Study the Effect of Network Congestion on the Performance of Interactive, Proactive and Hybrid Protocols in Terms of Quality of Service
Abstract
Today, MANET networks have attracted the attention of many researchers in the field of communications and networks because of the ease of establishing such networks and their wide spread in the various scientific and applied fields. The researchers have proposed many routing protocols in these networks. This is because the goal of the development process is to make these networks more secure and stable because they are highly vulnerable to penetration by any other node located in the perimeter of the network because the security factors are weak.
These protocols are categorized according to its strategy to three types are the proactive class, which relies on the transmission of control messages over the network to update the routes between any two nodes, and the reactive class, which depends on discovering the route when needed, without broadcasting of control messages across network , And the hybrid type, which combines the two classes, that divides the network into clusters where the nodes interconnections within the cluster depends on the interactive method, while the transmission between two nodes that belong to different clusters is depend on proactive method.
In this paper we compared between the most famous species (proactive, Reactive, hybrid) and choose a protocol to be representative of all species previously mentioned and the network performance assessment each type in terms of Throughput, dynamic routing, load, delay and determine which of these protocols appropriate for each case.
تحظى شبكات الـ MANET اليوم باهتمام العديد من الباحثين في مجالات الاتصالات والشبكات، نظراً لسهولة إنشاء مثل هذا النوع من الشبكات، وانتشارها الواسع في مختلف المجالات العلمية والتطبيقية، حيث عمد الباحثون إلى اقتراح العديد من بروتوكولات التوجيه في هذه الشبكات وما زالت عملية تطويرها مستمرة إلى يومنا هذا، حيث أن الهدف من عملية التطوير هو جعل هذه الشبكات أكثر أمنا واستقرارا لأنها معرضة بشكل كبير للاختراق من قبل أي عقدة أخرى موجودة في محيط الشبكة نظراً لأن عوامل الأمان ضعيفة فيها.
تم تصنيف هذه البروتوكولات حسب طريقة عملها إلى ثلاثة أصناف هي الصنف التفاعلي الذي يعتمد على إرسال رسائل تحكم عبر الشبكة من أجل تحديث المسارات التي تصل بين أي عقدتين فيها، والصنف الاستباقي الذي يعتمد على اكتشاف المسار عند الحاجة إليه فقط دون اللجوء إلى رسائل التحكم عبر الشبكة، والصنف الهجين الذي يجمع بين الصنفين السابقين فيقوم بتجزئة الشبكة إلى عناقيد حيث تتراسل العقد ضمن العنقود الواحد وفق الأسلوب التفاعلي بينما تتراسل العقد التي تتبع لعنقودين مختلفين وفق الصنف الاستباقي.
تمت المقارنة في هذا البحث بين الأنواع الثلاثة للبرتوكولات ( الاستباقية , التفاعلية , الهجينة ) و تم تقييم أداء الشبكة لكل نوع البروتوكولات كلا على حده من حيث المردود Throughput , حركية التوجيه Routing Traffic Sent, الحمل Load , التأخير Delay وتحديد السيناريوهات المناسبة لكل حالة.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 Rttps://creativecommons.org/licenses/by-nc-sa/4.0/
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The authors retain the copyright and grant the right to publish in the magazine for the first time with the transfer of the commercial right to Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series
Under a CC BY- NC-SA 04 license that allows others to share the work with of the work's authorship and initial publication in this journal. Authors can use a copy of their articles in their scientific activity, and on their scientific websites, provided that the place of publication is indicted in Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series . The Readers have the right to send, print and subscribe to the initial version of the article, and the title of Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series Publisher
journal uses a CC BY-NC-SA license which mean
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.