Simulation of ad hoc networks: ns-2 compared to JiST/SWANS
نویسندگان
چکیده
For the evaluation of ad hoc network protocols, researchers traditionally use simulations because they easily allow for a large number of nodes and reproducible environment conditions. But still, simulations are costly in terms of required processing time and memory. New approaches like the Javabased simulator JiST/SWANS promise to provide significant performance advantages compared to existing, well-known network simulators like ns-2. Though its creators have done comparison studies regarding processing time and memory requirements of JiST/SWANS, they did not test the validity of the results produced by the SWANS stack as well as its performance in detail. In this work, we focus on the comparability of implemented protocols and models in SWANS. Using the corresponding counterparts both in SWANS and ns-2, with an identical set of parameters, we are able to produce results and compare them afterward. In addition, we also provide a performance analysis using these simulations. By showing that JiST/SWANS produces equivalent simulation results as ns-2 in less time and with less memory, we support JiST/SWANS as a potential alternative.
منابع مشابه
A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملSWANS– Scalable Wireless Ad hoc Network Simulator User Guide
Wireless networking research is fundamentally dependent upon simulation. Analytically quantifying the performance and complex behavior of even simple protocols on a large scale is often imprecise. On the other hand, performing actual experiments is onerous: acquiring hundreds of devices, managing their software and configuration, controlling a distributed experiment and aggregating the data, po...
متن کاملJiST: an efficient approach to simulation using virtual machines
Discrete event simulators are important scientific tools and their efficient design and execution is the subject of much research. In this paper, we propose a new approach for constructing simulators that leverages virtual machines and combines advantages from the traditional systems-based and language-based simulator designs. We introduce JiST, a Java-based simulation system that executes disc...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملPower control in reactive routing protocol for Mobile Ad Hoc Network
The aim of this work is to change the routing strategy of AODV protocol (Ad hoc On Demand Vector) in order to improve the energy consumption in mobile ad hoc networks (MANET). The purpose is to minimize the regular period of HELLO messages generated by the AODV protocol used for the research, development and maintenance of routes. This information is useful to have an idea about battery power l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008