SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
Università degli Studi di Catania
   Corso di Laurea Magistrale in Ingegneria Informatica



Use of NS-2 to simulate MANET routing algorithms


    Architectures and tecnologies for telecommunications systems
                      Prof. Eng. Giacomo Morabito




                                                         Giancarlo Romeo
                                                                   O55 000031
Ad hoc networks
  “A mobile ad hoc network, is a self-configuring infrastructureless network of mobile devices
                                 connected by wireless links”.

                                                                    Route Discovery
                                                                          Forward
                                                                        Route Error
                                                                        Broken Link

           Source node


                                                                        Destination node




                                                              Mobile Ad hoc NETwork


There is no static infrastructure such as base station. If two hosts are not
within radio range, all message communication between them must pass
    through one or more intermediate hosts that double as routers.
Ad hoc routing protocols

 Targets



Minimize number of exchanged messages          to St
                                                    eve




Simplify processing and routing operations


Keeping updated the network scenario


Prevent loops inside the network
Ad hoc routing protocols: pro-active vs. reactive

 Pro-active (table-driven)

 Maintains fresh lists of destinations and their routes by periodically distributing routing tables
 throughout the network. The main disadvantages of such algorithms are:

  1. Respective amount of data for maintenance.
  2. Slow reaction on restructuring and failures.

 Reactive (on-demand)
Finds a route on demand by flooding the network with Route Request packets. The main disadvantages
of such algorithms are:

1. High latency time in route finding.
2. Excessive flooding can lead to network clogging.
DSDV (Destination-Sequenced Distance Vector)

DSDV is a table-driven routing scheme for ad hoc mobile networks
based on the Bellman-Ford algorithm.

   Advantages
Guarantees for loop free paths (sequence numbers).
Since each node knows the complete topology, a node can immediately find the
best route to a destination.

  Disadvantages

 Requires a regular update of its routing tables, which uses up battery
 power and a small amount of bandwidth even when the network is idle.
 (full dumps and smaller incremental updates).
AODV (Ad hoc On-Demand Distance Vector)

AODV is a reactive routing protocol, meaning that it establishes a route
to a destination only on-demand.

   Advantages

Guarantees for loop free paths (sequence numbers).
Low bandwidth utilization for path keeping.


  Disadvantages

The connection setup delay is higher (route discovery).
Network Simulator 2 (ns-2)

NS-2 is a discrete event simulator targeted at networking research. Ns
provides substantial support for simulation of TCP, routing, and multicast
   protocols over wired and wireless (local and satellite) networks.


                                                              Transmission ranges



                                                              Mobile node

  Timeline
Scenarios
  Parameters
                                                                        v

 Area                                                                                           v


  Free space where mobile nodes move on.                                    v



 Nodes                                                                                  v
  Number of mobile nodes in the area.                 Mobile node
                                                                                v                       v
                                                                                                            y

 Speed
  Min and max speed of nodes [in m/s].                                  v                   v
                                                                                                    v

 Simulation time
  Duration of simulation [in s].
                                                                                    x

 util/scenariogen
A program that creates TCL script for modeling mobile scenario.

  $ util/scenariogen -v 2 -n $opt(nn) -s 1 -m $opt(minspeed) -M $opt(maxspeed) -t 300 -P 1 -p 2.0 
  -x $opt(x) -y $opt(y) > scenarios/scenario.tcl
Propagation model

 Two-ray ground reflection model
                                                       direct ray             Power received at distance d
         Tx
                                                      Rx

       ht
                                                        hr
                ground
                                                              reflect ray
                                 d



 threshold.cc

A C++ program that calculates the thresholds for transmission receipt using the relation between various
physical parameters (distance, effect, propagation model etc.) related to transmissions in ns-2.
                                                                     Distance in meters
$ ./util/threshold -m TwoRayGround 120
                                                        Propagation model
CS Threshold and RX Threshold

NS2 mainly uses thresholds to determine whether one frame
                                                                               Physical transmission modeling
is received correctly by the receiver.


    CSThresh_                                                   MAC tags                                        Good frame
                                                             corrupted frame
   If signal strenght of the frame is less than CSThresh_,
   the frame is discarded in PHY module and not will be
   visible to MAC layer.


    RXThresh_                                                                                                   RxThresh_
                                                                  CSThresh_

   If signal strenght of the frame is stronger than
   RXThresh_, the frame is discarded in received
   correctly. Otherwise, the frame is tagged as corrupted
   and MAC layer will discard it.                                                  PHY module discards frame
Traffic
                                                                    Communication model stack
Parameters                                                           Tx                  Rx

Protocol                                           Application       FTP                FTP
 Type of communication protocol. (e.g. TCP)

Nodes                                                   Agent       TCP              TCP Sink
 Number of mobile nodes.

Connections                                                              create-connection
 Number of connections between mobile nodes.           MAC / PHY Layer


 util/trafficgen.tcl
An OTCL script that creates traffic between nodes in ns-2.

$ util/trafficgen.tcl -nn $opt(nn) -cn $opt(cn) > traffic/traffic.tcl
util/trafficgen.tcl
       Main                                                           Procedures/tcp-connect
while {$ftp_cnt < $opt(cn)} {                                         proc tcp_connect {src dst} {
	

   set src [expr int(rand() * $opt(nn))]                           	

   global ftp_cnt opt;
	

                                                                   	

                                                                      	

   puts "n# Node $src connecting through TCP to Node $dst."
	

   while 1 {
                                                                      	

	

   	

   set dst [expr int(rand() * $opt(nn))]                     	

   # create TCP Agent and attach it to the source node
	

   	

   if {$src != $dst} {                                       	

   puts "set tcp_($ftp_cnt) [new Agent/TCP]"
	

   	

   	

    break                                              	

   puts "$ns_ attach-agent $node_($src) $tcp_($ftp_cnt)"
	

   	

   }                                                         	

	

   }                                                               	

   puts "$tcp_($ftp_cnt) set window_ $opt(winsize)"
	

                                                                   	

   puts "$tcp_($ftp_cnt) set packetSize_ $opt(pktsize)"
                                    Connects source and destination   	

	

   tcp_connect $src $dst
}                                                                     	

   # create TCPSink Agent and attach it to the destination node
                                                                      	

   puts "set sink_($ftp_cnt) [new Agent/TCPSink]"
                                                                      	

   puts "$ns_ attach-agent $node_($dst) $sink_($ftp_cnt)"
                                                                      	

                                                                      	

   # create a connection between source and destination
                       Tx                       Rx
                                                                      	

   puts "$ns_ connect $tcp_($ftp_cnt) $sink_($ftp_cnt)"
                                                                      	

Application           FTP                       FTP                   	

   # create an FTP Application and attach it to the source node
                                                                      	

   puts "set ftp_($ftp_cnt) [new Application/FTP]"
                                                                      	

   puts "$ftp_($ftp_cnt) attach-agent $tcp_($ftp_cnt)"
                                                                      	

   puts "set ftp_($ftp_cnt) [$tcp_($ftp_cnt) attach-source FTP]"
                                                                      	

     Agent           TCP                 TCP Sink                     	

   # starts the FTPs transmission
                                                                      	

   puts "$ns_ at 0 "$ftp_($ftp_cnt) start""

                                                                      	

   incr ftp_cnt
                            create-connection                         }
sim.tcl
  Options

set opt(chan)           Channel/WirelessChannel	

	

    ;# channel type
set opt(prop)           Propagation/TwoRayGround	

      ;# radio-propagation model   Physical configuration
set opt(ant)            Antenna/OmniAntenna	

 	

       ;# antenna type
set opt(ll)
                        LL	

 	

 	

 	

 	

 	

 	

    ;# link layer type
set opt(ifq)
set opt(ifqlen)         Queue/DropTail/PriQueue	

       ;# interface queue type
set opt(netif)          50	

 	

 	

 	

 	

 	

 	

    ;# max packet in ifq
set opt(mac)            Phy/WirelessPhy	

 	

 	

 	

   ;# network interface type
set opt(rp)             Mac/802_11	

	

 	

 	

 	

     ;# MAC type
set opt(nn)             DSDV	

 	

 	

 	

 	

 	

      ;# ad-hoc routing protocol
set opt(pktsize)        300	

	

 	

 	

 	

 	

 	

    ;# number of mobilenodes


    Procedures

proc finish {} {...}
proc getargs {argc argv} {...}
proc usage {} {...}
sim.tcl
   Main

getargs $argc $argv
set ns_ [new Simulator]

set tracef [open traces/$opt(sim)/[string tolower $opt(rp)]/trace_$opt(par).tr w]   Open trace file
$ns_ trace-all $tracef

set topo [new Topography]
$topo load_flatgrid $opt(x) $opt(y)

set god_ [create-god $opt(nn)]

$ns_ node-config -adhocRouting $opt(rp) 
	

 	

  	

 	

   -llType $opt(ll)                 Node configuration
	

 	

  	

 	

   -macType $opt(mac) 
	

 	

  	

 	

   -ifqType $opt(ifq) 
	

 	

  	

 	

   -ifqLen $opt(ifqlen) 
	

 	

  	

 	

   -antType $opt(ant) 
	

 	

  	

 	

   -propType $opt(prop) 
	

 	

  	

 	

   -phyType $opt(netif) 
	

 	

  	

 	

   -topoInstance $topo 
	

 	

  	

 	

   -channel [new $opt(chan)]
sim.tcl
  Main

for {set i 0} {$i < $opt(nn)} {incr i} {
	

   set node_($i) [$ns_ node]           Initialize nodes
	

   $node_($i) random-motion 0
	

	

   $ns_ initial_node_pos $node_($i) 10
}

source scenarios/$opt(sim)/scenario_$opt(par).tcl
source traffic/sim$sim/traffic.tcl
                                                     Import scenario and traffic files

$ns_ at $opt(duration) "finish"
$ns_ run
allsim.tcl
Architecture
                                                        allsim.tcl


                       util                              sim.tcl              traces_analizer.awk
                                                   3. run-simulations          4. analize-traces

    scenariogen                    trafficgen.tcl
1. create-scenarios              2. create-traffic


 Options
set opt(nn)           100                          ;# number of nodes
set opt(x)            500                          ;# area width
set opt(y)            500                          ;# area length
set opt(cn)           30                           ;# number of connections

set opt(nsim)         5                            ;# number of simulations
set opt(rp)           {AODV DSDV}                  ;# routing protocols

set opt(minspeed)     {0.1 5.1 10.1 15.1 20.1}     ;# minimum speed
set opt(maxspeed)     {5.0 10.0 15.0 20.0 25.0}    ;# maximum speed
allsim.tcl

      Procedures: create-scenarios

proc create-scenarios {} {
    global opt                                               Number of
                                                             simulations
       file mkdir scenarios
       for {set sim 1} {$sim <= $opt(nsim)} {incr sim} {
             puts "Creating simulation n.$sim"

            file mkdir scenarios/sim$sim
            for {set j 0} {$j < 5} {incr j} {
                  puts " Creating scenario (m=[lindex $opt(minspeed) $j] m/s, M=[lindex $opt(maxspeed) $j] m/s)"
                  puts " => Writing "scenarios/sim$sim/scenario_[expr $j+1].tcl""

                 exec util/scenariogen -v 2 -n $opt(nn) -s 1 -m [lindex $opt(minspeed) $j] -M [lindex $opt(maxspeed) $j] 
                     -t 300 -P 1 -p 2.0 -x $opt(x) -y $opt(y) > scenarios/$sim/scenario_[expr $j+1].tcl
            }
	

     }                                                                                  Creates scenarios
	

	

     puts "Scenarios have been successfully created!n"
	

     puts "Press any key to continue..."
	

     gets stdin -
}
allsim.tcl

  Procedures: create-traffic

proc create-traffic {} {
	

  global opt                                      Number of
	

                                                     simulations
	

  file mkdir traffic
	

  for {set sim 1} {$sim <= $opt(nsim)} {incr sim} {
          puts "Creating simulation n.$sim"

          file mkdir traffic/sim$sim
          puts " Creating traffic (nn=$opt(nn), cn=$opt(cn))"
          puts " => writing "traffic/sim$sim/traffic.tcl"n"
          exec ns util/trafficgen.tcl -nn $opt(nn) -cn $opt(cn) > traffic/sim$sim/traffic.tcl   Creates traffic
	

   }

	

   puts "Traffic has been successfully created!"
	

   puts "nPress any key to continue..."
	

   gets stdin -
}
allsim.tcl
      Procedures: run-simulations

proc run-simulations {} {                                        Number of
    global opt
                                                                 simulations
             for {set sim 1} {$sim <= $opt(nsim)} {incr sim} {
                  puts "Running simulation n.$sim"

                   foreach rp $opt(rp) {
                       puts " Simulating $rp algorithm"

                       for {set j 0} {$j < 5} {incr j} {
                            puts " Running simulation (speed=[lindex $opt(minspeed) $j]-[lindex $opt(maxspeed) $j])"
                            puts "     => writing "traces/sim$sim/$rp/trace_[expr $j+1].tr""
                            catch {exec ns sim.tcl -nn $opt(nn) -rp $rp -x $opt(x) -y $opt(y) -sim $sim -par [expr $j+1]}
	

          	

       }
       	

         }
	

          }
                                                                                  Runs simulation on NS2
	

          puts "Simulations have been successfully executed!"
	

          puts "nPress any key to continue..."
	

          gets stdin -
}
allsim.tcl
      Procedures: analize-traces
proc analize-traces {} {
    global opt
    puts "Analyzing traces"

        file mkdir results
        foreach rp $opt(rp) {
            puts " Analyzing $rp algorithm"
            file mkdir results/[string tolower $rp]
            for {set j 0} {$j < 5} {incr j} {
                 set resultsf [open results/[string tolower $rp]/results_[expr $j+1].txt w]
                 puts " => writing "results/[string tolower $rp]/results_[expr $j+1].txt""

                for {set sim 1} {$sim <= $opt(nsim)} {incr sim} {
                     puts $resultsf [exec awk -f util/traces_analizer.awk traces/$sim/[string tolower $rp]/trace_[expr $j+1].tr]
                }
                close $resultsf              Filters trace files with awk and computes throughput
            }
        }
	

	

     puts "Calculating throughput has been successfully executed!"
	

     puts "nPress any key to continue..."
	

     gets stdin -
}
allsim.tcl
      Main

while 1 {
     exec clear >@ stdout
                                                                                 Usage
       puts "Welcome to NS2 Ad-hoc Network Simulator"
       puts "-- Speed ------------------------------n"
       puts "Simulation info:"                                                 $ tclsh allsim.tcl
       puts " Nodes: tt $opt(nn)"
       puts " Grid: tt $opt(x) m x $opt(y) m"
       puts " Connections: tt $opt(cn)"
       puts " Algorithms: tt $opt(rp)"

       puts "nCommand menu:"
       puts " 1. Create scenarios (varying max speed 5-25 m/s)"
       puts " 2. Create traffic"
       puts " 3. Run simulation on NS2"
       puts " 4. Analize traces"
       puts "n 0. Exit"
       puts "nWhat dou you choose?"
       gets stdin i

       switch $i {
            1 {create-scenarios}         Interactive menu
            2 {create-traffic}
            3 {run-simulations}
            4 {analize-traces}
            0 {exit 0}                                                         Running allsim.tcl script screenshot
	

     }
}
Simulations/Speed
Nodes: 100                               Speed: {5.0 10.0 15.0 20.0 25.0} m/s
Connections: 30
Area: 500m x 500m
CSThreshold: 120m
RXThreshold: 80m

                                                                                AODV         DSDV
                              792K
                      800Kb   727K

                      640Kb                                                                         high link failures
                                        531K
         Throughput




                      480Kb                             406K
                                                                      353K
                                                                                       321K
                      320Kb
                                        208K

                      160Kb                             91K           81K
                                                                                       56K
                                                                                                +overhead
                       0Kb
                         5 m/s       10 m/s         15 m/s         20 m/s          25 m/s
                                                  Nodes speed
Simulations/Nodes               10 m/s
Connections: 30                              Nodes: {50 75 100 125 150}
Area: 500m x 500m
CSThreshold: 120m
RXThreshold: 80m


                                                                             AODV         DSDV
                              591K    580K                                                        high link failures
                     600Kb

                                                                      482K
                     480Kb                                                            458K
                                                      428K
        Throughput




                     360Kb

                              226K    240K
                     240Kb                                            193K
                                                                                      146K
                                                                                                 +overhead
                                                      134K
                     120Kb

                      0Kb
                             50      75             100             125             150
                                              Number of nodes
Simulations/Nodes              20 m/s
Connections: 30                               Nodes: {50 75 100 125 150}
Area: 500m x 500m
CSThreshold: 120m
RXThreshold: 80m


                                                                              AODV           DSDV
                     400Kb    364K    363K             362K
                                                                                                     high link failures
                                                                       332K            329K
                     320Kb
        Throughput




                     240Kb

                     160Kb

                                                       68K
                                                                                                    +overhead
                     80Kb     51K                                     47K
                                                                                       59K
                                      35K

                      0Kb
                             50      75             100             125              150
                                               Number of nodes
Simulations/Nodes 10-20 m/s
Connections: 30                               Nodes: {50 75 100 125 150}
Area: 500m x 500m
CSThreshold: 120m
RXThreshold: 80m                                                              AODV 10 m/s
                                                                              DSDV 10 m/s
                                                                              AODV 20 m/s
                                                                              DSDV 20 m/s
                              591K    580K
                     600Kb                                                                     high link failures

                                                                      482K
                     480Kb                                                             458K
                                                       428K
                              364K    363K             362K
        Throughput




                     360Kb                                             332K            329K


                              226K    240K
                     240Kb                                            193K
                                                       134K                            146K
                     120Kb                                                                    +overhead
                                                       68K                             59K
                              51K     35K                             47K

                      0Kb
                             50      75             100             125              150
                                               Number of nodes
Simulations/Range
Nodes: 100                                     Range: {130 ... 120 100 80 60 40}
Connections: 30
Area: 500m x 500m
CSThreshold: 120m
RXThreshold: 80m

                                                                                        AODV        DSDV
                         600K                                                                           high link failures
                                                                                                       tx range too small
                         480K
            Throughput




                         360K

                         240K

                         120K                                                                          +overhead

                          0K
                                130 125 124 123 122 121 120 115 110 100            80    60    40
                                                          Range
DSDV vs. AODV

                DSDV                                  AODV



    Worst throughput: high                 Better throughput: low
  bandwidth utilization for link         bandwidth utilization for link
           keeping.                               keeping.

Low latency: the connection setup      High latency: the connection setup
   delay is lower (update table).        delay is higher (route discovery).

Mais conteúdo relacionado

Mais procurados

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Senthil Kanth
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...AAKASH S
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing TechonologiesKathirvel Ayyaswamy
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc NetworksKishan Patel
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETPrasanta kumr Manohari
 

Mais procurados (20)

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
S06 S10 P05
S06 S10 P05S06 S10 P05
S06 S10 P05
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
A QoS oriented distributed routing protocol for Hybrid Wireless Network :Firs...
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 

Destaque

Protocol implementation on NS2
Protocol implementation on NS2Protocol implementation on NS2
Protocol implementation on NS2amreshrai02
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Shaikhul Islam Chowdhury
 
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...Manoj Subramanian
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulationciza2013
 
Working with NS2
Working with NS2Working with NS2
Working with NS2chanchal214
 
Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Rihab Chebbah
 
NS-2 Tutorial
NS-2 TutorialNS-2 Tutorial
NS-2 Tutorialcode453
 
IEEE Project 2014 Ns2 simulation
IEEE Project 2014 Ns2 simulationIEEE Project 2014 Ns2 simulation
IEEE Project 2014 Ns2 simulationallmightinfo
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVEditor IJMTER
 
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2Aws Ali
 
Network simulator survey
Network simulator surveyNetwork simulator survey
Network simulator surveyWei Lin
 
Automatic test packet generation
Automatic test packet generationAutomatic test packet generation
Automatic test packet generationtusharjadhav2611
 

Destaque (20)

Protocol implementation on NS2
Protocol implementation on NS2Protocol implementation on NS2
Protocol implementation on NS2
 
Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34Simulation and Performance Analysis of AODV using NS-2.34
Simulation and Performance Analysis of AODV using NS-2.34
 
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
NS2 Projects for Final Year Students, MANET, VANET, Ad-Hoc Networks...
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Ns2programs
Ns2programsNs2programs
Ns2programs
 
Ns 2 Network Simulator An Introduction
Ns 2 Network Simulator An IntroductionNs 2 Network Simulator An Introduction
Ns 2 Network Simulator An Introduction
 
Vanet ns2 simulation
Vanet ns2 simulationVanet ns2 simulation
Vanet ns2 simulation
 
Ns2
Ns2Ns2
Ns2
 
Working with NS2
Working with NS2Working with NS2
Working with NS2
 
Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2Simulation d'un réseau Ad-Hoc sous NS2
Simulation d'un réseau Ad-Hoc sous NS2
 
NS-2 Tutorial
NS-2 TutorialNS-2 Tutorial
NS-2 Tutorial
 
IEEE Project 2014 Ns2 simulation
IEEE Project 2014 Ns2 simulationIEEE Project 2014 Ns2 simulation
IEEE Project 2014 Ns2 simulation
 
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODVA Review of Ad hoc on demand distance vector routing and proposed AR-AODV
A Review of Ad hoc on demand distance vector routing and proposed AR-AODV
 
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2
 
Tut hemant ns2
Tut hemant ns2Tut hemant ns2
Tut hemant ns2
 
JUF0646518
JUF0646518JUF0646518
JUF0646518
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
 
testbmr
testbmrtestbmr
testbmr
 
Network simulator survey
Network simulator surveyNetwork simulator survey
Network simulator survey
 
Automatic test packet generation
Automatic test packet generationAutomatic test packet generation
Automatic test packet generation
 

Semelhante a Use of NS-2 to Simulate MANET Routing Algorithms

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Wireless Sensor Networks with emphasis on DSR
Wireless Sensor Networks with emphasis on DSRWireless Sensor Networks with emphasis on DSR
Wireless Sensor Networks with emphasis on DSRAmrita Biswas
 
Ad hoc routing
Ad hoc routingAd hoc routing
Ad hoc routingits
 
Dissertation Defense August 2002
Dissertation Defense August 2002Dissertation Defense August 2002
Dissertation Defense August 2002Dr. Edwin Hernandez
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...JPINFOTECH JAYAPRAKASH
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
distance-vector-routing-3.pdf
distance-vector-routing-3.pdfdistance-vector-routing-3.pdf
distance-vector-routing-3.pdfJayaprasanna4
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationshobanavsm
 

Semelhante a Use of NS-2 to Simulate MANET Routing Algorithms (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
Wireless Sensor Networks with emphasis on DSR
Wireless Sensor Networks with emphasis on DSRWireless Sensor Networks with emphasis on DSR
Wireless Sensor Networks with emphasis on DSR
 
Ad hoc routing
Ad hoc routingAd hoc routing
Ad hoc routing
 
Manet algo
Manet algoManet algo
Manet algo
 
Dissertation Defense August 2002
Dissertation Defense August 2002Dissertation Defense August 2002
Dissertation Defense August 2002
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Aodv
AodvAodv
Aodv
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
SZRP.pdf
SZRP.pdfSZRP.pdf
SZRP.pdf
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Mobile Networking Solutions for First Responders
Mobile Networking Solutions for First RespondersMobile Networking Solutions for First Responders
Mobile Networking Solutions for First Responders
 
distance-vector-routing-3.pdf
distance-vector-routing-3.pdfdistance-vector-routing-3.pdf
distance-vector-routing-3.pdf
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communication
 

Último

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROmotivationalword821
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 

Último (20)

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTRO
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 

Use of NS-2 to Simulate MANET Routing Algorithms

  • 1. Università degli Studi di Catania Corso di Laurea Magistrale in Ingegneria Informatica Use of NS-2 to simulate MANET routing algorithms Architectures and tecnologies for telecommunications systems Prof. Eng. Giacomo Morabito Giancarlo Romeo O55 000031
  • 2. Ad hoc networks “A mobile ad hoc network, is a self-configuring infrastructureless network of mobile devices connected by wireless links”. Route Discovery Forward Route Error Broken Link Source node Destination node Mobile Ad hoc NETwork There is no static infrastructure such as base station. If two hosts are not within radio range, all message communication between them must pass through one or more intermediate hosts that double as routers.
  • 3. Ad hoc routing protocols Targets Minimize number of exchanged messages to St eve Simplify processing and routing operations Keeping updated the network scenario Prevent loops inside the network
  • 4. Ad hoc routing protocols: pro-active vs. reactive Pro-active (table-driven) Maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are: 1. Respective amount of data for maintenance. 2. Slow reaction on restructuring and failures. Reactive (on-demand) Finds a route on demand by flooding the network with Route Request packets. The main disadvantages of such algorithms are: 1. High latency time in route finding. 2. Excessive flooding can lead to network clogging.
  • 5. DSDV (Destination-Sequenced Distance Vector) DSDV is a table-driven routing scheme for ad hoc mobile networks based on the Bellman-Ford algorithm. Advantages Guarantees for loop free paths (sequence numbers). Since each node knows the complete topology, a node can immediately find the best route to a destination. Disadvantages Requires a regular update of its routing tables, which uses up battery power and a small amount of bandwidth even when the network is idle. (full dumps and smaller incremental updates).
  • 6. AODV (Ad hoc On-Demand Distance Vector) AODV is a reactive routing protocol, meaning that it establishes a route to a destination only on-demand. Advantages Guarantees for loop free paths (sequence numbers). Low bandwidth utilization for path keeping. Disadvantages The connection setup delay is higher (route discovery).
  • 7. Network Simulator 2 (ns-2) NS-2 is a discrete event simulator targeted at networking research. Ns provides substantial support for simulation of TCP, routing, and multicast protocols over wired and wireless (local and satellite) networks. Transmission ranges Mobile node Timeline
  • 8. Scenarios Parameters v Area v Free space where mobile nodes move on. v Nodes v Number of mobile nodes in the area. Mobile node v v y Speed Min and max speed of nodes [in m/s]. v v v Simulation time Duration of simulation [in s]. x util/scenariogen A program that creates TCL script for modeling mobile scenario. $ util/scenariogen -v 2 -n $opt(nn) -s 1 -m $opt(minspeed) -M $opt(maxspeed) -t 300 -P 1 -p 2.0 -x $opt(x) -y $opt(y) > scenarios/scenario.tcl
  • 9. Propagation model Two-ray ground reflection model direct ray Power received at distance d Tx Rx ht hr ground reflect ray d threshold.cc A C++ program that calculates the thresholds for transmission receipt using the relation between various physical parameters (distance, effect, propagation model etc.) related to transmissions in ns-2. Distance in meters $ ./util/threshold -m TwoRayGround 120 Propagation model
  • 10. CS Threshold and RX Threshold NS2 mainly uses thresholds to determine whether one frame Physical transmission modeling is received correctly by the receiver. CSThresh_ MAC tags Good frame corrupted frame If signal strenght of the frame is less than CSThresh_, the frame is discarded in PHY module and not will be visible to MAC layer. RXThresh_ RxThresh_ CSThresh_ If signal strenght of the frame is stronger than RXThresh_, the frame is discarded in received correctly. Otherwise, the frame is tagged as corrupted and MAC layer will discard it. PHY module discards frame
  • 11. Traffic Communication model stack Parameters Tx Rx Protocol Application FTP FTP Type of communication protocol. (e.g. TCP) Nodes Agent TCP TCP Sink Number of mobile nodes. Connections create-connection Number of connections between mobile nodes. MAC / PHY Layer util/trafficgen.tcl An OTCL script that creates traffic between nodes in ns-2. $ util/trafficgen.tcl -nn $opt(nn) -cn $opt(cn) > traffic/traffic.tcl
  • 12. util/trafficgen.tcl Main Procedures/tcp-connect while {$ftp_cnt < $opt(cn)} { proc tcp_connect {src dst} { set src [expr int(rand() * $opt(nn))] global ftp_cnt opt; puts "n# Node $src connecting through TCP to Node $dst." while 1 { set dst [expr int(rand() * $opt(nn))] # create TCP Agent and attach it to the source node if {$src != $dst} { puts "set tcp_($ftp_cnt) [new Agent/TCP]" break puts "$ns_ attach-agent $node_($src) $tcp_($ftp_cnt)" } } puts "$tcp_($ftp_cnt) set window_ $opt(winsize)" puts "$tcp_($ftp_cnt) set packetSize_ $opt(pktsize)" Connects source and destination tcp_connect $src $dst } # create TCPSink Agent and attach it to the destination node puts "set sink_($ftp_cnt) [new Agent/TCPSink]" puts "$ns_ attach-agent $node_($dst) $sink_($ftp_cnt)" # create a connection between source and destination Tx Rx puts "$ns_ connect $tcp_($ftp_cnt) $sink_($ftp_cnt)" Application FTP FTP # create an FTP Application and attach it to the source node puts "set ftp_($ftp_cnt) [new Application/FTP]" puts "$ftp_($ftp_cnt) attach-agent $tcp_($ftp_cnt)" puts "set ftp_($ftp_cnt) [$tcp_($ftp_cnt) attach-source FTP]" Agent TCP TCP Sink # starts the FTPs transmission puts "$ns_ at 0 "$ftp_($ftp_cnt) start"" incr ftp_cnt create-connection }
  • 13. sim.tcl Options set opt(chan) Channel/WirelessChannel ;# channel type set opt(prop) Propagation/TwoRayGround ;# radio-propagation model Physical configuration set opt(ant) Antenna/OmniAntenna ;# antenna type set opt(ll) LL ;# link layer type set opt(ifq) set opt(ifqlen) Queue/DropTail/PriQueue ;# interface queue type set opt(netif) 50 ;# max packet in ifq set opt(mac) Phy/WirelessPhy ;# network interface type set opt(rp) Mac/802_11 ;# MAC type set opt(nn) DSDV ;# ad-hoc routing protocol set opt(pktsize) 300 ;# number of mobilenodes Procedures proc finish {} {...} proc getargs {argc argv} {...} proc usage {} {...}
  • 14. sim.tcl Main getargs $argc $argv set ns_ [new Simulator] set tracef [open traces/$opt(sim)/[string tolower $opt(rp)]/trace_$opt(par).tr w] Open trace file $ns_ trace-all $tracef set topo [new Topography] $topo load_flatgrid $opt(x) $opt(y) set god_ [create-god $opt(nn)] $ns_ node-config -adhocRouting $opt(rp) -llType $opt(ll) Node configuration -macType $opt(mac) -ifqType $opt(ifq) -ifqLen $opt(ifqlen) -antType $opt(ant) -propType $opt(prop) -phyType $opt(netif) -topoInstance $topo -channel [new $opt(chan)]
  • 15. sim.tcl Main for {set i 0} {$i < $opt(nn)} {incr i} { set node_($i) [$ns_ node] Initialize nodes $node_($i) random-motion 0 $ns_ initial_node_pos $node_($i) 10 } source scenarios/$opt(sim)/scenario_$opt(par).tcl source traffic/sim$sim/traffic.tcl Import scenario and traffic files $ns_ at $opt(duration) "finish" $ns_ run
  • 16. allsim.tcl Architecture allsim.tcl util sim.tcl traces_analizer.awk 3. run-simulations 4. analize-traces scenariogen trafficgen.tcl 1. create-scenarios 2. create-traffic Options set opt(nn) 100 ;# number of nodes set opt(x) 500 ;# area width set opt(y) 500 ;# area length set opt(cn) 30 ;# number of connections set opt(nsim) 5 ;# number of simulations set opt(rp) {AODV DSDV} ;# routing protocols set opt(minspeed) {0.1 5.1 10.1 15.1 20.1} ;# minimum speed set opt(maxspeed) {5.0 10.0 15.0 20.0 25.0} ;# maximum speed
  • 17. allsim.tcl Procedures: create-scenarios proc create-scenarios {} { global opt Number of simulations file mkdir scenarios for {set sim 1} {$sim <= $opt(nsim)} {incr sim} { puts "Creating simulation n.$sim" file mkdir scenarios/sim$sim for {set j 0} {$j < 5} {incr j} { puts " Creating scenario (m=[lindex $opt(minspeed) $j] m/s, M=[lindex $opt(maxspeed) $j] m/s)" puts " => Writing "scenarios/sim$sim/scenario_[expr $j+1].tcl"" exec util/scenariogen -v 2 -n $opt(nn) -s 1 -m [lindex $opt(minspeed) $j] -M [lindex $opt(maxspeed) $j] -t 300 -P 1 -p 2.0 -x $opt(x) -y $opt(y) > scenarios/$sim/scenario_[expr $j+1].tcl } } Creates scenarios puts "Scenarios have been successfully created!n" puts "Press any key to continue..." gets stdin - }
  • 18. allsim.tcl Procedures: create-traffic proc create-traffic {} { global opt Number of simulations file mkdir traffic for {set sim 1} {$sim <= $opt(nsim)} {incr sim} { puts "Creating simulation n.$sim" file mkdir traffic/sim$sim puts " Creating traffic (nn=$opt(nn), cn=$opt(cn))" puts " => writing "traffic/sim$sim/traffic.tcl"n" exec ns util/trafficgen.tcl -nn $opt(nn) -cn $opt(cn) > traffic/sim$sim/traffic.tcl Creates traffic } puts "Traffic has been successfully created!" puts "nPress any key to continue..." gets stdin - }
  • 19. allsim.tcl Procedures: run-simulations proc run-simulations {} { Number of global opt simulations for {set sim 1} {$sim <= $opt(nsim)} {incr sim} { puts "Running simulation n.$sim" foreach rp $opt(rp) { puts " Simulating $rp algorithm" for {set j 0} {$j < 5} {incr j} { puts " Running simulation (speed=[lindex $opt(minspeed) $j]-[lindex $opt(maxspeed) $j])" puts " => writing "traces/sim$sim/$rp/trace_[expr $j+1].tr"" catch {exec ns sim.tcl -nn $opt(nn) -rp $rp -x $opt(x) -y $opt(y) -sim $sim -par [expr $j+1]} } } } Runs simulation on NS2 puts "Simulations have been successfully executed!" puts "nPress any key to continue..." gets stdin - }
  • 20. allsim.tcl Procedures: analize-traces proc analize-traces {} { global opt puts "Analyzing traces" file mkdir results foreach rp $opt(rp) { puts " Analyzing $rp algorithm" file mkdir results/[string tolower $rp] for {set j 0} {$j < 5} {incr j} { set resultsf [open results/[string tolower $rp]/results_[expr $j+1].txt w] puts " => writing "results/[string tolower $rp]/results_[expr $j+1].txt"" for {set sim 1} {$sim <= $opt(nsim)} {incr sim} { puts $resultsf [exec awk -f util/traces_analizer.awk traces/$sim/[string tolower $rp]/trace_[expr $j+1].tr] } close $resultsf Filters trace files with awk and computes throughput } } puts "Calculating throughput has been successfully executed!" puts "nPress any key to continue..." gets stdin - }
  • 21. allsim.tcl Main while 1 { exec clear >@ stdout Usage puts "Welcome to NS2 Ad-hoc Network Simulator" puts "-- Speed ------------------------------n" puts "Simulation info:" $ tclsh allsim.tcl puts " Nodes: tt $opt(nn)" puts " Grid: tt $opt(x) m x $opt(y) m" puts " Connections: tt $opt(cn)" puts " Algorithms: tt $opt(rp)" puts "nCommand menu:" puts " 1. Create scenarios (varying max speed 5-25 m/s)" puts " 2. Create traffic" puts " 3. Run simulation on NS2" puts " 4. Analize traces" puts "n 0. Exit" puts "nWhat dou you choose?" gets stdin i switch $i { 1 {create-scenarios} Interactive menu 2 {create-traffic} 3 {run-simulations} 4 {analize-traces} 0 {exit 0} Running allsim.tcl script screenshot } }
  • 22. Simulations/Speed Nodes: 100 Speed: {5.0 10.0 15.0 20.0 25.0} m/s Connections: 30 Area: 500m x 500m CSThreshold: 120m RXThreshold: 80m AODV DSDV 792K 800Kb 727K 640Kb high link failures 531K Throughput 480Kb 406K 353K 321K 320Kb 208K 160Kb 91K 81K 56K +overhead 0Kb 5 m/s 10 m/s 15 m/s 20 m/s 25 m/s Nodes speed
  • 23. Simulations/Nodes 10 m/s Connections: 30 Nodes: {50 75 100 125 150} Area: 500m x 500m CSThreshold: 120m RXThreshold: 80m AODV DSDV 591K 580K high link failures 600Kb 482K 480Kb 458K 428K Throughput 360Kb 226K 240K 240Kb 193K 146K +overhead 134K 120Kb 0Kb 50 75 100 125 150 Number of nodes
  • 24. Simulations/Nodes 20 m/s Connections: 30 Nodes: {50 75 100 125 150} Area: 500m x 500m CSThreshold: 120m RXThreshold: 80m AODV DSDV 400Kb 364K 363K 362K high link failures 332K 329K 320Kb Throughput 240Kb 160Kb 68K +overhead 80Kb 51K 47K 59K 35K 0Kb 50 75 100 125 150 Number of nodes
  • 25. Simulations/Nodes 10-20 m/s Connections: 30 Nodes: {50 75 100 125 150} Area: 500m x 500m CSThreshold: 120m RXThreshold: 80m AODV 10 m/s DSDV 10 m/s AODV 20 m/s DSDV 20 m/s 591K 580K 600Kb high link failures 482K 480Kb 458K 428K 364K 363K 362K Throughput 360Kb 332K 329K 226K 240K 240Kb 193K 134K 146K 120Kb +overhead 68K 59K 51K 35K 47K 0Kb 50 75 100 125 150 Number of nodes
  • 26. Simulations/Range Nodes: 100 Range: {130 ... 120 100 80 60 40} Connections: 30 Area: 500m x 500m CSThreshold: 120m RXThreshold: 80m AODV DSDV 600K high link failures tx range too small 480K Throughput 360K 240K 120K +overhead 0K 130 125 124 123 122 121 120 115 110 100 80 60 40 Range
  • 27. DSDV vs. AODV DSDV AODV Worst throughput: high Better throughput: low bandwidth utilization for link bandwidth utilization for link keeping. keeping. Low latency: the connection setup High latency: the connection setup delay is lower (update table). delay is higher (route discovery).