13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

160 M. Just, E. Kranakis, and T. Wan5.3 Simulation ResultsWe study the prob<strong>in</strong>g technique us<strong>in</strong>g the above def<strong>in</strong>ed metrics. The standard DSR(Standard DSR) is used as a basel<strong>in</strong>e to compare with the DSR with the extension ofthe prob<strong>in</strong>g technique (DSR Probe). We run the simulation 5 times and all the graphs(Figure 1) are plotted from the data averaged from the 5 runs.1DSR_Probe1DSR_ProbeDetection Rate0.80.60.40.2Palse Positive Ration0.80.60.40.200 0.05 0.1 0.15 0.2 0.25 0.3 0.3500 0.05 0.1 0.15 0.2 0.25 0.3 0.35Percent of BAD NodesPercent of BAD Nodes(a) Detection Rate(b) False Positive RatePackets Delivery Ration10.80.60.40.2Standard_DSRDSR_ProbeRout<strong>in</strong>g Overhead10.80.60.40.2Standard_DSRDSR_Probe00 0.05 0.1 0.15 0.2 0.25 0.3 0.35Percent of BAD Nodes(c) Network Throughput00 0.05 0.1 0.15 0.2 0.25 0.3 0.35Percent of BAD Nodes(d) Rout<strong>in</strong>g OverheadFig. 1. Simulation ResultsDetection Rate. Figure 1.a shows the detection rate. In the best case, 94% of the badnodes can be detected. In the worst case, the detect rate is 76%. There are several reasonswhy a BAD node is not detected. First, the BAD node is not <strong>in</strong> any path <strong>in</strong> therout<strong>in</strong>g cache each time when the prob<strong>in</strong>g technique starts to probe. S<strong>in</strong>ce the prob<strong>in</strong>gpaths are selected solely based on the paths ma<strong>in</strong>ta<strong>in</strong>ed <strong>by</strong> the rout<strong>in</strong>g cache, if a node isnot conta<strong>in</strong>ed <strong>in</strong> any path, its forward<strong>in</strong>g function will not be monitored. Second, thereare two consecutive BAD nodes <strong>in</strong> a path, and the bad behavior of one is hidden <strong>by</strong> theother. The l<strong>in</strong>k between the two bad nodes is detected as l<strong>in</strong>k layer break, the the badbehavior is not detected. Although this affects the detection rate, it does not have impacton packet delivery rate s<strong>in</strong>ce the l<strong>in</strong>k is removed from the rout<strong>in</strong>g cache <strong>in</strong> any way.False Positive Rate. Figure 1.b shows the false positive rate. We can see from thegraph that the highest false positive rate is below 9%, which is relatively low. Thefalse positive is caused ma<strong>in</strong>ly <strong>by</strong> node movement s<strong>in</strong>ce some l<strong>in</strong>k layer breaks are

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!