Network Simulator: A Learning Tool for Wireless Technologies



Similar documents
Daniele Messina, Ilenia Tinnirello

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Internet Connectivity for Ad hoc Mobile Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Energy Consumption analysis under Random Mobility Model

New Implementations into Simulation Software NS-2 for Routing in Wireless Ad-Hoc Networks

Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks

Ad-hoc and Hybrid Networks Performance Comparison of MANET Routing Protocols in Ad-hoc and Hybrid Networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

Network simulation and simulators. Lecturer: Dmitri A. Moltchanov

SJBIT, Bangalore, KARNATAKA

A Survey: High Speed TCP Variants in Wireless Networks

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

OPNET Network Simulator

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Gateway Load Balancing in Integrated Internet- MANET to Improve Network Performance

Energy Efficiency of Load Balancing in MANET Routing Protocols

Traffic Load Distribution in Ad Hoc Networks through Mobile Internet Gateways

LIST OF FIGURES. Figure No. Caption Page No.

An Extended AODV Protocol to Support Mobility in Hybrid Networks

OPNET - Network Simulator

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

An Efficient AODV-Based Algorithm for Small Area MANETS

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Security Threats in Mobile Ad Hoc Networks

Multi-paths Routing with Load Balancing for Internet Access in Wireless Mesh Networks

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

IJMIE Volume 2, Issue 7 ISSN:

mlab: A Mobile Ad Hoc Network Test Bed

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

Realistic Mobility for Mobile Ad Hoc Network Simulation

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS


CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

Keywords: DSDV and AODV Protocol

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Name Resolution in On-Demand MANETs and over External IP Networks

Performance Evaluation of Mobility Speed over MANET Routing Protocols

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Evaluation and Comparison of Wired VoIP Systems to VoWLAN

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Figure 1. The Example of ZigBee AODV Algorithm

Study of Network Characteristics Incorporating Different Routing Protocols

MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION

Routing with Load Balancing in Wireless Ad hoc Networks

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Robust Routing in Wireless Ad Hoc Networks

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

TOPOLOGIES NETWORK SECURITY SERVICES

IPv6 Associated Protocols

Network Mobility Support Scheme on PMIPv6 Networks

Security in Ad Hoc Network

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Result Analysis of Virtual IP Address Configuration Protocol

Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Simulation of wireless ad-hoc sensor networks with QualNet

CHAPTER 1 INTRODUCTION

Security for Ad Hoc Networks. Hang Zhao

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

Hosts Address Auto Configuration for Mobile Ad Hoc Networks

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Transcription:

Current Developments in Technology-Assisted Education (2006) 1979 Network Simulator: A Learning Tool for Wireless Technologies A. Triviño Cabrera, E. Casilari Dpto. Tecnología Electrónica, University of Málaga, Spain, atc@uma.es Communication protocols are a crucial area in the telecommunication engineering curricula. Learning the basis of this field requires the study of multiple and heterogeneous concepts that, in most cases, are explained by the translation and summarization of the published specifications. By this method, pupils memorize certain theoretical issues without understanding the correlation among them. As computers are available in a wide variety of scenarios, the simulation tools can be of great help for a better understanding of this communication area. Among the multiple network simulators that are accessible nowadays, we consider the Network simulator or ns-2 as one of the best option for future engineers who might be asked to work with a simulation tool in their professional tasks. The aim of the utilization of ns2 in laboratories is to show the packets exchange between two hosts and how some factors (Propagation model, MAC interface, MAC configuration, communication protocol, etc) have a significant contribution on the performance of wireless networks. In order to facilitate the learning of the fundamental concepts associated to wireless technologies, the teacher should consider which exercises will be proposed. As illustrative examples, in this paper we describe some works developed by students of the University of Malaga in their Master Thesis. Keywords Communication Protocols, Wireless Technologies, Network Simulator 1. Introduction Nowadays, there is a great interest in the area of ubiquous and mobile computing. The appropriate work in this field requires the learning of quite heterogeneous concepts. For example, the students may be asked to understand the signal codification, the OSI protocol stack, the MAC behaviour or some routing algorithms. Specifically, the teaching of routing protocols is often based on the presentation of the specifications related to the most significant protocols and the structure of the messages that they employ. By applying this methodology, this task becomes tough and the students do not even understand the utility of these protocols and their characteristics. In order to ease the learning of protocols, the utilization of illustrative examples is strongly recommended. As these days the access to computers is widely available, the simulators become an appropriate learning tool in this area. As a first step, the teacher should select the simulation tool. At the present time, there are several network simulators: Opnet [1], Omnet++ [2], Network Simulator [3], Glomosim [4], etc. However, the Network Simulator is considered as de facto standard due to its high utilization and it is also employed in professional activities. Probably, the success of this tool is due to its GPL (GNU General Public License) licence that has made the development of recent protocols possible. Therefore, we encourage the utilization of the Network Simulator. Although its popularity is on the rise, the employ of the Network Simulator presents some initial problems as the utilization of the already included protocols is easy but their modifications or the inclusion of new ones may become hard tasks. In this paper, we explain how the Network Simulator can be used and the main phases that are required for the inclusion of new protocols in ns-2. As illustrative examples, we briefly describe our experience with several Master Thesis. They were mainly focused on the performance of mobile ad hoc networks. This field includes the management of wireless concepts as well as the understanding of conventional and specific ad hoc routing protocols. The rest of the paper is structured as follows. In Section 2, the main characteristics of the Network Simulator are presented. Section 3 shows some works that have been performed by Master Students at the University of Málaga. Finally, Section 4 draws the main conclusions.

1980 Current Developments in Technology-Assisted Education (2006) 2. The Network Simulator NS-2 or Network Simulator is a discrete-event simulator whose implementation was started by 1989 with the development of the Real Network Simulator. Initially, NS-2 was focused on the simulation of wired technologuies but the Monarch group from the Department of Computer Science at the University of Rice developed the necessary extensions [5] in order to include the software for wireless and mobile hosts. This contribution is widely accepted and it is commonly included in the recent version of ns-2 that can be downloaded from the official site (see [3]). As a first approximation, the ns-2 could seem a bit difficult to work with. In order to ease its utilization, its structure is explained next. The ns-2 employs two languages. Firstly, the main characteristics of the scenario to simulate are described by OTcl [6]. Secondly, the kernel of ns-2 is specified by C++. It is organized in different folders, each one corresponds to an specific protocol. For example, there is a folder called AODV where all the files that are necessary for the implementation of this protocol are stored. If a user wants to utilize the already developed software that is included in the ns-2 release, he/she will have to know how to specify the scenario by OTcl. However, if some new protocols want to be tested or studied, the inclusion requires the modification of C++ files. In our experience, the modifications are not too troublesome but finding where to modify is usually quite hard. Once the simulations have ben run, the results are presented in a text version. One example of the traces is as follows: r 1.35 3 2 ack 40 ------ 1 3.0 0.0 15 201 + 1.351 1 0 ack 40 ------ 1 3.0 0.0 15 201-1.352 2 0 ack 40 ------ 1.39 0.0 15 201 Each line of the trace file is associated to a packet event. The ns-2 includes the Network Animator or NAM. This tool enables the visualization of the packets exchange. Although the animation of the network behaviour seems to be very attractive for the students, it is quite difficult to extract some statistics about the network performance from the trace file. Therefore, the simulation is followed by a postprocessing phase that is usually based on the execution of any scripts normally coded in PERL or AWK [7]. The Figure 1 shows the relationship between the different programs involved in the ns-2 utilization. As it is shown, the simulation scenario could be completed by a program for traffic generation (cbrgen) and a mobility generator (setdest). This mobility generator helps researchers to easily construct mobility traces that follow the Random WayPoint [8]. This mobility pattern is commonly utilized for the ad hoc studies. NS 2 (C ++) Results Traces Visual Representation NAM Simulation Scenario (otcl) Numerical Data PERL/AWK Traffic pattern (cbrgen) Mobility pattern (setdest) Figure 1. Structure of the execution of ns-2 simulations.

Current Developments in Technology-Assisted Education (2006) 1981 3. Examples of Utilization The ns-2 includes a great variety of implemented protocols. However, sometimes it is necessary to modify them or include new ones. As these activities require a high effort, we have performed them as Master Thesis. Next, we present the description of some of the Master Thesis that we have done. They are all based on mobile ad hoc networks. The MANETs (Mobile Ad Hoc NETworks) are composed by the union of wireless devices that intercommunicate among them without the existence of any pre-installed infrastructure. The MANET nodes should behave as hosts as well as routers in order to forward the packet from distant devices. In order to configure the MANET nodes, in the tcl script, the following specification should be included: $ns_ node-config -addressingtype flat or hierarchical or expanded -adhocrouting DSDV or DSR or TORA or AODV -lltype LL -mactype Mac/802_11 -proptype "Propagation/TwoRayGround" -ifqtype "Queue/DropTail/PriQueue" -ifqlen 50 -phytype "Phy/WirelessPhy" -anttype "Antenna/OmniAntenna" -channeltype "Channel/WirelessChannel" -energymodel "EnergyModel" -initialenergy (in Joules) -rxpower (in W) -txpower (in W) -agenttrace -routertrace -mactrace -movementtrace With these lines, the ad hoc routing protocol is easily specified as well as the wireless channel or the MAC interface. Additionally, the script configures the level of traces that are presented in the trace file. Some of the Master Thesis that we have guided are: A DSR policy based on the Path Stability In isolated ad hoc networks, it is interesting to analyze the criterion for selecting the best path among all the paths that can be constructed in the network. Usually, the utilized criterion corresponds to the minimum number of hops. However, in this Master Thesis the student analyzed some new criteria based on the path stability, that is, the criterion should select the path that is expected to have the longest lifetime. (In ad hoc network the path lifetimes are finite as the mobile devices are moving). The Path Lifetime is strongly dependent on the Link Lifetime. In order to estimate the link lifetimes, the student employed the Signal Strength. Therefore, a cross-layer philosophy was utilized. Additionally, the student understood how the channel propagation influences the signal strength. The work was based on the DSR (Dynamic Source Routing) protocol [9]. With this routing protocol, the student was familiarized to the employ of caches for the storage of learnt paths. As future works, the students could analyze which the appropriate timeout is for the entries in the caches based on the signal strength. Integration of ad hoc network into wired Networks

1982 Current Developments in Technology-Assisted Education (2006) In the field of ad hoc networks, a quite hot topic is the integration of this type of networks into the Internet. The integration requires the utilization of several technologies as the Mobile IP or the Address Autoconfiguration. There are all dependent on the Gateway Discovery. Thanks to the work elaborated by Ali Hamidian [10], a Master Thesis student analysed which gateway discovery is more appropriate (proactive, reactive, hybrid) for a seamless integration of MANETs and the Internet. As a Master Thesis work, the students could study the influence that the interval of the Modified Router Advertisements has on the network performance. Hybrid Gateway Discovery could also be adapted to the network density or to the mobility of the devices. The Figure 2 shows the scenario that could be considered for these studies. This image has been extracted from the NAM tool. Figure 2. Scenario for wireless/wired network extracted from NAM. Analysis of DAD techniques in ad hoc networks When mobile devices are integrated into external networks, they should be provided with a global IPv6 address [11]. In infrastructureless networks, the method for obtaining this address could be in an autonomous way. In a stateless configuration, the IPv6 address is generated by the concatenation of the prefix information to a theoretical unique number. Although the constructed number is expected to be unique, under some circumstances, this condition does not hold. Therefore, the generation of the IPv6 address is followed by a technique by which the self-generated IPv6 address is confirmed as unique. This operation is called as Duplicate Address Detection or DAD. The conventional DAD operation is often referenced as the try-and-wait operation. By this method, the node that has constructed the IPv6 address asks for a route to a hypothetic node which posseses the same IPv6 address. It waits for one second for a possible response and if no response is received, the node assumes its IPv6 address is unique. The main disadvantage of this operation is related to the waiting time. In order to overcome it, several proposals have been published. The students could compare them and conclude which one outperforms. The Figure 3 shows the transmission process in a MANET.

Current Developments in Technology-Assisted Education (2006) 1983 Figure 3. Transmission of Packets in a hybrid MANET extracted from NAM 4. Conclusions In this paper, the utilization of the ns-2 has been explained. As a guideline, the methodology that we recommend for the inclusion of new protocols in ns-2 have been shown. As illustrative examples, some works related to Master Thesis have been presented and proposed. Acknowledgements This work has been partially supported by the National Research project TEL2003-07953-C02-01. References [1] http://www.opnet.com/ [2] http://www.omnetpp.org/ [3] http://www.isi.edu/nsnam/ns/ [4] http://pcl.cs.ucla.edu/projects/glomosim/ [5] http://monarch.cs.cmu.edu/ [6] http://otcl-tclcl.sourceforge.net/otcl/ [7] http://www.perl.com [8] Yoon, J., Liu, M., and Noble, B., Random waypoint considered harmful, in Proceedings of Infocom 03, pp. 1312-1321, San Francisco. April 2003. [9] D.J. Johnson, D. Maltz y Y. C. Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), IETF Internet Draft, July 2004. [10] http://www.telecom.lth.se/personal/alexh/ [11] Perkins, C., Wakikawa, R., Malinen, J., Belding-Royer, E., and Y. Suan: IP Address Autoconfiguration for Ad Hoc Networks", IETF Draft, work in progress, November 2001