CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK

Similar documents
Aanchal Walia #1, Pushparaj Pal *2

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Analyzing Routing Protocols Performance in VANET Using p and g

AODV-PA: AODV with Path Accumulation

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

3. Evaluation of Selected Tree and Mesh based Routing Protocols

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Estimate the Routing Protocols for Internet of Things

Performance Analysis of MANET Routing Protocols OLSR and AODV

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Mobile Communications. Ad-hoc and Mesh Networks

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

A Literature survey on Improving AODV protocol through cross layer design in MANET

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

2013, IJARCSSE All Rights Reserved Page 85

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

Investigation on OLSR Routing Protocol Efficiency

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

Power aware Multi-path Routing Protocol for MANETS

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Performance Analysis of Aodv Protocol under Black Hole Attack

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Routing Protocols in MANETs

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

ECS-087: Mobile Computing

Performance Improvement of Wireless Network Using Modern Simulation Tools

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

LECTURE 9. Ad hoc Networks and Routing

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Mobile-Gateway Routing for Vehicular Networks 1

Routing Protocols in Mobile Ad-Hoc Network

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Performance Evaluation of MANET through NS2 Simulation

GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Improving Energy and Efficiency in cluster based VANETs through AODV Protocol

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

Figure 1: Ad-Hoc routing protocols.

Mitigating Superfluous Flooding of Control Packets MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

MANET PROTOCOLS ANALYSIS WITH VARYING PAUSE TIME SIMULATION TIME AND SPEED

The Study of Routing Strategies in Vehicular Ad- Hoc Network to Enhance Security

Performance Enhancement of Routing Protocols for VANET With Variable Traffic Scenario

The Performance of MANET Routing Protocols for Scalable Video Communication

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Routing Protocols in MANET: Comparative Study

The Effect of Number of Hops per Path on Remind Energy in MANETs Routing Protocols

Comprehensive Study and Review Various Routing Protocols in MANET

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

THE EXTENDED CLUSTERING AD HOC ROUTING PROTOCOL (ECRP)

Comparative Study on Performance Evaluation of Ad-Hoc Network Routing Protocols Navpreet Chana 1, Navjot Kaur 2, Kuldeep Kumar 3, Someet Singh 4

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

Overhead Reduction and Performance Enhancement of AODV and DSR Routing Protocols

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Queue Management for Network Coding in Ad Hoc Networks

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Abstract Introduction

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Introduction to Mobile Ad hoc Networks (MANETs)

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

IJMIE Volume 2, Issue 6 ISSN:

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Transcription:

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK Le Van Minh a,b, Yang MingChuan a, and Guo Qing a a Communication research center, Harbin Institute of Technology, Harbin, China b Faculty of Information Technology, Vinh University, Viet Nam minhdhvinh@gmail.com, mcyang@hit.edu.cn,qguo@hitcrc.hit.edu.cn ABSTRACT The moving with fast velocity of each node in vehicular ad hoc network (VANET) results in the existence transient communication links, which degrade the performance of developed protocols. Established routes frequently become invalid, and existing communication flows are interrupted, incurring delay and additional overhead. In this paper we use cross layer approach solving these problems. Firstly, we concentrate on measurement end-to-end delay in VANET. Subsequently, we use the end-to-end delay assessment of medium access control (MAC) layer for building route metric in network layer with the aim of shrinking route discovery time. For deploying route model we use hybrid routing protocol (combined between proactive and reactive routing protocol) aiming reduce route overhead, accelerate route convergence speed, and enhance route quality in routing table in each node. The simulation results illustrate outstanding features of our proposed model. Keywords: Vehicular ad hoc network; routing protocol; end-to-end delay; cross layer approach. 1 INTRODUCTION The VANET includes mobile nodes communicated eachother without any infrastructure or central administration. These characters make VANET becoming a huge challenge, and attract tremendous attention of researchers in recently. One of the foremost challenges in vehicular networks is to design protocols that can handle the high mobility of vehicles and constant changes in the underlying topology. Due to high mobility of VANET, the wireless link between two vehicles is short-lived. The channel quality information from physical and MAC layer help the sender in predicting the link connection time; subsequently the sender can find a new receiver before the current link is disconnected. Thus cross-layer interaction between MAC layer and higher layers is desirable to maintain link connectivity and improve system performance. We consider this works in some proposed routing protocols. In [1] the authors proposed the Movement Prediction-based Routing (MOPR) protocol. They used movement prediction information of each vehicular for V2V communication in VANET. It improves the routing process by taking the vehicle movement information that is typically available in MAC layer such as position, direction, speed, and network topology into consideration. Based on such vehicular information, MOPR predicts the future location of intermediate relay nodes, which can subsequently be used to estimate the life-time of point-to-point links. Similar to MOPR, Xi Yu et al. proposed a reliable routing protocol for VANET named -VANET. They use Total Weight of the Route (TWR) between the source and destination nodes [2]. TWR comprise not only Vehicle Speed and Vehicle Movement Direction but also Link Quality between Vehicles. In fact, they modify Ad hoc On-Demand Distance Vector () [3] parameters by complement speed, direction of vehiculars and expiration time estimation with the aim of achieving better routing performance. Although MOPR and -VANET consider link quality information for improving routing process, their gain is a minor adjustment. Obviously, in dense vehicular environment the multi-path routing is more predominant than singlepath routing. Therefore, these protocols need consider route selection in urban environment. As two aforementioned protocols our proposed routing protocol also use end-to-end delay information available in MAC layer for building routes. But our proposed routing protocol considers route selection by using hybrid routing model. The rest of the paper is divided into four parts. In the Volume 7 Number 4 Page 1286 www.ubicc.org

second part we stage out summary of routing protocol for vehicular ad hoc network. It comprise proactive, reactive, and hybrid routing protocol. The third part is our proposed routing protocol. In that we first measure end-to-end delay, subsequently use that result for building route metric of our proposed routing protocol. The fourth part we present some simulation results of our model. The fifth part is the conclusion of paper. 2 RELATED WORKS This part we summarize some main attributes of routing protocol for VANET. It is the background of our proposed routing protocol. In VANET each node can be seen as hosts and routers. As hosts, nodes need to provide useroriented services; as routers, nodes need to run the routing protocols, in accordance with routing strategies, nodes involve packet forwarding and router maintenance. When the source nodes and destination nodes have the requirement of communication, and they are not within the scope of wireless transmission, then they run the routing protocols by other nodes, and send data by wireless multi-hop approach. According to the different driver models of route discovery, routing protocols for VANET can be divided into proactive and reactive routing protocol. Combined with the advantages of these two types of routing protocols is the hybrid routing protocol. Proactive routing protocols In proactive routing protocols, because each node must retain the latest routing table in the local network; so, when network topology changes, routing changes must be send to each node in order to obtain the consistent and up-to-date network routing. These kinds of routing protocol adapt to the requirements of VANET through the modification of existing routing protocols. The proactive routing protocol requires each node to update immediately when there is any change in the network. For example, updates information only contain changes of the routing, or updates the entire routing table, which is affected by very fast change of the topology. Therefore, proactive routing protocol requires system s resources very much. But whenever a node requires setup the communication it can setting up a link to destination immediately. Reactive routing protocols Reactive routing protocol initiates a routing request that is based on the specific needs of communications, instead of periodically broadcasting routing information packet. Therefore, it only performs routing operations when the node need route, maintains the routing in the communication process, deletes routing when there is no communication in long time. These mechanisms make reactive routing save network resources effectively. Therefore, this kind of routing protocol is more suitable for VANET than proactive routing protocol. Hybrid routing protocols Hybrid routing protocol combines advantages of the proactive routing and the reactive routing. It protects the more accurate routing information in the local scope by the use of reactive routing. By the use of proactive routing in further distance routing, it will reduce the overhead of overall routing protocol. Thus, it can play a better network performance; such agreements are more applicable to topology in special scenes, such as highly dynamic changes. 3 PROPOSED ROUTING PROTOCOL As we mentioned above, the crucial features of VANET include rapid changing of topology, high mobility, high probability of network partitions, and end-to-end connectivity could not be guaranteed. So our proposed routing protocol was come from an idea to build a routing protocol can meet of the requirements about minimum routing delay time, uses minimum network resources and reliable in multi-rate network. For minimum routing delay time we use end-to-end delay estimation to build the routing metric. For minimum network resources and most suitable for VANET scenario we use hybrid routing protocol in our model. 3.1 End-to-end delay assessment and routing matric The packet processing delay at each node includes the processing time at the individual layers and the inter-layer communication time at various levels [4]. Therefore, the Node Processing Time (NPT) is NPT = Pd A + ILCd AT + Pd T + ILCd TN + OvNLd + ILCd NM + OvMACLd + ILCd MP + Pd P (1) where PdA is the processing delay at the application layer, ILCdAT represents the inter-layer communication delay be-tween the application layer and the transport layer, PdT denotes the processing delay at transport layer, ILCdTN represents the inter-layer communication delay between the transport layer and the network layer, OvNLd denotes the overall delay at the network layer, ILCdNM represents the inter-layer communication delay between the network layer and the MAC layer, OvMACLd denotes the overall delay at the MAC layer, ILCdMP represents the inter-layer communication delay between the MAC Volume 7 Number 4 Page 1287 www.ubicc.org

layer and the physical layer, and PdP denotes the processing delay at physical layer. In our works we use delayed information from ILCd NM, OvMACLd, and propagation for building routing metric. Therefore, node processing time able to consider as NPT = ILCd NM + OvMACLd + ILCd MP + Pd P (2) The MAC transmission delay depends on the backoff mechanism of the MAC protocol, and the average number of retransmissions required for a packet to be successfully transmitted. If i is the average number of retransmissions required for a successful packet transmission, then the amount of time spent by the MAC layer in transmitting this packet over the channel ( OvMACLd) is given as [5], [6] ( where RTS is the time spent in the RTS packet transmission, CTS is the time spent in the CTS packet transmission, DATA is the time spent in the data transmission, ACK is the time spent in the acknowledgement transmission, SIFS is the short inter-frame space, and µ is the propagation delay. Assume that the source and destination are separated by an average of n hops we have TotMACLd = n*ovmacld (4) Totµ = n*µavg (5) The average time spent for a packet transmission depends on the average number of retransmissions required for successfully transmitting a packet. Therefore, if i +1is the average number of attempts for the successful transmission of a packet, then the time spent by the MAC layer for transmitting a single RREQ packet ( RREQ1Pkt) in the four-way handshake transmission is given by (3), where the DATA represents an RREQ packet. If the average number of route discovery processes required to be initiated to obtain a route to the destination is nrreqs avg, then the total time spent in the route discovery processes (RREQT tot ) is given by RREQT tot = (RREQ1Pkt + RREP out ) nrreqs avg (6) where RREP out is the average RREP time-out period at the network layer. We have an estimative end-to-end delay formula as ) EEdRDT = RREQT tot + TotMACLd + Totµ (7) The end-to-end delay information was assessed by formula (7). We use this information as route matric, and define set close neighbor of each node in the network. Node j is the neighbor of node i, and node j become close neighbor of node i if only if EEdRDT ij EEdRDTi avr where EEdRDTij is end-to-end delay time between node i and node j, EEdRDTi avr is the average end-to-end time delay between node i and it s neighbors. Therefore, we have set of close neighbor of node i (CNBN i ) as CNBN i = {node j (node j is the neighbor of node i) & (EEdRDT ij EEdRDTi avr )} (8) 3.2 Route discovery strategy Route discovery strategy is divided two phases. The first phase is the process to look for a destination node in the neighbor table. If Destination node is in neighbor table then the Source node sends RREQ to Destination node by using unicast, and Destination node replies RREP to Source node also by using unicast. After that the link between Source node and Destination node is setting up, the route discovery process is finished. If Destination node is not in neighbor table then the route discovery process changes to second phase. In the second phase of route discovery, the Source node sends address of Destination node and its far nodes to close nodes by using multicast. The Destination node address is for next node to continue discovery process to find Destination node. Its far node address is for restricting routing overhead in next steps. In next step of route discovery process, each node in the set of close neighbor node continues performing the route discovery process from the first phase. It finished when setting up route to the Destination node. Parameters used in routing discovery process algorithm at one node are: OVH_NBR: Number of overhead neighbor, OVH_CLS_NBR: Number of overhead close neighbor, RREQ_NUM: Number of allowable RREQ packets, Node i _address: IP address of node i. IF node i receives a requirement to connect to node j THEN { FOR (i=; OVH_NBR -1; i++) {IF neighbor_address == node j _address THEN { Send (Addr, RREQ); exit} ELSE { Volume 7 Number 4 Page 1288 www.ubicc.org

FOR (j=; OVH_CLS_NBR-1; j++) {Send (Addr, RREQ); RREQ_Number++} } } } Algorithm.Route Discovery where Send(Addr, RREQ) is a function to send RREQ message to next node, Addr is address of Destination nodes. If Addr is only one address, it uses for unicast. If Addr includes all of close neighbor, it uses for multicast. If Addr includes all of neighbor, it uses for broadcast. But in our proposed routing protocol not uses broadcast method. When Destination node received the RREQ, it can use Reply(RREP) function. Reply is a function to send RREP message back to prior node of current node. If prior node is intermediate node, it continues used Reply(RREP) to send RREP message to its prior node. This operation repeat until RREP reached Source node. 3.3 Protocol operation For built the neighbor table, this protocol operation is the same as proactive routing protocol. One node uses Hello packet to maintain the relationship with neighbor nodes. If there is any a new node in it s the propagative range, this node is using Hello packet to update information of the new node. Therefore, neighbor table of each node in network always was updated instantaneously. The protocol operations were illustrated in figure 1. finished. If Destination node is not in neighbor table, Source node sends RREQ to close neighbor node. This operation restricts the routing overhead the same as OLSR [7]. Furthermore, it is a condition will be sure the setting up route will be rapid convergence and reliable. 4 SIMULATION RESULTS In this part we show preliminary results comparing between our proposed routing protocol (end-to-en delay assessment and hybrid routing protocol) and one popular protocol. We use the developed module in ns-2.34 [8] with support of Monarch [9] to simulate, and in the same condition of performance. The network was selected with the number of nodes varying from 5 to 2. Nodes are randomly distributed over 1m x 1m area. Send/receive data packets between Source node and Destination node use the IEEE 82.11g, uses IEEE 82.11 DCF for channel access, and data packet size is set to 512 bytes. Each routing protocol was deployed in the same scenario for run simulation. Obviously, from figure 2 the time for route discovery is directly proportional to nodes. But our proposed routing protocol was more slowly increase than. The time for each step in route discovery can shrink by using end-to-end delay assessment for route matric and relaying destination node to close neighbors mechanism. In figure 3, it is observed that end-to-end data transfer time inversely proportional to nodes. But we can see end-to-end data transfer time decreases very fast in. 1.9.8 Average route discovery time(s).7.6.5.4.3.2 Figure 1: One node uses hello packet for updating and maintaining information of neighbor nodes. The rest of the protocol is similar to reactive routing protocol, but there is one modification. When Source node receives a requirement to send message to Destination node, first steps it look for Destination node address in neighbor table. If Destination node is in neighbor table, it uses send (Addr, RREQ) send RREQ to Destination node, and Destination node uses reply (RREP) reply RREP to Source node and discovery process is.1 1 2 3 4 5 6 7 8 9 1 Path length (hops) Figure 2: Average route discovery time. Volume 7 Number 4 Page 1289 www.ubicc.org

Figure 3: Average end-to-end data transfer time. As inevitable results, the optimal delay time in route discovery and end-to-end data transfer time made gain outstanding performance. It is illustrated in figure 4 and figure 5 with measuring network throughput and packet loss rate parameters. Average packet loss rate Average end-to-end data transfer time(ms) Average network throughput (Mbps) 4 35 3 25 2 15 1 5 1 2 3 4 5 6 7 8 9 1 Number of pauses Figure 4: Average network throughput..3.25.2.15.1.5 25 2 15 1 5 Figure 5: Average packet loss rate. 5 CONCLUSION 4 6 8 1 12 14 16 18 2 Number of nodes 4 6 8 1 12 14 16 18 2 Number of nodes In this paper we proposed a proper routing protocol for VANET. By using end-to-end delay information for building route metric, it shrinks route discovery time and makes building route rapid convergence. Furthermore, it inherits the advanced properties of proactive routing protocol and reactive routing protocol. With using unicast, multicast and broadcast mechanisms appropriately, it reduces significantly control overhead and processing overhead. Therefore, it meet the communication requirements as fast setting up connection link, reliable link, reducing broken link, and increasing network throughput in VANET environment. ACKNOWLEDGEMENT This research was supported by the National Science and Technology Major Project: Wireless Innovative Campus Area Networks Project No. 21ZX35-3. 6 REFERENCES [1] M. MENOUAR, M. Lenardi, F. Filali: A movement prediction based routing protocol for vehicle-to-vehicle communications., Communications (25). [2] Xi Yu, Huaqun Guo, Wai-Choong Wong: A Reliable Routing Protocol for VANET Communications., Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1748 1753 (211). [3] C. E. Perkins and E. M. Royer: Ad-hoc On- Demand Distance Vector Routing., In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 9 1, New Orleans, LA (1999). [4] A. S. Tanenbaum: Computer Networks., 3rd ed. Pearson Education (23). [5] G. Bianchi: Performance analysis of the ieee 82.11 distributed coor-dination function., IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535 547 (2). [6] M. K. Kadiyala and R. Pendse: Model and analysis of IEEE 82.11 distributed coordination function medium access control protocol using the semi-markov process., ANRC, ECE Department, Wichita State University, Tech. Rep. version-1, (25). [7] T. Clausen and P. Jacquet, Optimized link state routing protocol (olsr), Network Working Group, vol. Project Hipercom, INRIA (23). [8] The Network Simulator - Ns-2, available: http://nsnam.isi.edu/nsnam/index.php. [9] The Rice University Monarch Project, available: http://www.monarch.cs.rice.edu. Volume 7 Number 4 Page 129 www.ubicc.org