13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

On-demand Rout<strong>in</strong>g <strong>in</strong> MANETs 39random variable with zero mean and standard deviation σ, which is called shadow<strong>in</strong>gdeviation. β and σ are obta<strong>in</strong>ed <strong>by</strong> measurement. For example, β is 2 for free space, 2to 3 for obstruction <strong>in</strong>side factories [10]; σ ranges from 4 to 12 for outdoor environments.3 Mobile Ad Hoc Network with Shadow<strong>in</strong>g ModelWhen apply<strong>in</strong>g a shadow<strong>in</strong>g model <strong>in</strong> our simulations of DSR and AODV, we noticesevere performance degradation compared to the use of a two-ray ground model. Wewill first discuss the behavior of DSR and AODV with a shadow<strong>in</strong>g model, then presentour proposal.3.1 The Network Simulator (NS2)All the modifications and simulations <strong>in</strong> this paper are based on The Network Simulator(NS2). NS2 is a discrete event simulator developed <strong>by</strong> the University of Californiaat Berkeley and the VINT project [12]. The Monarch research group at Carnegie-Mellon University developed support for simulation of multihop wireless networks <strong>in</strong>NS2. It provides tools for generat<strong>in</strong>g data traffic and mobile node mobility scenariopatterns and NS2 comes with implementations of DSR and AODV. In NS2, the DistributedCoord<strong>in</strong>ation Function (DCF) of IEEE 802.11 for wireless LANs is used asthe MAC layer protocol. The radio model uses characteristics similar to a commercialradio <strong>in</strong>terface, Lucent’s WaveLAN, which is modeled as a shared-media radio withnom<strong>in</strong>al bit rate of 2Mb/s and a nom<strong>in</strong>al radio range of 250 meters with omnidirectionalantenna. We choose the traffic sources to be constant bit rate (CBR) sources.Transmission rate is 4 packets per second. Each packet is 64 <strong>by</strong>tes long.3.2 Impact of Shadow<strong>in</strong>g Model on DSR and AODVIn an ideal environment, for a transmitter and receiver pair, the received signal poweronly depends on the distance between them. So if the receiver receives a packet with asignal strength is above the reception threshold, it can be sure it is <strong>in</strong> the transmissionrange of the transmitter, and also this l<strong>in</strong>k will last for a while, depend<strong>in</strong>g on the twonodes’ mobility pattern. With a shadow<strong>in</strong>g model, the received signal power has aGaussian distribution fluctuation. When a packet transmitted successfully on a l<strong>in</strong>k, itis not guaranteed that the next packet can be delivered even if the time between thesetwo packets is short. Figure 1 shows how the signal strength for packet receptionchanges for a pair of nodes over the same period of time (i.e., the distance betweentwo nodes is the same), us<strong>in</strong>g two propagation models. Notice that these graphs recordall the packets sent <strong>by</strong> both nodes, <strong>in</strong>clud<strong>in</strong>g all control packets at the MAClayer, and the two nodes are mov<strong>in</strong>g apart. All the data are obta<strong>in</strong>ed from NS2, theshadow<strong>in</strong>g model sets β=2 and δ=4, correspond<strong>in</strong>g to a free space environment.From Figure 1(a) we can see that <strong>in</strong> a shadow<strong>in</strong>g model, the signal strength fluctuatesover at least 2 orders of magnitude. This will cause many active l<strong>in</strong>ks to be con-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!