12,418 research outputs found

    Performance Analysis of Traffic and Mobility Models on Mobile and Vehicular Ad Hoc Wireless Networks

    Get PDF
    Advances in wireless communication technology and the proliferation of mobile devices enable the capa- bilities of communicating with each other even in areas with no pre-existing communication infrastructure. Traffic and mobility models play an important role in evaluating the performance of these communication networks. Despite criticism and assumption from various researches on Transmission Control Protocols (TCP), weaknesses on Mobile Ad Hoc Network (MANET), and Vehicular Ad Hoc Network (VANET). A simulation was carried out to evaluate the performance of Constant Bit Rate, Variable Bit Rate and Transmission Control Protocol on MANET and VANET using DSR routing protocol. CBR, VBR, and TCP have different manufacturer operation mechanisms and these differences lead to significant performance of CBR and VBR over TCP with better throughput and less average maximal end-to-end delay. DSR was able to respond to link failure at low mobility which led to TCP’s performance in packets delivery

    Observation-based Cooperation Enforcement in Ad Hoc Networks

    Full text link
    Ad hoc networks rely on the cooperation of the nodes participating in the network to forward packets for each other. A node may decide not to cooperate to save its resources while still using the network to relay its traffic. If too many nodes exhibit this behavior, network performance degrades and cooperating nodes may find themselves unfairly loaded. Most previous efforts to counter this behavior have relied on further cooperation between nodes to exchange reputation information about other nodes. If a node observes another node not participating correctly, it reports this observation to other nodes who then take action to avoid being affected and potentially punish the bad node by refusing to forward its traffic. Unfortunately, such second-hand reputation information is subject to false accusations and requires maintaining trust relationships with other nodes. The objective of OCEAN is to avoid this trust-management machinery and see how far we can get simply by using direct first-hand observations of other nodes' behavior. We find that, in many scenarios, OCEAN can do as well as, or even better than, schemes requiring second-hand reputation exchanges. This encouraging result could possibly help obviate solutions requiring trust-management for some contexts.Comment: 10 pages, 7 figure

    Performance analysis of MANET routing protocols in the presence of self-similar traffic

    Get PDF
    A number of measurement studies have convincingly demonstrated that network traffic can exhibit a noticeable self-similar nature, which has a considerable impact on queuing performance. However, many routing protocols developed for MANETs over the past few years have been primarily designed and analyzed under the assumptions of either CBR or Poisson traffic models, which are inherently unable to capture traffic self-similarity. It is crucial to re-examine the performance properties of MANETs in the context of more realistic traffic models before practical implementation show their potential performance limitations. In an effort towards this end, this paper evaluates the performance of three well-known and widely investigated MANET routing protocols, notably DSR, AODV and OLSR, in the presence of the bursty self-similar traffic. Different performance aspects are investigated including, delivery ratio, routing overhead, throughput and end-to-end delay. Our simulation results indicate that DSR routing protocol performs well with bursty traffic models compared to AODV and OLSR in terms of delivery ratio, throughput and end-to-end delay. On the other hand, OLSR performed poorly in the presence of self-similar traffic at high mobility especially in terms of data packet delivery ratio, routing overhead and delay. As for AODV routing protocol, the results show an average performance, yet a remarkably low and stable end-to-end delay
    • …
    corecore