{"title":"基于约束的移动自组织网络的吞吐量和连通性","authors":"H. Ramzan, A. Iqbal","doi":"10.1109/INMIC.2008.4777744","DOIUrl":null,"url":null,"abstract":"Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. The topology and movement of the nodes in the simulation are key factors in the performance of the network protocol under study. Once the nodes have been initially distributed, the mobility model dictates the movement of the nodes within the network. In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions which should impersonate the real world conditions. In order to overcome the short comings of the problem, design and analysis of restricted mobility model is the key. In this restricted mobility model we used the fact that mobile nodes moving under OLSR protocol tend to concentrate or settle down in the center and define a smaller mobility region then defined in the simulation parameters.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Throughput and connectivity using constraint based mobility model for mobile ad hoc networks\",\"authors\":\"H. Ramzan, A. Iqbal\",\"doi\":\"10.1109/INMIC.2008.4777744\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. The topology and movement of the nodes in the simulation are key factors in the performance of the network protocol under study. Once the nodes have been initially distributed, the mobility model dictates the movement of the nodes within the network. In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions which should impersonate the real world conditions. In order to overcome the short comings of the problem, design and analysis of restricted mobility model is the key. In this restricted mobility model we used the fact that mobile nodes moving under OLSR protocol tend to concentrate or settle down in the center and define a smaller mobility region then defined in the simulation parameters.\",\"PeriodicalId\":112530,\"journal\":{\"name\":\"2008 IEEE International Multitopic Conference\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE International Multitopic Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INMIC.2008.4777744\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Multitopic Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INMIC.2008.4777744","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Throughput and connectivity using constraint based mobility model for mobile ad hoc networks
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks for commercial uses due to their unique properties. One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. The topology and movement of the nodes in the simulation are key factors in the performance of the network protocol under study. Once the nodes have been initially distributed, the mobility model dictates the movement of the nodes within the network. In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions which should impersonate the real world conditions. In order to overcome the short comings of the problem, design and analysis of restricted mobility model is the key. In this restricted mobility model we used the fact that mobile nodes moving under OLSR protocol tend to concentrate or settle down in the center and define a smaller mobility region then defined in the simulation parameters.