Performance Comparisons of Node Mobility Models on Routing Protocols on MANET

 

Ashish Gupta1, Akhilesh Kosta2 , Ajay Kumar3

1Department of CSE, KIT, Kanpur, India

2Associate Professor, Department of CSE, KIT, Kanpur, India

3Assistant Professor, Department of CSE, ITM, GIDA, Gorakhpur

*Corresponding Author:ashish.ipec88@gmail.com, akhileshkosta@gmail.com, ajay.4cse@gmail.com

 

ABSTRACT:

A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. Since MANETs are not currently deployed on a large scale, research in this area is mostly simulation based. Among other simulation parameters, the mobility model plays a very important role in determining the protocol performance in MANET. Thus, it is essential to study and analyze various mobility models and their effect on MANET protocols. In this paper, we study different mobility models proposed in the recent research literature and their performance of routing protocols Bellman Ford, Dynamic Source Routing (DSR), WRP and Location Aided Routing (LAR1). In this study we have considered three mobility scenarios: Random Waypoint, Group Mobility and Freeway Models. These three Mobility Models are selected to represent possibility of practical application in future

 

KEY WORDS: MANET, Bellman Ford, DSR, WRP, LAR1, Random waypoint Mobility, Random Group Mobility.

 

 


INTRODUCTION:

In general, a Mobile Ad hoc NETwork (MANET) is a collection of wireless nodes communicating with each other in the absence of any infrastructure. Due to the availability of small and inexpensive wireless communicating devices, the MANET research field has attracted a lot of attention from academia and industry in the recent years. In the near future, MANETs could potentially be used in various applications such as mobile classrooms, battlefield communication and disaster relief applications.

 

To thoroughly and systematically study a new Mobile Ad hoc Network protocol, it is important to simulate this protocol and evaluate its protocol performance. Protocol simulation has several key parameters, including mobility model and communicating traffic pattern, among others.In this chapter and the next chapter we focus on the analysis and modeling of mobility models.

 

We are also interested in studying the impact of mobility on the performance of MANET routing protocols. We present a survey of the status, limitations and research challenges of mobility modeling in this chapter.

 

The mobility model is designed to describe the movement pattern of mobile users, and how their location, velocity and acceleration change over time. Since mobility patterns may play a significant role in determining the protocol performance, it is desirable for mobility models to emulate the movement pattern of targeted real life applications in a reasonable way. Otherwise, the observations made and the conclusions drawn from the simulation studies may be misleading. Thus, when evaluating MANET protocols, it is necessary to choose the proper underlying mobility model. For example, the nodes in Random Waypoint model behave quite differently as compared to nodes moving in groups [1]. It is not appropriate to evaluate the applications where nodes tend to move together using Random Waypoint model. Therefore, there is a real need for developing a deeper understanding of mobility models and their impact on protocol performance.

 

 


Fig.1. The categories of mobility models in Mobile Ad hoc Network

 

 


One intuitive method to create realistic mobility patterns would be to construct trace-based mobility models, in which accurate information about the mobility traces of users could be provided. However, since MANETs have not been implemented and deployed on a wide scale, obtaining real mobility traces becomes a major challenge. Therefore, various researchers proposed different kinds of mobility models, attempting to capture various characteristics of mobility and represent mobility in a somewhat 'realistic' fashion. Much of the current research has focused on the so-called synthetic mobility models [2] that are not trace-driven.

 

In the previous studies on mobility patterns in wireless cellular networks[3][4], researchers mainly focus on the movement of users relative to a particular area (i.e., a cell) at a macroscopic level, such as cell change rate, handover traffic and blocking probability. However, to model and analyze the mobility models in MANET, we are more interested in the movement of individual nodes at the microscopic-level, including node location and velocity relative to other nodes, because these factors directly determine when the links are formed and broken since communication is peer-to-peer.

 

In Fig.1 we provide a categorization for various mobility models into several classes based on their specific mobility characteristics. For some mobility models, the movement of a mobile node is likely to be affected by its movement history. We refer to this type of mobility model as mobility model with temporal dependency. In some mobility scenarios, the mobile nodes tend to travel in a correlated manner. We refer to such models as mobility models with spatial dependency. Another class is the mobility model with geographic restriction, where the movement of nodes is bounded by streets, freeways or obstacles.

 

MOBILITY MODELS:

Different mobility models can be differentiated according to their spatial and temporal dependencies.

 

Spatial dependency:

It is a measure of how two nodes are dependent in their motion. If two nodes are moving in same direction then they have high spatial dependency.

 

Temporal dependency:

 It is a measure of how current velocity (magnitude and direction) are related to previous velocity. Nodes having same velocity have high temporal dependency.

 

Random Waypoint:

The Random Waypoint model is the most commonly used mobility model in research community. At every instant, a node randomly chooses a destination and moves towards it with a velocity chosen randomly from a uniform distribution [0,V_max], where V_max is the maximum allowable velocity for every mobile node. After reaching the destination, the node stops for a duration defined by the 'pause time' parameter. After this duration, it again chooses a random destination and repeats the whole process until the simulation ends. Figures 2-4 illustrate examples of a topography showing the movement of nodes for Random Mobility Model.

 

Fig. 2. Topography showing Random mobility model

Random Point Group Mobility (RPGM):

Random point group mobility can be used in military battlefield communication. Here each group has a logical centre (group leader) that determines the group’s motion behavior. Initially each member of the group is uniformly distributed in the neighborhood of the group leader. Subsequently, at each instant, every node has speed and direction that is derived by randomly deviating from that of the group leader. Given below is example topography showing the movement of nodes for Random Point Group Mobility Model. The scenario contains sixteen nodes with Node 1 and Node 9 as group leaders.

 

Fig. 3. Topography showing Random point group mobility

 

Freeway Mobility:

This model emulates the motion behavior of mobile nodes on a freeway. It can be used in exchanging traffic status or tracking a vehicle on a freeway. Each mobile node is restricted to its lane on the freeway. The velocity of mobile node is temporally dependent on its previous velocity.

 

Given below is example topography showing the movement of nodes for Freeway Mobility Model with twelve nodes.

 

Fig. 4. Topography showing Freeway mobility model

DESCRIPTION OF ROUTING PROTOCOLS:

Bellman Ford Routing:

Bellman-Ford Routing Algorithm, also known as Ford-Fulkerson Algorithm, is used as an algorithm by distance vector routing protocols such as RIP, BGP, ISO IDRP, and NOVELL IPX. Routers that use this algorithm will maintain the distance tables, which tell the distances and shortest path to sending packets to each node in the network. The information in the distance table is always updated by exchanging information with the neighboring nodes. The number of data in the table equals to that of all nodes in networks (excluded itself). The columns of table represent the directly attached neighbors whereas the rows represent all destinations in the network. Each data contains the path for sending packets to each destination in the network and distance/or time to transmit on that path. The Measurements in this algorithm are the number of hops, latency, the number of outgoing packets, etc.

 

Dynamic Source Routing (DSR):

Dynamic Source Routing protocol is a reactive protocol i.e. it determines the proper route only when a packet needs to be forwarded. The node floods the network with a route-request and builds the required route from the responses it receives. DSR allows the network to be completely self-configuring without the need for any existing network infrastructure or administration. The DSR protocol is composed of two main mechanisms that work together to allow the discovery and maintenance of source routes in the ad hoc network. All aspects of protocol operate entirely on-demand allowing routing packet overhead of DSR to scale up automatically.

 

Route Discovery: When a source node S wishes to send a packet to the destination node D, it obtains a route to D. This is called Route Discovery. Route Discovery is used only when S attempts to send a packet to D and has no information on a route to D.

 

Route Maintenance: When there is a change in the network topology, the existing routes can no longer be used. In such a scenario, the source S can use an alternative route to the destination D, if it knows one, or invoke Route Discovery. This is called Route Maintenance [10] [11].

 

Location Aided Routing (LAR1):

Ad hoc on-demand distance vector routing (AODV) and distance vector routing (DSR) that have been previously described are both based on different variations of flooding. The goal of Location-Aided Routing (LAR) described in [6] is to reduce the routing overhead by the use of location information. Position information will be used by LAR for restricting the flooding to a certain area [7].

 

In the LAR routing technique, route request and route reply packets similar to DSR and AODV are being proposed. The implementation in the simulator follows the LAR1 algorithm similar to DSR.

Location Information:

When using LAR, any node needs to know its physical location. This can be achieved by using the Global Positioning System (GPS). Since the position information always includes a small error, GPS is currently not capable of determining a node’s exact position. However, differential GPS5 offers accuracies within only a few meters.

 

Expected Zone:

When a source node S wants to send a packet to some destination node D and needs to find a new route, it first tries to make a reasonable guess where D could be located. Suppose node S knows that at time t0 D’s position was P and that the current time is t1. Using this information S is able to determine the expected zone of D from the viewpoint of node S by time t1. For instance if D traveled with an average speed v, the source node S expects D to be in a circle around the old position P with a radius v(t1−t0). The expected zone is only an estimate by S to determine possible locations of D. If D traveled with a higher speed than S expected, the destination node may be outside the expected zone at time t1.

 

If the source node does not know the position of D at time t0, it will not be possible to estimate an expected zone. D could be anywhere. In this case, the entire ad-hoc network is selected as the expected zone and the routing algorithm reduces to a simple flooding.

 

Request Zone:

Be S still our source node that wants to send a packet to destination node D. The request zone is somewhat different from the expected zone, for it defines the zone where a route request should be forwarded from. An intermediate node will forward a route request packet only, if it belongs to the request zone. This is different from the flooding protocols described before. Obviously the request zone should contain the expected zone to reach destination node D.

 

Fig. 5. LAR Expected Zone

 

Wireless Routing Protocol (WRP):

WRP uses an enhanced version of the distance-vector routing protocol which uses the Bellman-Ford algorithm [9] to calculate paths. Because of the mobile nature of the nodes within the MANET, the protocol introduces mechanisms which reduce route loops and ensure reliable message exchange. WRP, similar to DSDV, inherits the properties of the distributed Bellman-Ford algorithm. To counter the count-to-infinity problem and to enable faster convergence, it employs a unique method of maintaining information regarding the shortest distance to every destination node in the network and the penultimate hop node on the path to every destination node. Since WRP, like DSDV, maintains an up-to-date view of the network, every node has a readily available route to every destination node in the network. It differs from DSDV in table maintenance and in the update procedures. While DSDV maintains only one topology table, WRP uses a set of tables to maintain more accurate information. The tables that are maintained by a node are the following: distance table (DT), routing table (RT), link cost table (LCT), and a message retransmission list (MRL).

 

The DT contains the network view of the neighbors of a node. It contains a matrix where each element contains the distance and the penultimate node reported by a neighbor for a particular destination. The RT contains the up-to-date view of the network for all known destinations. It keeps the shortest distance, the predecessor node (penultimate node), the successor node (the next node to reach the destination), and a flag indicating the status of the path. The path status may be a simple path (correct), or a loop (error), or the destination node not marked (null). The LCT contains the cost (e.g., the number of hops to reach the destination) of relaying messages through each link. The cost of a broken link is infinity. It also contains the number of update periods (intervals between two successive periodic updates) passed since the last successful update was received from that link. This is done to detect links breaks. The MRL contains an entry for every update message that is to be retransmitted and maintains a counter for each entry. This counter is decremented after every retransmission of an update message. Each update message contains a list of updates. A node also marks each node in the RT that has to acknowledge the update message it transmitted. Once the counter reaches zero, the entries in the update message for which no acknowledgments have been received are to be retransmitted and the update message is deleted. Thus, a node detects a link break by the number of update periods missed since the last successful transmission. After receiving an update message, a node not only updates the distance for transmission neighbors but also checks the other neighbors’ distance, hence convergence is much faster than DSDV.

 

IV SIMULATION ENVIORMENT:

Simulation is based on the same environment for Bellman Ford, DSR, WRP and LAR1 Routing Protocols in Glomosim version 2.02. Because mobility is the key reason for packet losses, we design the scenarios for comparing the performance of Bellman Ford, DSR, WRP and LAR1 based on different mobility models. The mobility models can be determined by various mobility models like random waypoint, random point group mobility and freeway mobility models. Table 1 summarizes other scenario parameters for Bellman Ford, DSR, WRP and LAR1.

Simulation Model:

 

The wireless network consists of varying numbers of nodes which are distributed uniform in a grid area of 1000m X 1000m. The data packet size is of 512 bytes. The simulation time is 360sec. The simulation model [8] with parameters is listed in table 1.

 

Table 1. Simulation Parameters

Traffic Pattern

CBR

Simulation Time

360 seconds

Simulation Area

1000m*1000m

Total Nodes

10, 20, 30, 40 and 50

The Data Packet Size

512 byets

Node Placement

Uniform

Speed of Node

25 m/s

Pause Time

30                  Sec.

 

Traffic Model:

The traffic model used is CBR (Constant Bit Rate). CBR Model generates traffic at a constant rate of 512 Byte each at the start of the simulation up to the end of the simulation. The inter departure time for each item is 1 second.

 

V RESULTS:

Three performance metrics are used for measuring the performance of Bellman Ford, DSR, WRP and LAR1 Routing Protocols. The simulation results are shown in the form of graph that represents (i) Packet Delivery Ratio, (ii) Average End to End Delay and (iii) Throughput.

 

(i) Packet Delivery Ratio

Number of Data Packets Delivered over Number of Data Packets Generated. “Number of Data Packets Delivered” is the total number of received data packets by destinations; “Number of Data Packets Generated” is the total number of generated data packets by sources.

 

Figure 6 (a), (b) and (c) shows the graph of Bellman Ford, DSR, WRP and LAR1 routing protocol for packet delivery ratio [9] between three mobility scenarios: Random Waypoint, Group Mobility and Freeway Models respectively.

 

(ii) Average End to End Delay:

Average packet delivery time from a source to a destination. First for each source-destination pair, an average delay for packet delivery is computed. Then the whole average delay is computed from each pair average delay.

 

Figure 7 (a), (b) and (c) shows the graph of Bellman Ford, DSR, WRP and LAR1 routing protocol for average end to end delay  between three mobility scenarios: Random Waypoint, Group Mobility and Freeway Models respectively.. End-to-end delay includes the delay in the send buffer, the delay in the interface queue, the bandwidth contention delay at the MAC, and the propagation delay.

 

Fig. 6 (a). PDR with Random Way point model

 

Fig. 6 (b). PDR with random point group mobility model

 

Fig. 6 (c). PDR with freeway mobility model

(iii) Throughput:

Throughput is the number of packet that is passing through the channel in a particular unit of time. This performance metric show the total number of packets that have been successfully delivered from source node to destination node and it can be improved with increasing node density.

 

Figure 8 (a), (b) and (c) shows the graph of Bellman Ford, DSR, WRP and LAR1 routing protocol for throughput between three mobility scenarios: Random Waypoint, Group Mobility and Freeway Models respectively.

 

Fig. 7 (a). End to End Delay with Random Way point model

 

Fig. 7 (b). End to End Delay with random point group mobility model

 

Fig. 7 (c). End to End Delay with freeway mobility model

 

Fig. 8 (a). Throug put with Random Way point model

 

Fig. 8 (b). Throughput with random point group mobility model

 

Fig. 8 (c). Throughput with freeway mobility model

 

VI. CONCLUSION:

In this paper we have simulated the Bellman Ford, DSR, WRP and LAR1 routing protocols on Glomosim Simulator. The performance of the protocols was measured with respect to metrics like Packet delivery ratio, end to end delay and Throughput. Simulations were carried out with identical networks and running different protocols on the mobile node. The simulation is divided in three parts basis on the mobility model (random waypoint mobility, random point group mobility model and freeway mobility model). Here we conclude as:

 

1      LAR1 performs well than DSR, Bellman Ford and WRP (in reference to packet delivery ratio) if the node mobility is random waypoint and random point group mobility model.

2.     Bellman Ford has performed well when the node mobility model is freeway mobility model.

3      .Packet delivery ratio is increases as the number of nodes increases.

4.     Freeway mobility model is better than the other two mobility models in terms of Packet Delivery Ratio.

5.     Bellman Ford performs better than DSR, LAR1 and WRP in terms of average end to end delay and random waypoint mobility model is better than random point group mobility model and freeway mobility model.

6.     DSR and LAR1 both have better Throughput than Bellman Ford and WRP.

7.     Random point group mobility is better in compare to freeway mobility model and radom way point mobility model in terms of throughput.

 

For the above discussion we can say that all the routing protocols and mobility models have their own significance they all have their own advantages and disadvantages its depends upon the situation where we have to use. In some situation LAR1 is better and in some situation DSR is better. In some cases Random Waypoint mobility model is better and in some cases Random Point Group mobility model is better.

 

VII. FUTURE SCOPE:

Future work may include same experiments for DSDV and ZRP, measuring the average end to end delay, packet delivery rate and drop ratio and the same experiments for different node mobility speed of the simulation and other mobility models. Another Future work is to perform the experiments for various different node migration speeds. We used the node mobility of 45km/h in our experiments this time. However, the node migration speed of 45km/h is just one of the possible velocities. Keeping the migration speed lower may lessen or rule out the cases of packets getting dropped even before routing information is updated. This may affect the simulation results and perhaps will bring out the strengths and weaknesses of different protocols unambiguously.

 

VIII. REFERENCES:

[1]     S.Corson and J. Macker, Mobile Ad hoc Networking (MANET):Routing Protocol Performance Issues and Evaluation Considerations, RFC: 2501, January 1999.

[2]     Carlo Kopp, “Ad Hoc Networking, Systems Journal, pp 33-40,1999.

[3]     Guolong Lin, Guevara Noubir and Rajmohan Rajaraman, "Mobility Models for Ad hoc Network Simulation", In Proceedings of IEEE INFOCOM 2004, Volume 1,  pp. 7-11, 2004.

[4]     Tracy Camp, Jeff Boleng and Vanessa Davies, “A Survey of Mobility  Models for Ad Hoc Network” Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, pp. 483-502, 2002.

[5]     F. Bai and A. Helmy, "The Important Framework for Analyzing and Modeling the Impact of Mobility in Wireless Adhoc Networks", in Wireless Ad Hoc and Sensor Networks, Kluwer Academic Publishers, 2004.

[6]     F. Bai, A. Helmy, “A Survey of Mobility Modeling and Analysis in Wireless Adhoc    Networks” in Wireless Ad Hoc and Sensor Networks, Kluwer Academic Publishers, 2004.

[7]     F. Bai,  G.  Bhaskara  and  A.  Helmy,"  Building  the  Blocks  of Protocol  Design  and  Analysis Challenges and Lessons Learned from Case Studies on Mobile Adhoc Routing and Micro-Mobility Protocols", ACM Computer Communication Review, Vol.34, No.3,  pp.57-70, 2004.

[8]     F. Bai, N. Sadagopan and A. Helmy, "IMPORTANT:A framework to systematically analyze the Impact of Mobility on Performance of Routing protocols for Adhoc Networks, IEEE Infocom, pp. 825-835, 2003.

[9]     Charles E Perkins and Pravin Bhagwat, Highly Dynamic Destination Sequenced Distance Vector  Routing (DSDV) for Mobile Computers”, SIGCOMM 94, pp. 234-244, 1994.

[10]   David B. Johnson, David A. Maltz, Yih-Chun Hu, The Dynamic Source Routing (DSR) Protocol for  Mobile Ad Hoc Networks.draft-ietf-manet-dsr-10.txt, July 2004.

[11]   David B. Johnson and David A. Maltz. “Dynamic Source Routing in Ad Hoc Wireless Networks”. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.

[12]   Biao Zhou, Kaixin Xu and Mario Gerla, “Group and Swarm Mobility Models for Ad Hoc Network  Scenarios Using Virtual Tracks, In Proceedings of MILCOM2004, Volume 1, pp. 289- 294, 1994.

[13]   Mobility Generator (version1.0) from the site, http://nile.usc.edu/important/software.htm, February 2004

[14]   Ashish Gupta and Akhilesh Kosta,” A survey on Node Mobility Models on MANET Routing Protocols”. In International Journal of Research (IJR) Vol-1, Issue-5, June 2014 ISSN 2348-6848.

 

 

Received on 07.07.2014               Accepted on 28.07.2014 

©A&V Publications all right reserved

Research J. Engineering and Tech. 5(3): July-Sept. 2014 page 151-157