13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Evaluation of the AODV and DSR Rout<strong>in</strong>g Protocols 313.4 Mobile Path Computation for DSRTo facilitate the computation of the mobile path for our evaluation of the DSRprotocol, we require the actual paths used <strong>by</strong> the protocol to route data packetsfrom the source to a dest<strong>in</strong>ation. In order to obta<strong>in</strong> this <strong>in</strong>formation, we modifythe DSR implementation <strong>in</strong> ns-2 to trace the primary and secondary cache eachtime an entry is either added to or deleted from the cache.For every simulation run, we gather the route cache trace and use this todeterm<strong>in</strong>e the actual path, which DSR would use to route a packet from sourceto dest<strong>in</strong>ation for a particular time sequenced graph <strong>in</strong> the mobile graph G. Thisapproach is generalized and can be used to gather route <strong>in</strong>formation for protocolimplementations <strong>in</strong> other network simulators such OpNet or QualNet [15,17].The procedure we adopt to select the actual path is consistent with the algorithmused <strong>by</strong> the ns-2 implementation of DSR to select a route. For example,Fig. 2 shows a three graph subsequence G i−1 G i G i+1 <strong>in</strong> a mobile graph for asession between source-dest<strong>in</strong>ation pair 4-5. The solid path between nodes 4 and5 is the actual route computed <strong>by</strong> DSR while the dashed path (which co<strong>in</strong>cideswith the last two hops of the actual route) is the shortest hop path.100010001000900790079007800700401211661338007004012161613380070040121616 31360060060050040011151021950040011151021950040011151021930020010018148917530020010018148917530020010018148917500 100 200 300 400 500 600 700 800 900 100000 100 200 300 400 500 600 700 800 900 100000 100 200 300 400 500 600 700 800 900 1000Fig. 2. Subsequence G i−1G iG i+1 of a mobile graph for source-dest<strong>in</strong>ation 4-5.3.5 Mobile Path Computation for AODVEvery node that implements the AODV protocol ma<strong>in</strong>ta<strong>in</strong>s a separate rout<strong>in</strong>gtable with the next hop <strong>in</strong>formation. Each entry <strong>in</strong> the rout<strong>in</strong>g table has anexpiration time and a sequence number. To compute the actual mobile path forAODV, we trace the route table for every node <strong>in</strong> the simulation whenever anew entry is added or updated <strong>in</strong> the rout<strong>in</strong>g table.One can easily trace the valid path to the dest<strong>in</strong>ation from the rout<strong>in</strong>g table<strong>in</strong>formation for each node. The expiration time for each rout<strong>in</strong>g table entryis used to judge whether or not the route calculated is stale. We use the samealgorithm used <strong>by</strong> the ns-2 AODV implementation to calculate the actual mobilepath for our mobile graph.3.6 Computation of the MERIT RatioEvery connection <strong>in</strong> the connection pattern file has a designated start (t start )and stop time (t stop ). Our mobile graph G consists of a graph sequence for the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!