EMWIN: Emulating a Mobile Wireless Network using a Wired Network*

Size: px
Start display at page:

Download "EMWIN: Emulating a Mobile Wireless Network using a Wired Network*"

Transcription

1 EMWIN: Emulating a Mobile Wireless Network using a Wired Network* Pei Zheng and Lionel M. Ni Department of Computer Science and Engineering, Michigan State University 3115 Engineering Building East Lansing, MI, 48824, USA Phone: {zhengpei,ni}@cse.msu.edu ABSTRACT Test and performance evaluation of protocols and algorithms in mobile wireless networks is known to be challenging. Due to the highly varying characteristics of mobile wireless networks, one cannot merely rely on either network simulation or a testbed. Network emulation provides a controllable and reproducible environment, yet it generally lacks the support for the emulation of network topology and mobility, which are extremely critical in mobile wireless network research. We introduce EMWIN, a new IP-based mobile wireless emulation system that can overcome those drawbacks. In EMWIN, a target mobile wireless network is precisely mapped to an emulation configuration in a laboratory private network consisting of several emulator nodes, each of which is able to emulate multiple mobile hosts. Moreover, the emulator node can be flexibly configured such that predefined network conditions and traffic dynamics can be generated in an automatic manner. With EMWIN, the mobility of the target mobile wireless network with a number of mobile nodes can be faithfully emulated in a wired network environment. Categories and Subject Descriptors C.2.1 [Computer Systems Organization]: Computer- Communication Networks - Network Architecture and Design Wireless communication General Terms Measurement, Performance, Design Keywords mobile wireless network, performance evaluation, network emulation, mobility 1. INTRODUCTION Recent research in mobile computing has given rise to a plethora of mobile wireless network protocols and algorithms at different network layers. Applications subject to the dynamic environment of mobile wireless networks must be adaptive to a variety of Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. WOWMOM 02, September 28, 2002, Atlanta, Georgia. Copyright 2000 ACM /00/0000 $5.00. network conditions and traffic dynamics. In an effort to test and evaluate the correctness and performance of new protocols, algorithms, and applications, one can choose from three approaches: simulation, testbed, or emulation. Wireless simulation packages, such as GloMoSim [1] and ns-2 [2], have been widely used in wireless network research. Especially, simulation is probably the only way to study the behavior of a protocol when real implementation is unavailable for a field test. Wireless network simulators often provide a rich set of protocol modules as well as a fully controllable simulation environment to generate whatever simulated network conditions and traffic dynamics. However, wireless simulation often makes many assumptions that may not always be valid in real wireless networks, thus making the statement based on the simulation result incorrect or flawed. Moreover, simulation time increases considerably as the number of simulated mobile nodes increases in most event-driven simulators. Furthermore, protocol and algorithm modules in wireless network simulators are not real implementations. Even if they work as expected in a simulator, they may fail in the target network due to either implementation bugs or network conditions and traffic dynamics that cannot be simulated or have been ignored in previous simulations. Some simulators can import traffic from real networks. However, each packet has to be converted such that it can be adapted in the simulation environment. A testbed might be theoretically the best test environment for new protocols and algorithms. As long as the real implementation for a certain operating system is available, one can always conduct a field test. However, a testbed will become useless and create misleading results if some specific network conditions and traffic dynamics never occur during a test. A wireless network emulator is a combination of wireless simulation and testbed. Similar to the simulation approach, wireless network emulation can generate predefined emulated network conditions and traffic dynamics for any specific purposes. As a real laboratory network, real protocol implementations, if available, can be tested in a controllable and reproducible environment without any modification. The major research issue of common wireless network emulators is how to determine those predefined network effects such that the corresponding emulation result can give more insight to users. Existing wireless network emulators can only emulate end-to-end network effects, making them unable to be used for the evaluation of topology-related * This research was supported in part by NSF grant EIA

2 protocols such as multi-hop mobile ad hoc routing protocols. Moreover, existing wireless network emulators are non-scalable in terms of the number of mobile hosts that they can emulate. In this paper, we present a new IP-based mobile wireless network emulation system called EMWIN (Emulation of Mobile WIreless Networks). EMWIN, unlike any other wireless network emulators to the authors knowledge, provides a unique feature of emulating multiple mobile hosts in one single emulator node. Thus with a number of commodity computers as the emulator nodes, one can emulate a large number of mobile hosts in EMWIN. In addition, EMWIN is able to emulate the mobility of a mobile host in a wired network. The rest of the paper is organized as follows. A literature review of existing mobile wireless network emulators is presented in Section 2. The architecture of EMWIN is outlined in Section 3, followed by a discussion of some critical design issues and a brief description of software components in EMWIN. Some preliminary testing results and a sample emulation experiment with EMWIN are then presented in Section 4. We conclude this paper with a summary and some future work in the last section. 2. A REVIEW OF EXISTING MOBILE WIRELESS NETWORK EMULATORS 2.1 Central-Control Wireless Emulators Emulators in this category abstract the entire mobile wireless network to a model with a set of parameters. With these parameters, the emulator is able to reproduce some network effects by applying network conditions and traffic dynamics to each packet passing by. A mobile wireless emulation experiment is conducted by connecting mobile hosts to the central-control emulator. This category may also include some general-purpose network emulators in addition to one specifically designed for mobile wireless network emulation. Some general purpose network emulators falling into this category are ONE [3], MIT s Click modular router [4], Dummynet [5], and NIST NET [6]. Typical network parameters supported in these emulators include packet delay distribution, packet drop pattern, bandwidth, and queues. Although these emulators perform well for wired network emulations, they are likely to fail to meet one of the specific requirements of mobile wireless network emulation, i.e., the capability to emulate dynamic network conditions. Wirelessspecific network emulators, such as Seawind [7], allow one to define multiple set of parameters that are constantly changing during an emulation experiment. Additionally, specific channel models are provided to closely mimic a unidirectional wireless link. Another example of central-control mobile wireless network emulator is JEmu [8]. In JEmu, mobile hosts connected to the emulator host are not allowed to move. The emulator program, a standalone application, accepts radio layer messages from those mobile hosts and determines whether or not to forward the messages to the destination based on the location information of the mobile hosts. If there is a collision on the mobile host once the message is forwarded, the message is then dropped and returned to the radio layer. Central-control emulators are easy to configure, and their parameter sets are usually enough for the performance evaluation of end-to-end network protocols. However, this approach fails to provide a test environment for some other topology-related protocols such as multi-hop ad hoc routing protocols, which is now highly active in mobile network research community. 2.2 Simulation-combined Wireless Emulators Mobile wireless network emulators in this category aim to combine network emulation with existing full-fledged network simulators such that the rich resource available in network simulators can be used in an emulation experiment. The most known example in the category is VINT/ns [9, 10]. As an extensible and powerful event-driven network simulator, VINT/ns has been widely used in network research community. A set of wireless and mobile extension has been developed by Monarch project at CMU/Rice [10-12]. The emulation facility in VINT/ns is able to capture and direct traffic into the simulator. Within the simulator, protocol modules, algorithms, and visualization tools can be incorporated into the emulator in an automatic fashion. In addition, arbitrary mobility can be generated with the help of the simulator. In particular, [12] offers an ns-based emulation environment for multi-hop ad hoc networks, in which a dynamic scenario can be created with ns and real traffic from a mobile node can be directed into a central ns server. The advantage of this approach is that it offers a large amount of simulation resources in the central simulator, compared with the centralcontrol approach that only has a limited number of network parameters available. However, similar to central-control approach, the simulation-combined approach also lacks the support for the evaluation of real topology-related protocols. Furthermore, since the emulation is mostly conducted in the simulator, this approach inherits the intrinsic drawbacks of network simulation. 2.3 Trace-based Mobile Network Emulation This approach, more specifically trace modulation, consists of three distinct phases: data collection phase, trace distillation phase, and modulation phase [13]. The first phase collects traces from a target mobile wireless network. The second phase constructs a wireless network model with the collected traces. The last phase reproduces the traced network effect in a wired network. This approach is particularly significant because the wireless network effects that it reproduces originate from real network traces, while the other two approaches can only approximate the network effects to some certain levels. However, similar to the central-control approach and simulation-combined approach, the trace-based approach can only provide a reproducible environment for the performance evaluation of endto-end protocols and applications. Additionally, since each mobile host in the target network should be traced for an emulation experiment, this approach cannot emulate a large-scale network because of the high cost in collecting traces. In addition to the three categories, some general purpose network emulators can also be used to emulate a simple wireless network topology, such as [14]. The problem of these emulators is that the number of nodes they can emulate is limited by the one-to-one mapping scheme, in which each mobile host in the target network is mapped to an emulator node in the emulation experiment. While all these approaches described above address the problem of mobile wireless network emulation with different methodologies, they share the following drawbacks:

3 Unable to emulate a wireless network topology, or unable to emulate a complex network topology with a low cost. Unable to emulate the mobility of each individual mobile host. Unable to provide an interactive interface for users to easily reconfigure the emulator. EMWIN, our mobile wireless network emulation system, is able to solve all the three problems. The capability of emulating multiple mobile hosts in one single emulator node allows one to emulate a complicated wireless topology with a small number of commodity computers, as in contrast to those one-to-one emulation approaches. We propose a data structure called neighbor table in each emulated mobile host to enable the mobility emulation. User-space control programs and kernel modules make EMWIN flexible in terms of emulation reconfiguration and interaction between users and the system. With these functionalities, EMWIN can be applied to a broad area of mobile wireless researches. 3. EMWIN Architecture 3.1 System Overview EMWIN is based on an emulation framework called EMPOWER (EMulation the Performance Of WidE area networks) [15]. EMPOWER provides a unique approach of mapping a network topology to an emulation configuration in a laboratory network. A router in the target network is mapped to a Virtual Router in the emulation configuration. A link in the target network is mapped to a Virtual Link in the emulation configuration. As shown in Figure 1, a router with four physical ports is mapped to a virtual router with four virtual ports in an emulator node. A virtual port is a combination of a physical Ethernet port to connect with other virtual routers, and a software module of virtual device to control the outgoing packets from this virtual port. In Figure 1, the emulator node has a total number of seven virtual ports; four of them are used in this example. An emulation configuration physically consists of a number of emulator nodes and fast Ethernet switches to establish a virtual topology. Each emulator node in the emulation configuration, with multiple network interface cards installed and properly configured, can be logically regarded as a set of virtual routers and virtual links. Specific network conditions and traffic dynamics are generated by the virtual routers and virtual links in the emulation configuration. VP 1 PP 1 Virtual Router Router PP 2 PP 3 VD 1 VD 2 VD 3 VD 4 VP 2 VP 3 VP 4 Emulator Node PP 4 VP 5 Virtual Ports (Not Used) VD 5 VD 6 VD 7 VP 6 VP 7 PP n VP n VD n Physical Port Virtual Port Virtual Device Figure 1. An example of virtual-router mapping EMWIN essentially makes use of the virtual-router mapping scheme and adds some mobile wireless extensions to EMPOWER such that the mobility of mobile hosts can be emulated in a wired laboratory private network. The physical layout of EMWIN consists of a number of emulator nodes and test nodes connected to a fast Ethernet switch. A test node can be a computer or a mobile device such as a laptop computer or a handheld device. Network traffic generated by the test nodes are directed to those emulator nodes in a way determined by the topology of the target network. Each emulator node may have multiple network interface cards installed. The number of mobile hosts that an emulator node can emulate can be increased simply by plugging in more network interface cards. The number of mobile hosts that EMWIN can emulate can also be increased by adding more emulator nodes into the system. As a result, EMWIN is highly scalable in emulation capacity. EMWIN can also have physical mobile hosts such as laptop computers, PDAs, and PocketPCs with wireless adaptors, and IEEE wireless access points connected to the laboratory private network, thus providing a hybrid emulation configuration with both fixed emulator nodes and mobile emulator nodes. A target network of EMWIN is a mobile wireless network with a certain number of mobile hosts, which may include a variety of mobile devices. Each mobile host may operate in either multi-hop ad hoc mode, peer to peer mode, or infrastructure mode. In EMWIN, each mobile host in a target mobile wireless network is mapped to a Virtual Mobile Node (VMN). An emulation scenario can be created by configuring the property sets of all the VMNs. Thus the problem of emulating of mobile wireless network is reduced to the problem of accurately mapping the target network to an emulation configuration with the support for mobility emulation in a wired network. The following section outlines the approach we used to solve the problem. 3.2 Features of EMWIN EMWIN provide a set of features as follows. As an IP-based mobile wireless network emulation system, network conditions and traffic dynamics generated in EMWIN are real. A packet in EMWIN physically traverses the network protocol stack of the emulator node s kernel, instead of logical processes in network simulators. Mobile wireless network protocol implementations can be tested and evaluated directly in EMWIN without any modifications or conversions. The unique feature of emulating multiple mobile hosts in a single emulator node enables one to emulate a large number of mobile hosts in EMWIN. For example, each emulator node can be configured to emulate 8 mobile hosts. With 6 of these emulator nodes, one can emulate a mobile wireless network with a total number of 48 mobile hosts. EMWIN supports wireless mobility emulation with a wired network. Each VMN in EMWIN maintains a neighbor table of its accessible VMNs. The movement of a mobile host can be emulated by controlling its VMN s neighbor table. As a result, a dynamically changing wireless network topology can be emulated in a wired network. With this feature, multi-hop mobile ad hoc network emulation can be done with EMWIN. EMWIN provides a fully controllable and reproducible network environment, in which wireless network protocols and algorithms can be tested and evaluated against specific network conditions and traffic dynamics.

4 The use of commodity computers as emulator nodes makes EMWIN a low-cost emulation system. VMNs can be controlled with a user-space program, thus it is convenient for the reconfiguration of an emulation experiment. 3.3 Stages in an Emulation There are three necessary stages in conducting mobile wireless network emulation with EMWIN, as shown in Figure 2. First, the target mobile wireless network must be characterized for an emulation experiment with EMWIN. Physical network parameters of a mobile host in the target network are collected such as the data transmission speed, data transmission range of the wireless adaptor, and the bit error rate. If the transmission range is constantly changing, a series of sample data of the transmission range is needed for mobility emulation in the next stage. The network parameters can also be obtained by measuring the performance of a mobile host. In addition, the movement of each mobile host must be explicitly determined. Otherwise, random movement will be used. The output of target network characterization is a set of network parameters that can fully determine an emulation configuration. Target Network Characterization Emulation Results Emulation Experiment A Set of Network Parameters Emulation Mapping An Emulation Configuration Output Input Figure 2. Stages in a complete emulation with EMWIN The second stage is emulation mapping. Based on the input of a set of network parameters from the first stage, EMWIN will generate an emulation configuration, which consists of certain number of properly configured VMNs and their mobility event lists. Each event represents an effective movement of the mobile host. Note that not all the movements are emulated since some of them may not have any impact on the neighbors of the mobile host. In other words, EMWIN only emulate the movement of a mobile host that will result in changes of its accessible neighbors or the transmission quality to its neighbors. The output of this stage is a complete emulation configuration. Once an emulation configuration is available, an emulation experiment can be conducted. If the purpose of the emulation is to evaluate the performance of a protocol or an algorithm implementation on a mobile host, one can simply execute the implementation on the corresponding VMN. For other purposes that may involve multiple mobile hosts, a scenario must be defined by the user prior to the emulation experiment. Each VMN in this scenario will then be configured in the second stage. In addition, traffic monitoring tools [16] and performance measurement tools [17] are needed to collect and analyze emulation results. If the emulation experiment results show that an adjustment of the selected network parameters is needed to achieve a more accurate emulation, the three-stage procedure can be repeated with the adjustment. Current EMWIN is able to automatically conduct the last two stages, leaving the first stage to the user. 4. Design of EMWIN 4.1 Design Issues A critical design issue of EMWIN is to make it flexible in emulating different layers of mobile wireless networks. More specifically, EMWIN should not only provide means to emulate network behaviors beyond network layer (including network layer), but also facilitate the emulation of data link layer. In particular, most existing approaches use simulation to evaluate MAC layer protocols such as [18] and [19]. We intend to provide an emulation approach for the same purpose. The emulation of network layer and transport layer of a mobile wireless network can be done by abstracting the target network to a model with a set of network parameters, which is sufficient for end-to-end protocol evaluation, as described in the previous section. However, the emulation of multi-hop ad hoc routing in network layer needs more than those parameters. The movement of each mobile host must be precisely emulated such that the execution of routing protocols in the emulation environment closely mimics its behavior in the target network. In the emulation mapping stage of EMWIN, the movement of each mobile host in the target network is used to compute the neighbor table. Any topology changes in the target network will be reflected in the neighbor tables of some VMNs. We also plan to enhance EMWIN by providing modules to generate random movements for a number of mobile nodes. The emulation of data link layer of a mobile wireless network needs more discussion. Since EMWIN is designed to emulate a mobile wireless network in a wired network, the difference between the data link layer of a wireless network and a wired network makes the data link layer emulation quite complicated. For example, current Ethernet uses CSMA/CD as the MAC layer protocol, while IEEE uses CSMA/CA with RTS/CTS and acknowledgement as the MAC layer protocol. Furthermore, EMWIN should be able to evaluate any modifications to the backoff algorithm. To achieve this, a special emulated MAC layer (emac) has to be added to each VMN. emac resides between the virtual device and network layer. Whenever a packet is about to be sent out from a VMN, emac of this VMN will check the channel flag of its current neighbors. If one of its neighbors has a channel flag raised, that neighbor is active in transmitting now. Thus the VMN has to backoff for next try. Once occupying the channel successfully, it will raise the channel flag to indicate the occupation. The channel flag will be reset when the transmission is over. In addition, RTC/CTS can be sent from one VMN to another for a complete channel operation. emac is also the place where a backoff algorithm can be incorporated into EMWIN. Since multiple VMNs coexist in an emulator node, resource competition among those VMNs may occur, which in turn affects the accuracy and scalability of the emulator. We have developed an effective virtual-router mapping algorithm to solve this

5 problem. According to this algorithm, we first find the maximum number of VMNs an emulator node is allowed to generate, then the target network is partitioned into small blocks such that the emulation accuracy of each block is guaranteed. Taking this problem into account, we are able to emulate 6 mobile nodes with a Pentium 4 1.7GHz computer, 4 mobile nodes with an AMD K6 300MHz computer. With a small number of those computers, we can emulate a large mobile wireless networks. In addition, we measured the overhead of the emulator modules and Ethernet links in emulating wireless connections. The results show that they have no significant effect on the emulation accuracy [20]. 4.2 EMWIN COMPONENTS As a distributed mobile wireless network emulation system, EMWIN employs a VMN-based approach to facilitate the emulation of multiple mobile hosts, instead of a central-control approach that can only support end-to-end network effect emulation. The emulator nodes have the same hardware configurations. Each of them may be configured to generate a number of VMNs in accordance with the mapping scheme. Emulator Node VMN Figure 3. Logic view of an emulator node showing an example of four VMNs existence VMN Control Program Virtual Device Control Program User Space Kernel Space Virtual Device Figure 4. Modules in an emulator node where VMNs and virtual devices are controlled by user-space programs As shown in Figure 3, an emulator node is configured to generate four VMNs. The circles indicate the transmission range of each VMN, which may constantly move around. Note that these VMNs share the same system resources such as CPU, memory, bus, and interrupt in the emulator node. The key component in EMWIN is the virtual device. A virtual device is loadable kernel module attached to a physical network device. It can be configured to have an IP address. With appropriate routing table modifications, outgoing packets from a VMN physical network device can be redirected to the attached virtual device, in which a set of network effects such as packet transmission speed, packet latency, packet drop rate, and bit error rate can be applied. Consequently, a virtual device module represents a unidirectional link in the target mobile wireless network. A VMN physically consists of two network interface cards, one for ingress traffic and the other for egress traffic. However, since a virtual device only affects egress traffic, one single virtual device is attached to the network interface card for egress traffic to impose predefined network effects, as shown in Figure 4. Particularly, each VMN has a list of mobility events, which describes the movement of the corresponding mobile host in the target network. Each entry in the mobility event list consists of a time value indicating the time the event fires, and the updated neighbors of the emulator host. When a packet is directed to a VMN from IP layer of the emulator node, the corresponding virtual device will search the neighbor table to check if the next hop of the packet is in the neighbor table. If the next hop is in the neighbor table, the packet will be forwarded to the next hop. Otherwise, the packet will be silently dropped. The global coordination among VMNs on multiple emulator nodes is done by synchronizing system clocks of those emulator nodes periodically. Note that presently EMWIN does not deal with the radio layer collision at the receiver side. An enhanced version will cope with both receiver side collision and sender side accessibility. A similar approach of mobility emulation is in [21], in which a receiver side filter is used to determine if an ingress packet should be accepted. However, this approach only supports one filter per mobile host, which considerably limits its application. VMNs and virtual devices are executed in the kernel space, while two control programs, VMN control program and virtual device control program, are executed in user space such that one can conveniently modify the configurations of VMNs and virtual devices. Specifically, the VMN control program is responsible for generating all the VMNs based on the target network information in a configuration file. It also maintains the correct schedule of the mobility events. The virtual device control program configures the property set of each virtual device and system-wide settings according to the emulation scenario. These may include IP address, network mask, ARP entry, routing tables, routing rules, and queuing disciplines. 5. Preliminary Testing Results 5.1 Prototype Implementation We have implemented a number of software modules on Linux kernel version for the prototype of EMWIN. A laboratory emulation environment has been established to conduct some validation experiments and sample emulation experiments. Presently, there are two types of emulator nodes in EMWIN. One is Pentium 4 1.7GHz PC with 128MB memory and the other is AMD K6/2 300MHz PC with 64MB memory. Both systems run Linux kernel The test nodes are Intel Celeron 500MHz PCs with 128MB memory running Linux kernel Each emulator node has three D-Link DFE-570TX Quad Channel network interface cards installed, each of which provides 4 100BaseTX Ethernet ports. Thus a total number of 12 fast Ethernet ports are available on each emulator node. All the Ethernet ports on emulator nodes connect to a private local area network through

6 two fast Ethernet switches: D-Link DES 3624i and D-Link DES The validation of network parameter emulation shows that the VMN component in EMWIN is quite accurate in emulating these network parameters [15]. 5.2 A Sample Emulation To demonstrate the unique features of EMWIN, we now introduce a sample emulation of a multi-hop mobile ad hoc network. The sample network consists of 4 mobile hosts, A, B, C and D, as shown in Figure 5. A and C are two PocketPCs that do not move in this scenario, while B and D are two laptop computers that move in a predefined manner. The distance between A and C is 40 feet, B and D are in the middle perpendicular to A and C. Each mobile host has a transmission range of 25 feet. The moving speed of B and D is 1 foot per second. Note that the transmission range and moving speed can be any values. We choose these values to simplify the illustration of mobility emulation. The mobilty information of this scenario is shown in Table 1. The origin of the 2-d coordinates is at the position of A. At time t=0 second, B has an initial coordinates of (20, 0) and begins to move upwards, C has an initial coordinates of (40, 0), D has an initial coordinates of (20, -18). At time t=15 seconds, B has moved to (20, 25) and then stays there. D begins to move upwards. At time t=18 seconds, D moves to (20, -15) and keeps moving upwards. At time t=33 seconds, D moves to (20, 0). In this scenario, A and C cannot communicate with each other directly. Initially B works as a gateway for A and C to forward packets to and from these two mobile hosts. When B is moving upwards and out of the transmission range of A and C (t=15s), A and C lose the connection between each other. At the same time D is moving upwards. After three seconds (t=18 seconds), D is within the range of A and C, thus it works as a gateway for A and C to forward packets between them. We begin the emulation of this sample network by entering the first stage: target network characterization. The network parameters of this sample network are shown in Table 2. We choose these parameters in order to demonstrate comprehensive emulation of the sample network. We can also obtain these parameters by measuring the performance of a real target network. The output of this stage is a formatted configuration file containing all the necessary information for emulation mapping. Table 1. Mobility information of the sample scenario Node Time (second) A (0,0) B (20,0) (20,25) (20,25) (20,25) C (40,0) D (20,-18) (20,-18) (20,-15) (20,0) Table 2. Network parameters used in the sample emulation Link Latency (ms) Bandwidth (Mbps) A->B 3 10 B->A 2 10 B->C 2 10 C->B <1 10 A->D 3 10 D->A 2 5 C->D <1 10 D->C 4 5 In the second stage, the target network with its determined network parameters is mapped to an emulation configuration in EMWIN. The configuration file is read by the VMN control program, then 4 VMNs, VMN A, VMN B, VMN C and VMN D, are generated and properly configured according to the information in the configuration file. Since only 4 VMNs with 8 virtual devices have to be generated, one emulator node with 8 Ethernet ports is sufficient. In particular, the VMN control program constructs a mobility event list for each VMN, which will be used to configure the neighbor table of each VMN at a specified time. In addition, the routing table of each VMN has to be modified due to the changes in the neighbor table. For example, at the time when D is about to enter the transmission range of A and C, the routing tables of VMNs for A and C must be modified to reflect this change. We plan to implement some proposed multi-hop ad hoc routing protocols in EMWIN such that the installation and removal of a route for a VMN can be done automatically. VMN B VMN A VMN C B A C TN 1 TN 2 VMN D D Emulator Node Figure 5. A sample mobile wireless network Figure 6. The emulation configuration of the sample network We conduct the sample network emulation with two test nodes and an emulator node in EMWIN, as shown if Figure 6. VMN A is the gateway of one test node TN 1, while VMN C is the gateway of the other test node TN 2. VMN B or VMN D will be the gateway of

7 VMN A and VMN C, depending on their positions at that time. The routing tables of VMN B and VMN D ensure that packets from TN 1 to TN 2 will be forwarded to VMN C, and packets from TN 2 to TN 1 will be forwarded to VMN A. First, to verify the correct mobility event schedule of each VMN, a number of ICMP ECHO REQUEST are sent from TN 1 to TN 2. The round trip time of each packet is shown in Figure 7. In the first 15 seconds while B works as the gateway between A and C, the round trip times are on an average of 7 milliseconds. After that, there is no connection between A and C for 3 seconds. When D moves within the range of A and C and becomes the gateway, the round trip times are on an average of 9 milliseconds. Note that the time accuracy in EMWIN is almost 1 millisecond. Round Trip Time (ms) ICMP Sequence Number Round Trip Time Figure 8. Time sequence graph of VMN A Figure 7. ICMP round trip time To demonstrate how EMWIN help examine the behavior of protocols in the target mobile ad hoc network, an ftp file transfer is performed between the two test nodes. The time-sequence graphs of the ftp data transfer connection on VMN A and VMN D are shown in Figure 8 and Figure 9, respectively. Note that in Figure 8, the relative time begins at an absolute time of t=3 seconds when the ftp transfer begins. In Figure 9, the relative time begins at an absolute time of t=18 seconds when VMN D begins forward packets for the connection between VMN A and VMN C. The time-sequence graphs suggest that the ftp data transfer continues for about 12 seconds. Then the connection was interrupted for 3 seconds, and then resume at t=18 seconds. Thus all the network events in this scenario are accurately emulated by EMWIN with only one emulator node. This emulation example demonstrates that EMWIN provides an alternative for the evaluation of various TCP flavors in wireless networks. By far most of the existing research in this domain are either simulationbased or requiring enough number of mobile devices [22, 23]. Moreover, multi-hop ad hoc routing protocols can be evaluated with EMWIN instead of simulation as described in [24-26]. Figure 9. Time sequence graph of VMN D 6. Conclusion and Future Work In this paper, we presented a new IP-based mobile wireless network emulation system called EMWIN. Be aware of the drawbacks and limitations of existing wireless network emulators, we aimed to design and implement a new one that is able to emulate network topology and mobility of mobile hosts. Specifically, with a set of network parameters, EMWIN can map the target mobile wireless network to an emulation configuration in a laboratory private network, which consists of several emulator nodes and wireless devices if necessary. In the resulted configuration, each mobile host in the target network is mapped to a VMN, a logical entity with two network interfaces. Each emulator node has multiple fast Ethernet interface cards installed and configured. Therefore it can generate multiple VMNs. As a result, EMWIN is highly scalable in terms of the number of mobile hosts it can emulate in a target network. The mobility of mobile hosts is emulated with a simple and effective approach: neighbor table. A VMN will only transmit a packet if the next hop of the packet is in its neighbor table. The neighbor table can be modified in an automatic manner to emulate a predefined emulation scenario. We have implemented a prototype of EMWIN on Linux kernel EMWIN can be applied to a broad area of mobile wireless network researches, such as protocol performance evaluation, and exploration of the dynamics and impact of specific network behaviors. In particular, EMWIN provides a flexible and scalable environment for the emulation of

8 multi-hop mobile ad hoc networks, which is difficult and even impossible with other emulators. Since EMWIN has shown a strong potential in supporting a variety of mobile wireless network research areas, we are in the process of exploring other possible enhancements to it. In our prototype, one has to define the movement of each mobile host in an emulation. We will add the function of random movement generation in case no target network is available while evaluating the performance of a protocol. We plan to add a module to the emulator node such that it can support the emulation of receiver side collision in radio layer. Particularly, we are considering incorporating infrared-aware devices (such as a PocketPC with infrared reader) into EMWIN for the development of some location-based mobile applications. 7. ACKNOWLEDGMENTS We would like to thank Kaushik K. Dam, Manqing Huang and Gang Lan for their previous contributions in the emulator. Thanks also go to Lei Xu for her suggestions and insightful comment. 8. REFERENCES [1] GloMoSim, [2] The Network Simulator: ns-2, [3] M. Allman, A. Caldwell, and S. Ostermann, "ONE: The Ohio Network Emulator," Ohio University, Tech Report TR-19972, August [4] E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, "The Click Modular Router," ACM Transactions on Computer Systems, vol. 18, pp , August, [5] L. Rizzo, "Dummynet: a simple approach to the evaluation of network protocols," ACM Computer Communication Review, vol. 27, [6] NIST NET, [7] M. Kojo, A. Gurtov, J. Manner, P. Sarolahti, T. Alanko, and K. Raatikainen, "Seawind: a Wireless Network Emulator," In Proceedings of 11th GI/ITG Conference on Measuring, Modeling and Evaluation of Computer and Communication Systems(MMB 2001), RWTH Aachen, Germany, [8] J. Flynn, H. Tewari, and D. O'Mahony, "JEmu: A Real Time Emulation System for Mobile Ad Hoc Networks," In Proceedings of the Firsit Joint IEI/IEE Symposium on Telecommunications Systems Research, Dublin, Ireland, November [9] K. Fall, "Network Emulation in the VINT/NS Simulator," In Proceedings of 4th IEEE Symposium on Computers and Communications, July [10] F. Kubinszky, "Emulation of ad-hoc networks on IEEE ," Budapest University of Technology and Economics, Budapest, Hungary, MS Thesis [11] The CMU Monarch Project's Wireless and Mobility Extensions to NS, [12] Q. Ke, D. A. Maltz, and D. B. Johnson, "Emulation of Multi- Hop Wireless Ad Hoc Networks," In Proceedings of the seventh International Workshop on Mobile Multimedia Communications (MOMUC 2000), Tokyo, Japan, October [13] M. Satyanarayanan and B. Noble, "The Role of Trace Modulation in Building Mobile Computing Systems," In Proceedings of the 6th Workshop on Hot Topics in Operating Systems, Cape Cod MA, USA, May [14] J. S. Ahn, P. B. Danzig, Z. Liu, and L. Yan, "Evaluation of TCP Vegas: Emulation and Experiment," In Proceedings of SIGCOMM, [15] P. Zheng and L. M. Ni, "EMPOWER: A Scalable Framework for Network Emulation," In Proceedings of the 2002 International Conference on Parallel Processing (ICPP '02), In Press, Vancouver, Canada, [16] tcpdump/libpcap, [17] ttcp, [18] S. S. Kang and M. W. Mutka, "Provisioning Service Differentiation in Ad Hoc Networks by the Modification of Backoff Algorithm," In Proceedings of Int'l Conference on Computer Communication and Network (ICCCN) 2001, Scottsdale, Arizona, October [19] B. Bensaou, Y. Wang, and C. C. Ko, "Fair Media Access in based Wireless Ad-hoc Networks," In Proceedings of Mobile and Ad Hoc Networking and Computing 2000, [20] P. Zheng and L. M. Ni, "Experiences in Building a Scalable Distributed Network Emulation System," Department of Computer Science and Engineering, Michigan State University, Tech Report MSU-CSE-02-18, [21] D. T. McWherter, J. Sevy, and W. C. Regli, "Building an IP Network Quality-of-Service Testbed," in Internet Computing, vol. 4, 2000, pp [22] H. Balakrishnan, V. N. Padmanabhan, S. Seshan, and R. H. Katz, "A Comparison of Mechanisms for Improving TCP Performance over Wireless Links," IEEE\ACM Transactions on Networking, vol. 5, pp , [23] C. Parsa and J. J. Garcia-Luna-Aceves, "Improving TCP Performance over Wireless Networks at the Link Layer," In Proceedings of 7th International Conference on Network Protocols, [24] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols," In Proceedings of Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '98), Dallas, Texas USA, [25] S. R. Das, R. Castaneda, J. Yan, and S. Rimli, "Comparative performance evaluation of routing protocols for mobile, adhoc networks," In Proceedings of IEEE the Seventh International Conference on Computer Communications and Networks (IC3N '98), [26] D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," in Mobile Computing, T. Imielinski and H. Korth, Eds.: Kluwer Academic Publishers, 1996.

EMPOWER: A Network Emulator for Wireline and Wireless Networks*

EMPOWER: A Network Emulator for Wireline and Wireless Networks* EMPOWER: A Network Emulator for Wireline and Wireless Networks* Pei Zheng 1 and Lionel M. Ni 1,2 1 Department of Computer Science & Engineering 2 Department of Computer Science Michigan State University

More information

MASSIVE: An Emulation Environment for Mobile Ad-hoc Networks

MASSIVE: An Emulation Environment for Mobile Ad-hoc Networks MASSIVE: An Emulation Environment for Mobile Ad-hoc Networks Michael Matthes, Holger Biehl, Michael Lauer, and Oswald Drobnik Department of Computer Science, J.W. Goethe-University D-60054 Frankfurt/Main,

More information

MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks

MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks MobiNet: A Scalable Emulation Infrastructure for Ad Hoc and Wireless Networks Priya Mahadevan UC San Diego pmahadevan@cs.ucsd.edu Adolfo Rodriguez IBM, RTP and Duke University razor@cs.duke.edu David Becker

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

TWO-STAGE WIRELESS NETWORK EMULATION

TWO-STAGE WIRELESS NETWORK EMULATION TWO-STAGE WIRELESS NETWORK EMULATION Tanguy Perennou, 1 ' 2 Emmanuel Conchon, 1 ' 2 Laurent Dairaine 1 ' 2 and Michel Diaz 2 1 ENSICA, 1 place Emile Blouin, 31056 Toulouse Cedex 5, France "[tanguy.perennou.emmanuel.conchon.laurent.dairaine/oensica.fr

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS 1 TANMAYA SWAIN, 2 PRASANT KUMAR PATTNAIK School Of Computer Engineering, KIIT University, Bhubaneswar E-mail:

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

A Portable Real-time Emulator for Testing Multi-Radio MANETs

A Portable Real-time Emulator for Testing Multi-Radio MANETs A Portable Real-time Emulator for Testing Multi-Radio MANETs Weirong Jiang 1, Chao Zhang 2 1 Tsinghua University Research Institute of Information Technology Beijing 100084, China jwr2000@mails.tsinghua.edu.cn

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs

Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs Applications and Performance Analysis of Bridging with Layer-3 Forwarding on Wireless LANs James T. Yu and Chibiao Liu School of Computer Science, Telecommunications, and Information Systems DePaul University,

More information

Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol

Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol Analysis of Network Traffic in Ad-Hoc Networks based on DSDV Protocol with Emphasis on Mobility and Communication Patterns Vahid Garousi Department of Systems and Computer Engineering Carleton University,

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection

Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Efficient Node Reconfiguration in Mobile Ad Hoc Networks (MANETs) for Wireless Internet Access Point Connection Kin Choong Yow School of Computer Engineering Nanyang Technological University Nanyang Avenue,

More information

WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System

WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System Basem Shihada Computer Science & Electrical Engineering CEMSE, KAUST University of Waterloo Seminar December 8 th, 2014 2 3 How

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

Distributed Clusterhead Architecture for Mobile Ad Hoc Networks Journal of Computer Science 2 (7): 583-588, 2006 ISSN 1549-3636 2006 Science Publications Distributed Clusterhead Architecture for Mobile Ad Hoc Networks 1 Emad Qaddoura, 2 Wesam AlMobaideen and 3 Ahmad

More information

Factors Affecting the Performance of Ad Hoc Networks

Factors Affecting the Performance of Ad Hoc Networks Factors Affecting the Performance of Ad Hoc Networks Dmitri D. Perkins, Herman D. Hughes, and Charles B. Owen Department of Computer Science and Engineering Michigan State University East Lansing, MI 88-6

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

The CMU Monarch Project s Wireless and Mobility Extensions to ns

The CMU Monarch Project s Wireless and Mobility Extensions to ns The CMU Monarch Project s Wireless and Mobility Extensions to ns David B. Johnson Josh Broch Yih-Chun Hu Jorjeta Jetcheva David A. Maltz The Monarch Project Carnegie Mellon University http://www.monarch.cs.cmu.edu/

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Examining Mobile-IP Performance in Rapidly Mobile Environments: The Case of a Commuter Train.

Examining Mobile-IP Performance in Rapidly Mobile Environments: The Case of a Commuter Train. Examining Mobile-IP Performance in Rapidly Mobile Environments: The Case of a Commuter Train. Edwin Hernandez and Abdelsalam (Sumi) Helal Department of Computer and Information Science and Engineering

More information

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL AIM: To conduct an experiment to demonstrate the working of file transfer with the UDP Server and Client. APPARATUS REQUIRED: PC with network simulation

More information

PERFORMANCE EVALUATION OF AODV AND DSR ROUTING PROTOCOLS IN MANET NETWORKS

PERFORMANCE EVALUATION OF AODV AND DSR ROUTING PROTOCOLS IN MANET NETWORKS PERFORMANCE EVALUATION OF AODV AND DSR ROUTING PROTOCOLS IN MANET NETWORKS Ammar Odeh, Eman AbdelFattah and Muneer Alshowkan Department of Computer Science & Engineering, University of Bridgeport Bridgeport,

More information

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes Ruchi Khandelwal 1 & Akhilesh Kosta 2 Department of Computer Science and Engineering

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

A General Purpose Queue Architecture for an ATM Switch

A General Purpose Queue Architecture for an ATM Switch Mitsubishi Electric Research Laboratories Cambridge Research Center Technical Report 94-7 September 3, 994 A General Purpose Queue Architecture for an ATM Switch Hugh C. Lauer Abhijit Ghosh Chia Shen Abstract

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information

Distributed Emulation of Shared Media Networks

Distributed Emulation of Shared Media Networks Distributed Emulation of Shared Media Networks Daniel Herrscher, Steffen Maier, Kurt Rothermel University of Stuttgart, Institute of Parallel and Distributed Systems (IPVS) Universitätsstr. 38, D-7569

More information

A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET

A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET A NEW ENERGY LEVEL EFFICIENCY ISSUES IN MANET K. ARULANANDAM 1 and Dr. B. PARTHASARATHY 2 1 Research scholar, Vinayaka Mission University, Salem, Tamilnadu 2 Dean, Mailam Engineering College, Tindivanam.

More information

Architectural Principles of the Internet

Architectural Principles of the Internet TLEN7000/ECEN7002: Analytical Foundations of Networks Architectural Principles of the Internet Lijun Chen 11/27/2012 The Internet Protocol Stack TCP/IP was first proposed in 1973 The specifications are

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks

On the Impact of Noise Sensitivity on Performance in Based Ad Hoc Networks On the Impact of Noise Sensitivity on Performance in 82.11 Based Ad Hoc Networks Saman Desilva Computer Science Department The Univ. of Texas at San Antonio, San Antonio, TX 78249 Email: sdesilva@cs.utsa.edu

More information

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links

Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Evaluation of a Queue Management Method for TCP Communications over Multi-hop Wireless Links Satoshi Ohzahata and Konosuke Kawashima Department of Computer, Information and Communication Sciences, Tokyo

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model

Study on Indoor and Outdoor environment for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Study on and Outdoor for Mobile Ad Hoc Network: Random Way point Mobility Model and Manhattan Mobility Model Ibrahim khider,prof.wangfurong.prof.yinweihua,sacko Ibrahim khider, Communication Software and

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35 Manpreet Singh Team number 8 Project webpage-http://manpreetensc833.weebly.com/ ENSC 833 : NETWORK

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Dynamic Source Routing in ad hoc wireless networks

Dynamic Source Routing in ad hoc wireless networks Dynamic Source Routing in ad hoc wireless networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University In Mobile Computing, vol. 353, chapter 5, T. Imielinski and H.

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations

More information

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online

More information

CHAPTER 2 - NETWORK DEVICES

CHAPTER 2 - NETWORK DEVICES CHAPTER 2 - NETWORK DEVICES TRUE/FALSE 1. Repeaters can reformat, resize, or otherwise manipulate the data packet. F PTS: 1 REF: 30 2. Because active hubs have multiple inbound and outbound connections,

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation

Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation Scalable IP-VPN Flow Control Mechanism Supporting Arbitrary Fairness Criteria Part 2: Simulation and Implementation Osamu Honda, Hiroyuki Ohsaki, Makoto Imase Graduate School of Information Science and

More information

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes?

Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? By: Jing Deng, Yunghsiang S. Han, and Sanjeev R. Kulkarni. J. Deng, Y. S. Han, and S. R. Kulkarni, "Can Multiple Subchannels

More information

Sena Technologies White Paper: Latency/Throughput Test. Device Servers/Bluetooth-Serial Adapters

Sena Technologies White Paper: Latency/Throughput Test. Device Servers/Bluetooth-Serial Adapters Sena Technologies White Paper: Latency/Throughput Test of October 30, 2007 Copyright Sena Technologies, Inc 2007 All rights strictly reserved. No part of this document may not be reproduced or distributed

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks

More information

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK [r.tasker@dl.ac.uk] DataTAG is a project sponsored by the European Commission - EU Grant IST-2001-32459

More information

Performance evaluation and enhancement of WLAN

Performance evaluation and enhancement of WLAN Performance evaluation and enhancement of WLAN (CMPT885 / ENSC835) Demo Plan Jiaqing (James) Song songs@acm.org Spring 2002 Contents of Demo OPNET WLAN Models PHY Characteristics WLAN Parameters Adaptive

More information

Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network

Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Research on Ad Hoc-based Routing Algorithm for Wireless Body Sensor Network Hui Cheng, Zhongyang Sun, * Xiaobing Zhang,

More information

Wireless Mesh Networks

Wireless Mesh Networks Distributed Systems 600.437 Wireless Mesh Networks Department of Computer Science The Johns Hopkins University 1 Wireless Mesh Networks Lecture 10 Further reading: www.dsn.jhu.edu/publications/ 2 The Wireless

More information

Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks

Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks Ralph Jansen and Bernd Freisleben Department of Electrical Engineering & Computer Science University of Siegen Hölderlinstr. 3 D 57068 Siegen

More information

TCP and UDP Fairness in Vehicular Ad hoc Networks

TCP and UDP Fairness in Vehicular Ad hoc Networks TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer

More information

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information

The Effects of Asymmetry on TCP Performance

The Effects of Asymmetry on TCP Performance The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

Throughput Analysis of Congestion Control Protocols (TCP, XCP, RCP) in Multi-Hop Wireless Network.

Throughput Analysis of Congestion Control Protocols (TCP, XCP, RCP) in Multi-Hop Wireless Network. Analysis of Congestion Control Protocols (TCP, XCP, RCP) in Multi-Hop Wireless Network. Dr. Atul M Gosai 1, Udit Narayan Kar 2 and Bhargavi H Goswami 3, Assistant Professor 1 Research Fellow 2, Research

More information

Video Diffusion: A Routing Failure Resilient, Multi-Path Mechanism to Improve Wireless Video Transport

Video Diffusion: A Routing Failure Resilient, Multi-Path Mechanism to Improve Wireless Video Transport Video Diffusion: A Routing Failure Resilient, Multi-Path Mechanism to Improve Wireless Video Transport Jinsuo Zhang Yahoo! Inc. 701 First Avenue Sunnyvale, CA 94089 azhang@yahoo-inc.com Sumi Helal Dept

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

A Real Time Emulation System for Ad hoc Networks

A Real Time Emulation System for Ad hoc Networks level realtime time, the A Real Time Emulation System for Ad hoc Networks Juan Flynn, Hitesh Tewari, Donal O'Mahony Network and Telecommunications Research Group, Department of Computer Science, Trinity

More information

XCast: Interactive, Movable, Personalized Broadcasts (on Demand) for Local Life Interfaces

XCast: Interactive, Movable, Personalized Broadcasts (on Demand) for Local Life Interfaces XCast: Interactive, Movable, Personalized Broadcasts (on Demand) for Local Life Interfaces Sung-Hyuck Lee Viral Communications Group, MIT Media Lab starsu@media.mit.edu 1 Table of Contents Executive Summary

More information

Congestions control through cloud computing with MANET

Congestions control through cloud computing with MANET Congestions control through cloud computing with MANET Ajey Singh 1, Maneesh Shrivastava 2 Department of Information Technology 1,2 Lakshmi Narain College of Technology Bhopal, India 1,2 Abstract Adhoc

More information

Proposal for a Hybrid Implementation of Adhoc On-demand Distance Vectoring (AODV)

Proposal for a Hybrid Implementation of Adhoc On-demand Distance Vectoring (AODV) Final Proposal Research Topic home Proposal for a Hybrid Implementation of Adhoc On-demand Distance Vectoring (AODV) Stephen Walter December, 2008 Abstract Reactive wireless networks are lacking a general

More information

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS

DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS DYNAMIC ROUTES THROUGH VIRTUAL PATHS ROUTING FOR AD HOC NETWORKS Abdulrahman H. Altalhi Computer Science Department University of New Orleans New Orleans, LA, 70148 USA Golden G. Richard, III Abstract

More information

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks 2009 International Conference on Intelligent Networking and Collaborative Systems Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks Saud Al otaibi Software Technology Research Laboratory

More information

SWAP and TCP performance

SWAP and TCP performance SWAP and TCP performance Jean Tourrilhes, HPLB 23 March 98 1 Introduction The SWAP protocol that we have proposed [4] the HRFWG is designed to carry TCP/IP traffic. Of course, we would never had proposed

More information

IJMIE Volume 2, Issue 9 ISSN:

IJMIE Volume 2, Issue 9 ISSN: PERFORMANCE ANALYSIS OF DSDV WITH OTHER MANET ROUTING PROTOCOL USING RANDOM WAYPOINT MOBILITY MODEL IN NS-3 Saurabh kumar soni* Prof.Prem Narayan Arya* ABSTRACT Routing protocols are a critical aspect

More information

Performance evaluation and enhancement of WLAN

Performance evaluation and enhancement of WLAN Performance evaluation and enhancement of WLAN (CMPT885 / ENSC835) Jiaqing (James) Song songs@acm.org Spring 2002 Table of Contents Introduction to WLAN Performance enhancement Implementation with OPNET

More information

QoS issues in Wi-Fi-WMM based triple play home networks

QoS issues in Wi-Fi-WMM based triple play home networks QoS issues in Wi-Fi-WMM based triple play home networks Yun Tao Shi Jean-Marie Bonnin Gilles Straub Thomson, France INRIA/IRISA, France Thomson, France yun-tao.shi@thomson.net jm.bonnin@enst-bretagne.fr

More information

Improving Fairness among TCP Flows crossing Wireless Ad Hoc and Wired Networks

Improving Fairness among TCP Flows crossing Wireless Ad Hoc and Wired Networks Improving Fairness among TCP Flows crossing Wireless Ad Hoc and Wired Networks Luqing Yang 1 Winston K.G. Seah 1,2 Qinghe Yin 2 1 Department of Electrical Engineering, National University of Singapore,

More information