Movement Evaluation of Mobility Models in Ad Hoc Networks
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2014, Vol 11, Issue 9
Abstract
Mobility is a normal behavior of Ad Hoc networks. A realistic simulation of user movement in Ad Hoc Network is an important to the network act. The difficult movement pattern of nodes is important in the study of Ad hoc Networks. As the existing mobility models cannot realistically model the recognized movement patterns of node and characteristics of node in any complex area scenarios, this manuscript proposes a personal area mobility model that realistically represents the movements of nodes in a personal area scenario. The plan of this study is to calculate the performance of different Mobility models for Ad Hoc Net work in realistic environments using the available open-source tools for simulating mobile networks. The routing protocols (AODV, DSR, DSDV), mobility models (Random Way Point (RWP), Tactical Indoor Mobility Model (TIMM)) and other aspects are explained and discussed in order to know how to use them properly to model real-life conditions. NS-2.34 and Bonnmotion-2.0 were used to create the networks, services and environment personality in common. In this manuscript we have used to different mobility model to analyze the effect of different mobility pattern in realistic environment such as campus, building, Shopping mall environment to get a realistic simulation. The routing protocol, mobility models and other aspects are explained and discussed in order to know how to use them properly to model real-life conditions. NS-2.34 and Bonnmotion-2.0 were used to create the networks, services and environment personality in common.Therefore, by using mobility a model, this is an important aspect in enhancing the self-confidence in the simulation result of the networks. The results show that realistic Mobility Models better the available mobility model for any site situation such as Shopping mall etc.
Authors and Affiliations
Harish Pratap Singh , Arvind Kumar Shukla , Abhishek Mishra
An Approach to Color Image enhancement Using Modified Histogram
Image enhancement is one of the key issues in high quality pictures such as digital camera and HDTV. Since Image clarity is very easily affected by lighting, weather, or equipment that has been used to capture the...
A Survey on Image Authentication Techniques
Image authentication is the process of proving image identity and authenticity. Digital images are increasingly transmitted over non-secure channels such as the Internet. Military, medical and quality control images must...
Pollution Monitoring System using Wireless Sensor Network in Visakhapatnam
As the technology increase, the degree of automation (minimizing the man power) in the almost all sectors are also increases. Wireless Sensor Networks (WSN) are gaining the ground in all sectors of life; from homes...
Text Steganography Techniques: A Review
Steganography has been in use since the presence of secret messages and this use has gained popularity as the internet became well-liked. Text steganography is a sub part of steganography that hides the message beh...
Implementation of Web Based Intelligent Substation Power Equipment Monitoring and Controlling System
The paper proposes an innovative design to develop a system based on ARM micro controller that is used for monitoring the voltage, current and temperature of a substation and to protect the system from the rise in...