3,024 research outputs found
Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs
In this paper, a framework for experimental parameters in which Packet
Delivery Ratio (PDR), effect of link duration over End-to-End Delay (E2ED) and
Normalized Routing Overhead (NRO) in terms of control packets is analyzed and
modeled for Mobile Ad-Hoc NETworks (MANETs) and Vehicular Ad-Hoc NETworks
(VANETs) with the assumption that nodes (vehicles) are sparsely moving in two
different road. Moreover, this paper contributes the performance comparison of
one Proactive Routing Protocol; Destination Sequenced Distance vector (DSDV)
and two reactive protocols; DYnamic Source Routing (DSR) and DYnamic MANET
On-Demand (DYMO). A novel contribution of this work is enhancements in default
versions of selected routing protocols. Three performance parameters; PDR, E2ED
and NRO with varying scalabilities are measured to analyze the performance of
selected routing protocols with their original and enhanced versions. From
extensive simulations, it is observed that DSR outperforms among all three
protocols at the cost of delay. NS-2 simulator is used for simulation with
TwoRayGround propagation model to evaluate analytical results
Performance Analysis of Traffic and Mobility Models on Mobile and Vehicular Ad Hoc Wireless Networks
Advances in wireless communication technology and the proliferation of mobile devices enable the capa-
bilities of communicating with each other even in areas with no pre-existing communication infrastructure.
Traffic and mobility models play an important role in evaluating the performance of these communication
networks. Despite criticism and assumption from various researches on Transmission Control Protocols
(TCP), weaknesses on Mobile Ad Hoc Network (MANET), and Vehicular Ad Hoc Network (VANET).
A simulation was carried out to evaluate the performance of Constant Bit Rate, Variable Bit Rate and
Transmission Control Protocol on MANET and VANET using DSR routing protocol. CBR, VBR, and TCP
have different manufacturer operation mechanisms and these differences lead to significant performance
of CBR and VBR over TCP with better throughput and less average maximal end-to-end delay. DSR
was able to respond to link failure at low mobility which led to TCPâs performance in packets delivery
DEMO: Simulation of Realistic Mobility Model and Implementation of 802.11p (DSRC) for Vehicular Networks (VANET)
An ad hoc network of vehicles (VANET) consists of vehicles that exchange
information via radio in order to improve road safety, traffic management and
do better distribution of traffic load in time and space. Along with this it
allows Internet access for passengers and users of vehicles. A significant
characteristic while studying VANETs is the requirement of having a mobility
model that gives aspects of real vehicular traffic. These scenarios play an
important role in performance of VANETs. In our paper we have demonstration and
description of generating realistic mobility model using various tools such as
eWorld, OpenStreetMap, SUMO and TraNS. Generated mobility scenario is added to
NS-2.34 (Network Simulator) for analysis of DSR and AODV routing protocol under
802.11p (DSRC/WAVE) and 802.11a. Results after analysis shows 802.11p is more
suitable than 802.11a for VANET.Comment: 4 pages, 6 figures, International Journal of Computer Applicatio
Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks
Wireless Mesh Networks (WMNs) have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.). However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET On-demand (DYMO) routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.Wireless Mesh Networks (WMNs), IEEE 802.11s, AODV, DSR, DYMO
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
- âŠ