Simulation and Analysis of Protocols in Ad Hoc Network

被引:2
|
作者
Huang, Runcai [1 ,2 ]
Zhuang, Yiwen [1 ]
Cao, Qiying [1 ]
Huang, Runcai [1 ,2 ]
机构
[1] Donghua Univ, Coll Comp Sci & Technol, Shanghai, Peoples R China
[2] Shanghai Univ Engn Sci, Coll Elect & Elect Engn, Shanghai, Peoples R China
关键词
mobile network; network simulation; simulation software; protocol analysis;
D O I
10.1109/ICECT.2009.66
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Simulation and analysis of protocols for network topology is an important research method in network field. The paper introduces the feature and infrastructure of Ad Hoc. The Ad Hoc network and its three protocols (AODV, DSDV, DSR) are presented in detail. The process and method of the simulation of mobile Ad Hoc is analyzed in aspects of objection, scheme design, environment setting and OTel script writing. Finally, the three protocols are simulated by NS2 software, the relevant simulation working diagram and parameter comparison table are presented, and the simulation results are analyzed in aspects of packet delivery fraction and end-to-end time delay. The comparison of simulation results concludes that in the circumstance of non-active movement, the DSR protocol is available due to its low packet loss rate and low end-to-end time delay. While in the circumstance of active movement, AODV protocol is available due to its high packet delivery fraction and low end-to-end time delay, because it embodies the mixed features of DSR and DSDV protocol.
引用
收藏
页码:169 / +
页数:2
相关论文
共 50 条
  • [31] Simulation of Ad Hoc Routing Protocols using OMNeT plus
    Sommer, Christoph
    Dietrich, Isabel
    Dressler, Falko
    [J]. MOBILE NETWORKS & APPLICATIONS, 2010, 15 (06): : 786 - 801
  • [32] Evaluation of ad hoc routing protocols in real simulation environments
    Hassan, Amr M.
    Youssef, Mohamed I.
    Zahra, Mohamed M.
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2006, : 288 - +
  • [33] Performance analysis of transmission multimedia data with typical Ad-hoc network protocols
    College of Computer Science and Technology, WUT, Wuhan 430063, China
    [J]. Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban), 2007, 6 (1075-1078):
  • [34] Energy Consumption Analysis of Multicast Routing Protocols in Wireless Ad Hoc Network Environment
    Aarthy, M. P. A. Mala
    Shanmugaraj, M.
    Dhulipala, V. R. Sarma
    [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 412 - +
  • [35] Vulnerabilities of ad hoc network routing protocols to MAC misbehavior
    Guang, L
    Assi, C
    [J]. WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 146 - 153
  • [36] Ad hoc Network Routing Protocols on Random Waypoint Model
    Kumar, Jogendra
    Panda, M. K.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 901 - 905
  • [37] How to obfuscate execution of protocols in an ad hoc radio network?
    Kardas, Marcin
    Klonowski, Marek
    Syga, Piotr
    [J]. AD HOC NETWORKS, 2019, 84 : 90 - 106
  • [38] Performance comparison of ad hoc wireless network routing protocols
    Ehsan, H
    Uzmi, ZA
    [J]. INMIC 2004: 8TH INTERNATIONAL MULTITOPIC CONFERENCE, PROCEEDINGS, 2004, : 457 - 465
  • [39] Performance Comparison of Reactive Routing Protocols for Ad Hoc Network
    Abushiba, Walid
    Johnson, Princy
    [J]. 2015 FORTH INTERNATIONAL CONFERENCE ON E-TECHNOLOGIES AND NETWORKS FOR DEVELOPMENT, 2015, : 1 - 5
  • [40] Fairness of Trust Based Mobile ad hoc Network Protocols
    Burke, Ivan Daniel
    Olivier, Martin
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 67 - 81