31,699 research outputs found
Time Dependent Performance Analysis of Wireless Networks
Many wireless networks are subject to frequent changes in a combination of network topology, traffic demand, and link capacity, such that nonstationary/transient conditions always exist in packet-level network behavior. Although there are extensive studies on the steady-state performance of wireless networks, little work exists on the systematic study of their packet-level time varying behavior. However, it is increasingly noted that wireless networks must not only perform well in steady state, but must also have acceptable performance under nonstationary/transient conditions. Furthermore, numerous applications in today's wireless networks are very critical to the real-time performance of delay, packet delivery ratio, etc, such as safety applications in vehicular networks and military applications in mobile ad hoc networks. Thus, there exists a need for techniques to analyze the time dependent performance of wireless networks.
In this dissertation, we develop a performance modeling framework incorporating queuing and stochastic modeling techniques to efficiently evaluate packet-level time dependent performance of vehicular networks (single-hop) and mobile ad hoc networks (multi-hop). For vehicular networks, we consider the dynamic behavior of IEEE 802.11p MAC protocol due to node mobility and model the network hearability as a time varying adjacency matrix. For mobile ad hoc networks, we focus on the dynamic behavior of network layer performance due to rerouting and model the network connectivity as a time varying adjacency matrix. In both types of networks, node queues are modeled by the same fluid flow technique, which follows flow conservation principle to construct differential equations from a pointwise mapping of the steady-state queueing relationships. Numerical results confirm that fluid-flow based performance models are able to respond to the ongoing nonstationary/transient conditions of wireless networks promptly and accurately. Moreover, compared to the computation time of standard discrete event simulator, fluid-flow based model is shown to be a more scalable evaluation tool. In general, our proposed performance model can be used to explore network design alternatives or to get a quick estimate on the performance variation in response to some dynamic changes in network conditions
A time dependent performance model for multihop wireless networks with CBR traffic
In this paper, we develop a performance modeling technique for analyzing the time varying network layer queueing behavior of multihop wireless networks with constant bit rate traffic. Our approach is a hybrid of fluid flow queueing modeling and a time varying connectivity matrix. Network queues are modeled using fluid-flow based differential equation models which are solved using numerical methods, while node mobility is modeled using deterministic or stochastic modeling of adjacency matrix elements. Numerical and simulation experiments show that the new approach can provide reasonably accurate results with significant improvements in the computation time compared to standard simulation tools. © 2010 IEEE
Observation-based Cooperation Enforcement in Ad Hoc Networks
Ad hoc networks rely on the cooperation of the nodes participating in the
network to forward packets for each other. A node may decide not to cooperate
to save its resources while still using the network to relay its traffic. If
too many nodes exhibit this behavior, network performance degrades and
cooperating nodes may find themselves unfairly loaded. Most previous efforts to
counter this behavior have relied on further cooperation between nodes to
exchange reputation information about other nodes. If a node observes another
node not participating correctly, it reports this observation to other nodes
who then take action to avoid being affected and potentially punish the bad
node by refusing to forward its traffic. Unfortunately, such second-hand
reputation information is subject to false accusations and requires maintaining
trust relationships with other nodes. The objective of OCEAN is to avoid this
trust-management machinery and see how far we can get simply by using direct
first-hand observations of other nodes' behavior. We find that, in many
scenarios, OCEAN can do as well as, or even better than, schemes requiring
second-hand reputation exchanges. This encouraging result could possibly help
obviate solutions requiring trust-management for some contexts.Comment: 10 pages, 7 figure
Quantifying Link Stability in Ad Hoc Wireless Networks Subject to Ornstein-Uhlenbeck Mobility
The performance of mobile ad hoc networks in general and that of the routing
algorithm, in particular, can be heavily affected by the intrinsic dynamic
nature of the underlying topology. In this paper, we build a new
analytical/numerical framework that characterizes nodes' mobility and the
evolution of links between them. This formulation is based on a stationary
Markov chain representation of link connectivity. The existence of a link
between two nodes depends on their distance, which is governed by the mobility
model. In our analysis, nodes move randomly according to an Ornstein-Uhlenbeck
process using one tuning parameter to obtain different levels of randomness in
the mobility pattern. Finally, we propose an entropy-rate-based metric that
quantifies link uncertainty and evaluates its stability. Numerical results show
that the proposed approach can accurately reflect the random mobility in the
network and fully captures the link dynamics. It may thus be considered a
valuable performance metric for the evaluation of the link stability and
connectivity in these networks.Comment: 6 pages, 4 figures, Submitted to IEEE International Conference on
Communications 201
An efficient hybrid model and dynamic performance analysis for multihop wireless networks
Multihop wireless networks can be subjected to nonstationary phenomena due to a dynamic network topology and time varying traffic. However, the simulation techniques used to study multihop wireless networks focus on the steady-state performance even though transient or nonstationary periods will often occur. Moreover, the majority of the simulators suffer from poor scalability. In this paper, we develop an efficient performance modeling technique for analyzing the time varying queueing behavior of multihop wireless networks. The one-hop packet transmission (service) time is assumed to be deterministic, which could be achieved by contention-free transmission, or approximated in sparse or lightly loaded multihop wireless networks. Our model is a hybrid of time varying adjacency matrix and fluid flow based differential equations, which represent dynamic topology changes and nonstationary network queues, respectively. Numerical experiments show that the hybrid fluid based model can provide reasonably accurate results much more efficiently than standard simulators. Also an example application of the modeling technique is given showing the nonstationary network performance as a function of node mobility, traffic load and wireless link quality. © 2013 IEEE
Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs
In this paper, a framework for experimental parameters in which Packet
Delivery Ratio (PDR), effect of link duration over End-to-End Delay (E2ED) and
Normalized Routing Overhead (NRO) in terms of control packets is analyzed and
modeled for Mobile Ad-Hoc NETworks (MANETs) and Vehicular Ad-Hoc NETworks
(VANETs) with the assumption that nodes (vehicles) are sparsely moving in two
different road. Moreover, this paper contributes the performance comparison of
one Proactive Routing Protocol; Destination Sequenced Distance vector (DSDV)
and two reactive protocols; DYnamic Source Routing (DSR) and DYnamic MANET
On-Demand (DYMO). A novel contribution of this work is enhancements in default
versions of selected routing protocols. Three performance parameters; PDR, E2ED
and NRO with varying scalabilities are measured to analyze the performance of
selected routing protocols with their original and enhanced versions. From
extensive simulations, it is observed that DSR outperforms among all three
protocols at the cost of delay. NS-2 simulator is used for simulation with
TwoRayGround propagation model to evaluate analytical results
Protector Control PC-AODV-BH in The Ad Hoc Networks
In this paper we deal with the protector control that which we used to secure
AODV routing protocol in Ad Hoc networks. The considered system can be
vulnerable to several attacks because of mobility and absence of
infrastructure. While the disturbance is assumed to be of the black hole type,
we purpose a control named "PC-AODV-BH" in order to neutralize the effects of
malicious nodes. Such a protocol is obtained by coupling hash functions,
digital signatures and fidelity concept. An implementation under NS2 simulator
will be given to compare our proposed approach with SAODV protocol, basing on
three performance metrics and taking into account the number of black hole
malicious nodesComment: submit 15 pages, 19 figures, 1 table, Journal Indexing team, AIRCC
201
- …