Mobile Coverage Problem Analysis by using NS2 Web Site: www.ijaiem.org Email: ,

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 8, August 2013
ISSN 2319 - 4847
Mobile Coverage Problem Analysis by using
NS2
Ajay Singh1 and Dr. Pankaj Dashore2
1
Scholar-M. Tech (Computer Network)
Oriental University Indore, MP, India
2
Head of CSE Dept, Oriental University, Indore, MP, India
Abstract
In this research paper, we examine a very common problem of mobile network that is out of coverage problem. To examine this
problem we use a very common simulator NS2 among various simulators. It is most commonly use by various researcher, teacher
and student of different institutions and universities. Define a brief description of Mobile Network.
Keywords: AODV, NS2, UDP, Base Station, Mobile Network
1. INTRODUCTION
As we knows that Mobile phones communicate through a system radio waves, antennas and towers. All mobile phone
depend on radio waves and radio waves travel through air. In radio transmission mobile calls can be interrupted by
various buildings, weather, mountain and other objects within your and nearest mobile tower. Various reason that disturb
the completions of a call. Even when a carrier offers coverage in a certain geographical areas, we may not able to
complete a call due to limitations in network architecture, capacity, and topography.
A network that does not contain wire is known as wireless network [9]. To design the wireless scenario we are using very
popular simulator NS2 among various simulation tools. It is an Object oriented and discrete event driven network
simulator used by various researcher, teacher and student into the education field for research point of view [10].
2. MOBILE NETWORK
A network of two or more mobile devices with a single base station is known as mobile network. In this network, mobile
can communicate each other if they are in the radio signal coverage area of the existing base station. The coverage area or
boundaries of an access point or base station is known as a cell. A mobile network is also known as cellular network.
A mobile network with one base station and two mobiles are illustrated in figure 1. Mobiles are communicate only when
both in the coverage area of base-station. Otherwise they give coverage problem.
Figure 1 Mobile Network
3. WIRELESS SIMULATION MODEL
A wireless scenario with three nodes can be seen into Nam output window that generated by NS2 simulation tools shown
into the figure 2. The three nodes are node 0, 1 and 2. The node 0 and 2 are sender and receiver while node 1 is access
point. Wireless Access Points (WAPs) are specially configured nodes on wireless local area networks (WLANs). Access
points act as a central transmitter and receiver of WLAN radio signals. Access points used in home or small business
networks are generally small, dedicated hardware devices featuring a built-in network adapter, antenna, and radio
transmitter. Access points support Wi-Fi wireless communication standards. Wireless network area for this scenario is
500m*500m. TCL scripting language is used to generate this scenario.
Volume 2, Issue 8, August 2013
Page 60
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 8, August 2013
ISSN 2319 - 4847
Figure 2 Nam output window
4. PARAMETER REQUIRE FOR SIMULATION
The following simulation parameter is used to generate this scenario, list are given into the table I
Table 1: Simulation Parameters
Parameter Name
NS Version
Channel
Propagation
Network Interface
Antenna
Interface Queue
Routing Protocol
Transport Protocol
Radio Frequency
Packet Size
Transmission rate
Mobile Speed
Simulation Time
CBR start at node 0
CBR stop at node 0
Node 2 start move towards
AP
Node 2 move away from AP
Received packets or signal
from AP
Value
NS2
Wireless Channel
TwoRayGround
WirelessPhy
OmniAntenna
DropTail
AODV
UDP
914MHZ
1000byte
1Mbps
150 m/s
20 s
0.0 second
15.0 second
1.0 second
2.5 second
1.8 second
5. EXPERIMENTAL ANALYSIS
Whenever we start simulation, CBR also start the transmission of data packets from the node 0 as a source node. Here
data packets of node 0 cannot send directly to the destination node 2 that can access the data packets or radio signal
through access points i.e. node1. It means source and destination (i.e. node 0 and node 2) can communicate through
access point (i.e. node 1).
After start the simulation we will see no any packet transmission visible from source to destination node shown in below
figure 3. Also note the simulation time but packet are transmitted you can see in source node packet info table.
Figure 3
Volume 2, Issue 8, August 2013
Page 61
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 8, August 2013
ISSN 2319 - 4847
After one second when node 2 move towards access point (i.e. node1) and node 2 reach coverage area of access point. We
will find packet transmitted from source to destination node (i.e. node 1 and node 2) through access point (i.e. node 1).
Here node 1 receive packet from node 0 and transmit the packet to node 2. We can see in figure 4. Again note the
simulation time.
Figure 4
When after 2.5 second node 2 move away from the access point (i.e. node 1) and reach out of access point range all
packets are dropped at node 1 and base station/access point is not able to transmit packets that are coming from source
node to destination node. We can see these in figure 5
Figure 5
I have created two tables such as source and destination node packet info table to understand which packet reaches or not
to the destination node from source node. This table also shows packet id of each packets, packet transmission time from
source node, packet receiving time at destination node and how many time taken by each packet to reach from source to
destination node. In source file have three columns- first column indicate packet id, second column indicate sending time
of packet and third column indicate packet size. This entire thing you can see in the source node packet info table (i.e.
Table 2)
Table 2: Source Node Packet Info
Volume 2, Issue 8, August 2013
Page 62
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 8, August 2013
ISSN 2319 - 4847
Similarly in destination file has five columns-first columns indicate packet id, second column indicate sending time, third
column indicate receiving time, fourth column indicate delay between source to destination node and fifth column
indicate packet size at destination node. These entire things you can see in the destination node packet info table (i.e.
Table 3)
Table 3: Destination Node Packet Info
After analyze both source and destination node packet info table, you can conclude how many data packets are sent by
source node and how many packet received by destination node, their sending and receiving time also illustrated in to the
table 2 and 3.
6. CONCLUSION
In this research paper, we summarizes the out coverage problem occur due to out of range of source and destination from
base station or access point. An access point or base station sends or receives packets or signals only when they are
available in their range otherwise all packets or signals are dropped. All simulation result is achieved by using NS2
simulation tool.
References
[1.] Ashikur Rahman, Pawel Gburzynski, “Hidden Problems with the Hidden Node Problem”, 23rd Biennial Symposium
on Communications
[2.] Pommer, Hermann,“Roaming zwischen Wireless Local Area Networks”, VDM Verlag, Saarbrücken 2008, ISBN
978-3-8364-8708-5
[3.] C. Rama Krishna, “STTP on Wireless Communication “, 2009.
[4.] K. Chakrabarty, S. S. Iyengar, H. Qi, E. Cho, "Grid coverage for surveillance and target location in Distributed
sensor networks," IEEE Transactions on Computers, 51(12):1448-1453, December 2002.
[5.] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, "Span: An Energy-Efficient Coordination Algorithm for
Topology
Maintenance in Ad Hoc Wireless Networks," ACM/IEEE International Conference on Mobile
Computing and Networking (MobiCom 2001), Rome, Italy, July 16-21, 2001.
[6.] V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, “MACAW: A Media Access Protocol for Wireless LAN’s,”
in Proc. ACM SIGCOMM ’94, pp. 212–25, London, UK, Aug. 31–Sept. 2, 1994.
[7.] K. Biba, “A Hybrid Wireless MAC Protocol Supporting Asynchronous and Syncronous MSDU Delivery Services,”
Tech. Rep. Paper 802.11/91-92, IEEE 802.11 Working Group, 1992.
[8.] K.-C. Chen, “Medium access control of wireless lans for mobile computing,” IEEE Network, vol. 8, no. 5, pp. 50–63,
1994.
[9.] Ajay Singh and Dr. Pankaj Dashore, “ Packet Flow Analysis in Wireless Scenario“, International Journal of
Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, Jun 2013, ISSN: 2277128X
[10.] Almargni Ezreik and Abdalla Gheyani, “Design and Simulation of Wireless Network using NS-2”, 2nd International
conference on Computer Science and Information Technology (ICCSIT’2012) Singapore April 28-29, 2012.
Volume 2, Issue 8, August 2013
Page 63
Download