uu.seUppsala University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Comparing wireless flooding protocols using trace-based simulations
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. (Communication Research)
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems. (Communication Research)
2013 (English)In: EURASIP Journal on Wireless Communications and Networking, ISSN 1687-1472, E-ISSN 1687-1499, 169:1-15 p.Article in journal (Refereed) Published
Abstract [en]

Most wireless multi-hop networks, such as ad hoc networks and wireless sensor networks, need network-wide broadcasting, which is best done with a flooding protocol. In this article, we use packet trace information from a real test-bed network to define a simulator for flooding protocol performance studies. Five protocols are compared using the simulator. Trace-based simulations promise to have the benefits of the simulator, such as reducing required work effort and repeatability but still produce results close to the real test-bed or deployment. We propose and evaluate different approaches on how to use collected trace data and how to tune the parameters to achieve the best possible accuracy in comparison with actual test-bed measurements. We study the resulting accuracy of the model so that performance studies know with what confidence a certain conclusion can be made. Using the new trace-based model and knowing its accuracy, we compare the five flooding protocols to gain additional insights into their performance. Finally, by modifying the trace data, we study how real-world effects, such as links with in-between qualities and asymmetric links, influence the different flooding protocols.

Place, publisher, year, edition, pages
2013. 169:1-15 p.
National Category
Computer Engineering Communication Systems
Research subject
Computer Science with specialization in Computer Communication
Identifiers
URN: urn:nbn:se:uu:diva-205410DOI: 10.1186/1687-1499-2013-169ISI: 000321777400001OAI: oai:DiVA.org:uu-205410DiVA: diva2:642127
Projects
ProFuN
Funder
Swedish Foundation for Strategic Research
Available from: 2013-06-19 Created: 2013-08-16 Last updated: 2017-12-06Bibliographically approved

Open Access in DiVA

fulltext(1066 kB)285 downloads
File information
File name FULLTEXT01.pdfFile size 1066 kBChecksum SHA-512
d2eba6e525418ccbc966549b1e613b88b594e8afef9bfdd65919f57442e580bc33856ad4edac52c1be5c22906bfe2066dbb1e252c8af160216409dbfd00a29d2
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Authority records BETA

Jacobsson, MartinRohner, Christian

Search in DiVA

By author/editor
Jacobsson, MartinRohner, Christian
By organisation
Computer Systems
In the same journal
EURASIP Journal on Wireless Communications and Networking
Computer EngineeringCommunication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 285 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 426 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf