13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

On-demand Rout<strong>in</strong>g <strong>in</strong> MANETs 39random variable with zero mean and standard deviation σ, which is called shadow<strong>in</strong>gdeviation. β and σ are obta<strong>in</strong>ed <strong>by</strong> measurement. For example, β is 2 for free space, 2to 3 for obstruction <strong>in</strong>side factories [10]; σ ranges from 4 to 12 for outdoor environments.3 Mobile Ad Hoc Network with Shadow<strong>in</strong>g ModelWhen apply<strong>in</strong>g a shadow<strong>in</strong>g model <strong>in</strong> our simulations of DSR and AODV, we noticesevere performance degradation compared to the use of a two-ray ground model. Wewill first discuss the behavior of DSR and AODV with a shadow<strong>in</strong>g model, then presentour proposal.3.1 The Network Simulator (NS2)All the modifications and simulations <strong>in</strong> this paper are based on The Network Simulator(NS2). NS2 is a discrete event simulator developed <strong>by</strong> the University of Californiaat Berkeley and the VINT project [12]. The Monarch research group at Carnegie-Mellon University developed support for simulation of multihop wireless networks <strong>in</strong>NS2. It provides tools for generat<strong>in</strong>g data traffic and mobile node mobility scenariopatterns and NS2 comes with implementations of DSR and AODV. In NS2, the DistributedCoord<strong>in</strong>ation Function (DCF) of IEEE 802.11 for wireless LANs is used asthe MAC layer protocol. The radio model uses characteristics similar to a commercialradio <strong>in</strong>terface, Lucent’s WaveLAN, which is modeled as a shared-media radio withnom<strong>in</strong>al bit rate of 2Mb/s and a nom<strong>in</strong>al radio range of 250 meters with omnidirectionalantenna. We choose the traffic sources to be constant bit rate (CBR) sources.Transmission rate is 4 packets per second. Each packet is 64 <strong>by</strong>tes long.3.2 Impact of Shadow<strong>in</strong>g Model on DSR and AODVIn an ideal environment, for a transmitter and receiver pair, the received signal poweronly depends on the distance between them. So if the receiver receives a packet with asignal strength is above the reception threshold, it can be sure it is <strong>in</strong> the transmissionrange of the transmitter, and also this l<strong>in</strong>k will last for a while, depend<strong>in</strong>g on the twonodes’ mobility pattern. With a shadow<strong>in</strong>g model, the received signal power has aGaussian distribution fluctuation. When a packet transmitted successfully on a l<strong>in</strong>k, itis not guaranteed that the next packet can be delivered even if the time between thesetwo packets is short. Figure 1 shows how the signal strength for packet receptionchanges for a pair of nodes over the same period of time (i.e., the distance betweentwo nodes is the same), us<strong>in</strong>g two propagation models. Notice that these graphs recordall the packets sent <strong>by</strong> both nodes, <strong>in</strong>clud<strong>in</strong>g all control packets at the MAClayer, and the two nodes are mov<strong>in</strong>g apart. All the data are obta<strong>in</strong>ed from NS2, theshadow<strong>in</strong>g model sets β=2 and δ=4, correspond<strong>in</strong>g to a free space environment.From Figure 1(a) we can see that <strong>in</strong> a shadow<strong>in</strong>g model, the signal strength fluctuatesover at least 2 orders of magnitude. This will cause many active l<strong>in</strong>ks to be con-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!