Simulation and Analysis of Protocols in Ad Hoc Network

被引:2
|
作者
Huang, Runcai [1 ,2 ]
Zhuang, Yiwen [1 ]
Cao, Qiying [1 ]
Huang, Runcai [1 ,2 ]
机构
[1] Donghua Univ, Coll Comp Sci & Technol, Shanghai, Peoples R China
[2] Shanghai Univ Engn Sci, Coll Elect & Elect Engn, Shanghai, Peoples R China
关键词
mobile network; network simulation; simulation software; protocol analysis;
D O I
10.1109/ICECT.2009.66
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Simulation and analysis of protocols for network topology is an important research method in network field. The paper introduces the feature and infrastructure of Ad Hoc. The Ad Hoc network and its three protocols (AODV, DSDV, DSR) are presented in detail. The process and method of the simulation of mobile Ad Hoc is analyzed in aspects of objection, scheme design, environment setting and OTel script writing. Finally, the three protocols are simulated by NS2 software, the relevant simulation working diagram and parameter comparison table are presented, and the simulation results are analyzed in aspects of packet delivery fraction and end-to-end time delay. The comparison of simulation results concludes that in the circumstance of non-active movement, the DSR protocol is available due to its low packet loss rate and low end-to-end time delay. While in the circumstance of active movement, AODV protocol is available due to its high packet delivery fraction and low end-to-end time delay, because it embodies the mixed features of DSR and DSDV protocol.
引用
收藏
页码:169 / +
页数:2
相关论文
共 50 条
  • [41] Advances on Network Protocols and Algorithms for Vehicular Ad Hoc Networks
    Lloret, Jaime
    Ghafoor, Kayhan Z.
    Rawat, Danda B.
    Xia, Feng
    [J]. MOBILE NETWORKS & APPLICATIONS, 2013, 18 (06): : 749 - 754
  • [42] Advances on Network Protocols and Algorithms for Vehicular Ad Hoc Networks
    Jaime Lloret
    Kayhan Z. Ghafoor
    Danda B. Rawat
    Feng Xia
    [J]. Mobile Networks and Applications, 2013, 18 : 749 - 754
  • [43] Security challenges for routing protocols in mobile ad hoc network
    Kakade, Kiran Shrimant
    Rajesh, C.
    Veena, T.
    Sivakumar, P.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (03)
  • [44] Routing protocols in wireless mobile ad hoc network - A review
    Latiff, LA
    Fisal, N
    [J]. APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 600 - 604
  • [45] Parameterized Verification of Safety Properties in Ad Hoc Network Protocols
    Delzanno, Giorgio
    Sangnier, Arnaud
    Zavattaro, Gianluigi
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2011, (60): : 56 - 65
  • [46] A simulation platform for wireless ad hoc network
    Zhong, XF
    Wang, YZ
    Mei, SL
    Wang, J
    [J]. 2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 705 - 709
  • [47] A simulation testing platform of Ad Hoc network
    Huang, Xuyong
    Miao, Shihong
    Pei, Liu
    [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 604 - +
  • [48] Mobility models for ad hoc network simulation
    Lin, GL
    Noubir, G
    Rajaraman, R
    [J]. IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 454 - 463
  • [49] Interactive simulation system for Ad hoc network
    Switching Technology and ATM Research Center, Institute of Communication Engineering, NanJing 210016, China
    [J]. Xitong Fangzhen Xuebao / Journal of System Simulation, 2001, 13 (05): : 615 - 617
  • [50] Attack analysis and detection for ad hoc routing protocols
    Huang, YA
    Lee, W
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2004, 3224 : 125 - 145