Comparative Simulations of WSN

نویسندگان

  • Andreas TIMM-GIEL
  • Ken MURRAY
  • Markus BECKER
  • Ciaran LYNCH
  • Carmelita GÖRG
  • Dirk PESCH
چکیده

In this paper we present the results of a study within the CRUISE Network of Excellence. Within CRUISE we have simulated a simple scenario for Wireless Sensor Networks with three different simulation tools: NS-2, OMNeT++ and OPNET. The scenario investigated is that of a fire fighter entering a building and deploying sensor nodes in different rooms. Data collected from the sensor nodes is transmitted to the fire fighter and the incident commander at the other end. The simulation tools are compared regarding their ease of implementing the scenarios, collecting the metrics delay, throughput as well as comparability of the results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Study on Priority Based Qos Aware Mac Protocols for Wsn

In Wireless Sensor Network (WSN), QoS (Quality of Service) in sensor application plays a very important role. QoS based routing is required to ensure the best use of nodes in WSN. In this paper, a comparative study of QoS based routing in Media Access Control (MAC) protocols are presented based on the traits to solve problems like prioritization, timeliness, reliability etc. The study mainly fo...

متن کامل

A comparative study of two alternative wildfire models, with applications to WSN topology control

In this paper two wildfire modelling methods are compared in terms of performance, scaling up flexibility and speed of model execution. The InteSys model is based on Cellular Automata (CA). Simple rules are applied to each cell, interacting with neighbouring cells. The cell based structure reflects the object oriented nature of the model, as each cell is a working copy of a cell class – a bluep...

متن کامل

A Comprehensive and Comparative Study of Elliptic Curve Cryptography Hardware Implementations for WSN

Key management and authentication are essential modules for network security provisioning especially for Wireless Sensor Networks (WSN). Make available these two services by using symmetric cryptosystems in software implementation are challenging that’s not providing a perfect trade-off between resilience and performance. Asymmetric approaches with public key cryptosystems, specifically Ellipti...

متن کامل

Computational Intelligence Based Optimization of Energy Aware Routing in WSN

The researches inclined towards intelligent behavior of the nature to explore architecture for intelligent systems. Artificial intelligence (AI) brings evolution to computational intelligence (CI) emergence which is highlighted in this article .CI gives a picture of the nature’s supremacy of being the ultimate intelligent optimizer for human made solutions. A complete picture of energy awarenes...

متن کامل

MAP++: support for map-based WSN modeling and design with OMNeT++

Wireless Sensor Networks (WSN) are receiving growing attention in the research community. As simulation is a frequently used to test and validate the different approaches, the flexibility of the simulation environments to support the varied WSN schema is desirable. The multitude works regarding WSN in general [7, 8], and OMNeT++ [1, 2, 5, 6] in particular, confirm the rising interest in providi...

متن کامل

Survey on Various Key Management Schemes for LEACH in Wireless Sensor Networks

Wireless Sensor Network (WSN) are the network of sensor nodes which communicate with each other and with the base station using wireless channel. Due to extensive use of wireless sensor networks it is necessary to improve its security. WSN nodes are prone to physical attacks. Wireless sensor networks (WSN) face security threats so traditional key management schemes are no longer accurate for WS...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008