# I. INTRODUCTION ireless Sensor Network (WSN) thus consists of tiny sensor nodes communicating with each other, and deployed from small to large scales. The existing wireless technology is based at the point-to -point technology. This kind of network is used in areas such as environmental monitoring or in rescue operatio ns. Wireless systems, both mobile and fixed, have become an indispensable part of communication infrastructure. Their applications range from simple wireless low data rate transmitting sensors to high data rate real-time systems such as those used for monitoring large retail outlets [1]. The destination-sequenced distance vector (DS DV) routing protocol is a proactive routing protocol which adds a new attribute, sequence number, to each route table entry at each node. Routing table is maintained at each node and with this table; node transmits the packets to other nodes in the network. This protocol was motivated for the use of data exchange along changing and arbitrary paths of interconnection which may not be close to any base station. The motivation for choosing a DSDV routing protocol for our research comes from the fact that many routing protocols are based on DSDV such as AODV [3]. In addition, several routing protocols have been proposed [4], [5], [6], [7], [8], [9], [10], [11], [12] to improve the performance of DSDV. DSDV routing protocols are considered more reliable and robust. Furthermore, in DSDV protocol, whenever a link failure is detected in a primary route, the source node can select the best route. This mechanism enhances route availability and consequently reduces control overhead, saves energy, enhances data transmission rate, and increases the network throughput . For these reasons, proactive DSDV routing protocol is useful for the use to many applications in MANETs of data exchange along changing and arbitrary paths of interconnection without need to any base station and achieve high quality of service (QoS) in terms of packet delivery ratio and end-to-end (E2E) delay to support multimedia applications over MANETs, such as real-time traffic as visitor tracking sensor, load balancing. Some real time applications required DSDV protocol behavior such as Follow me, Multimedia guide book, Visitor tracking, Sensor network IEEE 802.15.4 LR-WPAN. The primary objective of this article are: Firstly, evaluating the performance of DSDV in WSN as extend to our pervious study that it analyses performance , design and implementation in details of the DSDV routing protocol in MANET as in [2] using the ns-2 network simulator. Where what are we presenting in this paper it was not applied in [2]. So, The performance metrics evaluated in terms diffe-rent network metrics such as, number of nodes and network dynamicity in terms of node speed and pause time. Secondly, the application of DSDV we envisaged is called the monitor sensor system -involved tracking the approximate location of several mobile nodes in a small building, and feed information on proactive protocol, and for this reason, the DSDV routing protocol was used to communicate nodes location information to the sink node. Thirdly, the application's performance achieved by analyzes and evaluate of DSDV protocol in terms of throughput, delay and packet delivery ratio. The problems that DSDV faced in this application presented. The rest of the paper is organized as follows: Section 2 begins with knowledge information about some the applications of DSDV in different approach. Section 3 presents the following methodology and procedures of previous and current our study. Section 4 discusses of tools and the simulation environment. Section 5 describes Network Topology and Device Architecture in a LR-WPAN and scenarios. Section 6 and Section 7 describes the simulation parameter used to analysis and running of program in ns2. Section 8 discuss the results, evaluates the performance of DSDV protocol. The paper is concluded along with future works directions in section 9. # II. APPLICATION OF DSDV PROTOCOL IN WSN Potential WSN applications include security, traffic control, industrial and manufacturing automation, medical or animal monitoring [13]. The WSN nodes can also be used to monitor dangerous or inaccessible environments, such as volcanoes, toxic regions, the deep ocean or the lunar surface. These small nodes can be fixed, mobile or move together with the observed phenomenon (e.g. sensing animal movements or hurricanes). The purpose of this paper is to evaluate DSDV routing protocol in wireless sensor network (WSN) as Wireless Personal Area Networks (WPAN) scales regarding the packet delivery ratio , the average end-to end delay and throughput and other parameter is will presented as list as will we see. However, many Ad hoc routing protocols are proposed for WSNs due to their quick and economically less demanding deployment. DSDV and AODV are good examples of Ad hoc protocols that are proposed and implemented in WSNs [14]. # a) Applications DSDV routing protocol in MANET There are however sensor applications that are designed with mobile ad-hoc routing protocols. Destination Sequenced Distance Vector (DSDV) is a candidate routing algorithm for many sensor applications like the "Follow me" application that guides visitors to the location of a building or an application to assist workers in finding conference rooms [15]. multimedia information via Bluetooth to the user's mobile device. If the Ethernet is substituted with a wireless 802.11b network then the application can be deployed to outdoor archaeological and tourist sites, especially when the sites are expanding for areas of many km 2 . The application we envisaged-called the Visitor Tracking System-involved tracking the approximate location of several mobile nodes in a small building personal area, and feed information on location and direction of each node to a single central sinks. It was required that the user at the central sink receive alerts if any mobile node approached restricted areas within the building, from [17]. # c) Sensor network IEEE.802.15.4 RL-WPAN The IEEE 802.15.4 standard [18] defines the physical layer (PHY) and medium access control (MAC) sub-layer specifications for Low Rate -Wireless Personal Area Networks (LR-WPANs), low power consumption and low cost applications. The standard MAC protocol supports two operational modes, either beacon enabled or non beacon-enabled. When using a beacon, the transmitssion is based on super frames slotted CSMA-CA. For the non beacon mode, the messages will be directly transmitted in an unspotted CSMA-CA, from [19]. The IEEE 802.15.4 standard is being designed to be used in a wide variety of applications which require simple wireless communications over short-range distances with limited power and relaxed throughput needs. IEEE 802.15.4 facilitates Wireless Sensor Networks (WSNs) with the goal of reducing the installation cost of sensors and actuators while enabling sensor-rich environments. # III. METHODOLOGY To achieve primary objectives, the following tasks must be done: Firstly, get a general understanding of MANETs, simulation environment that could be used for analyzing, evaluating and implementing MANETs' protocols, understanding DSDV source code to know how DSDV protocol mechanism. Then, analyze the protocol theoretically and through simulation based on above mentioned performance and network metrics. The research methodology used is simulation-based prototyping. That is, designed and implemented the routing protocol that extends the well-studied DSDV protocol. Then evaluation of protocol in life as WSN application. We revise the protocol based on these performance # Global Journal of Computer Science and Technology Volume XVII Issue I Version I 6 Year 2017 ( ) # E Both applications could be also used in outdoor sites such as archaeological sites, where no infrastructure exists. Another application of DSDV protocol is the Multimedia Guidebook [16], which is based on sensors communicating through an Ethernet to provide metrics to produce the final protocol DSDV. As in Fig 1 , shows the research methodology used in this research and it taken from initial previous our study by Gawiy in [2]. Simulation in general and the NS2 simulator in particular are widely used to evaluate network protocols. They have significant advantages over other methodlogies such as direct experiments and mathematical modeling. A computer simulation is an application designed to mimic a real-life situation . One of the advantages of simulators is that they are able to provide our with practical feedback when designning real world systems. Consequently, we as designners can determine the correctness and efficiency of a design before the system is actually constructed. The simulators permit our to study a problem at several different levels of abstraction. By approaching a system at a high level of abstraction, we can understand the behavior and interactions of all components of this protocol, and is therefore better equipped to counter the system's complexity. One of the disadvantages of using a network simulator for testing a distributed application system from the fact that there is no real network involved in the simulation [2]. Indeed industry standard tools like NS2 have emerged to meet this need. This study follows this practice. # IV. SIMULATION ENVIRONMENT NS2.34 network simulator [20] is used to evaluate the proposed DSDV. The simulation scenario topology consisting of number of nodes and their connectivity and was created by topology generators GT-ITM [21]. The goal of our simulations in this paper is study and evaluation and measure the ability of DSDV routing protocol to react to multi-hop ad-hoc network topology changes with. IEEE 802.15.4 standard and comparison of performance metric based on following network metrics, number of nodes, pause time of mobile nodes movement, speed of nodes mobility. To run the simulation experiments, our basic methodology is to define a set of movement scenarios and communication patterns and apply them to MANET. In fact, testing with each data packet originated by a sender mobile node, whether the DSDV routing protocol is able to route and deliver it to the destination node. # V. NETWORK TOPOLOGY AND DEVICE ARCHITECTURE Devices in a LR-WPAN scenario can be of 3 types, PAN Coordinator, full function device (FFD) or a reduced function device (RFD) [22]. Devices that participate are FFD or RFD. Each RFD can only associate with a single FFD at an instance whereas FFDs can communicate with other FFDs or RFDs. A FFD contains the complete set of MAC services and is able to operate as a network coordinator or a network device. On the contrary, a RFD is simply a network device with a reduced set of MAC services and usually used for simple applications. In fig. 2 with this topology, communication is established between devices by a single mobile controller known as the PAN coordinator (this is nod 12 shown in scenario fig 2). The PAN coordinator (which is a FFD) acts as a hub that forms direct links to other devices. These devices, consisting of FFDs or RFDs, from around the PAN coordinator and act as data terminal locations (sensors). This topology simplifies routing and reduces direct links at the expense of data traffic latency. In the scenario showed as in fig. 3, each node connected with the central coordinator considered secondary Coordinator for node farther out as well as this node if it succeeds in sync link with the secondary coordinator is like the farthest coordinator of the central coordinator. If node works in contact, they transmit information owned by other nodes and so are transfers information between the wish to reach even the central coordinator, which is regarded as the sink or destination for the entire network and the rest of the nodes is the source for the transfer of information Because DSDV protocol is proactive any it cares greatly providing availability and keep topology of network exposed to all node. All node have information about the location nodes other in network so this protocol does not require a delay is needed to rediscover the path to the target as long as it always update routing table .for This that DSDV useful so in such applications. The implementation of non beacon-enabled mode in mobile ad-hoc sensor networks is not suitable because the non beacon enabled mode does not send a beacon periodically, thus the node (node 11 as in fig 4) will assume it's association is always preserved although it may have moved away from the coordinator and lost the link. If this happens, the moving node stops its attempt to associate with other coordinators because it does not consider itself an orphan node. Thus, it will be difficult for the nearest coordinator to detect this node. In this network the DSDV protocol in very good way periodically or incremental updates messages is transmitting between the nodes to maintain network topology as it theses the node moving in network area. The flow of node association and synchronization is given in Fig. 5. The node starts association with an active scan procedure that scans all listed channels by sending beacon requests to all nearby coordinators. All the information received in a beacon frame will be recorded in a PAN descriptor. The results of the channel scan will be used to choose a suitable PAN. The node then sends a request to associate with the chosen coordinator. The node updates its current channel and PAN id while waiting for an acknowledgement from the coordinator. Upon receiving an acknowledgement, the node then waits for the association results. The coordinator will determine whether the current resources are available on the PAN in order to allow the node to associate. If sufficient resources are available, the coordinator then allocates a short address to the node and sends an association response command containing a new address and a status indicating a successful association [19]. If there are not sufficient resources, the node will receive an association response command with a failure status. 15.4 network. The DSDV protocol presents a stability at the power consumption as it has a mechanism of finding a valid route be using a technical which exchanges routing messages between nearby mobile nodes. Essen tially, the influence of mobility, dropped packets by node and network loading on the network will be considered. In particular, the network's packet delivery ratio, delay and data throughput performance are measured with specific transmission rates. The performances resulting from the metrics are presented with moving scenarios. To increase then confidence level of the results, a set of simulation parameters are performed with various random seeds for the data transmission. Depending on the WSN operating requirements nd environment, there has to be compromises between the node transmission range, operational lifespan and device cost. The transmission range can be determined from two-ray ground reflection models which relates the maximum range to the antenna gain, transmit power and receiver sensitivity. The data traffic type is CBR with the application agent sending at a rate of 4 data packets per second continuously. The nodes Node Scan all the listed channel (Active scan) # Send beacon request command # Information received records in PAN descriptor # Scan results # Updates current channel and PAN id Send association request to coordinator # Waiting for acknowledgment # Acknowledgment received Waits for the association results (aResponsewaitTime) association results # Tracking bescon # Start search beacon Beacon received? # Results of synchronization request Send orphan notification command # Waits aResponseWait # Coordinator # Realignment Received? used in the simulation will movement and placed at random position generated by setdest in ns-2. The centre node is designated the PAN coordinator with all other nodes randomly transmitting data packets to the PAN coordinator. The speed and heading of each node will vary according to the generated movement scenario with a maximum simulation runs of one hour. The simulations are During the certain behaviors are exhibited by the nodes if communication cannot be established with the coordinator. When a node losses synchronization, orphan-scanning is performed to relocate the coordinator. When coordinator relocation is successful, communication will resume. If relocation of the coordinator fails, node will subsequently perform active channel scan to send association request to the PAN coordinator. Upon successful association, the node begins to transmit beacons and start data transmission. Else, non-beacon mode is enabled for that node. # Scan results # Coordinator # VIII. SIMULATION RESULTS AND DISCUSSION a) The packet delivery ratio In DSDV, if it is not possible for the packets to be delivered, DSDV tries to drop them which means a lesser PDF as well as less delay Furthermore, DSDV is a table-driven protocol and updates its table periodi-cally which leads to an increase in the routing load in the network and less PDF in movement with high spe-ed, but in this simulation and as we seed in previous scenarios that DSDV protocol with low speed net work perform high throuput and PDF nearly to 100%. As oc-increases by approximately 98% at time between 5.5 to 70.46 sec. then pdr take in constant from at time between 80 to 125.11,so pdr at time 125.11sec become 99 % . # Global Journal of Computer Science and Technology Volume XVII Issue I Version I This shows that for delay-sensitive applications, DSDV protocol with IEEE 802.15.4 standards is remarkably well suitable. This attribute can be explainned by the fact that DSDV is a proactive routing protocol and in these types of protocols the path to a destination is immediately available. In other words, there is ean environment speed of sensor node slow ly movi-ng has 0.47 m/sec based ocean speed, then DSDV algorithm has better packet delivery rate as in fig 6. In contrast, pdf in DSDV is 50 % at time 5.47 sec and no delay caused by routing discovery. Furthermore, DSDV routing protocol tries to drop the packets, if it is not possible to deliver them which means less delay. # c) The Throughput The network throughput in general, increases steadily over the entire simulation time. DSDV attains the highest throughput and shows efficient behavior in all mobility scenarios. The reasons for this good throughput include: firstly, when the first data packet arrives, it is kept until the best route is found for a particular destination. Secondly, a decision may delay to a decision may delay to advertise the routes which are # IX. CONCLUSION AND FUTURE WOKE Since The IEEE 802.15.4 standard is being designed to be used in a wide variety of applications which require low send rates over short-range distances with limited power and relaxed throughput needs. This consider problem for routing protocols when need to transmitting of large routing packet especially in network that contain large number of mobile hosts. thus , Because full dump packets that generated by DSDV to routes update and by progress of simulation time in pervious sensor scenario then routing tables at each node become large to maintain all topology of network and this require large bandwidth to exchange these packets . As resulting of that much dropped packet will occur because The IEEE 802.15.4 not enabled large packets transmission. To this cause PDF of DSDV with progress of simulation time take in decrease. So, the problems in this protocol will taken consideration and The performance comparison with other routing protocols can be done in different classes of parameters and operating conditions, which will be useful for actual deployment of sensor network in particular application of industrial control.and improvement of DSDV protocol to achieve high QoS in terms of packet delivery ratio and end-to-end delay to support multimedia applications by this protocol over WSNs. ![a) Working environment ? Operating System: Ubuntu10.10 (Linux). ? Patch used: Mannasim [24] Patch with ns-allinone-2.34[20] for WSN simulation. ? NS version: ns-allinone-2.34. ? Various packages and scripts: NAM 1.14, Awk 3.1.6, tcl8.4.18, Tracgraph 2.02,gnuplot 4.0.](image-2.png "") 2![Figure 2: Initial modes movements before the nodes associates with its coordinator at time 2 sec](image-3.png "Figure 2 :") ![2017 Global Journ als Inc. (US) Global Journal of Computer Science and Technology Volume XVII Issue I Version I of Computer Science c of Yemen; e-mail: mohammdghawi@gmail.com](image-4.png "©") 4![Figure 4: Fast moving lost synchronization](image-5.png "Figure 4 :") 35![Figure 3: Movement after the node associates with its coordinator](image-6.png "Figure 3 :Figure 5 :") 6![Figure 6: Packet delivery ratio vs simulation time](image-7.png "Figure 6 :") 7![Figure 7: Ave End 2 End Delay vs Movement in Time b) End-to-End delay These graphical results from fig. 7 are measurement of Delay extremely powerful. It shows that Endto-End delay in IEEE 802.15.4 with DSDV is lowest as compared with the other routing protocols we are see them in several researches as in [23] .This shows that for delay-sensitive applications, DSDV protocol with IEEE 802.15.4 standards is remarkably well suitable. This attribute can be explainned by the fact that DSDV is a proactive routing protocol and in these types of protocols the path to a destination is immediately available. In other words, there is](image-8.png "Figure 7 :") 1Year 201711Volume XVII Issue I Version I( ) EGlobal Journal of Computer Science and Technology© 2017 Global Journ als Inc. (US) 2Year 201713NO.Parametervalue1. 2.No. of CBR Packets Generated No. of CBR Packets sent86314 packets 83166 packets( ) E3.No. of CBR Packets received84821 packets4.No. of routing packets3104 packets5.Total No. of MAC Packets sent36056 packets6.Total No. of Fwd packets398 packets7.Total No. of Dropped (packets259748 packets8.Packet Delivery Ratio (PDR %)99.989996 %9.Network Throughput1.536942 kbits/sec10.Average node Throughput38.423553 kbits/sec11.Normalized routing load3.659471 packets %12.Average end to end delay13.065065 msGlobal Journal of Computer Science and TechnologyVolume XVII Issue I Version I b) DSDV applications in Visitor Tracking System (VTS)© 20 7 Global Journa ls Inc. (US) © 20 7 Global Journa ls Inc. (US) © 2017 Global Journ als Inc. (US) tion,http://www.mannasim.dcc.ufmg.br/ © 20 7 Global Journa ls Inc. (US) 1 * Applications of MANET Routing Protocols in Sensor Network VenetisKanakaris DavidNdzi KyriakosOvaliadis Department of Electronic and Computer Engineering, University of Portsmouth * An Networks and its Performance Comparison RU Z K U RKhan AVReddy KAReddy THarsha The 2nd UKSIM European Symposium on Computer Modeling and Simulation Liverpool, United kingdom September 2008 * Improvements on DSDV in mobile ad hoc networks TLiu KLiu International Conference on Wireless Communications, Networking and Mobile Computing Shanghai, China WiCom 2007. September 2007 * Dual-interface multiple channels dsdv protocol TTLuong BSLee CKYeo 5th IEEE International Conference on Wireless and Mobile Computing Networking and Communication Marrakech, Morocco 2009. October 2009 * Channel allocation for multiple channels multiple interfaces communication in wireless ad hoc networks TTLuong BSLee CKYeo The 7th international IFIP-TC6 networking conference on AdHoc and sensor networks Singapore May 2008 * Method for Reducing Routing Overhead for Mobile Ad Hoc Network SChang WTing JChen IEEE International Conference on Wireless Communications and Signal Processing Suzhou,China WCSP 2010. October 2010 * 4: Wireless Medium AccessBControl (MAC) and Physical Layer (PHY) Speci fications for Low -Rate Wireless Personal Area Networks (LR-WPANs) IEEE Std 802.15.4TM 2003. 2003 Institute of Electrical and Electronics Engineers Part 15 * The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc Networks NYadav RYadav International Journal of Electronics 1 2 Circuits and Systems * Workplace Applications of Sensor Networks WSConner JHeidemann LKrishnamurthy XiWang MYarvis Wireless Sensor Networks: A Systems Perspective NirupamaBulusu SanjayJha August 2005 Artech House. to appear * Using Wireless Sensors as Selection Devices for a Multimedia Guidebook Scenario MRos MSouza MChan KBialkowski APostula NBergmann AToth Proc. RealWSN ,Workshop on Real-World Wireless Sensor Networks RealWSN ,Workshop on Real-World Wireless Sensor NetworksStockholm, Sweden June 2005 * Characterisation and Applications of MANET Routing Algorithms in Wireless Sensor Networks SiddhuWarrier Master of Science School of Informatics 2007 University of Edinburgh * 4: Wireless Medium Access B Control (MAC) and Physical Layer (PHY) Speci fications for Low -Rate Wireless Personal Area Networks (LR-WPANs) IEEE Std 802.15.4TM 2003. 2003 Institute of Electrical and Electronics Engineers Part 15 * Performance Evaluation of IEEE 802.15.4 for Mobile Sensor Network KZen DHabibi AMRassau IAhmad Proceedings of 5th IFIP International Conference on Wireless and Optical Communications Networks. WOCN '08 5th IFIP International Conference on Wireless and Optical Communications Networks. WOCN '08Surabaya, East Java Indonesia IEEE Press 2008 * Network Simulator 2 Ns2 NS2 * Georgia Tech Internetwork Topology Models (GT-ITM) homepage * a performance analysis of an ad-hoc ocean Sensor network KYLim Civilian, Singapore Technologies Dynamics Pte Ltd December 2006 University of Sheffield, United Kingdom * Comparison and Performance Evaluation of Wireless Sensor Network with different Routing Protocols DDChaudhary ; PranavPawar L MDr Waghmare Member IACSIT) Aalborg University, Denmark; Singapor IACSIT Press 2011. 2011 6 * Mannasim Framework, a module for WSN simula * Performance Analysis of Destination Sequenced Distance Vector RoutingProtocol in MANET MohammedGawiya AbdullahAl-Quha AliAl Lathaaa ZaidAmrana Al-Hubaishi International Journal of Ad Hoc Vehicular and Sensor Net works * RFC3561: Ad hoc ondemand distance vector (AODV) routing CPerkins EBelding-Royer SDas July 2003 * Adapting to route-deman d and mobility in ad hoc network routing SAhn AUShankar Computer Networks 38 April 2002 * A proactive routing protocol for multichannel wireless ad-hoc net works (DSDV-MC) ULee SFMidkiff JSPark IEEE International Conference on Information Technology: Coding and Computing (ITCC 2005) Las Vegas NV, United states April 2005 * Congestion control performance of RDSDV protocol in multihop wireless ad hoc networks SKBoukerche Das Wireless Networks 9 2003 * OPR: DSDV Based New Proactive Routing Protocol for Ad-Hoc Networks RR SKumar DPandey International Association of Computer Science and Information Technology -Spring Confe rence Singapore; United Kingdom 2009. April 2009. December 2011 1 International Journal