4. Simulation Model. this section, the simulator and the models used for simulation are discussed.
|
|
- Domenic Carroll
- 6 years ago
- Views:
Transcription
1 4. Simulation Model In this research Network Simulator (NS), is used to compare and evaluate the performance of different ad-hoc routing protocols based on different mobility models. In this section, the simulator and the models used for simulation are discussed Network Simulator NS is a discrete event simulator developed for networking research at University of California, Berkley (McCanne and Floyd 2003; Fall and Varadhan 2003). The goal of NS-2 is to support research and education in networking. It is suitable for designing new protocols, comparing different protocols and traffic evaluations. NS-2 was developed as a collaborative environment. A large number of institutes and personnel in research and development maain use NS-2. It provides support for wired and wireless networking. The simulator is written using C++. The accompanying OTCL script language is based on Tcl/Tk. The network components such as nodes, links, protocols and traffic requirements are defined using OTCL scripts. The simulator uses this script and outputs the trace at different selective layers. This output is used to calculate delays, throughput and other performance measures. NS can be used to simulate ad-hoc routing protocols. The wireless model has a mobile node at the core. The Mobile node has the ability to move within a given topology, ability to transmit and receive signals from a wireless channel. 86
2 Physical Layer Model Propagation models are used to determine whether the data transmitted through the air has been successfully received. These models consider propagation delays, carrier sensing and capture effects. In NS, for power attenuation of a signal, 1/r 2 free space model for short distances (r ) and 1/r 4 ground reflection model for distances above 100 meters are usually used, which are suitable for low-gain antennas located 1.5 meters above the ground and operating in the 1-2 GHz band (Broch et al 1998). When a packet transmission is requested, the sender object computes the propagation delay from the sender to every other erface on the channel and schedules the packet reception event for each node MAC Implementation IEEE MAC (IEEE Computer Society) is implemented within NS. MAC layer handles collision detection, fragmentation and acknowledgements. The protocol may also be used to detect transmission errors is a CSMA/CA protocol. It avoids collisions by checking the channel before using it. If the channel is free, it can start sending. If the channel is not free, it waits for a random amount of time before re-trying. For each retry, exponential backoff algorithm is used. In a wireless medium, it cannot be assumed that all stations hear each other. If a station seizes the medium by assuming that it is available, it may not necessarily be so. This problem is known as the hidden terminal problem and to overcome these problems, the collision avoidance mechanism and 87
3 positive acknowledgement schemes are used together. Positive acknowledgement requires peers to retransmit data and acknowledge each other until both are successful. ARP (Plummer 1982) is implemented in NS. It translates IP addresses to hardware MAC address before the packets are sent down to MAC. The antenna gain and receiver sensitivity parameters are available in NS. There are different types of antennas available for simulation. The channel implementation is based on a shared media model. All mobile nodes have one or more network erfaces that are connected to a channel. A channel has a particular radio frequency with a particular modulation and a coding scheme. Channels are orthogonal, i.e., packets sent on one channel do not erfere with transmission and reception in adjacent or any other channels. A packet is received if the transmission range is within the radio propagation model calculation and allowed by the bit error correction/detection system Mobile Node This is the basic object with added functionalities such as mobility, transmit and receive on a channel. Mobility features include node movement, periodic position updates and maenance of topology boundary. These are implemented using C++. Creation and attachment of network components like classifiers, demultiplexer, link layer (LL), MAC, channel within mobile node have been implemented in OTCL. Each mobile node is attached to a routing agent, which calculates the routes to other nodes in the network. Packets sent from the application are received by the routing agent as shown in 88
4 Figure 4.1. The agent determines a routing path for the packet and stamps it. It then sends the packet down to the link layer. The link layer uses ARP to determine the hardware addresses of neighbouring nodes and maps IP addresses to their correct erfaces. The packet is then sent to the erface queue and stays there until a signal from MAC is received. It leaves the erface queue (IFQ) and waits for the MAC to send when the channel is available. The packet is copied to all erfaces at the same time when the first bit of the packet would begin arriving at the erface in a real physical system. Each network erface stamps the packet with its own properties and invokes the propagation model. Note that the propagation model is invoked at the receiver. The propagation model uses transmit and receive stamps to determine the power at which the erface will receive the packet. The receiving network erface is left to decide whether the packet is received successfully or not. If successful, the packet is passed to MAC layer. If the MAC layer receives this packet as error-free and collision-free, it passes the packet to the node s entry po. The packet then reaches a demultiplexer, which decides whether the packet should be forwarded again or if it has reached its destination node. If the arrived po is the destination node, the packet is sent to the demultiplexer that decides the application to which it should be delivered. If the packet is forwarded, this operation is repeated (Fall and Varadhan 2003). 89
5 Figure 4.1 Schematic of a mobile node in NS 4.2. Structure of NS-2 NS-2 is built using object oriented methods in C++ and OTcl (object oriented variant of Tcl). As shown in the Figure 4.2, NS-2 erprets the simulation scripts written in OTcl. A user has to set the different components (e.g event scheduler objects, network components libraries and setup module libraries) in the simulation 90
6 environment. The user writes the simulation as a OTcl script, plumbs the network components together to complete the simulation. Figure 4.2 Simplified User s View of NS The user can setup and implement new network components required for the simulation. The event scheduler along with the network components trigger the events of the simulation (e.g. sends packets, starts and stops tracing). Some parts of NS-2 are written using C++ for efficiency reasons. The data path (written in C++) is separated from the control path (written in OTcl). Data path objects are compiled and then made available to the OTcl erpreter through an OTcl linkage (tclcl) which maps methods and member variables of the C++ object to methods and variables of the linked OTcl object. The C++ objects are controlled by OTcl objects. It is possible to add methods and member variables to a C++ linked OTcl object. A linked class hierarchy in C++ has its corresponding class hierarchy in OTcl as shown in Figure 4.3. Results obtained by NS-2 have to be processed by other tools, e.g. the Network Animator (NAM), a perl or an awk script and gnuplot (Gnuplot, 2003). 91
7 Figure 4.3 OTcl and C++: the duality Functionalities of NS-2 Functionalities for wired, wireless networks, tracing and visualization are available in NS-2. Support for the wired networks include o Routing DV, LS, PIM-SM o Transport protocols: TCP and UDP for unicast and SRM for multicast o Traffic sources: web, ftp, telnet, cbr (constant bit rate), stochastic, real audio o Different types of Queues: Drop-Tail, RED, FQ, SFQ, DRR o Quality of Service: egrated Services and Differentiated Services o Emulation Support for the wireless networks include 92
8 o Ad hoc routing with different protocols, e.g. AODV, DSR, DSDV, TORA o Wired-cum-wireless networks o Mobile IP o Directed diffusion o Satellite o Senso-MAC o Multiple propagation models (Free space, two-ray ground, shadowing) o Energy models Tracing Visualisation o Network Animator (NAM) o TraceGraph Utilities o Mobile Movement Generator Set dest n <num of nodes> -p <pause time> s <maxspeed> -t <sim time> -x <max x> -y <max y> Generating Traffic Patterns (CBR/TCP traffic) n s cbrgen.tcl [- type cbr tcp] [ nn nodes ] [ seed seed][ mc connections] [ rate rate] Trace Files There exists two different trace file formats (old and new) (Griswold, 2003; Fall and Varadhan 2003). A new trace file format was roduced apart from the 93
9 wireless trace format with the idea of joining the tracing in wired and wireless networks Old Wireless Trace File Format A trace in this format always begins with one of the characters in table 4.1. This character is succeeded by a white space separated list of values specific for the used protocol and the type of the message. For all wireless traces the values specified in table 4.2 are recorded. The values for the protocols used in the simulation are listed in tables 4.3, 4.4 and New Wireless Trace File Format The structure of the new wireless trace file format is changed so that it can be egrated o the new trace file format of the entire simulator. The lines of the trace files begin with the same action flags as in the old format and listed in table 4.1and followed by flag/value pairs. The flags begin with a dash and a letter that specifies the flag type (refer table 4.6). The trace format of a wireless event is shown in table 4.7. S Send R Receive D Drop F Forward Table 4.1: These four characters specify the action that can be processed at the packet 94
10 Event Abbreviation Type Value Wireless Event s: Send r: Receive d: Drop f: Forward %.9f %d (%6.2f %6.2f) %3s %4s %d %s %d [%x %x %x %x] %.9f _%d_ %3s %4s %d %s %d [%x %x %x %x] double Time Node ID double X Coordinate (If Logging Position) double Y Coordinate (If Logging Position) string Trace Name string Reason Event Identifier string Packet Type Packet Size hexadecimal Time To Send Data hexadecimal Destination MAC Address hexadecimal Source MAC Address hexadecimal Type (ARP, IP) Table 4. 2 Format of a wireless event 95
11 Event Type Value [%s %d/%d %d/%d] string Request or Reply ARP Trace Source MAC Address Source Address Destination MAC Address Destination Address %d [%d %d] [%d %d %d %d->%d] [%d %d %d %d->%d] Number Of Nodes Traversed Routing Request Flag Route Request Sequence Number Routing Reply Flag Route Request Sequence Number DSR Trace Reply Length Source Of Source Routing Destination Of Source Routing Error Report Flag (?) Number Of Errors Report To Whom Link Error From Link Error To Table 4.3 Additional trace information according to the used protocol Part I: ARP, DSR 96
12 [0x%x %d %d [%d %d] [%d %d]] (REQUEST) hexadecimal Type Hop Count Broadcast ID Destination Destination Sequence Number Source AODV Trace Source Sequence Number [0x%x %d [%d %d] %f] (%s) hexadecimal Type Hop Count Destination Destination Sequence Number double Lifetime string Operation (REPLY, ERROR, HELLO) Table 4.4 Additional trace information according to the used protocol Part II: AODV 97
13 IP Trace TCP Trace CBR Trace IMEP Trace Char Char Char hexadecimal [%d:%d %d:%d %d %d] Source IP Address Source Port Number Destination IP Address Destination Port Number TTL Value Next Hop Address, If Any [%d %d] %d %d Sequence Number Acknowledgment Number Number Of Times Packet Was Forwarded Optimal Number Of Forwards [%d] %d %d Sequence Number Number Of Times Packet Was Forwarded Optimal Number Of Forwards [%c %c %c 0x%04x] Acknowledgment Flag Hello Flag Object Flag Length Table 4.5 Additional trace information according to the used protocol Part III: IP, CBR, IMEP N I H M P Node Property IP Level Packet Information Next Hop Information MAC Level Packet Information Application Level Packet Information Table 4.6 Flag types new wireless trace format 98
14 Flag Type Value s-r-d-f action type -t Double Time -Ni Node ID -Nx Double X Coordinate -Ny Double Y Coordinate -Ne Double Node Energy Level -Nl String Trace Name (AGT, RTR ) -Nw String Drop Reason -Hs Node ID -Hd Node ID For Next Hop -Ma hexadecimal Duration -Ms hexadecimal Source Ethernet Address -Md hexadecimal Destination Ethernet Address -Mt hexadecimal Ethernet Type -P String Application Type (arp, dsr, cbr, tcp ) Table 4.7 Wireless event using the new trace format 99
15 4.3. Mobility models Mobility management faces many challenges in ad-hoc networks. Routing enhancement can be achieved by seeking a node and by exploiting all the mobility profiles for the nodes. The ad-hoc networks routing performance is strongly influenced by the nature of nodes mobility pattern. Most of the simulation work in ad hoc network evaluates the routing performance using only the Random Waypo (RWP) (Camp et al 2002) model. This model provides limited scenarios, where all the mobile nodes move randomly in an area which is not realistic in emulating mobile nodes movements in the real world. Varying the mobility characteristics are expected to have a significant impact on the routing protocols performance. The following section contains a brief description of the existing mobility models in ad-hoc networks Entity and Group Mobility Models Since MANETs are often analyzed through simulations, their performance results depend slightly on the simulation network parameters. Thus the evaluation of an ad-hoc routing protocol depends on the selected mobility model. Entity mobility models represent mobile nodes whose movements are independent of each other. On the other hand, group mobility models represent mobile nodes whose movements are dependent on each other and they tend to be more realistic in applications involving group communication. 100
16 Entity Mobility Models In Random Waypo (RWP) Model (Bettstetter et al 2002) all nodes are uniformly distributed around the simulation space and movement of nodes can be paused according to the pause time specified. A mobile node begins by staying in a one location for a fixed pause time. After that it selects a random destination and moves towards that destination with a speed uniformly distributed over [0, speedmax]. Upon reaching the destination the node pauses and then repeats the process throughout the simulation time. This model is memory less where current locations are independent of the previous ones. Unfortunately the simplicity of this model cannot be adapted to describe complex mobility behaviour of users Manhattan Grid Mobility Model Manhattan Grid Mobility Model (ETSI ) is proposed to model a city section with streets crossing each other perpendicularly. Each mobile node starts from a random po on a certain street. It then chooses a random destination and moves toward this destination within a predefined speed range. Upon reaching the destination the node pauses for a certain time before repeating the process. It is assumed that the nodes move only in the vertical and horizontal directions on the map. 101
17 Group Mobility Models Reference Po Group Mobility (RPGM) Model (Hong et al 1998) it encompasses a random motion of a group of mobile nodes as well as random motion of each mobile node within a given group. Each group has its own mobility behaviour. There is a logical centre for each group such that the centre s motion defines the entire group s motion behaviour (including location, speed, direction and acceleration) and it follows the RWP model. Every node within a specified group follows this logical centre. The motion of the groups is explicitly defined by giving a motion path for the centre which is viewed as a sequence of check pos. Individual mobile nodes belonging to a group randomly move about their own pre-defined reference pos whose movements depend on the group movement Related Work In this chapter, details of previous research on Ad-Hoc networks and how this work inspired this thesis work is discussed. This begins with the discussion of significance of mobility models. It can be seen that reactive ad-hoc routing protocols will have different optimal connectivity levels with the difference in the mobility pattern. In (Turgut et al 2001), the authors claim that if the movement pattern of the nodes is absolutely deterministic then the route life time can be exactly determined. On the other hand a chaotic mobility pattern brings in uncertay to the route life time. The authors highlighted the important role of mobility models on the route life time. They have 102
18 shown that this highly depends on the speed and direction of movement of all the involved nodes. In this thesis a performance study is made (Chen and Chang 2003) for on demand ad-hoc routing protocols with different mobility models Emerging Tools/Frameworks Indeed the Random Waypo model which is used in most of the ad-hoc simulation is studied under NS-2 does not consider some significant mobility characteristics. Firstly spatial dependency is not considered where each mobile node moves independently of others ignoring the neighbourhood influence on the nodes movements. Also temporal dependency is not considered such that mobile nodes velocities are independent. However in reality the mobile node velocity should not change abruptly due to the physical constras of the mobile entity itself. Furthermore the Random Waypo model does not include the geographic restrictions where the movement of mobile node may be restricted by a street map or city boundaries. To thoroughly study the effect of mobility on MANET protocol performance some tools and frameworks have emerged developing a set of mobility models in order to provide a richer environment for routing protocols evaluation. One such tool is the Bonn-Motion tool Bonn-Motion Tool: A mobility scenario generator and analysis tool. It supports Manhattan Grid Mobility, Reference Po Group Mobility and Random Waypo models. 103
19 4.4. Summary: From the study, it is evident that the field of ad-hoc mobile networks is rapidly growing and changing and there are many routing challenges that need to be met. The validation of the routing propositions is being mainly conducted through simulation results. In this chapter, roduction was given on the major challenges in the design of routing protocols in ad-hoc network. It is noticed that the major challenges to be addressed in any routing protocol design are the nodes mobility, dynamic topology, limited battery power and limited bandwidth. Different classifications of the routing protocols according to the routing approach, routing architecture and communication reliability are provided. The most common classification considered for almost all protocols, divides the protocols according to the used routing approach o proactive (on-demand) and reactive (table driven). Since MANETs are not widely deployed, most of the research in these networks is based on simulation. The Random Waypo model is the most commonly used mobility model in these simulations. This model is not sufficient to capture some important mobility characteristics in MANET scenarios. Consequently there is a need for considering the impact of different mobility models in the evaluation of routing performance. 104
CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS
59 CHAPTER 4 SIMULATION MODEL AND PERFORMANCE METRICS 4.1 OVERVIEW OF SIMULATION MODEL The performance of a MANET routing protocol under varying network conditions is to be evaluated in order to understand
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationAnalysis of Routing Protocols in MANETs
Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationChapter-4. Simulation Design and Implementation
Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview
More informationRouting Protocols Simulation of Wireless Self-organized Network Based. on NS-2. Qian CAI
International Conference on Computational Science and Engineering (ICCSE 2015) Routing Protocols Simulation of Wireless Self-organized Network Based on NS-2 Qian CAI School of Information Engineering,
More informationPerformance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model
Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationAnalysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol
Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol with Emphasis on Mobility and Communication Patterns Vahid Garousi Department of Systems and Computer Engineering Carleton University,
More informationPerformance analysis of aodv, dsdv and aomdv using wimax in NS-2
Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers
More informationNetwork Simulator 2: Introduction
Network Simulator 2: Introduction Presented by Ke Liu Dept. Of Computer Science SUNY Binghamton Spring, 2006 1 NS-2 Overview 2 NS-2 Developed by UC Berkeley Maintained by USC Popular simulator in scientific
More informationDMN1 : COMMUNICATION PROTOCOL SIMULATION. Faculty of Engineering Multimedia University
DMN1 : COMMUNICATION PROTOCOL SIMULATION Faculty of Engineering Multimedia University DMN1 Marking Scheme No Component Criteria Not answered 0 marks Poor 2 marks Acceptable 4 (max) marks 1 Viva Students
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationAnalysis and Simulations of Routing Protocols with Different Load Conditions of MANETs
Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs Poonam Pahuja Department of Computer Engineering, Mewar University, Chittorgarh Rajasthan, Email: poonamsanjay2007@gmail.com
More informationThe CMU Monarch Project s Wireless and Mobility Extensions to ns
The CMU Monarch Project s Wireless and Mobility Extensions to ns David B. Johnson Josh Broch Yih-Chun Hu Jorjeta Jetcheva David A. Maltz The Monarch Project Carnegie Mellon University http://www.monarch.cs.cmu.edu/
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationPerformance Evaluation of Routing Protocols for Mobile Ad Hoc Networks
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib
More informationMobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV
Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationPerformance Analysis of Routing Protocols for Mobile Ad-hoc Networks
Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks Anil Choudhary Department of Electrical and Electronics Engineering Rajiv Gandhi Govt. Polytechnic, Itanagar, Arunachal Pradesh, India
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationImpact of Mobility Models on the Performance of Routing Protocols in Mobile Ad Hoc Networks
Impact of Mobility Models on the Performance of Routing Protocols in Mobile Ad Hoc Networks Mohammad Amin Roshanasan a, Ghassan A. QasMarrogy b, Zainab Murtadha c, Jia Uddin d, *, Emmanuel A. Oyekanlu
More informationCHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN
26 CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN Due to the continuous research progress in the field of WSN, it is essential to verify the new hardware and software design and
More informationA Simulation study : Performance comparison of AODV and DSR
A Simulation study : Performance comparison of AODV and DSR K.Dileep Kumar 1, N.Seethayya 2, H.Venkata Bhagya Sri 3,S.Papa Rao 4 1,2,3,4 Asst.Professor Department of CSE, Sri Sivani College of Engineering,
More informationPart 5. Wireless Network
Introduction to NS-2 Part 5. Wireless Network Min Chen School of Computer Science and Engineering Seoul National University 1 Outline Introduction to Wireless Network An Example of Wireless Simulation
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationNetwork Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.
Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to
More informationIMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS
IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India
More informationA Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks
International Journal of Research in Advent Technology, Vol.6, No.8, August 218 A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks S. Mahalakshmi 1, Dr. K. Geetha 2
More informationPerformance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3
International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 2017 Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationStudy on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model
Study on and Outdoor for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Ibrahim khider,prof.wangfurong.prof.yinweihua,sacko Ibrahim khider, Communication Software and
More informationII. ROUTING CATEGORIES
ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses
More informationPerformance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla
More informationAn Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET
An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini
More informationPERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET
PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,
More informationSIMULATION BASED AND ANALYSIS OF ROUTING PROTOCOLS FOR VANET USING VANETMOBISIM AND NS-2
International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 9, Sep 2015, pp. 32-41, Article ID: IJCET_06_09_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=6&itype=9
More informationNetwork Simulator 2. Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore.
Network Simulator 2 Reti di Telecomunicazioni (CdL Ing. TLC) Telematica I (CdL Ing. INF) Ing. Carla Passiatore c.passiatore@poliba.it 1 NS2 wireless simulation Use NS to simulate Wireless Network Simple
More informationPerformance Analysis of Three Routing Protocols for Varying MANET Size
Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 A brief Introduction to ns-2 2 Contents 1. Introduction to ns-2 2. ns-2 Components 3. Create a Basic ns-2 Model 4. Case Study: WiFi Simulation 5. Simulation
More informationA STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS
A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationPERFORMANCE ANALYSIS OF AODV, DSR AND DSDV IN MANET USING NS-2
PERFORMANCE ANALYSIS OF AODV, DSR AND DSDV IN MANET USING NS-2 Subhrananda Goswami 1 * and Chandan Bikash Das 2 1 Assistant Professor, Department of IT, Global Group of Institutions, Haldia, Purba Midnapore,
More informationPerformance Of Routing Protocols For Mobile Ad Hoc Networks
Performance Of Routing Protocols For Mobile Ad Hoc Networks San San Naing, Zaw Min Naing, Hla Myo Tun Abstract: Mobile ad hoc network has become popular in wireless network communication technology. Recently
More informationAPPENDIX A. Installation Procedure of VanetMobiSim 1.1
APPENDIX A Installation Procedure of VanetMobiSim 1.1 A1.1 How to install VanetMobiSim-1.1 The first step is downloading the source code of VanetMobiSim-1.1and expand it in a base directory of our choice.
More informationEvaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios
Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models
More informationPERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS
PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400
More informationAd Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationEvaluation of Mobility Models with AODV & OLSR Protocol by Varying Node Speed in MANET
Evaluation of Mobility Models with AODV & OLSR Protocol by Varying Node Speed in MANET Smt. Rekha Shahapurkar 1, Dr. Umesh Kumar Singh 2, Sh. Yogesh Mishra 3 1 Reasearch Scholar, 2 Reader 3 Assistant ptofessor
More informationPOLITECNICO DI TORINO Repository ISTITUZIONALE
POLITECNICO DI TORINO Repository ISTITUZIONALE Comparative Performance Simulation of DSDV, AODV and DSR MANET Protocols in NS2 Original Comparative Performance Simulation of DSDV, AODV and DSR MANET Protocols
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 7, July ISSN
International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 1447 A Survey cum Simulation on Routing Protocols for Mobile Ad-Hoc Network Nidhi bajpai,anuradha,rajat Dixit ABSTRACT
More informationCERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research
CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West
More informationPerformance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET
Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering
More informationWireless networks. Wireless Network Taxonomy
Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher
More informationEFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS
EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN Bhurewal, Prof. Ms. Sujata G. Tuppad, Journal Impact Factor (215): 8.9958 (Calculated by GISI) MULTICHANNEL MOBILE ADHOC NETWORKS Mayur N. Bhurewal 1, Prof.
More informationCHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION
58 CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 4.1 INTRODUCTION TO SLBHAD The focus of this chapter is to detect and isolate Black Hole attack in the MANET (Khattak et al 2013). In order to do that,
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationReliable Multicast in Mobile Networks
Reliable Multicast in Mobile Networks Pasi Tiihonen and Petri Hiirsalmi Lappeenranta University of Technology P.O. Box 20 FIN-53851 Lappeenranta, Finland, {Pasi Tiihonen, Petri Hiirsalmi}@lut.fi Key words:
More informationThe Network Simulator Fundamentals. Downloads and further info at:
ns-2 The Network Simulator Fundamentals Downloads and further info at: http://www.isi.edu/nsnam/ns 1 ns Primer Basic ns Architecture Basic Tcl, OTcl Elements of ns 2 ns Architecture Object-oriented (C++,
More informationINTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..
INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationSimulations: ns2 simulator part I a
Simulations: ns2 simulator part I a Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ a Based on: Eitan Altman and Tania Jimenez NS Simulator for Beginners,...
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science
More informationSIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze
80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationEthernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1
Ethernet Network Fundamentals Chapter 9 1 Objectives Identify the basic characteristics of network media used in Ethernet. Describe the physical and data link features of Ethernet. Describe the function
More informationPERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET
Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationCongestions control through cloud computing with MANET
Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc
More informationPerformance Evaluation and Statistical Analysis of MANET routing Protocols for RPGM and MG
Performance Evaluation and Statistical Analysis of MANET routing Protocols for RPGM and MG Prajakta M. Dhamanskar Fr. C.R.C.E., Mumbai Lecturer, IT Dept.India Dr. Nupur Giri V.E.S.I.T., Chembur Professor,
More informationPart 3: Network Simulator 2
S-38.148 Simulation of data networks / fall-04 Part 3: Network Simulator 2 24.11.2004 1 NS2: Contents NS2 Introduction to NS2 simulator Background info Main concepts, basics of Tcl and Otcl NS2 simulation
More informationPerformance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks
Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks E.Gnanamanoharan 1 and R. Bensraj 2 Department of Electrical Engineering 1, 2 Annamalai University 1, 2 Email:
More informationROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS
ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile
More informationA Review paper on Routing Protocol Comparison
A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna
More informationPerformance Comparison of Routing Protocols for wrecked ship scenario under Random Waypoint Mobility Model for MANET
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1051-1058 Research India Publications http://www.ripublication.com Performance Comparison of Routing Protocols
More informationPerformance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationConsiderable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)
Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing
More informationEnergy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models
ICACSIS 2012 ISBN: 978-979-1421-15-7 Energy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models Harris Simaremare*, Abdusy Syarif**, Abdelhafid
More informationA Multi-homing Extension of Wireless Node Implementation in NS-2
A Multi-homing Extension of Wireless Node Implementation in NS-2 Qinghua Wang, Tingting Zhang Department of Information Technology and Media Mid Sweden University, 85170 Sundsvall, Sweden Email: {qinghua.wang,
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationPerformance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela
Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,
More informationExecutive Overview. D1.3.2-VanetMobiSim/Ns-2: A VANET simulator for CARLINK
Executive Overview Title: D1.3.2-VanetMobiSim/Ns-2: A VANET simulator for CARLINK Summary: This document provides a brief introduction and analysis of the simulation tool VanetMobiSim/NS-2 proposed for
More informationPERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET
Volume 1, Issue 4, 215 PERFORMANCE BASED EVALUATION OF, AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh Gyan Vihar University Abstract:A Mobile
More information