Validating relocation analysis of self-stabilizing MAC algorithms for Mobile Ad-Hoc Networks Master of Science Thesis in the programme Computer Science
نویسندگان
چکیده
In this dissertation, I generalize the relocation analysis of MAC algorithms for Mobile Ad-hoc Network by creating different mobility models. The models of Constrainedjump mobility, Parallel-motion and Flock mobility were implemented in TOSSIM. The Constrained-jump model is used for simulating two versions of a MAC Algorithm [3, 9] and comparing their performance. Two functions are derived from the numerical analysis of the Constrained-jump model. These functions are used to predict the throughput of the MAC algorithms in the more complex mobility scenarios: Parallelmotion and Flock mobility. One function considers two parameters (the maximum relocation ratio and the relocation rate); the other one considers one parameter (the similarity ratio). All these parameters reflect the important mobility aspects of the studied models. After the comparison, it turns out that the MAC algorithm’s throughput in the Parallel-motion model can be better estimated using the second function. And both functions achieve a good performance predicting the throughput in the Flock model.
منابع مشابه
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs) mobile nodes do not have access to a fixed network infrastructure and they set up a communication network by themselves. MANETs require implementation of a wireless Medium Access Control (MAC) layer. Existing MAC algorithms that consider no mobility, solve the problem of eventually guaranteeing every node with a share of the communications bandwidth. In the co...
متن کاملRelocation Analysis of Stabilizing MAC Algorithms
Throughput is a basic measure for communication efficiency. It is defined as the average fraction of time that the channel is employed for useful data propagation. This work considers the problem of analytically estimating the throughput of protocols for media access control (MAC) in mobile ad hoc networks (MANETs). The dynamic and difficult to predict nature of MANETs complicates the analysis ...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کامل