Performance analysis of traffic and mobility models on mobile and vehicular ad hoc wireless networks

Advances in wireless communication technology and the proliferation of mobile devices enable the capa- bilities of communicating with each other even in areas with no pre-existing communication infrastructure. Traffic and mobility models play an important role in evaluating the performance of these communication networks. Despite criticism and assumption from various researches on Transmission Control Protocols (TCP), weaknesses on Mobile Ad Hoc Network (MANET), and Vehicular Ad Hoc Network (VANET). A simulation was carried out to evaluate the performance of Constant Bit Rate, Variable Bit Rate and Transmission Control Protocol on MANET and VANET using DSR routing protocol. CBR, VBR, and TCP have different manufacturer operation mechanisms and these differences lead to significant performance of CBR and VBR over TCP with better throughput and less average maximal end-to-end delay. DSR was able to respond to link failure at low mobility which led to TCP’s performance in packets delivery.

[1]  Zongkai Yang,et al.  Simulation Comparison of Four Wireless Ad hoc Routing Protocols , 2004 .

[2]  Kwei-Jay Lin,et al.  RT-Llama: Providing Middleware Support for Real-Time SOA , 2010, Int. J. Syst. Serv. Oriented Eng..

[3]  Scott Tilley,et al.  Software Testing in the Cloud: Perspectives on an Emerging Discipline , 2012 .

[4]  Abdullah Muhammed,et al.  Performance Comparison Study of Routing Protocols for Mobile Grid Environment , 2008 .

[5]  Allan M. Hart Hibernate: A Full Object Relational Mapping Service , 2009 .

[6]  Chien-Chung Shen,et al.  What does using TCP as an evaluation tool reveal about MANET routing protocols? , 2006, IWCMC '06.

[7]  Nancy R. Mead,et al.  Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods , 2010, Int. J. Secur. Softw. Eng..

[8]  Lokanatha C. Reddy,et al.  Performance Comparison of Wireless Mobile Ad-Hoc Network Routing Protocols , 2008 .

[9]  Martine Collard,et al.  Network-Based Modeling in Epidemiology: An Emphasis on Dynamics , 2012, Int. J. Inf. Syst. Model. Des..

[10]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[11]  Victor C. M. Leung,et al.  A dynamic reservation protocol for integrating CBR/VBR/ABR traffic over IEEE 802.14 HFC networks , 1998, IEEE GLOBECOM 1998 (Cat. NO. 98CH36250).

[12]  Robert de Simone,et al.  UML MARTE Time Model and Its Clock Constraint Specification Language , 2014 .

[13]  V. Garousi Analysis of network traffic in ad-hoc networks based on DSDV protocol with emphasis on mobility and communication patterns , 2005, 2005 1st IEEE and IFIP International Conference in Central Asia on Internet.

[14]  Apkar Salatian Validating the INTERPRETOR Software Architecture for the Interpretation of Large and Noisy Data Sets , 2013 .

[15]  Stijn Hoppenbrouwers,et al.  Applying AHP for Collaborative Modeling Evaluation: Experiences from a Modeling Experiment , 2013, Int. J. Inf. Syst. Model. Des..

[16]  Gonzalo Génova,et al.  Software Engineering Research: The Need to Strengthen and Broaden the Classical Scientific Method , 2014 .

[17]  Khaldoun Al Agha,et al.  Evaluation of TCP Performance in MANETs using an Optimized Scalable Simulation Model , 2007, 2007 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems.

[18]  Bello Lawal,et al.  Performance Evaluation of CBR and TCP Traffic Models on MANET Using DSR Routing Protocol , 2010, 2010 International Conference on Communications and Mobile Computing.

[19]  Alex Talevski,et al.  Performance measurement of various routing protocols in ad-hoc networks , 2009 .

[20]  Robert M. Hierons,et al.  A Longitudinal Study of Fan-In and Fan-Out Coupling in Open-Source Systems , 2011, Int. J. Inf. Syst. Model. Des..

[21]  Mahbubur Rahman Syed,et al.  Handbook of research on modern systems analysis and design technologies and applications , 2008 .

[22]  Paolo Giorgini,et al.  Threat Analysis in Goal-Oriented Security Requirements Modelling , 2014, Int. J. Secur. Softw. Eng..