skip to main content
10.1145/1593105.1593226acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

DSR and TORA in fixed and mobile wireless networks

Published: 28 March 2008 Publication History

Abstract

Mobile ad-hoc networks (MANET) are developed to provide protocol functionally suitable for wireless routing applications within both fixed and mobile network. Source-initiated on-demand driven routing protocols are one type of protocols used in MANET and they detect and respond to changes in the network topology by gathering information to use in route construction and mobility management. Fixed wireless networks are currently gaining popularity and in this paper DSR and TORA will be employed and tested in such networks. This paper will discuss the performance of DSR and TORA routing protocols using the OPNET simulator. The performance is analyzed with respect to throughput, end-to-end delay and overhead by varying network size in both fixed and mobile network settings.

References

[1]
Broch, J., Johnson, D. B., Maltz, D. A. (1998) "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks". IETF MANET Working Group Internet Draft. draft-itef-manet-dsr-00.txt. March 1998.
[2]
Johnson, D. B., Maltz, D. A. (1996) "Dynamic Source Routing in Ad Hoc Wireless Networks". In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153--181. Kluwer Academic Publishers, 1996.
[3]
Johnson, D. B., Maltz, D. A. and Broch, J. (2001) "DSR: The Dynamic Source Routing Protocol for Multi-hop Wireless Ad Hoc Networks". In C. Perkins, editor, Ad Hoc Networking, chapter 5, pages 139--172. Addison-Wesley, 2001.
[4]
Johnson, D. B., Maltz, D. A. and Hu, Y. (2004) "DSR: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)". Internet-Draft, draft-ietf-manet-dsr-10.txt, July 2004.
[5]
Kim, S. H., Mims, C., & Holmes, K. P. (2006). "An introduction to current trends and benefits of mobile wireless technology use in higher education". AACE Journal, 14(1), 77--100. 2006.
[6]
Park, V. D. and Corson, M. S. (1997) " A Highly Adaptive Distributed Routing Algorithms for Mobile Wireless Networks". In IEEE INFOCOM, 1997.
[7]
Park, V., Corson, S. (2000) "Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification," IETF MANET Working Group Internet Draft. draft-itef-manet-TORA-spec-03.txt. November 2000.
[8]
Royer, E., Toh, C.-K. (1999) "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications Magazine, Vol. 6, No. 2, April 1999.
[9]
Shim, M. K., & Shim, S. J. (2001) "Mobile computing in higher education: Faculty perceptions of benefits and barriers," Journal of Educational Technology Systems, 2001. 29(4), 345--354.
[10]
Tao, E. (2003) "Wireless network deployment and its impacts on teaching and learning---a case study of California State University Monterey Bay". Proceedings of Syllabus, San Jose Marriott, Stanford University. July 2003.
[11]
Wang, J., Lee, S., Zhong, Z. and Nelakuditi, S. (2005) "Localized On Demand Link State Routing for Fixed Wireless Networks". SIGCOMM'05, August, 2005, Philadelphia, Pennsylvania, USA.
[12]
Wanichkorn, K. and Sirbu, M. (2002) "The Role of Fixed Wireless Access Networks in the Deployment of Broadband Services and Competition in Local Telecommunications Markets: an Engineering, Economic and Public Policy Analysis". Working paper, Dept. of Engineering and Public Policy, Carnegie Mellon University. 2002.

Cited By

View all
  • (2014)Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping AttackProceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 201210.1007/978-81-322-1602-5_45(419-428)Online publication date: 26-Feb-2014
  • (2012)Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing10.1109/PDGC.2012.6449807(147-152)Online publication date: Dec-2012

Index Terms

  1. DSR and TORA in fixed and mobile wireless networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACMSE '08: Proceedings of the 46th annual ACM Southeast Conference
    March 2008
    548 pages
    ISBN:9781605581057
    DOI:10.1145/1593105
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 March 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DSR
    2. MANET
    3. OPNET
    4. TORA
    5. fixed wireless networks

    Qualifiers

    • Research-article

    Conference

    ACM SE08
    ACM SE08: ACM Southeast Regional Conference
    March 28 - 29, 2008
    Alabama, Auburn

    Acceptance Rates

    Overall Acceptance Rate 502 of 1,023 submissions, 49%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Efficient Protocol Prediction Algorithm for MANET Multimedia Transmission Under JF Periodic Dropping AttackProceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 201210.1007/978-81-322-1602-5_45(419-428)Online publication date: 26-Feb-2014
    • (2012)Comparative performance analysis of routing protocols in mobile ad hoc networks under JellyFish attack2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing10.1109/PDGC.2012.6449807(147-152)Online publication date: Dec-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media