Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01-12-2009 | Research Article

Simulations of the Impact of Controlled Mobility for Routing Protocols

Authors: Valeria Loscrí, Enrico Natalizio, Carmelo Costanzo

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2010

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper addresses mobility control routing in wireless networks. Given a data flow request between a source-destination pair, the problem is to move nodes towards the best placement, such that the performance of the network is improved. Our purpose is to find the best nodes selection depending on the minimization of the maximum distance that nodes have to travel to reach their final position. We propose a routing protocol, the Routing Protocol based on Controlled Mobility (RPCM), where the chosen nodes' path minimizes the total travelled distance to reach desirable position. Specifically, controlled mobility is intended as a new design dimension network allowing to drive nodes to specific best position in order to achieve some common objectives. The main aim of this paper is to show by simulation the effectiveness of controlled mobility when it is used as a new design dimension in wireless networks. Extensive simulations are conducted to evaluate the proposed routing algorithm. Results show how our protocol outperforms a well-known routing protocol, the Ad hoc On Demand Distance Vector routing (AODV), in terms of throughput, average end-to-end data packet delay and energy spent to send a packet unit.

1. Introduction

There are many challenges to face while designing wireless networks and protocols, such as obtaining a good throughput, minimizing data delay, and minimizing energy waste. In fact, most of the wireless networks are characterized by battery-equipped devices; thus the minimization of the energy consumption is a key factor. With the miniaturization of computing elements, we have seen many mobile devices appear in the market that can collaborate in an ad hoc fashion without requiring any previous infrastructure control. This gave birth to the concept of self-organization for wireless networks, which is intrinsecally tied to the capability of the nodes to move to different placements. In the last few years, the research community has become interested in the sinergic effect of mobility and wireless networks. Controlled mobility is a new concept for telecommunication research field and can be defined as a kind of mobility where mobile devices are introduced in the network and move to specified destinations with defined mobility patterns for specific objectives. In practice, controlled mobility is a new design dimension of the networks. The use of controlled mobility as a new design dimension to enhance performance of wireless networks represents a recent, innovative, and revolutionary concept. In fact, while opportunistic use of external mobility has been extensively investigated, the use of controlled mobility is largely unexplored. This new design dimension can effectively be used to improve system performance by allowing devices equipped with mobility support to reach favourable locations. Although many communication protocols for wireless networks have been proposed, to the best of our knowledge there is no routing protocol based on controlled mobility. In fact, in [1] authors consider jointly mobility and routing algorithms but the solution they propose is for Wireless Sensor Networks (WSNs) and only the base station is mobile. Among the main routing protocols proposed for Mobile Ad hoc NETworks (MANETs), we have the Ad hoc On Demand Distance Vector (AODV) routing [2, 3] and the Temporally Ordered Routing Algorithm (TORA) [4]. Both are examples of demand-driven algorithms that eliminate most of the overhead associated with table update in high-mobility scenarios. However, the path discovery phase incurs in high energy costs. On the other hand, our system is quasi-static, in the sense that the only mobility we consider is controlled mobility, which is used by nodes to reach specific locations; then, for energy efficiency matters, it is convenient to use a table-driven system. Another interesting routing protocol is [5], where the minimum metric paths are based on two different power metrics:
(i)
minimum energy per packet,
 
(ii)
minimum cost per packet.
 
However, this routing algorithm does not take into account the mobility as a new design dimension. In this paper, we take the controlled mobility into account by investigating the performance of a wireless network, where all the devices are equipped with mobility unit. The idea is to use existing multihop routing protocol; specifically we consider the well-known routing algorithm AODV and achieve further improvements in terms of network performance as throughput, data delay, and energy spent per packet, by explicitly exploiting mobility capabilities of the wireless devices. Previous analytical results formulated in [68] suggests that controlled mobility of nodes helps to improve network performance. Based on these results, we consider jointly controlled mobility and routing strategies. We perform simulations through a well-known simulation tool [9] to quantify the throughput, delay, and energy spent per packet compared with wireless network where AODV is used. The rest of the paper is organized as follows. Section 2 is the related works. We give some practical application example in Section 3. We give details about Routing Protocol based on Controlled Mobility in Section 4. Section 5 is related to simulation, and finally we conclude our work in Section 6.
In the recent past a lot of works studied the effects of mobility in the networks. Often, devices' mobility has been regarded as a negative fact that causes link break, disconnections, and so forth. From a certain moment it has been understood that mobility of nodes can potentially be used to improve perfomance of the network. Grossglauser and Tse [10] showed that mobility increases capacity of a network. Unfortunately, they did not take into account the delay in their work. The research community investigated throughly the delay-throughput trade-off and some interesting results have been obtained. In fact, Gamal et al. [11] determined the throughput-delay trade-off in a fixed and mobile ad hoc network. He showed that, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq1_HTML.gif nodes, the following statement holds https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq2_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq3_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq4_HTML.gif are the delay and the throughput, respectively. For a network consisting of mobile nodes, he showed that the delay scales as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq5_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq6_HTML.gif is the velocity of the mobile nodes. Once the trade-off between delay and throughput has been characterized, some algorithms that attain the optimal delay for each throughput value have been proposed. Another model makes it possible to exploit the random waypoint mobility of some nodes, in order to design a routing algorithm that allows high throughput with low delays, where the delay depends on the nodes' mobility, while the throughput is independent of it [12]. De Moraes [13] showed that there is a trade-off among mobility, capacity, and delay in ad hoc networks. A first step in taking advantage of the possibilities that mobility introduces has been made by the research community when predictable mobility became an important research focus. In fact, researchers studied many specific network objectives, under a random mobility-based communication paradigm; nevertheless the mobility of the sinks, for example in military applications, is based on soldier or fire fighter movements, and thus, it is predictable, in substance. Generally, the existing research in wireless sensor networks considers sink movement based on random mobility. However, the trajectories of the sink, in many practical applications, can be determined in advance. Based on these considerations, Lee et al. [14] proposed a predictable mobility-based algorithm, which uses the existing dissemination protocols and it is based on the random mobility-based communication paradigm. He showed the improvements and the various advantages of using the predictable mobility-based communication paradigm as the energy consumption decreases and the network lifetime increases. Predictable mobility of nodes has also been exploited to help in packets delivering [15]. In this work, nodes routing tables are updated with link state and trajectory information, which are received from other nodes. The problem of routing related to the predictable mobility has also been analyzed by [16]. In this work, paths are created by the movements of nodes, which will deliver the message they are carrying when they find other suitable nodes. The space-time routing framework it proposed leverages the predictability of nodes motion. Controlled mobility has been a hot research topic of the robotics community for many years. It concerns the motion coordination of a group of robots for a common objective, typically the coverage of a geographical area. In [17], the authors consider the problem of deploying a mobile sensors network composed of a distributed collection of nodes equipped with locomotion capability. Such mobile nodes use their ability to move in order to maximize the area covered by the network. Their approach is based on a potential-field approach and nodes are treated as virtual particles, subject to virtual forces. The concept of controlled mobility is also used by [18] by considering a hybrid network with both static and mobile nodes, which fully exploits the movement capability of the sensors. In [1] authors consider jointly mobility and routing algorithms, but the solution they proposed is based on the base station as the only controlled mobile device. In this work we are interested to consider the mobility of devices in a controlled fashion along with the routing algorithm. Specifically, we base our proposal on the analytical results obtained in [6, 8] that show the potential advantages obtainable through controlled mobility. In [8], it was not possible to take into account all the constraints of a real routing algorithm and, for this reason, we implemented RPCM in a well-known simulation tool, ns2.

3. Practical Applications of Controlled Mobility

In this section we will give some practical applications of Controlled Mobility. There is an interesting real application of controlled mobility to reduce power consumption realized by Intel, that showed that a few motes equipped with 802.11 wireless capabilities can be added to a sensor network in order to act as wireless hubs [19]. Load balancing through controlled mobility in wireless sensor networks is studied by Luo and Hubaux in [1]. The nodes closest to the base station are the bottleneck in the forwarding of data. A base station, which moves according to an arbitrary trajectory, continuously changes the closest nodes and solves the problem. The authors find the best mobility pattern for the base station in order to ensure an even balance of network load on the nodes. Recently, Intel installed a small sensor network in a vineyard in Oregon and a second one in Northern California to monitor microclimates and Redwood canopies, respectively. In this context, the mobile sensors had to measure, share, and combine the collected data regarding temperature, humidity, and other factors. At the gateway, the data was interpreted and used to help avoid mold, frostbite, and other agricultural problems. The agricultural environment is just an example of how a sensor network can take advantage of mobile robot's capabilities for data gathering and interpretation. Furthermore, sensors often need to be recalibrated and a robot could act as a gateway to the sensor network and perform calibration tasks. An interesting application of sensor devices with mobile robots, related to coverage, is for people with disabilities [20, 21]. In fact, technical devices, such as mobile robots, can aid personal assistance. A mobile robot requires a sensing system in order to control the path of movement and the surrounding environment. The robot can be equipped with sensors for detecting distances and obstacles. Another work worth mentioning has been conducted by Kansal et al. in [22]. The authors do not present an algorithm for the optimization of some parameters; instead they propose Morph as a new vision of sensor networking, where controlled mobility is considered as an additional design dimension of the communication protocols. They argue that, in Morph, controlled mobility can be employed for the sustainability of the network, which consists in both alleviating the lack of resources and improving the network performance.

4. A New Routing Protocol Based on Controlled Mobility (RPCM)

The network scenario we consider consists of all nodes able to move and control their movements. The communication strategy used in this work considers different paths for each pair source-destination nodes and the best path is selected to be used for data communication. The choice of the best path is based on a metric. Specifically, in this context we consider the path whose nodes have to travel the total minimum distance to reach the evenly spaced positions on the straight line between the source-destination pair. The same metric has been proposed in an optimization model in [8], where the model determines the placement that minimizes the total travelled distance of the sensor nodes. This kind of movement could be useful in all situations where a mobility too high can be dangerous (i.e., military applications such as minefields monitoring) or difficult because of a high presence of obstacles.

4.1. Some Assumptions

Assume that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq7_HTML.gif nodes deployed randomly in a square area. All the nodes have the same transmission range. If two nodes are within each other's transmission range, they can communicate directly and they are neighbours. Otherwise they have to rely on intermediate nodes to relay the messages for them. Any node in the network may have data to be sent to any other node. The path from a source to a destination may not be direct but involves other intermediate nodes. We assume that several paths, from the source https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq8_HTML.gif to the destination https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq9_HTML.gif , have already been discovered by a routing protocol. Specifically, we apply the Route Request phase of the AODV protocol, with some additional information such as the nodes' position. We need this information for implementing our protocol as explained in the follow. We also assume that nodes move only in order to reach specific locations when they belong to a path. Our mobility control scheme is not directly incorporated into a specific layer of the classical ISO/OSI layer structure (i.e., physical layer, routing layer, etc.) but is orthogonal to this kind of subdivision as we can observe in Figure 1. In fact, controlled mobility could be exploited at different levels.

4.2. The Routing Protocol Based on Controlled Mobility

In this section we detail the routing protocol along with the mobility algorithm. Assume that a source node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq10_HTML.gif needs to establish a communication with a node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq11_HTML.gif . The source node will broadcast a Request Packet, which will be forwarded by its neighbours. Each node includes in the request packet its geographical coordinates in the network. Once the Request Packet reaches the correct destination, the node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq12_HTML.gif will not send a Reply Packet immediately, but it will wait for processing other requests. In order to avoid unuseful delay, a destination node will wait for a specific time, and then it will send a reply packet by building the best selected path. The metric we introduced to evaluate the goodness of a path is based on the total travelling distance. In practice, the algorithm will choose the path that minimizes the sum of nodes' travelled distances. Other metrics, such as the minimization of the maximum travelled distance, could be considered and implemented. In Figure 2 the request phase of the routing protocol is explained. We can observe that the source node starts a request phase by sending a Route Request and every intermediate node stores the position of the previous node, the ID of the previous node, and rebroadcasts the request packet. The mechanisms to avoid loop and control packet storms are the same as in AODV. Once the Request Packet reaches the destination node, if the request is processed for the first time, the destination node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq13_HTML.gif activates a timer and continues to process other Request Packets of the same source node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq14_HTML.gif . Otherwise, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq15_HTML.gif compares the previous path with the current path and selects the best one (in this case the path whose nodes travel the minimum total distance). Once the timer expires, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq16_HTML.gif sends a Reply Packet to the first node of the selected path in the backward direction. This node computes its new position depending on the number of nodes involved in the path (this information is sent from the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq17_HTML.gif node) and forwards the Reply Packet to the following node in the backward direction (this information has been stored in the Routing Table during the Route Request phase). Hence, this node will move to the evenly spaced position on the straight line between the source and the destination. When each relay node knows its position, the optimal configuration of relay nodes for an active flow is established as in [6, 23]. It is worth to note that in this case the solutions found in [6, 23] are the same, because the initial energy of nodes is the same. In practice, the nodes will reach the evenly spaced positions on the straigth line between the source and the destination. In Figure 3 the Reply phase is explained. Once the source node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq18_HTML.gif receives the Reply Packet, all the nodes belonging to the path have already moved to their new position and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq19_HTML.gif will start the data communication flow.
In practice, nodes compute their new positions based on the total number of nodes belonging to the current path and considering they have to be evenly distributed on the straight line between the source and the destination. The Mobility Algorithm can be summarized as follows.
Mobility Algorithm
Mobility control at each relay node.
(i)
Each node acquires the information of the new position it has to reach when the reply of the request is received. The new position is on the straight line between the source and the destination and each node will be positioned in an evenly distributed fashion.
 
(ii)
Each node that received a reply packet moves towards its new position.
 
In [23], authors had to introduce a damping factor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq20_HTML.gif to avoid oscillations in the network. In fact, nodes exchange local position information with neighbours and some iteration of the distributed algorithm is needed to reach the final optimal displacement of the nodes. Thus, we do not need to introduce any damping factor, because nodes already have all the information they need to reach the new location. Furthermore, we do not have any convergence concern. In fact, nodes start to move once they receive the reply packet and reach the final destination.
From the description of the routing protocol is clear the reason why no damping factor is needed, even if our protocol is totally distributed and the Mobility Control Algorithm is orthogonal to the network layer. The new protocol requires few changes to the classical schemes; the information that need to be added are as follows:
(i)
in the Request Packet: the positions and the IDs of source and forwarding nodes;
 
(ii)
in the Reply Packet: the positions of the destination node and the hop number of the source-destination path;
 
(iii)
in the nodes' routing tables: source's position and hop number of the source-destination path.
 
The effect of applying the RPCM protocol is shown in Figures 4 and 5.
In Figure 4 we can observe the selection of many potential paths for the pair source-destination, nodes 0 and 99, respectively. Specifically, the paths discovered are 0-53-89-72-38-99, 0-77-15-8-98-99, 0-16-70-71-19-99, 0-12-9-74-97-99, and 0-32-17-38-99. Among the different paths, the one whose nodes travel the total minimum distance is chosen. In this case the selected path based on our metric is 0-32-17-38-99. When the reply phase begins, the first node that receives the reply packet is node 38, it computes its new location and sends the reply packet to the node 17, and then it moves towards its best location. In similar fashion, node 17 receives the reply packet from the node 38, computes its new destination, sends the reply packet and moves to the new location, and so forth. Once node 0 receives the reply packet from the node 32, then all the nodes belonging to the path (in this case, nodes 38, 17, and 32) already moved to their new positions and node 0 starts the data communication flow to node 99. Note that source node and destination do not move.

5. Simulation and Results

As we already said in the previous subsections, the optimization model including the minimization of the nodes' total travelled distances along with other possible metrics has been introduced in [8]. Unfortunately in that analytical work, many practical details could not be taken into consideration. For this reason, we chose to implement one of those possible metrics in a complete routing algorithm and simulate its behaviour in a well-known network simulator: ns2, in order to evaluate the realistic effects of controlled mobility in the routing process in comparison with the AODV protocol.

5.1. Reference Environment

In Table 1, all the most important environment and simulator parameters are reported. We chose to implement our algorithm in a square area of 500 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq21_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq22_HTML.gif 500 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq23_HTML.gif , where a variable number of wireless nodes has been randomly deployed, according to the reported nodes density ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq24_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq25_HTML.gif , which correspond to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq26_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq27_HTML.gif ). Also the number of concurrent flows is considered variable. Depending on the density, nodes have a different transmission area to cover. All nodes have initially the same energy and transmit at the same transmission rate; when they move, the energy expenditure https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq28_HTML.gif is proportional to the travelled distance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq29_HTML.gif by a movement factor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq30_HTML.gif . When nodes mobility is allowed, the set of limitations becomes enriched with new elements. In fact, the definitions of an energy model related with the motion of nodes and of another model related with the communication needed for their coordination are required. For the former a simplified model is a distance proportional model https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq31_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq32_HTML.gif is the distance to cover, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq33_HTML.gif takes into account the kinetic friction; while https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq34_HTML.gif represents the energy necessary to win the static friction, both these constants depend on the environment (harsh or smooth ground, air, surface or deep water). For the latter, usually the energy required to send one bit at the distance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq35_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq36_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq37_HTML.gif is the exponent of the path loss https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq38_HTML.gif depending on the environment and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq39_HTML.gif is a constant [J/(bits https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq40_HTML.gif )]. Regarding the simulator, we used a two-ray ground propagation model and both the simulated routing protocols (AODV and RPCM) are mounted on top of the IEEE 802.11 MAC. The energy spent in sleep, wake-up, and active mode is reported in the table. The output parameters taken in consideration are as follows:
Table 1
Evaluation parameters.
Environment
 
Field Area ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq41_HTML.gif )
500 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq42_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq43_HTML.gif 500 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq44_HTML.gif
Nodes Density ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq45_HTML.gif )
[2 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq46_HTML.gif 6] https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq47_HTML.gif
Flows Number ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq48_HTML.gif )
[4 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq49_HTML.gif 12]
Maximum Transmission Radius ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq50_HTML.gif )
1/(2 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq51_HTML.gif ) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq52_HTML.gif
Initial Residual Energy Range ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq53_HTML.gif )
100 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq54_HTML.gif
Transmission Rate ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq55_HTML.gif )
32 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq56_HTML.gif
Movement Constant ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq57_HTML.gif )
0.1 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq58_HTML.gif
Simulator
 
Propagation Model
Two-Ray Ground
MAC Type
IEEE 802.11
Packet Size
512  https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq59_HTML.gif
set val(rxPower)
0.00175  https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq60_HTML.gif
set val(txPower)
0.00175  https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq61_HTML.gif
Wake-Up Time
0.005  https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq62_HTML.gif
Number of runs
10
Statistical confidence interval
95%
(i)
throughput,
 
(ii)
delay,
 
(iii)
energy spent for received packet.
We ran 10 simulations for each scenario and average the results in order to reach the 95% of statistical confidence.
 

5.2. Performance Evaluation

We performed two simulation campaigns: the first consists of increasing nodes density for a fixed number of flows ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq63_HTML.gif ), in the second the number of flows varies between 4 and 12 and the nodes density is set to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq64_HTML.gif . Figures 6, 7, and 8 show the performance of the two algorithms for the first simulation campaign in terms of throughput, delay and energy spent for received packed, respectively.
As we can see, for all the output parameters our scheme out performs the AODV achieving 30%, 80% and 40% of improvements for throughput, delay and energy spent for received packet, respectively. Furthermore, the behavior of the RPCM scheme is more robust and scalable than the AODV, since it is almost constant for all output parameters when density, while in the AODV scheme, delay and energy spent are affected by the nodes density.
Figures 9, 10, and 11 show the performance of the two algorithms for the second simulation campaign in terms of throughput, delay and energy spent for received packed, respectively.
Also when the number of simultaneous flows varies between 4 and 12, the throughput of RPCM results 30% higher than the AODV on average. The delay is still lower for the RPCM, even if, when the number of flows increases, the improvement tends to reduce. From Figures 9 and 10 we see that, for RPCM, we can determine a "threshold" on the number of concurrent flows, until it is below 6, the performance is constant with very high throughputs and very low delays, when the number of flows is higher than 6, then the performance worsens.This result gives the designer a good hint about the number of concurrent flows to allow into the network, in order to have high performance. At least, the energy spent for received packet shows two different trends for AODV and RPCM, the first is not very affected by the number of flows and oscillates between 0.012 and 0.015 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq71_HTML.gif while the second shows a negative exponential bahavior for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq72_HTML.gif the energy spent on average is 0.025 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq73_HTML.gif but it reduces till 0.005 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F315381/MediaObjects/13638_2009_Article_1864_IEq74_HTML.gif when the number of flows increases.

6. Conclusion

In this work we focused on both the novel concept of controlled mobility and the routing algorithms. The concept of controlled mobility has been introduced in some previous recent work, but it has only been considered from an analytical point of view or in a marginal fashion, such as only a mobile base station in the network. In this paper we focus on the controlled mobility as a new design dimension and we exploit it by implementing a new routing protocol based on controlled mobility. The most important aspect of this is related to the evaluation performance based on the usage of a well-known simulation tool, ns2. In fact, in previous works the analytical approach limited the use of controlled mobility while in this context, thanks to the simulator, we have been able to consider many realistic aspects of the network, while a routing protocol is implemented. Extensive simulations have been conducted and simulation results have shown how the new routing protocol outperforms a well-known routing algorithm, the AODV. Furthermore, results obtained suggest that other metrics can be easily realized and tested by simulation. In fact, as future works, we intend to study other optimization metrics such as the maximization of the network lifetime or the minimization of the average (or the maximum) distance travelled by nodes belonging to a path.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Luo J, Hubaux J-P: Joint mobility and routing for lifetime elongation in wireless sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societes (INFOCOM '05), March 2005, Miami, Fla, USA 3: 1735-1746. Luo J, Hubaux J-P: Joint mobility and routing for lifetime elongation in wireless sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societes (INFOCOM '05), March 2005, Miami, Fla, USA 3: 1735-1746.
2.
go back to reference Chakeres ID, Belding-Royer EM: AODV routing protocol implementation design. Proceedings of the International Workshop on Wireless Ad Hoc Networking (WWAN '04) in Conjunction with the 24th International Conference on Distributed Computing Systems (ICDCS '04), March 2004, Tokyo, Japan 24: 698-703. Chakeres ID, Belding-Royer EM: AODV routing protocol implementation design. Proceedings of the International Workshop on Wireless Ad Hoc Networking (WWAN '04) in Conjunction with the 24th International Conference on Distributed Computing Systems (ICDCS '04), March 2004, Tokyo, Japan 24: 698-703.
3.
go back to reference Perkins CE, Belding-Royer EM, Chakeres I: Ad hoc on-demand distance vector (AODV) routing. in IETF Internet draft, draft-perkins-manet-aodvbis-00.txt, October 2003 Perkins CE, Belding-Royer EM, Chakeres I: Ad hoc on-demand distance vector (AODV) routing. in IETF Internet draft, draft-perkins-manet-aodvbis-00.txt, October 2003
4.
go back to reference Park VD, Corson MS: A highly adaptive distributed routing algorithm for mobile wireless networks. Proceedings of the 16th Annual Joint Conference of the IEEE Computer and Communications Societes (INFOCOM '97), April 1997, Kobe, Japan 3: 1405-1413. Park VD, Corson MS: A highly adaptive distributed routing algorithm for mobile wireless networks. Proceedings of the 16th Annual Joint Conference of the IEEE Computer and Communications Societes (INFOCOM '97), April 1997, Kobe, Japan 3: 1405-1413.
5.
go back to reference Singh S, Woo M, Raghavendra CS: Power-aware routing in mobile ad hoc networks. Proceedings of the 4th Annual IEEE/ACM International Conference on Mobile Compuetr and Network (MOBICOM '98), October 1998, Dallas, Tex, USA 181-190.CrossRef Singh S, Woo M, Raghavendra CS: Power-aware routing in mobile ad hoc networks. Proceedings of the 4th Annual IEEE/ACM International Conference on Mobile Compuetr and Network (MOBICOM '98), October 1998, Dallas, Tex, USA 181-190.CrossRef
6.
go back to reference Natalizio E, Loscrí V, Viterbo E: Optimal placement of wireless nodes for maximizing path lifetime. IEEE Communications Letters 2008, 12(5):362-364.CrossRef Natalizio E, Loscrí V, Viterbo E: Optimal placement of wireless nodes for maximizing path lifetime. IEEE Communications Letters 2008, 12(5):362-364.CrossRef
7.
go back to reference Natalizio E, Loscrí V, Guerriero F, Violi A: Energy spaced placement for bidirectional data flows in wireless sensor network. IEEE Communications Letters 2009, 13(1):22-24.CrossRef Natalizio E, Loscrí V, Guerriero F, Violi A: Energy spaced placement for bidirectional data flows in wireless sensor network. IEEE Communications Letters 2009, 13(1):22-24.CrossRef
8.
go back to reference Loscrí V, Natalizio E, Costanzo C, Guerriero F, Violi A: Optimization models for determining performance benchmarks in wireless sensor networks. Proceedings of the 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM '09), June 2009, Athens, Greece 333-338. Loscrí V, Natalizio E, Costanzo C, Guerriero F, Violi A: Optimization models for determining performance benchmarks in wireless sensor networks. Proceedings of the 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM '09), June 2009, Athens, Greece 333-338.
10.
go back to reference Grossglauser M, Tse DNC: Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Transactions on Networking 2002, 10(4):477-486. 10.1109/TNET.2002.801403CrossRef Grossglauser M, Tse DNC: Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Transactions on Networking 2002, 10(4):477-486. 10.1109/TNET.2002.801403CrossRef
11.
go back to reference El Gamal A, Mammen J, Prabhakar B, Shah D: Throughput-delay trade-off in wireless networks. Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societes (INFOCOM '04), March 2004, Hong Kong 1: 464-475. El Gamal A, Mammen J, Prabhakar B, Shah D: Throughput-delay trade-off in wireless networks. Proceedings of the 23th Annual Joint Conference of the IEEE Computer and Communications Societes (INFOCOM '04), March 2004, Hong Kong 1: 464-475.
12.
go back to reference Bansal N, Liu Z: Capacity, delay and mobility in wireless ad hoc networks. Proceedings of the 22th Annual Joint Conference of the IEEE Computer and Communications Societes (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1553-1563. Bansal N, Liu Z: Capacity, delay and mobility in wireless ad hoc networks. Proceedings of the 22th Annual Joint Conference of the IEEE Computer and Communications Societes (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1553-1563.
13.
go back to reference de Moraes RM, Sadjadpour HR, Garcia-Luna-Aceves JJ: Mobility-capacity-delay trade-off in wireless ad hoc networks. Ad Hoc Networks 2006, 4(5):607-620. 10.1016/j.adhoc.2005.06.005CrossRef de Moraes RM, Sadjadpour HR, Garcia-Luna-Aceves JJ: Mobility-capacity-delay trade-off in wireless ad hoc networks. Ad Hoc Networks 2006, 4(5):607-620. 10.1016/j.adhoc.2005.06.005CrossRef
14.
go back to reference Lee E, Park S, Lee D, Choi Y, Yu F, Kim S-H: A predictable mobility-based communication paradigm for wireless sensor networks. Proceedings of Asia-Pacific Conference on Communications (APCC '07), 2007 373-376. Lee E, Park S, Lee D, Choi Y, Yu F, Kim S-H: A predictable mobility-based communication paradigm for wireless sensor networks. Proceedings of Asia-Pacific Conference on Communications (APCC '07), 2007 373-376.
15.
go back to reference Zhi Z, Guanzhong D, Lixin L, Yuting Z: Relay-based routing protocols for space networks with predictable mobility. International Conference on Space Information Technology, 2005, Proceedings of SPIE 5985: Zhi Z, Guanzhong D, Lixin L, Yuting Z: Relay-based routing protocols for space networks with predictable mobility. International Conference on Space Information Technology, 2005, Proceedings of SPIE 5985:
16.
go back to reference Merugu S, Ammar M, Zegura E: Routing in space and time in networks with predictable mobility. Georgia Institute of Technology, Atlanta, Ga, USA; 2004. Merugu S, Ammar M, Zegura E: Routing in space and time in networks with predictable mobility. Georgia Institute of Technology, Atlanta, Ga, USA; 2004.
17.
go back to reference Howard A, Mataric M, Sukhatme G: Mobile sensor network deployment using potential field: a distributed scalable solution to the area coverage problem. Proceedings of the 6th International Symposium on Distributed Autonomous Robotic Systems (DARS '02), June 2002, Fukuoka, Japan 299-308. Howard A, Mataric M, Sukhatme G: Mobile sensor network deployment using potential field: a distributed scalable solution to the area coverage problem. Proceedings of the 6th International Symposium on Distributed Autonomous Robotic Systems (DARS '02), June 2002, Fukuoka, Japan 299-308.
18.
go back to reference Wang D, Liu J, Zhang Q: Probabilistic field coverage using a hybrid network of static and mobile sensors. Proceedings of the International Workshop on Quality of Service (IWQoS '07), June 2007, Chicago, Ill, USA 56-64. Wang D, Liu J, Zhang Q: Probabilistic field coverage using a hybrid network of static and mobile sensors. Proceedings of the International Workshop on Quality of Service (IWQoS '07), June 2007, Chicago, Ill, USA 56-64.
19.
go back to reference Kling RM: Intel motes: advanced sensor network platforms and applications. Proceedings of the IEEE MTT-S International Microwave Symposium Digest, June 2005, Long Beach, Calif, USA 2005: 365-368. Kling RM: Intel motes: advanced sensor network platforms and applications. Proceedings of the IEEE MTT-S International Microwave Symposium Digest, June 2005, Long Beach, Calif, USA 2005: 365-368.
20.
go back to reference Mahoney RM: Robotic products for rehabilitation: status and strategy. In Proceedings of the International Conference on Rehabilitation Robotics (ICORR '97), April 1997, Bath, UK. The Bath Institute of Medical Engineering, Bath University; 12-22. Mahoney RM: Robotic products for rehabilitation: status and strategy. In Proceedings of the International Conference on Rehabilitation Robotics (ICORR '97), April 1997, Bath, UK. The Bath Institute of Medical Engineering, Bath University; 12-22.
21.
go back to reference Topping MJ, Hegarty JR: The potential of low-cost computerised robot arms as aids to independence for people with physical disability. Proceedings of the 1st International Workshop Domestic Robots and the 2nd International Workshop on Medical and Health Care Robotics, 1989, London, UK 303-307. Topping MJ, Hegarty JR: The potential of low-cost computerised robot arms as aids to independence for people with physical disability. Proceedings of the 1st International Workshop Domestic Robots and the 2nd International Workshop on Medical and Health Care Robotics, 1989, London, UK 303-307.
22.
go back to reference Kansal A, Rahimi M, Estrin D, Kaiser WJ, Pottie GJ, Srivastava MB: Controlled mobility for sustainable wireless sensor networks. Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON '04), October 2004, Santa Clara, Calif, USA 1-6. Kansal A, Rahimi M, Estrin D, Kaiser WJ, Pottie GJ, Srivastava MB: Controlled mobility for sustainable wireless sensor networks. Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON '04), October 2004, Santa Clara, Calif, USA 1-6.
23.
go back to reference Goldenberg DK, Lin J, Morse AS, Rosen BE, Yang YR: Towards mobility as a network control primitive. Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '04), 2004, Tokyo, Japan 163-174.CrossRef Goldenberg DK, Lin J, Morse AS, Rosen BE, Yang YR: Towards mobility as a network control primitive. Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '04), 2004, Tokyo, Japan 163-174.CrossRef
Metadata
Title
Simulations of the Impact of Controlled Mobility for Routing Protocols
Authors
Valeria Loscrí
Enrico Natalizio
Carmelo Costanzo
Publication date
01-12-2009
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2010/315381

Other articles of this Issue 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Go to the issue

Premium Partner