International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com Volume 2, Issue 8, August 2013 ISSN 2319 - 4847 Mobile Coverage Problem Analysis by using NS2 Ajay Singh1 and Dr. Pankaj Dashore2 1 Scholar-M. Tech (Computer Network) Oriental University Indore, MP, India 2 Head of CSE Dept, Oriental University, Indore, MP, India Abstract In this research paper, we examine a very common problem of mobile network that is out of coverage problem. To examine this problem we use a very common simulator NS2 among various simulators. It is most commonly use by various researcher, teacher and student of different institutions and universities. Define a brief description of Mobile Network. Keywords: AODV, NS2, UDP, Base Station, Mobile Network 1. INTRODUCTION As we knows that Mobile phones communicate through a system radio waves, antennas and towers. All mobile phone depend on radio waves and radio waves travel through air. In radio transmission mobile calls can be interrupted by various buildings, weather, mountain and other objects within your and nearest mobile tower. Various reason that disturb the completions of a call. Even when a carrier offers coverage in a certain geographical areas, we may not able to complete a call due to limitations in network architecture, capacity, and topography. A network that does not contain wire is known as wireless network [9]. To design the wireless scenario we are using very popular simulator NS2 among various simulation tools. It is an Object oriented and discrete event driven network simulator used by various researcher, teacher and student into the education field for research point of view [10]. 2. MOBILE NETWORK A network of two or more mobile devices with a single base station is known as mobile network. In this network, mobile can communicate each other if they are in the radio signal coverage area of the existing base station. The coverage area or boundaries of an access point or base station is known as a cell. A mobile network is also known as cellular network. A mobile network with one base station and two mobiles are illustrated in figure 1. Mobiles are communicate only when both in the coverage area of base-station. Otherwise they give coverage problem. Figure 1 Mobile Network 3. WIRELESS SIMULATION MODEL A wireless scenario with three nodes can be seen into Nam output window that generated by NS2 simulation tools shown into the figure 2. The three nodes are node 0, 1 and 2. The node 0 and 2 are sender and receiver while node 1 is access point. Wireless Access Points (WAPs) are specially configured nodes on wireless local area networks (WLANs). Access points act as a central transmitter and receiver of WLAN radio signals. Access points used in home or small business networks are generally small, dedicated hardware devices featuring a built-in network adapter, antenna, and radio transmitter. Access points support Wi-Fi wireless communication standards. Wireless network area for this scenario is 500m*500m. TCL scripting language is used to generate this scenario. Volume 2, Issue 8, August 2013 Page 60 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com Volume 2, Issue 8, August 2013 ISSN 2319 - 4847 Figure 2 Nam output window 4. PARAMETER REQUIRE FOR SIMULATION The following simulation parameter is used to generate this scenario, list are given into the table I Table 1: Simulation Parameters Parameter Name NS Version Channel Propagation Network Interface Antenna Interface Queue Routing Protocol Transport Protocol Radio Frequency Packet Size Transmission rate Mobile Speed Simulation Time CBR start at node 0 CBR stop at node 0 Node 2 start move towards AP Node 2 move away from AP Received packets or signal from AP Value NS2 Wireless Channel TwoRayGround WirelessPhy OmniAntenna DropTail AODV UDP 914MHZ 1000byte 1Mbps 150 m/s 20 s 0.0 second 15.0 second 1.0 second 2.5 second 1.8 second 5. EXPERIMENTAL ANALYSIS Whenever we start simulation, CBR also start the transmission of data packets from the node 0 as a source node. Here data packets of node 0 cannot send directly to the destination node 2 that can access the data packets or radio signal through access points i.e. node1. It means source and destination (i.e. node 0 and node 2) can communicate through access point (i.e. node 1). After start the simulation we will see no any packet transmission visible from source to destination node shown in below figure 3. Also note the simulation time but packet are transmitted you can see in source node packet info table. Figure 3 Volume 2, Issue 8, August 2013 Page 61 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com Volume 2, Issue 8, August 2013 ISSN 2319 - 4847 After one second when node 2 move towards access point (i.e. node1) and node 2 reach coverage area of access point. We will find packet transmitted from source to destination node (i.e. node 1 and node 2) through access point (i.e. node 1). Here node 1 receive packet from node 0 and transmit the packet to node 2. We can see in figure 4. Again note the simulation time. Figure 4 When after 2.5 second node 2 move away from the access point (i.e. node 1) and reach out of access point range all packets are dropped at node 1 and base station/access point is not able to transmit packets that are coming from source node to destination node. We can see these in figure 5 Figure 5 I have created two tables such as source and destination node packet info table to understand which packet reaches or not to the destination node from source node. This table also shows packet id of each packets, packet transmission time from source node, packet receiving time at destination node and how many time taken by each packet to reach from source to destination node. In source file have three columns- first column indicate packet id, second column indicate sending time of packet and third column indicate packet size. This entire thing you can see in the source node packet info table (i.e. Table 2) Table 2: Source Node Packet Info Volume 2, Issue 8, August 2013 Page 62 International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com Volume 2, Issue 8, August 2013 ISSN 2319 - 4847 Similarly in destination file has five columns-first columns indicate packet id, second column indicate sending time, third column indicate receiving time, fourth column indicate delay between source to destination node and fifth column indicate packet size at destination node. These entire things you can see in the destination node packet info table (i.e. Table 3) Table 3: Destination Node Packet Info After analyze both source and destination node packet info table, you can conclude how many data packets are sent by source node and how many packet received by destination node, their sending and receiving time also illustrated in to the table 2 and 3. 6. CONCLUSION In this research paper, we summarizes the out coverage problem occur due to out of range of source and destination from base station or access point. An access point or base station sends or receives packets or signals only when they are available in their range otherwise all packets or signals are dropped. All simulation result is achieved by using NS2 simulation tool. References [1.] Ashikur Rahman, Pawel Gburzynski, “Hidden Problems with the Hidden Node Problem”, 23rd Biennial Symposium on Communications [2.] Pommer, Hermann,“Roaming zwischen Wireless Local Area Networks”, VDM Verlag, Saarbrücken 2008, ISBN 978-3-8364-8708-5 [3.] C. Rama Krishna, “STTP on Wireless Communication “, 2009. [4.] K. Chakrabarty, S. S. Iyengar, H. Qi, E. Cho, "Grid coverage for surveillance and target location in Distributed sensor networks," IEEE Transactions on Computers, 51(12):1448-1453, December 2002. [5.] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks," ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2001), Rome, Italy, July 16-21, 2001. [6.] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, “MACAW: A Media Access Protocol for Wireless LAN’s,” in Proc. ACM SIGCOMM ’94, pp. 212–25, London, UK, Aug. 31–Sept. 2, 1994. [7.] K. Biba, “A Hybrid Wireless MAC Protocol Supporting Asynchronous and Syncronous MSDU Delivery Services,” Tech. Rep. Paper 802.11/91-92, IEEE 802.11 Working Group, 1992. [8.] K.-C. Chen, “Medium access control of wireless lans for mobile computing,” IEEE Network, vol. 8, no. 5, pp. 50–63, 1994. [9.] Ajay Singh and Dr. Pankaj Dashore, “ Packet Flow Analysis in Wireless Scenario“, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, Jun 2013, ISSN: 2277128X [10.] Almargni Ezreik and Abdalla Gheyani, “Design and Simulation of Wireless Network using NS-2”, 2nd International conference on Computer Science and Information Technology (ICCSIT’2012) Singapore April 28-29, 2012. Volume 2, Issue 8, August 2013 Page 63