Peformance Evaluation Of Ad Hoc On Demand Routing

上传人:仙*** 文档编号:76780100 上传时间:2022-04-18 格式:DOC 页数:5 大小:210.50KB
收藏 版权申诉 举报 下载
Peformance Evaluation Of Ad Hoc On Demand Routing_第1页
第1页 / 共5页
Peformance Evaluation Of Ad Hoc On Demand Routing_第2页
第2页 / 共5页
Peformance Evaluation Of Ad Hoc On Demand Routing_第3页
第3页 / 共5页
资源描述:

《Peformance Evaluation Of Ad Hoc On Demand Routing》由会员分享,可在线阅读,更多相关《Peformance Evaluation Of Ad Hoc On Demand Routing(5页珍藏版)》请在装配图网上搜索。

1、Peformance Evaluation Of Ad Hoc On Demand RoutingProtocol With Heterogenous NodesMahamadou laico TraoreSchool of Continued Education,Beijing University of Posts and Telecommunications,Beijing(100876)AbstractIn wireless ad hoc network many papers have been proposed on the routing protocols implementa

2、tion,analysis, performance study and improvement. Simulations are always done with identical nodes assumption thats means nodes homogeneity, all of the nodes have the same characteristics but in reality it is not always true. With the multiplicity of the wireless devices sometimes it is possible; no

3、des can be different in some parameters like coverage range, antenna height, energy and rate of response to incoming signal. Since many kinds of nodes with different parameters are available and for the extensibility of wireless ad hoc network, it is time to begin to think on how to introduce and to

4、 take this constraint into account in the current routing protocols. So for showing heterogeneity constraint in these routing protocols, we will propose to study the behaviors, and the performance limitation of Ad hoc On Demand Distance Vector protocol (AODV) which is one of the IETF approved protoc

5、ols.Keywords:AODV,heterogeneity,coverage range and antenna height1. IntroductionA mobile ad-hoc network is a kind of wireless network which has mobile devices with self-configuring capability, the terminals may be free to move randomly and organize themselves arbitrary, and thus, the network topolog

6、y may change rapidly and unpredictably; consequently causing several particular features to limit the achievable performance of data communications, such as radio link problems, energy constrained operation and the lack of infrastructure. With these constraints the key element which can offset, infl

7、uence and improve the network efficiency is the routing protocol.Ideally, a mobile ad hoc network routing protocol should be able to quickly provide optimal routes, even in the case of link failures in an active path, with minimum impact on data latency, available bandwidth and device power consumpt

8、ion for any data traffic pattern. Apart from theses constraints so far mentioned we still face the problem of node heterogeneity which is now a real challenge in current MANET routing protocols with the proliferation, the development and the multiplicity of wireless devices. Till now in many propose

9、d paper routing protocols implementation, performance analysis and improvement are done with homogeneous nodes assumptions, thats means all of the nodes are having the same characteristics when making routing decisions; which treats a resource-poor (weak) device forwarding data packets same as a res

10、ource-rich (strong) device, which is totally different from the real conditions. So in order to extend the application area of the wireless ad hoc network, I think it is time and necessary to adapt or include these new constraints in current approved protocols or to plan a new protocol with heteroge

11、neous nodes assumptions.Heterogeneity is just a case that wireless ad hoc networks consist of many different devices. These devices may include of some dedicated wireless routers, desktop machines, laptops, handhelds and phones. Each device in the network has its own characteristics, properties and

12、purpose such as energy capacity, response speed and coverage range and should be used accordingly.Some papers have already talked on a similar problem but many of them are based on the hierarchical routing protocol assumptions 6 and 7, which generally have an incumbent problem of group or group head

13、 selection when nodes movement is very fast. Due to the importance and to bring to fore this problem we propose to analyze the behavior, the limit performances of the Ad hoc On Demand Distance Vector protocol (AODV) , which is one of the IETF approved protocol, when nodes are heterogeneous and mixed

14、 distributed.This paper is organized as follows: section II is the ad hoc network protocols overview; section III, simulation and result analysis and the last section is the paper conclusion and future work proposal.2. Ad hoc Network Protocols OverviewMobile ad-hoc networks are networks that involve

15、 mobile nodes communicating over wireless connections. The networks are characterized by variable topologies, therefore static routing paths, like those used in conventional routing, cannot be used. The dynamic properties of links within a MANET require active topology discovery and maintenance to d

16、o any kind of deterministic routing. Continual variability, along with the existence of sudden and possibly unidirectional connections, makes routing on these networks very complex. Approaches, termed pro-active 8, work much like traditional link-state routing algorithms, these approaches attempt to

17、 maintain an up to date view of the network locally and use this information to route packets towards their destination: Example of pro-active routing protocol is DSDV (Destination Sequenced Distance Vector). But these approaches have been found not to scale well, requiring exponentially increasing

18、control traffic in order to maintain their connection state information. Therefore, another approach was developed that could scale without the need of consistent control traffic: reactive routing. 9, the idea behind reactive routing is to only find connection state when it is needed. When a message

19、 is to be sent, a node floods the network with a route request. Everyone that hears the request appends their address and forwards the request. Once the destination is found, the request is routed back to the source using the appended addresses. The source then uses the list of addresses to route th

20、e message to its final destination. This incurs an extra round trip latency and higher chance of route failure in exchange for control traffic that scales linearly with the amount of messages to be sent. In the other hand we have another approach which merges proactive and reactive protocol. Called

21、hybrid routing protocol 10 and 11, it combines the best features of the above two categories. Nodes within a certain distance from the node are said to be within the routing zone of the given node. For routing within this zone, a table-driven routing approach is used; for nodes that are located beyo

22、nd this zone, an on-demand routing approach is used. Example of hybrid routing protocols is ZRP (Zone Routing Protocol).Ad Hoc On-Demand Vector Routing (AODV) 1, 2, 3 and 4 protocol is a reactive routing protocol for mobile ad hoc networks. That means that AODV does nothing until a node needs to tra

23、nsmit a packet to a node for which it does not know a route. In addition, it only maintains routes between nodes which need to communicate. Its routing messages do not contain information about the whole route path, but only about the source and the destination. Therefore, routing messages have a co

24、nstant size, independently of the number of hops of the route. It uses destination sequence numbers to specify how fresh a route is (in relation to another), which is used to grant loop freedom. In AODV, a node does route discovery by flooding the network with a Route Request message (RREQ). Once it

25、 reaches a node that knows the requested route, it replies with a Route Reply message (RREP) that travels back to the originator of the RREQ. After this, all the nodes of the discovered path have routes to both ends of the path. In addition to these routing messages, Route Error messages (RERR) are

26、used to notify the other nodes that certain nodes are not anymore reachable due to a link breakage.3. Simulation and Result AnalysisThe simulation experiments are presented in this section. The overall goal of our experiments is to study and show the behavior, the performance of the ad-hoc on demand

27、 routing protocol to react to the network heterogeneity by computing the number of weak devices. It will be evaluated on the end-to-end throughputs, average delay and network average overhead for the case of two different classes, strong and weak devices which are mixed distributed in the network ar

28、ea.3.1 Simulation environmentOur simulations have been implemented in Network Simulator (ns-2) 5 from Lawrence BerkeleyNational Laboratory with extensions from the MONARCH Project at Carnegie Mellon University. At the physical layer, the extended ns-2 employs a radio propagation model supporting pro

29、pagation delay, Omni-directional antennas, and a shared media network interface. The IEEE 802.11 medium access protocol is employed at the link layer level.Our simulations are based on the scenario of 30 wireless nodes forming an ad hoc network, moving about over a rectangular (1200mx1200m) flat spa

30、ce. All the nodes are mixed distributed and they are composed of weak and strong terminals. The nodes in the simulation are mixed distributed and move according to the random waypoint model without pause time or total movement. Each node selects a random destination in the 1200m x 1200m space and mo

31、ves to that destination at a speed distributed uniformly between 0 and 20m/s and each simulation runs for 400s of simulated time.We run our simulations by varying the number of weak nodes patterns generated for 5 different simulations: 5, 10, 15and 20. The case of 30 homogenous nodes has been chosen

32、 as strong nodes.Three cases of heterogeneity are created and described as follow:-Case 1: coverage range difference, the strong nodes have 250m as coverage range and the weak nodes, 100m as coverage range.- Case 2: antenna height difference, we define two kinds of antenna heights, 1.5m for the stro

33、ngdevices and 0.5 m for the weak devices.- Case 3: Case 1 and case 2 combined together3.2 Simulation resultsWe studied the protocol performance by computing the network throughput, network overhead and the end to end communication average delay. In the simulation environment assumptions, the behavio

34、rs and the performances of ad hoc on demand distance vector protocol (AODV) for the three cases of heterogeneity are illustrated by below graphs. These graphs correspond successively to the networkaver a g e dela yaverage delay, overhead and throughput graphs.1210864antenna height coverage range cov

35、erage&ant-height200510152025number of weak nodesFig 1: average delaySince the nodes are distributed, mixed randomly; it is possible for an end-to-end link, that the number of weak nodes is higher than the strong nodes; what results in a bad packet routing due to theirs weak characteristics; thus cau

36、sing the increase in averageend-to-end communication delay.Indeed, on the graph Fig 1 we observe that this delay is more notable in the third case of heterogeneity than in both other cases. The graph also shows that the delay for a difference of antenna height is smaller than the delay caused by the

37、 difference in coverage range. Since the coverage range of nodes is not the same; then link become asymmetrical i.e. sometimes it possible that a node A communicates with a node B but B in turn cannot communicate with a node C because of the weakness of its coverage range. Thus there is a link break

38、 which demands that the process of local repair or new route discoverymechanisms be executed which ultimately increase the average delay time.For all the three cases of heterogeneity, average delay time increases with the number of weak nodes. It reaches 9s for the third case of heterogeneity which

39、is the mix of the two others cases. This value is approximately eight times of the result of the heterogeneous nodes delay time under the sameconditions of simulation.20000ov er hea d15000100005000antenna height coverage coverage&ant-height00510152025number of weak nodesFig 2: overheadIn addition to

40、 the frequent link breaks which results in the frequent request of the local repair or route discovery mechanisms, we also have the problem of packets loss.Packet loss occurs in the case where data packets transmission is cancelled due to routing time out caused by weak characteristics of the commun

41、ication link. Faced with these different constraints the network uses more control packets and have as consequence a spectacular increase in network routing overhead.The graph in Fig 2 above shows all the three cases of heterogeneity, the network routing overheadtends towards 2 times the value of th

42、e homogenous case for 20 weak nodes.8070throughput60504030201000510152025 number of weak nodesantenna height coverage range coverage&ant- heightFig 3: throughputBecause of the rise in the end-to-end communication average delay time and the network routing overhead which normally occupy most of the a

43、vailable bandwidth and as one would expect it will have a serious consequences on the network throughput. Indeed we can notice this on the graph where the throughput decreases with the growth in number of the weak nodes. We can see, it decreases by 81% for coverage range difference and by 97% for an

44、tenna height difference from the homogenous value for only 10 numbers of weak nodes and certainly the result will reach zero when the number of weaknodes reaches 25.4. ConclusionsToday research in ad hoc network is the most covet topic by the researchers due to its application area. Till now, the pr

45、oposed protocols of this kind of network have been implemented with the nodes assumed to be homogenous in nature that means all the nodes in the network are assumed to have the same characteristics. According to the above simulations results obtain in this paper, Due to some differences in character

46、istics between the wireless devices, such as there coverage range, node antenna height; it is obvious that the end-to-end communication average delay time, the network routing overhead and throughput are very much affected. We can say that the protocol dont respond as well as in the case of homogeno

47、us node assumptions and thus, we think it is time to take into account or accommodate heterogeneity constraint in current ad hoc network protocols to improve more their performances. And we think it is inescapable now because of the actual development and multiplicity of the wireless devices, especi

48、ally as the cases of heterogeneity mentioned in this paper are only few among many others yet to be mentioned.Future WorkOur future work in ad hoc network routing protocols improvement will be how to accommodate ad hoc on demand routing protocol to support nodes heterogeneity or implement a new one

49、which takes into account this constraint.References1- C. E. Perkins, E. M. Belding-Royer, and S. Das “Ad hoc On-Demand Distance Vector (AODV) Routing”RFC 3561, July 2003.2- Mobile Ad-hoc Networks, http:/www.ietf.org/html.charters/manetcharter.html.3- C. Perkins and E. Royer and S. Das “Ad hoc On-dem

50、and Distance Vector (AODV) Routing”, Internet Draft, draft-ietf-manet-aodv-11.txt, work in progress, Aug 2002.4- C. Perkins and E. Royer, “Ad-hoc On-Demand Distance Vector Routing” In IEEE workshop on MobileComputing Systems and Applications, February 1999.5- The ns Manual (formerly ns Notes and Doc

51、umentation)The VINT Project A Collaboration between researchers at UC Berkeley, LBL, USC/ISI, and Xerox PARC.KevinFall hkfallee.lbl.govi, Editor Kannan Varadhan hkannancatarina.usc.edui, Editor September 23, 20066- Efficient Group Mobility for Heterogeneous Sensor Networks (Sept. 2006) Traynor P., J

52、aeSheung Shin, Madan, B. Phoha, S. La Porta, T. Vehicular Technology Conference, 2006. VTC-2006 fall. 2006 IEEE 64th Page(s):1 - 5 Digital Object Identifier 10.1109/VTCF.2006.5457- Multiclass routing and medium access control for heterogeneous mobile ad hoc networks (Jan. 2006)Xiaojiang Du; Dapeng W

53、u; Wei Liu; Yuguang Fang; Vehicular Technology, IEEE Transactions on Volume55, Issue 1, Jan. 2006 Page(s):270 - 277 Digital Object Identifier 10.1109/TVT.2005.8611838-Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks(May 2007) Mbarushimana C, Shahrab

54、i A. Advanced Information Networking and Applications Workshops, 2007, AINAW 07. 21st International Conference Volume 2, Page(s): 679 - 684 Digital Object Identifier10.1109/AINAW.2007.1239-Routing overhead analysis for reactive routing protocols in wireless ad hoc networks (Aug. 2005) Naserian M., T

55、epe, K.E., Tarique M., Wireless And Mobile Computing, Networking And Communications, 2005. (WiMob2005) IEEE International Conference Volume 3, Page(s):87 - 92 Vol. 3 Digital Object Identifier10.1109/WIMOB.2005.151288910- Performance of a hybrid routing protocol for mobile ad hoc networks (Oct. 2001)

56、Nasipuri A., Burleson R., Hughes B., Roberts J. Computer Communications and Networks, 2001. ProceedingsTenth International Conference Page(s):296 - 302 Digital Object Identifier 10.1109/ICCCN.2001.956272 11- A two-zone hybrid routing protocol for mobile ad hoc networks Dec. 2004Wang L., Olariu S., Parallel and Distributed Systems, IEEE Transactions Volume 15, Issue 12, Page(s):1105 -1116 Digital Object Identifier 10.1109/TPDS.2004.73

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!