Abstract
Most wireless multi-hop networks, such as ad hoc networks and wireless sensor networks, need network-wide broadcasting, which is best done with a flooding protocol. In this article, we use packet trace information from a real test-bed network to define a simulator for flooding protocol performance studies. Five protocols are compared using the simulator. Trace-based simulations promise to have the benefits of the simulator, such as reducing required work effort and repeatability but still produce results close to the real test-bed or deployment. We propose and evaluate different approaches on how to use collected trace data and how to tune the parameters to achieve the best possible accuracy in comparison with actual test-bed measurements. We study the resulting accuracy of the model so that performance studies know with what confidence a certain conclusion can be made. Using the new trace-based model and knowing its accuracy, we compare the five flooding protocols to gain additional insights into their performance. Finally, by modifying the trace data, we study how real-world effects, such as links with in-between qualities and asymmetric links, influence the different flooding protocols.
Highlights
In some wireless networks, a node may not be able to directly transmit a packet to every node in the network due to transmission range limitations
Using the trace-based model that we have improved the accuracy of our simulator, it makes sense to use the model and, for instance, simulate other flooding protocols for performance comparison
In this article, we compared the performance of flooding protocols for wireless multi-hop networks, in particular, mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs)
Summary
A node may not be able to directly transmit a packet to every node in the network due to transmission range limitations. It needs help from other nodes to relay the packet to the destination. Such wireless networks are called multihop networks and require special networking protocols. This is only possible if some of the nodes relay the broadcasting packet so that all nodes can be reached. This process is called flooding and is used by multiple other protocols and applications, including unicast routing protocols
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have