where CH is elected based on both transmitted power and residual energy. The
node numbers to form a group are decided based on the size of network and transmitted power. The CH is the main and rotated to
average the power consumption.
The CH collects the information of its multiple non-CH members and transmits to the sink node. This is because, sink is a far away
node and it’s cheaper for members to reach CH than to directly transmit to the sink. It helps in removing redundancy within data
that are spatially correlated due to closely spaced nodes. If sensors are deployed in hostile environment, then the issues like security,
data integrity and confidentiality are some of the vital factors to be considered.
As in figure 2, host 2 is the transmitting host and receiving node is 9. RREQ packet is generated by node2 containing its own
particular address, incremented sequence number, hop count of source and details of destination address which is broadcasted
throughout the network. The addresses are grouped into address block and rest attributes into TLV block. All intermediate hosts
which have a genuine route to target keep appending its address, seq number to RREQ packet till target is found, as seen with nodes 4
and 6. When node9 gets the RREQ, it will have four addresses and three hops. RREP packet is sent by the target.
In the backward route path accumulation feature takes place. It is to make sure that forward route is built and all in-between nodes
know the path to every other node. If the transmitter node doesn’t get RREP within specified value TTL, then the RREQ is resent.
Node9 responds the RREQ by adding its address etc and RREP is sent using the reverse route to node2.
Route Maintenance: There should be continuous monitoring of routes status, links and the RT should maintain updates in it. This
maintenance mechanism can be accomplished using two steps. First is, to preserve routes that are existing, lifetime of path should be
extended when there is successful delivery of packets. The lifetime of path is automatically extended so that it can be used in further
transmission.
Second, process is accomplished using the RRER messages. If link to any another nodes break then this message has to be generated.
The generated node multi-casts this packet to those nodes only that are connected with the failed link. The RT is updated with
removing the broken link. The discovery process has to be initiated, if any host wishes to transmit along the removed path.
Maintenance process is as illustrated in figure 3, the link from node6 to node9 is broken and node6 has a packet to transfer to node9.
Hence, node6 generates a RRER message and propagates backwards to node2. Rest of the in-between nodes instantly updates their
RT entries regarding link breakdown and new routing change. As in figure, nodes next to node 2 and 4, that is, node 3, 5, 7 and 10
also receives this message.
START
Data Aggregation
DSR Modified
DYMO
END
START
N Is it a Ctrl msg?
Am I dst of
msg? Y Send RREP to
src
N
Is it RREP
msg? Re-send RREP
Discard msg
Y msg
N Y
Figure 5: Flow chart of modified DYMO Algorithm
Figure 6: Dynamic Creation of Nodes Figure 7: Dynamic formation of clusters and hello packet transmission
The entered source and destination nodes can be viewed in NAM window which is highlighted in colour red and labeled in color
green as shown in snapshot 8. Snapshot 9 shows the best neighbour node as node 18 which is selected based on Euclidean formula.
Node 18 receives the control packet from source node 12.
Figure 8: Dynamic selection of Source and Destination nodes Figure 9: Packet transmission between Node 12 to node 18
Packet received by node 18 from source node 12 is retransmitted by node 18 to node 50 as seen in figure 10. Snapshot 11 shows
destination node 48 receiving the packet from node 50.
Figure 10: Packet transmission between Node 18 to node 50 Figure 11: Packet transmission between Node 50 to node 48
Snapshot 12 shows CH selection in each cluster. This is based on highest received energy level. Based on highest energy level
cluster head is elected. CH role is rotated among all nodes. A clustering algorithm called LEACH is adopted. In this, nodes having
more residual energy have higher probability to become the leader. It incorporates randomized rotation of high-energy CH position
such that CH role rotates among other nodes in order to avoid draining battery of any one host in the network. Cluster Head should
be reachable in a single hop from their cluster members. Primary function of CH is data aggregation where CH collects data from its
cluster members as shown in figure 13 and transfers it to the sink node far away.
Figure 12: Formation of Cluster heads Figure 13: Data aggregation and transmission to sink by CHs
V. RESULTS
The graph of Performance is as shown below. The parameters are Packet drop, Packet delivery ratio and Throughput.
Figure 14 show that DYMO exhibited highest throughput as compared to DSR. DYMO has ability to search route quickly as it
avoids expiring good route by updating route lifetime appropriately while DSR uses stale routes. Performance of DSR is weak as it
doesn’t have proper technique to update stale routes. Figure 15 show that DYMO have a higher packet delivery fraction whereas the
packet delivery ratio of DSR is low due to stale routes.
Figure 14: Graph output showing Throughput vs time Figure 15: Graph output showing PDR vs time
Figure 16 showed Average end to end delay of DSR is more than DYMO. Due to the presence of stale caches in DSR, delay is more
than DYMO. Average end to end delay of DYMO protocol is the less. Figure 17 shows that the BER of DSR is more compared to
DYMO.
Figure 16: Graph output showing Delay vs time Figure 17: Graph output showing BER vs time
As shown in table 2 the parameters for example throughput, delay, bit error rate and packet delivery ratio are compared between
protocols modified DYMO and DSR with respect to simulation time.
VI. CONCLUSION
The modification of algorithm of DYMO presented in this project keeps the important characteristics of DYMO while trying to
obtain reduction of control packets. There is an improvement in throughput. The presented results show better performance of
DYMO in NAM window. The proposed routing protocols methodology is applied to random waypoint model with CBR traffic load
from the initiator node to the target node. Performance of modified DYMO is compared with DSR by measuring performance
metrics. Results showed performance of DYMO is better than DSR in case of throughput, delay, bit error rate and packet delivery
ratio.
DYMO can be modified further by adding Dynamic forward delay to all nodes. It will make sure that only the best node’s RREQ
reaches the destination first. Also modified DYMO can be compared with other routing protocols based on various performance
metrics.
REFERENCES
[1] Jogendra kumar, M K Panda, “Ad Hoc Network Routing Protocols on Random Waypoint Model”, IEEE International conference on Electrical, Electronics
and optimization Techniques; 2016
[2] E. Zola, F. Barcelo-Arroyo and I. Martin-Escalona, “DYMO Self-Forwarding: A Simple Way for Reducing the Routing Overhead in MANETs”, Hindawi
Mobile Information Systems; 2017
[3] Jatinder Pal Singh and Anuj Kr. Gupta, “A Review on DYMO Routing Protocol in MANETs”, International Journal of Advanced Trends in Computer Science
and Engineering; Volume 2, No.2, March - April 2013, pp: 21-26
[4] S. Taneja and A. Kush, “A survey of routing protocols in mobile Ad hoc networks,” International Journal of Innovation, Management and Technology; vol. 1,
no. 3, August 2010
[5] Swati Dhawan and Vinod Saroha, “Review on Performance Issues of Routing Protocols of Mobile Ad-hoc Networks”, International Journal of Advanced
Research in Computer Science and Software Engineering; Volume 3, Issue 6, June 2013
[6] D.-W. Kum, J.-S. Park, Y.-Z. Cho and B.-Y. Cheon, “Performance evaluation of AODV and DYMO routing protocols in MANET,” in Proceedings of the
2010 7th IEEE Consumer Communications and Networking Conference, (CCNC ’10), pp. 1–2,Las Vegas, Nev, USA, January 2010
[7] R. Kochher and R. Mehta, “Performance analysis of reactive AODV and DSR with Hybrid GRP Routing Protocols under IEEE 802.11g MANET,” in
Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking WiSPNET’16, pp. 1912–1916, Chennai, India,
March 2016
[8] M. G. Rubinstein et al., “A survey on wireless Ad Hoc networks,” in Mobile and Wireless Communication Networks. IFIP The International Federation for
Information Processing, G. Pujolle, Ed., vol.211, Springer, Boston, Mass, USA, 2006
[9] V. G. Menon, J. P. Pathrose and J. Priya, “Ensuring reliable communication in disaster recovery operations with reliable routing technique”, Mobile
Information Systems, vol. 2016
[10] J. N. Al-Karakiand, A. E. Kamal, “Routing techniques in wireless sensor networks: a survey”, IEEE Wireless Communications, vol. 11, no.6, pp. 6–28, 2004
[11] Geeta Jayakumar and Gopinath Ganapathi, “Reference point group mobility and Random Waypoint models in performance evaluation of MANET Routing
Protocols”, Journal of computer system, Networks and communications, Volume 2008
[12] M. Amin, M. Abrar, Z. U. Khan, Andusalam, and S. Rizwan, “Comparison of OLSR & DYMO routing protocols on the basis of different performance metrics
in mobile ad-hoc networks”, American Journal of Scientific Research, 2011