NetSim v14.4 Help

Contents:

  • Introduction
  • Simulation GUI
    • NetSim MANET Network Setup
      • Deployment Architecture
    • Fast Configuration
      • Device Placement
    • Create Scenario
      • Wireless Node
      • Bridge Node
      • Link
    • Set Node, Link and Application Properties
    • Enable Packet Trace, Event Trace (Optional)
    • Enable protocol specific logs and plots
    • GUI Configuration Parameters
    • Run Simulation
  • Model Features
    • Ad hoc On Demand Distance Vector Routing
    • Dynamic Source Routing (DSR)
      • Using Link-Layer Acknowledgements
      • Using Network-Layer Acknowledgements
      • Why do we see continuous RREQ and RREP packets in DSR?
    • AODV/DSR Metrics
    • Zone Routing Protocol (ZRP)
    • Optimized Link State Routing Protocol (OLSR)
      • One Hop neighbor
      • Two Hop neighbor
      • Multipoint Relays (MPR)
      • Topology discovery
      • TC Message Format
      • Core Functionality of OLSR
      • Link Sensing
      • Neighbor detection
      • MPR Selection
      • TC message
      • Route Calculation
    • Energy model in MANETs
    • Mobility models in NetSim
      • Random Walk Mobility Model
      • Random Waypoint Mobility Model
      • Group Mobility Model
      • Pedestrian Mobility Model
      • File Based Mobility Model
    • Omni and sector (directional) antennas
      • Limitations
    • How are packet collisions modelled in NetSim?
    • How is packet error decided in NetSim
    • Broadcast in MANETs
    • Radio measurement log file and plots
  • Featured Examples
    • AODV Routing
      • Network Settings
    • ZRP-IARP
      • Network Settings
      • Output
    • ZRP-IERP
      • Network Settings
      • Output
    • MANET-OLSR
      • Part-1: MPR Table Formation in NetSim
      • Part-2: NDP and TC Messages in OLSR
    • Comparative analysis of AODV and OLSR in static and mobility scenarios
      • Introduction
      • Simulation Setup
      • Network Configuration
      • Scenario Setup
      • Steps for Control Traffic Overhead Calculation
      • Results and Discussion
      • Impact of Varying Velocity on Routing Protocol Performance
      • Velocity cases
    • Multiple MANETS
      • Network Settings
      • Output
    • Energy consumption in MANETs
      • Network Setup
      • Energy Consumption
      • Energy consumption calculations
      • Case#1: Results and discussion
      • Case #2: Results and discussion
      • Case #3: Results and discussion
    • Application throughput variation with node mobility
      • Network Settings
      • Output
      • Inference
    • Performance of range based pathloss model in MANETs
      • Introduction
      • Case 1: Range Based Pathloss. Nodes Within Transmission Range.
      • Case 2: Range Based Pathloss. Nodes Beyond Transmission Range.
      • Case 3: Range Based Pathloss with Node Mobility.
      • Case 4: Range Based Pathloss with Multi-hop Communication.
      • Case 5: Range Based Pathloss with Multi-hop Communication and Node Mobility
      • Case 6: Range Based Pathloss. Nodes within range and beyond range. Broadcast Application
      • Case 7: Range Based Pathloss. Transmission Failure due to Interference.
      • Case 8: Range Based Pathloss. Carrier sense (CS) blocking due to neighboring transmissions.
  • References
  • Latest FAQs
NetSim v14.4 Help
  • Featured Examples

Featured Examples

Sample configuration files for all networks are available in Examples Menu in NetSim Home Screen. These files provide examples on how NetSim can be used – the parameters that can be changed and the typical effect it has on performance.

AODV Routing

The Ad hoc On Demand Distance Vector Routing (AODV) protocol defines 3 message types:

  • Route Requests (RREQs): RREQ messages are used to initiate the route-finding process.

  • Route Replies (RREPs): RREP messages are used to finalize the routes.

  • Route Errors (RERRs): RERR messages are used to notify the network of a link breakage in an active route.

The route discovery process involves ROUTE REQUEST (RREQ) and ROUTE REPLY (RREP) packets. The source node initiates the route discovery process using RREQ packets. The generated route request is forwarded to the neighbors of the source node and this process is repeated till it reaches the destination. On receiving an RREQ packet, an intermediate node with route to destination or the destination node generates an RREP containing the number of hops required to reach the destination. All intermediate nodes that participate in relaying this reply to the source node create a forward route to destination [3].

RERR message processing is initiated when Node detects a link break for the next hop of an active route or receives a data packet destined for a node for which it has no (active) route.

Open NetSim and Select Examples-> Mobile Ad hoc Networks-> MANET AODV then click on the tile in the middle panel to load the example as shown in below screenshot Figure-1.

_images/Figure-1.png

Figure-1: List of scenarios for the example of MANET AODV

The following network diagram illustrates, what the NetSim UI displays when you open the example configuration file see Figure-2

_images/Figure-2.png

Figure-2: Network set up for studying the MANET AODV

Network Settings

  1. A network scenario is designed in NetSim GUI, consisting of 5 wireless nodes omni ants, named N1, N2, N3, N4, and N5, and one link in the "Standard MANET" of the "Mobile Ad hoc Network" library.

  2. In the general properties of N3, Wireshark Capture is set to Online. To configure any properties in the nodes, click on the node, expand the property panel on the right side, and change the properties as mentioned in the steps.

  3. In the position properties, set the mobility model as No-Mobility for all devices present in the GUI.

  4. The Medium Access Protocol is set to DCF in Interface 1(Wireless)-> Datalink layer of all the devices.

  5. Click on link and expand property panel on the right, and set the Channel Characteristics : Path loss only; Path loss model: Log Distance; Path loss exponent: 3.1.

  6. The routing protocol in the network layer is set to AODV for all nodes. As this is a global property, changing it on one node will affect all nodes.

  7. Packet trace is enabled by clicking on the configure report tab, allowing us to track the route that the packets have taken to reach the destination based on AODV.

  8. Configure the CBR application between two nodes by clicking on the set traffic tab from the ribbon at the top, selecting N1 as the source and N2 as the destination. Click on the created application and set the transport protocol to UDP, keeping the other properties as default.

  9. Run simulation for 10 seconds.

Output: Open packet trace from simulation results window. The packet flow can be observed by filtering Control Packet Type/App Name to AODV RREQ , AODV RREP and AODV RREP (Hello) as shown below.

_images/Figure-3.png

Figure-3: AODV different control packet in Packet trace

  • Source Node 1 initiates route discovery process using RREQ packets. The generated route request is broadcast to the neighbors of the source node i.e. Node 4.

  • Node 4 broadcasts the RREQ packet to its neighboring nodes i.e., Node 3, Node 1 since Node 4 does not have a route to destination Node 2.

  • Similarly, Node3 broadcasts the RREQ packet to Node 5 and Node 4.

  • Node 5 broadcasts to Node 2 and Node 3.

  • On receiving a RREQ packet, the Destination Node 2 generates a RREP packet and transmits to Node 5, Node 2 -> Node 5, Node 5 -> Node 3, Node 3 -> Node 4, and Node 4->Node 1.

  • After receiving the RREP, the Source Node 1 starts sending Data packets to Node 2 (Node 1 -> Node 4-> Node 3 -> Node 5 -> Node 2). To observe the same, filter the CONTROL PACKET TYPE/APP NAME to APP1_CBR and PACKET ID to 1 in packet trace.

_images/Figure-a.png

In Wireshark, filter AODV packets and select the RREQ packets and expand Ad hoc on-demand distance vector protocol to view the above-mentioned fields of RREQ as shown Figure-4.

_images/Figure-4.png

Figure-4: AODV RREQ control packet in Wireshark

Open Wireshark, filter AODV packets and select the RREP packets and expand Ad hoc on-demand distance vector protocol to view the above-mentioned fields of RREP as shown Figure-5.

_images/Figure-5.png

Figure-5: AODV RREP control packet in Wireshark

ZRP-IARP

Open NetSim and select Examples->Mobile Ad hoc Networks->ZRP IARP then click on the tile in the middle panel to load the example as shown in below screenshot Figure-6.

_images/Figure-6.png

Figure-6: List of scenarios for the example of ZRP-IARP

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file see Figure-7.

_images/Figure-7.png

Figure-7: Network set up for studying the ZRP-IARP

Network Settings

  1. Set grid length as 600m*300m from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. A network scenario is designed in NetSim GUI consisting of 5 wireless nodes and one ad-hoc link in the “Standard MANET” module of MANET Network library.

  3. To configure any properties in the nodes, click on the node, expand the property panel on the right side, and change the properties as mentioned in the below steps.

  4. In the position properties set mobility model as no mobility for all devices present in GUI.

  5. The Medium access protocol was set to DCF in Interface 1(wireless)-> Datalink layer of all Wireless nodes.

  6. The routing protocol in the network layer is set to ZRP for all nodes. As this is a global property, changing it on one node will affect all nodes.

  7. Click on link and expand property panel on the right and set the channel characteristics: path loss only, path loss model: log distance, path loss exponent: 3 under medium property.

  8. Configure CBR application from set traffic tab in ribbon on the top between wireless node 1 to wireless node 2 , click on the created application, expand the property panel on the right and set transport protocol to UDP

  9. Enable packet trace from configure reports tab in ribbon on the top.

  10. Run simulation for 10 seconds.

Output

Open Packet trace from simulation results window and observe Control Packet Type/App Name.

_images/Figure-8.png

Figure-8: Packet Trace

Users can see only NDP Hello Message and OLSR TC MESSAGE since the destination node is within the zone. The ZRP framework proactively maintains local routing information (routing zones) based on periodic exchanges of neighbor discovery messages.

ZRP-IERP

Open NetSim and Select Examples -> Mobile Ad hoc Networks -> ZRP IERP then click on the tile in the middle panel to load the example as shown in below screenshot Figure-9.

_images/Figure-9.png

Figure-9: List of scenarios for the example of ZRP-IERP

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file see Figure-10.

_images/Figure-10.png

Figure-10: Network set up for studying the ZRP-IERP

Network Settings

  1. Set grid length as 600m*300m from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. A network scenario is designed in NetSim GUI consisting of 12 wireless nodes and one ad-hoc link in the “Standard MANET” of MANET Network library.

  3. To configure any properties in the nodes, click on the node, expand the property panel on the right side, and change the properties as mentioned in the below steps.

  4. In the position properties set mobility model as No mobility for all devices present in GUI.

  5. The medium access protocol was set to DCF in Interface 1(wireless)-> Datalink layer of all wireless nodes

  6. The routing protocol in the network layer is set to ZRP for all nodes. As this is a global property, changing it on one node will affect all nodes.

  7. Click on link and open property panel on the right and set the Channel characteristics: Log distance, Path loss exponent: 2.9.

  8. Configure CBR application from wireless nodes 1 to wireless nodes 12 by clicking on set traffic tab in ribbon on the top. Click on the created application and set the transport protocol to UDP, keeping the other properties as default.

  9. Enable Packet Trace from configure reports tab in the ribbon on the top.

  10. Run simulation for 10 seconds.

Output

Open packet trace and filter Control Packet Type/App Name to IERP route request. In the below packet trace, node-1 is sending IERP route request packets to its peripheral nodes 2 and 3 since the destination is not present in node1’s zone. Similarly, Node 2 transmits IERP route request packets to node 5 and 7 and node 3 transmits to node 4. To observe the IERP route request flow from the respective nodes filter the Transmitter Id to Node 1, Node 2 and Node 3 alone.

_images/Figure-11.png

Figure-11: Packet Trace

Node 7 generates an IERP Route Reply packet in response to the IERP Route Request since the destination node, Node 12, is present in the Node 7 zone. IERP Route Reply packet routes through Node 7 🡪 Node 2 and Node 2 🡪 Node 1. And the data packet routes through Node 1🡪 Node 2, Node 2 🡪 Node 7, Node 7 🡪 Node 9 and Node 9 🡪 Node 12.

_images/Figure-12.png

Figure-12: Packets take the route 1 > 2 > 7 > 9 > 12 when running ZRP-IERP

MANET-OLSR

Part-1: MPR Table Formation in NetSim

Introduction

In OLSR, only a subset of preselected nodes called MPR (Multi-Point Relays) are used to perform topological advertisements. Control messages (containing e.g. routing information) are broadcast and forwarded only by MPRs. This leads to a reduction in the number of transmitter nodes, in the overhead and in useless receptions of messages on nodes. The well-known storm problem due to broadcasting is avoided.

Creation of MPRs in OLSR

Neighbor Discovery

  • Each node in the OLSR network periodically broadcasts HELLO messages to its immediate neighbors. These messages contain information about the node itself and its direct neighbors (1-hop neighbors).

  • From these HELLO messages, a node learns about its 1-hop and 2-hop neighbors (the neighbors of its neighbors).

MPR Selection

  • Goal: The primary goal of selecting MPRs is to ensure that all 2-hop neighbors of a node can be reached through at least one of its MPRs.

  • A node selects a subset of its 1-hop neighbors as MPRs in such a way that these MPRs can cover all of its 2-hop neighbors. This means that every 2-hop neighbor must be reachable via at least one selected MPR.

  • The selection of MPRs is done based on degree of connectivity - nodes with a larger number of 2-hop neighbors might be preferred to cover more ground with fewer MPRs.

Route Calculation Using MPRs

  • Only the nodes selected as MPRs are responsible for forwarding control messages like Topology Control (TC) messages. This significantly reduces the number of transmissions, leading to less network overhead.

  • When a node needs to broadcast a TC message, it only forwards it to its MPRs, which in turn continue the broadcast, ensuring that the entire network receives the update.

_images/Figure-13.png

Figure-13: Illustration of MPR Selection Algorithm [4]. U is the node for which the MPR set is being calculated. Red nodes are the set of isolated nodes. Blue nodes are the set of MPR nodes obtained in the first step. Node E, in purple, is the MPR node selected in the second step. At the end of step 2, the remaining white nodes can be reached either directly or through one of the MPRs.

In the first step, a node, node U (the green node in the diagram), selects relays from its one-hop neighbors (N1). These relays, referred to as MPR1 nodes (highlighted in blue), ensure that all isolated nodes in its two-hop neighborhood (N2), shown in red, are reachable. For instance, node T is considered an isolated node that can only connect to node U through node H. Therefore, node H is elected as an MPR in this step, ensuring node T can reach U in two hops.

In the second step, node U focuses on covering any remaining nodes in its two-hop neighborhood that were not connected by the initial MPR selection. It considers nodes in N2 that remain uncovered, as well as one-hop neighbors not chosen in the first step, like nodes B, F, E, and D. Node U then selects additional MPRs based on their connectivity to maximize coverage. For example, node E is chosen because it can cover multiple nodes in N2 that would otherwise remain isolated. The algorithm concludes when all nodes within two hops of node U are connected, forming an efficient routing set, represented as MPR(U) = {C, E, I, H, G} in the diagram. This process ensures optimal coverage while minimizing redundant transmissions.

3D Network Topology

In the network topology illustrated in Figure-13, connecting lines indicate that two nodes are within communication range of each other, while the absence of a line signifies that the nodes are out of range. The specific distance requirements between nodes create a set of spatial constraints that cannot be satisfied when nodes are arranged only in the X-Y plane. To resolve this geometric limitation, the nodes are positioned in three-dimensional space, utilizing the Z-axis to achieve the required connectivity pattern. The coordinates of the nodes are given in the table below.

Node ID

X

Y

Z

1

500.00

250.00

150

2

500.00

150.00

230

3

571.00

179.00

70

4

600.00

250.00

230

5

571.00

321.00

70

6

500.00

350.00

230

7

429.00

321.00

70

8

399.83

249.15

230

9

429.00

179.00

70

10

394.06

105.73

0

11

382.76

113.09

130

12

571.78

97.90

130

13

614.60

118.89

0

14

624.00

289.00

160

15

564.00

263.00

0

16

545.27

396.84

170

17

455.00

437.00

65

18

393.35

300.00

0

19

352.03

339.62

150

20

330.36

252.03

300

Table-1: XYZ coordinates for the 20 nodes in this scenario

A 3D view of the topology is shown in Figure-14 below.

_images/Figure-14.png

Figure-14: 3-D views of the topology. The range of the nodes is 130m. View-1 shows the network topology from a front right perspective, while View-2 provides a top down perspective.

Network Setup

Open NetSim and Select Examples > Mobile Ad hoc Networks > MANET-OLSR then click on the tile in the middle panel to load the example as shown in below

_images/Figure-15.png

Figure-15: List of scenarios for the example of MANET-OLSR

The following steps were carried out to generate this scenario:

  • Set grid length as 1000 x 500 from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  • Create a scenario with 20 Nodes as shown in Figure 4 13.

  • Click on wireless node, expand the property panel on right and go to Position layer > set Mobility model to No mobility in all nodes.

  • Set the Routing protocol to OLSR in Network layer of wireless nodes. As this is a global property, changing it on one node will affect all nodes.

  • Click on the link, expand link property on right and set the channel characteristics to pathloss and pathloss model as Range based, with range as 130m.

  • Enable OLSR MPR log by clicking on configure reports tab and plots as shown below.

_images/Figure-16.png

Figure-16: Enabling OLSR MPR log

  • Run the simulation for 50 seconds.

Results and Analysis

  • In the Results dashboard, click on logs tab and open OLSR_MPR_Log.csv file.

  • Filter the device name column to U.

_images/Figure-17.png

Figure-17: MPR table formed at node U node

  • Initially, U starts with a single MPR node, "E," at 1598.32 ms. Over time, more nodes are added to the MPR list (e.g., "C", "H", "I", "G"), with some nodes being dropped or rearranged.

  • We finally get the set of MPR nodes as "C; I; G; H; E".

Part-2: NDP and TC Messages in OLSR

Introduction

OLSR Hello Messages (NDP)

The OLSR Hello messages, part of the Neighbor Discovery Protocol (NDP), are exchanged between directly connected nodes. They enable each node to detect its one-hop and two-hop neighbors. These messages are used to establish and maintain neighbor relations, which are necessary for building an updated and accurate network topology. Hello messages include information about link status and the willingness of a node to participate in forwarding traffic for its neighbors. This process helps in selecting Multipoint Relays (MPRs), which minimize the number of transmissions required for routing updates.

OLSR TC Messages

_images/Figure-18.png

Figure-18: OLSR Hello Message Broadcasting all Its Neighbors information with associated Link Type

Network Setup

  • Consider the same scenario as Part -1.

  • Click on wireless node U, expand property panel on right and go to General Layer 🡪 Set Wireshark Capture to Online.

  • Go to Configure Reports tab 🡪 Enable Packet trace.

  • Run the simulation for 50 seconds.

Results and Analysis

Wireshark is generated during the simulation of network.

Neighbor Discovery Process (NDP) or Hello Messages:

The periodic exchange of Hello messages in OLSR dynamically updates the MPR (Multi-Point Relay) list of a device. You can observe this in the OLSR_MPR_Log.csv by filtering the Device Name column to "U."

See Figure-16,

  1. Initial MPR Selection: At 1598.32 ms, the device starts with a single MPR node, "E." This means "E" was initially the best choice for relaying messages.

  2. MPR List Evolution: Over time, more nodes like "C," "H," "I," and "G" are added to the list. This indicates the device is adapting to network changes, selecting new relays as network conditions evolve.

  3. Dynamic Changes: Nodes are added or removed from the MPR list based on their current efficiency in relaying messages, reflecting ongoing adjustments to the network topology.

    • Multiple MPR Nodes: We finally get the set of MPR nodes as "C; I; G; H; E".

_images/Figure-19.png

Figure-19: MPR table formed at node U node after periodic exchange of Hello messages.

Topology Control (TC) Messages

TC (Topology Control) messages are periodically exchanged to inform nodes about the network's topology. Each node updates its routing table based on the information in these messages, which include details about MPRs (Multi-Point Relays) and their connections.

When a node receives a TC message, it uses the link information to add or adjust routes in its table, ensuring it always has the most efficient paths to other nodes. This dynamic updating keeps the network adaptive to changes, such as new routes or broken links.

_images/Figure-20.png

Figure-20: TC Message Broadcasted from node to all its Neighbors, so that other nodes in the network can use this information to update their own routing tables.

_images/Figure-21.png

Figure-21: Routing Table of Node U

The routing table shown in Figure-21 reflects these updates, displaying the optimal routes formed from the latest TC message exchanges.

How often are NDP Hello Messages and TC Messages exchanged in the Network?

Open Packet trace from simulation results window and filter Control Packet Type/App Name to NDP HELLO MESSAGE, Source ID to Node-1. All the nodes in the network exchange the NDP HELLO MESSAGEs periodically (for every 2 seconds- check NETWORK LAYER ARRIVAL TIME column) to detect the neighbors. In the below screenshot, Node-1 is broadcasting NDP HELLO MESSAGES to its neighbors 2, 3, 4 ,5, 6, 7, 8 and 9 for every 2 seconds as shown below.

_images/Figure-22.png

Figure-22: NDP HELLO MESSAGES to its neighbors 2, 3, 4,5,6,7,8 and 9 for every 2 seconds in Packet Trace.

You can observe in the packet trace that hello packets are exchanged every 1.7 seconds. This is obtained from [5]

\(Actual\ Message\ Interval = Message\ Interval - \ \ Jitter\)

This is applicable for TC messages as well.

Now filter Control Packet Type/App Name to OLSR TC Message, Source Id and Transmitter Id to Node-1. All nodes in the network, broadcasts Topology control (TC) messages (for every 5 seconds - check Network layer arrival time column) in order to build the topology information base. In the below screenshot, node-1 is broadcasting OLSR TC Message to its neighbors 2, 3, 4, 5, 6, 7, 8 and 9 for every 5 seconds as shown below.

_images/Figure-23.png

Figure-23: OLSR TC Message sent to neighbors 2, 3,4,5,6,7,8 and 9, every 5 seconds as can be seen in packet trace

Comparative analysis of AODV and OLSR in static and mobility scenarios

Introduction

Mobile Ad hoc Networks (MANETs) are self-organizing wireless networks that operate without a fixed infrastructure. The dynamic and distributed nature of MANETs introduces challenges for routing protocols, particularly in handling topology changes and maintaining efficiency under varying traffic loads. Routing protocols for MANETs are broadly categorized into reactive and proactive approaches, each with distinct mechanisms and trade-offs.

  • Ad-hoc On-Demand Distance Vector (AODV): AODV is a reactive routing protocol that establishes routes only when needed. As described by Clausen et al. [6], AODV initiates route discovery by broadcasting route request packets, followed by unicast replies for discovered routes. This approach reduces control overhead in static or low-traffic networks. However, frequent route rediscoveries caused by mobility or high traffic densities can increase overhead.

  • Optimized Link State Routing (OLSR): OLSR is a proactive protocol that maintains routing tables for all nodes in the network at all times. Clausen et al. [6] , highlights OLSR’s use of Multipoint relays (MPRs) to optimize control traffic by reducing redundant retransmissions during periodic updates. While OLSR ensures immediate route availability, it generates constant control traffic regardless of traffic flow or mobility.

This example evaluates and compares the performance of AODV and OLSR under three scenarios:

  • No mobility: Nodes remain stationary throughout the simulation.

  • With mobility: Nodes follow a random walk mobility model, but with a fixed speed.

  • Varying velocity: Nodes move at speeds ranging from 0 m/s to 100 m/s.

_images/Figure-24.png

Figure-24: 10-Node Network Topology in MANET Simulation. The area of operation is set to 10km × 5km. Nodes communicate wirelessly using ad hoc routing protocols. The range of each node is set to 1.7 km and transmissions could be single hop or multi hop.

We analyze which protocol is more resource-efficient under different network conditions, focusing on control traffic overhead, which refers to the additional network traffic generated by routing protocols during activities such as route discovery, updates, and maintenance. Since excessive control traffic can degrade performance in MANETs by consuming the already limited bandwidth, minimizing this overhead is crucial for efficient network operation. By comparing AODV and OLSR, this study provides insights into their suitability for specific scenarios, helping users make appropriate decisions based on trade-offs between scalability, bandwidth utilization, and control overhead.

Simulation Setup

Network Configuration

  1. These settings have been pre-configured in the simulatio environment.

Simulation Parameters

Environment size

10000 \(\times\) 5000

Mobility model

No mobility/Random walk

Velocity

10 m/s (only for Random walk)

Calculation Interval

2 second (only for Random walk)

Routing protocol

AODV/OLSR

MAC protocol

802.11 b

Transmission range

1700 m

Table-2: Simulation parameters for MANET scenario

  1. Setting transmission range in NetSim

  • Click on the link connecting the nodes and open the link properties by navigating to the medium property in the link properties panel (RHS).

  • Set channel characteristics to pathloss, choose Range based for the pathloss model, and enter 1700 m in the Range (m) field.

_images/Figure-25.png

Figure-25: Configuring transmission range in NetSim link properties.

  1. Enable packet trace from the configure reports tab in ribbon on top.

  2. Run the simulation for 50 seconds

Scenario Setup

For both AODV and OLSR, we simulate 30 cases with varying numbers of applications. Each case increases the number of applications by one, starting from a single application in Case 1 and going up to 30 applications in Case 30.

Repetition of Simulations

To reduce the impact of randomness, each scenario (AODV and OLSR) is repeated with three sets of simulations:

  • Set 1: Initial set of source-destination pairs.

  • Set 2: Second set of source-destination pairs.

  • Set 3: Third set of source-destination pairs.

The final results are the averaged control traffic overhead across these three sets.

In the NetSim GUI, we provide configuration files for three cases: mobility, No-mobility, and velocity. The dataset includes:

  1. Mobility Cases:

  • Set 1: 30 cases of AODV and OLSR.

  1. No-Mobility Cases:

  • Set 1: 30 cases of AODV and OLSR.

  1. Velocity Cases:

  • Set 1: 10 cases of AODV and OLSR across varying velocities.

The complete set of configuration files is available for download: GitHub Zip folder download link: https://github.com/NetSim-TETCOS/Comparative-analysis-of-AODV-and-OLSR-v14.4/archive/refs/heads/main.zip

  1. Click on the link above to download the comparative analysis examples.

  2. Extract the zip folder. The extracted project folder consists of case files for mobility, No-mobility, and velocity cases.

  3. Instructions for importing the workspace are provided in section 4.9.2 of the NetSim user manual.

Steps for Control Traffic Overhead Calculation

Running the Simulation

  1. Open NetSim and Select Examples-> Mobile Ad hoc Networks -> Comparative Study of AODV and OLSR

_images/Figure-26.png

Figure-26: Network Scenario. With 10 wireless nodes configured with 10 traffic flows with each other

  1. For this example, Open the No-mobility case-10 scenario (e.g., No-mobility case > Set-1 > AODV > case-10), which is configured with 10 applications.

  2. Run the simulation for 50 seconds.

Accessing the Packet Trace

  1. After each simulation is completed, open the packet trace file generated from the result dashboard.

_images/Figure-27.png

Figure-27: Opening packet trace from simulation results window

  1. This file contains detailed logs for each packet transmitted in the network.

Filtering Control Packets for AODV

  1. In this step, we filter AODV control packets specifically to calculate the control traffic overhead accurately:

_images/Figure-28.png

Figure-28: Filtering AODV Control Packets in Packet Trace

  • Filtering by Control Packet Type: We select only rows where Control Packet Type/App Name specifies AODV. This isolates the AODV-specific control traffic data.

Removing Duplicate Entries

Broadcast control packets, used by AODV/OLSR during route discovery, are transmitted to all neighbouring nodes within range. In all these cases the same packet is received and logged by multiple nodes. Since each neighbor logs the packet, the same packet(s) appears multiple times in the data, however the packet(s) was transmitted only once by the sender.

_images/Figure-29.png

Figure-29: Observing the phy layer start time from packet trace

  • For example, a packet sent by Node-9 may be received by multiple nodes (Node-2, Node-5, etc.) at the same Phy layer start time(µS).

  • By keeping only unique entries based on Packet Id and Phy layer start time(µS), we avoid counting the same packet multiple times, which would otherwise inflate the overhead.

Steps to remove Duplicate packet entries

  1. Go to Data > Remove Duplicates in your spreadsheet software.

  2. In the Remove Duplicates dialog:

_images/Figure-30.png

Figure-30: Removing Duplicate AODV Control Packets Based on Packet ID and Start Time

  • Unselect all columns.

  • Select only the columns Packet Id and Phy layer start time(µS).

  1. This will remove duplicate AODV control packets based on packet ID and start time.

Calculating the Control Traffic Overhead

  1. In the filtered data, locate the Phy layer pay load(Bytes) column.

_images/Figure-31.png

Figure-31: Calculating the total control traffic overhead

  1. Finally, we calculate the sum of Phy layer payload (Bytes) for the unique entries. This gives the actual control traffic overhead for AODV, ensuring an accurate representation of the protocol’s overhead without duplicate broadcasts.

  2. Record this sum as the Control traffic overhead for the current case of AODV.

Repeating for OLSR

  1. Configure the network layer protocol to OLSR instead of AODV.

  2. Follow above steps to calculate the control traffic overhead for each case of OLSR.

  3. Filter for OLSR packets in the Control Packet Type/App Name column.

_images/Figure-32.png

Figure-32: Filtering OLSR Control Packets in Packet Trace

  1. Here just filter NDP Hello Message and OLSR TC Message

  2. Repeat above steps for each case (Case 1 to Case 30) of AODV and OLSR.

  3. Record the overhead values.

Averaging Across Sets

  1. Calculate the control traffic overhead for Set 1.

  2. Repeat the calculations for Set 2 and Set 3.

  3. Average the control traffic overhead values from sets 1, 2, and 3 to obtain the final control traffic overhead for each case.

We have used the same method to get the results for Mobility case also

Results and Discussion

No-Mobility cases

The results for the No-mobility case of these three sets are as follows:

Table:

Set 1 (Ctrl Traffic OH)

Set 2(Ctrl Traffic OH)

Set 3 (Ctrl Traffic OH)

Average

No. of Traffic flows

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

1

25408

481992

26176

481308

25424

480220

25669

481173

2

26520

440320

26972

461744

28160

471988

27217

458017

3

27896

469316

26972

459604

30924

490188

28597

473036

4

27348

480884

27588

478740

30228

489796

28388

483140

5

28204

465048

29308

430536

32320

491600

29944

462395

6

31052

430108

30324

437132

32284

460404

31220

442548

7

30848

473172

32180

452036

29772

478536

30933

467915

8

32584

436616

32956

452296

31596

472688

32379

453867

9

34360

427428

33108

443520

35016

437920

34161

436289

10

33616

456036

36252

477660

32548

420932

34139

451543

11

36476

432028

90788

442452

34268

432896

53844

435792

12

38444

448028

44644

460820

38084

460484

40391

456444

13

38376

468408

38940

457412

39712

463236

39009

463019

14

49996

443056

48136

477200

35320

477716

44484

465991

15

48060

453160

48212

454996

42052

465972

46108

458043

16

46852

459232

59984

455332

42356

489372

49731

467979

17

51872

449772

91728

431432

38832

425436

60811

435547

18

51668

479544

91840

439224

57864

460660

67124

459809

19

52184

481220

69356

445224

47020

464732

56187

463725

20

52824

464176

75636

421440

78740

423412

69067

436343

21

75048

458424

78500

466688

542100

449080

231883

458064

22

79456

439976

455780

466716

59932

442384

198389

449692

23

89332

424888

2380728

447300

79424

426636

849828

432941

24

85116

473820

2915412

476732

126364

407244

1042297

452599

25

82756

443136

1369760

450536

1989620

414728

1147379

436133

26

2083272

420028

2360080

492896

1786548

397752

2076633

436892

27

1385988

425060

3691028

504956

2056808

384900

2377941

438305

28

2168944

454656

2564324

486992

3477228

394188

2736832

445279

29

1064636

454716

3782316

459032

3560280

374716

2802411

429488

30

2556544

406544

4280888

499940

2235200

392132

3024211

432872

Table-3: Control Traffic Overhead (Bytes) for OLSR and AODV across Three Simulation Sets

This table presents the control overhead data for 30 traffic flows, averaged across three simulation sets (Set 1, Set 2, and Set 3) with unique source-destination pairs. The averaging process reduces randomness and ensures a more accurate comparison for both the no mobility and mobility scenarios.

Plot:

_images/Figure-33.png

Figure-33: Control Packet Overhead vs. Number of traffic flows in No-mobility case

Mobility cases

The results for the Mobility case of these three sets are as follows:

Table:

Set 1 (Ctrl Traffic OH)

Set 2(Ctrl Traffic OH)

Set 3 (Ctrl Traffic OH)

Average

No. of Traffic flows

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

1

25468

567404

25468

567404

27564

523484

26167

552764

2

26100

571956

27732

565780

27568

554052

27133

563929

3

28284

575044

27816

540492

27684

565280

27928

560272

4

28608

547816

30364

545140

31836

525460

30269

539472

5

29212

560864

31396

511772

30684

472132

30431

514923

6

31328

558536

32928

485168

31876

543732

32044

529145

7

32536

523900

35684

634288

32808

527412

33676

561867

8

32752

569348

31396

587000

32808

528504

32319

561617

9

35044

604432

31636

636816

33824

611956

33501

617735

10

34068

518736

34280

593988

36032

674456

34793

595727

11

39036

509376

37544

572560

37248

582228

37943

554721

12

36660

521772

39668

554048

39644

585284

38657

553701

13

37036

503700

48180

578588

44104

593464

43107

558584

14

47028

553828

42636

573436

53084

573252

47583

566839

15

50748

540140

50012

549184

355392

576804

152051

555376

16

59056

460676

1355420

559148

60640

563972

491705

527932

17

62776

555588

183964

547756

62644

465324

103128

522889

18

60436

574892

71752

500528

52292

567476

61493

547632

19

126680

572652

60120

562644

77252

547496

88017

560931

20

63424

505444

110380

570064

72000

538784

81935

538097

21

98604

517780

2194176

524448

99292

500468

797357

514232

22

743344

501272

3502212

572152

76796

604312

1440784

559245

23

3766092

517560

2906148

561000

100112

546148

2257451

541569

24

511088

472460

3594464

579412

1515364

530324

1873639

527399

25

3115056

403116

2297716

500444

1916896

369752

2443223

424437

26

2756380

547684

2900080

539396

2454956

570272

2703805

552451

27

1902272

508524

4675832

477324

2272428

537524

2950177

507791

28

1716844

488860

4297136

553316

2845088

549000

2953023

530392

29

2546728

408976

3420656

513904

2909900

526536

2959095

483139

30

776816

411412

3729096

553620

3061636

486088

2522516

483707

Table-4: Control Traffic Overhead (Bytes) for OLSR and AODV across Three Simulation Sets

Plot:

_images/Figure-34.png

Figure-34: Control packet overhead vs. Number of traffic flows in mobility case

Discussion

AODV Control Overhead:

  • In both no-mobility and mobility scenarios, AODV initially performs better for approximately the first 1–18 traffic flows, maintaining lower control traffic overhead compared to OLSR. This is due to its reactive nature, where route discovery is triggered only when required, minimizing unnecessary control packets in low-traffic conditions.

  • However, beyond 1-18 traffic flows, the control overhead for AODV increases drastically in both scenarios. This sharp rise is due to the additional route discovery processes triggered by increasing traffic flows. In mobility scenarios, this increase is further amplified by frequent route rediscoveries caused by dynamic topology changes.

OLSR Control Overhead:

  • OLSR exhibits consistent control overhead across all traffic flows in both no-mobility and mobility scenarios. Its proactive nature, characterized by periodic routing updates, ensures stable performance regardless of traffic flow density or mobility.

  • While OLSR's overhead is slightly higher than AODV’s for fewer than 10 traffic flows, it becomes the more efficient protocol as traffic density increases, due to its predictable and scalable performance.

Insights

The results highlight the following key observations:

  1. Low traffic loads: AODV has an advantage in sparse traffic scenarios (up to 10 traffic flows), where its reactive mechanism minimizes unnecessary control overhead.

  2. High traffic loads: OLSR exhibits better scalability and predictability for networks with moderate to high traffic densities.

  3. Impact of Mobility: While mobility introduces additional control traffic for AODV due to frequent route rediscoveries, the overall trend remains similar to the no-mobility scenario, with traffic flow density being the dominant factor.

Impact of Varying Velocity on Routing Protocol Performance

In MANETs, the velocity of nodes significantly influences the dynamics of the network topology. As nodes move faster, link breakages and re-establishments occur more frequently, posing challenges for routing protocols.

Scenario Setup

  1. These settings have been pre-configured in the simulatio environment.

Simulation Parameters

Environment Size

10000\(\times\)5000

Mobility Model

Random Walk

Velocity

Varied from 0 m/s to 100 m/s

Calculation Interval

2 second

Routing Protocol

AODV/OLSR

MAC Protocol

802.11 b

Transmission range

Table-5: Scenario settings

  1. We have considered a 10-node scenario with 10 traffic flows, where simulations were conducted in three separate sets for both AODV and OLSR.

  2. The control traffic overhead was calculated using the same methodology applied for the no-mobility and mobility scenarios.

  3. The results of the simulations are presented in Table-6, which shows the averaged control traffic overhead for both protocols at varying velocities.

Velocity cases

The results for the Velocity case of these three sets are as follows:

Table:

Set 1 (Ctrl Traffic OH)

Set 2(Ctrl Traffic OH)

Set 3 (Ctrl Traffic OH)

Average results from three sets

Velocity

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

AODV\(\mathbf{(B)}\)

OLSR\(\mathbf{(B)}\)

0

33548

454224

33728

987192

33208

612888

33495

684768

10

32336

577476

34964

883564

32844

724380

33381

728473

20

33016

625672

36392

1100368

32964

878620

34124

868220

30

32560

722296

42892

968404

36656

857956

37369

849552

40

615268

664616

322956

1023200

45332

699156

327852

795657

50

54720

707184

789660

1058916

53416

883684

299265

883261

60

988036

575244

1305972

724312

140148

670376

811385

656644

70

302836

752468

722504

1000576

746080

937828

590473

896957

80

124608

660272

1989568

805692

110576

902668

741584

789544

90

1281244

703228

2920076

650408

81160

901464

1427493

751700

100

1249232

748888

2055652

784784

2607460

686236

1970781

739969

Table-6: Average control traffic overhead for AODV and OLSR under varying velocity

The averaged results from the three sets provide a comparison of the control traffic overhead for the two protocols under varying velocity conditions.

Plot:

_images/Figure-35.png

Figure-35: Control traffic overhead for AODV and OLSR under varying velocity

Discussion

  1. AODV Control Overhead:

  • Low Velocity (0–20 m/s): At lower velocities, the network topology remains relatively stable, leading to fewer route rediscoveries. AODV maintains a low and gradually increasing control traffic overhead in this range.

  • High Velocity (20–100 m/s): As velocity increases, frequent link breakages due to rapid topology changes necessitate repeated route rediscovery processes. This results in a sharp rise in AODV’s control overhead, especially beyond 50 m/s.

  1. OLSR Control Overhead:

  • Stable Performance Across Velocities: OLSR exhibits consistent control overhead across all velocity levels. This is due to its proactive routing approach, where periodic updates maintain routing tables regardless of node velocity.

  • Minimal Impact of Velocity: Even at the highest velocity (100 m/s), OLSR’s overhead remains relatively constant, highlighting its robustness in handling dynamic topologies.

Insights

The results highlight the following key observations:

  1. Performance at low velocity: AODV’s reactive nature minimizes control traffic overhead, making it more efficient in networks with low or limited mobility.

  2. Performance at high velocity: OLSR’s proactive updates ensure stable and predictable overhead, making it better suited for highly dynamic environments.

Multiple MANETS

Open NetSim and Select Examples->Mobile Ad hoc Networks->Multiple MANETs then click on the tile in the middle panel to load the example as shown in below screenshot Figure-36.

_images/Figure-36.png

Figure-36: List of scenarios for the example of Multiple-MANETs

Multiple MANETs allows users to interconnect two or more MANETs using a bridge node. Click and drop wireless nodes, Ad hoc links and bridge node onto the grid environment and connect wireless nodes to ad hoc links to form two different MANET’s using ad hoc links. Further connect the two MANET’s using a bridge node as shown below Figure-37.

_images/Figure-37.png

Figure-37: Network set up for studying the Multiple-MANETs

Network Settings

  1. Grid length: 500m*250m from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. A network scenario is designed in the NetSim GUI, comprising four wireless nodes and one bridge node, with two ad hoc links from the Interconnected MANETs module.

  3. To configure any properties in the nodes, click on the node, expand the property panel on the right side, and change the properties as mentioned below.

  4. The Medium access protocol was set to DCF in Interface (Wireless)-> Datalink layer of all wireless nodes and bridge node (Interface 1 and Interface 2).

  5. The routing protocol in the network layer is set to AODV for all nodes. As this is a global property, changing it on one node will affect all nodes

  6. Create a CBR application from wireless node 1 to wireless node 5 from the set traffic tab in the ribbon on top. Click on the created application, and in the right-side property panel, set the transport protocol to UDP, keeping the other application properties as default.

  7. Enable packet race from the configure reports tab in ribbon on top.

  8. Run simulation for 10 seconds.

Output

After simulation, open packet trace from simulation results window and filter Control Packet Type/App Name to App1 CBR and Packet Id to 1. In the below screenshot, users can observe that the packets from source node-1 are going to destination node-5 via bridge node-3.

_images/Figure-38.png

Figure-38: Packet transmitting from Source Node-1 to Destination Node-5 via Bridge Node-3 in Packet Trace.

Energy consumption in MANETs

In this experiment, we aim to analyze the per-packet energy consumption for various types of packets, including data packets of different sizes, WLAN ACKs, and MANET control packets, across both DSR and AODV protocols.

Open NetSim and Select Examples-> Mobile Ad hoc Network ->Energy consumption in MANET then click on the tile in the middle panel to load the example as shown in below screenshot.

_images/Figure-39.png

Figure-39: List of scenarios for the example of Energy consumption in MANET.

Network Setup

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-40.png

Figure-40: Network setup for analyzing the energy consumption in MANETs.

  1. The scenario comprises of

  • Two wireless node omni ants, wireless node omni ant1 & wireless node omni ant2.

  • Wireless node omni ant1 sends data to wireless node omni ant2, and wireless node omni ant2 sends data to wireless node omni ant1.

  1. Set grid length to 400m*200m from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. Click on wireless node, expand the property panel on the right and set the following properties under different layers.

Device Properties

Position layer properties

Mobility Model

No Mobility

Network layer properties

Routing Protocol

DSR/AODV

Interface(Wireless) properties

Datalink layer properties

Medium Access Protocol

DCF

Physical layer properties

Standard

IEEE802.11n

Number of Frames to Aggregate

1

Tx \(\mathbf{\times}\) Rx antenna counts

1 \(\times\) 1

Power Source

Battery

Table-7: Wireless node Omni Ant properties configured in NetSim.

Battery Properties

Energy harvesting

Off

Initial energy (𝑚𝐴ℎ)

300

Transmitting current

316.7

Idle mode current

227

Voltage (𝑉)

3.6

Receiving current

261.1

TTable-8: Battery model properties configured in NetSim.

Link Properties

Channel characteristics

No pathloss

Table-9: Link properties configuration.

  1. Click on the set traffic tab in the top ribbon/toolbar and create a CBR application as per the below settings.

Application Properties

Source Id

1 / 2

Destination Id

2 / 1

Packet size (B)

420 / 1420 / 428

Inter arrival time \(\left( \mathbf{\mu s} \right)\)

20000

Mean generation rate (kbps)

168 / 568/171

Table-10: Application configured from wireless node omni Ant1 to wireless node omni ant2 and wireless node omni ant2 to wireless node omni ant1 for 2 cases, with packet size as 420B and 1420B. These are the application layer packet sizes and on adding overheads the packet sizes are 500B and 1500B respectively at the PHY layer.

  1. Enable the Packet trace under config reports tab on the top

  2. Enable the IEEE 802.11 Radio measurement and Energy log under Network log as shown below.

_images/Figure-41.png

Figure-41: Enabling IEEE 802.11 Radio measurement and Energy log.

  1. Run the simulation for 100 seconds.

Energy Consumption

  • The energy consumption is given by

\[ConsumedEnergy(J) = V\lbrack Volts\rbrack \times I\lbrack Amps\rbrack \times t\lbrack sec\rbrack\]

where \(V\) is the battery voltage, \(I\) is the current drawn and \(t\ \)is the time for which the node is in a particular mode.

  • This can be computed for each packet and for each mode using NetSim’s energy log. The formula to be used is

\[ \begin{align}\begin{aligned}ConsumedEnergy\ (mJ) = \frac{Voltage\lbrack V\rbrack \times ModeCurrent\lbrack mA\rbrack \times \left( CurrentTime(\mu s) - ModeChangeTime(\mu s) \right)}{10^{6}}\\where current time minus mode-change-time is the time for which the node is in a particular mode.\end{aligned}\end{align} \]

Energy consumption calculations

In the results window, open packet trace and Energy log file as shown below.

_images/Figure-42.png

Figure-42: Open Energy log file and packet trace from Results tab.

Open Energy log file and Filter out previous mode to TRX on busy and RX on busy in Energy log as shown below.

_images/Figure-43.png

Figure-43: Filter out RX on busy and TRX on busy under previous mode in Energy log file.

_images/Figure-44.png

Figure-44: Filter out the DSR RREQ under Control Packet Type/App Name in packet trace.

To calculate the energy consumption for different packet types, first filter out the packet type in packet trace and note the PHY LAYER ARRIVAL TIME (µs) column value and cross-reference with Mode Switch Time(ms) column in the energy log file for TRX ON BUSY/RX ON BUSY case as shown below.

_images/Figure-45.png

Figure-45: Filter out packet type in packet trace.

_images/Figure-46.png

Figure-46: Filter out mode to TRX ON BUSY and RX ON BUSY in Energy log. Record the Phy Layer Arrival Time from packet trace and cross-reference with Mode Switch Time in Energy log. The mode switch time and current time values will be utilized to calculate the mode-time in the energy calculations for different packet types.

In the calculations below, the voltage and mode current are user inputs while current time and mode switch time are recorded in the energy log file. The packet trace is only used to determine the type of packet (Route request, Data, WLAN ACK etc.).

  • DSR Route Request

  • Transmit Energy

\[Energy\ (mJ) = \frac{Voltage(V) \times ModeCurrent(mA) \times (CurrentTime - ModeChangeTime)(ms)}{10^{3}}\]

\(= 3.6V \times 316.7mA \times (5008.5669 - \ 5008.4424) \times 10^{- 3}\)

\(= 0.141894\)

  • Receive Energy

\[Energy\ (mJ) = \frac{Voltage(V) \times ModeCurrent(mA) \times (CurrentTime - ModeChangeTime)(ms)}{10^{3}}\]

\(= 3.6V \times 261.1\ mA \times (5000.19446\ - \ 5000.07) \times 10^{- 3}\)

\(= 0.116983\)

  • DSR Route Reply

    • Transmit Energy

\[Energy\ (mJ) = \frac{Voltage(V) \times ModeCurrent(mA) \times (CurrentTime - ModeChangeTime)(ms)}{10^{3}}\]

\(= 3.6V \times 316.7mA \times (5008.865442 - 5008.81701) \times 10^{- 3}\)

\(= 0.055218\)

  • Receive Energy

\[Energy\ (mJ) = \frac{Voltage(V) \times ModeCurrent(mA) \times (CurrentTime - ModeChangeTime)(ms)}{10^{3}}\]

\(= 3.6V \times 261.1\ mA \times (5010.473342 - 5010.42491) \times 10^{- 3}\)

\(= 0.045524\)

  • Application (Data) Packets, 500B

    • Transmit Energy

\[Energy\ (mJ) = \frac{Voltage(V) \times ModeCurrent(mA) \times (CurrentTime - ModeChangeTime)(ms)}{10^{3}}\]

\(= 3.6V \times 316.7mA \times (5009.21652\ - \ 5009.121108) \times 10^{- 3}\)

\(= 0.1087811\)

  • Receive Energy

\[Energy\ (mJ) = \frac{Voltage(V) \times ModeCurrent(mA) \times (CurrentTime - ModeChangeTime)(ms)}{10^{3}}\]

\(= 3.6V \times 261.1\ mA \times (5010.76442 - 5010.669008) \times 10^{- 3}\)

\(= 0.089683\)

  • WLAN Block ACK Packets

    • Transmit Energy

\[Energy\ (mJ) = \frac{Voltage(V) \times ModeCurrent(mA) \times (CurrentTime - ModeChangeTime)(ms)}{10^{3}}\]

\(= 3.6V \times 316.7mA \times (5009.302086 - 5009.22652) \times 10^{- 3}\)

\(= 0.086154\)

  • Receive Energy

\[Energy\ (mJ) = \frac{Voltage(V) \times ModeCurrent(mA) \times (CurrentTime - ModeChangeTime)(ms)}{10^{3}}\]

\(= 3.6V \times 261.1\ mA \times (5008.951008 - 5008.875442) \times 10^{- 3}\)

\(= 0.071029\)

Case#1: Results and discussion

Packet Size = 500B, Routing Protocol: DSR

Node ID

Packet Type

Packet Size (B)

Tx Energy (mJ) per packet

Rx Energy (mJ) per packet

Node 1

DSR Control Packet (Req)

76

0.1418936

0.1169827

DSR Control Packet (Reply)

76

0.0552183

0.0455241

WLAN Block ACK

32

0.0861543

0.0710290

Application Packet 1

500

0.1087811

NA

Application Packet 2

500

NA

0.0896835

Node 2

DSR Control Packet (Req)

76

0.1418936

0.1169827

DSR Control Packet (Reply)

76

0.0861543

0.0455241

WLAN Block ACK

32

0.0861543

0.0710290

Application Packet 1

500

NA

0.0896835

Application Packet 2

500

0.1087811

NA

Table-11: Tx and Rx energy consumption per packet for 500-byte packet size and DSR routing protocol.

Case #2: Results and discussion

Packet Size = 1500B, Routing Protocol: DSR

Node ID

Packet Type

Packet Size (B)

Tx Energy (mJ)

per packet

Rx Energy (mJ)

per packet

Node 1

DSR Control Packet (Req)

76

0.1418936

0.1169827

DSR Control Packet (Reply)

76

0.0552183

0.0455241

WLAN Block ACK

32

0.0861543

0.0710290

Application Packet 1

1500

0.2351098

NA

Application Packet 2

1500

NA

0.1938339

Node 2

DSR Control Packet (Req)

76

0.1418936

0.1169827

DSR Control Packet (Reply)

76

0.0552183

0.0455241

WLAN Block ACK

32

0.0861543

0.0710290

Application Packet 1

1500

NA

0.1938339

Application Packet 2

1500

0.0861543

NA

Table-12: Tx and Rx energy consumption per packet for 1500-byte packet size and DSR routing protocol.

  • DSR Route Request is a broadcast packet.

  • Broadcast packet is sent at “broadcast” rate which uses the lowest rate (MCS).

  • Since this packet is sent at the lowest rate, the Transmission time is higher leading to higher energy consumption.

  • DSR Route reply is a unicast packet.

  • This is sent at “unicast” rate. This rate (MCS) is chosen per the Wi-Fi MCS-Rx Power tables. In this case it is MCS 7.

  • Transmission time is lower than DSR Route Request leading to lower energy consumption, even though the RREQ and RREP packets are of the same size.

  • We see that the application and WLAN ACK packets have the same transmit and received energies for both nodes.

  • Compared to case #1, in case #2, the packet size is three times larger (1500B vs. 500B), but the energy consumption isn't proportionally higher (i.e., it is not three times more). This is because the difference in the total transmission times is not a factor of three.

  • Recall that in Wi-Fi

\[TotalTransmissionTime\ (s) = Pkt.\ TransmissionTime + PreambleTime(s)\]
  • We know that

\[Pkt.\ TransmissionTime\ (\mu s) = ceil\left( \frac{Pkt.Size(B)}{DataRate(Mbps)} \right)\]
  • While the packet transmission time is three times longer than before, the preamble time remains constant at 40 \(\mu s\) in both cases.

  • For a packet size of \(500B\) given a data rate of \(72.2\ \)Mbps

\[Pkt.\ TransmissionTime(\mu s) = ceil\left( \frac{500 \times 8}{72.2} \right) = 55.402\]
\[TotalTranmissionTime\ (\mu s) = 55.402 + 40 = 95.402\]
  • For packet size = 1500B

\[Pkt.\ TransmissionTime(\mu s) = ceil\left( \frac{1500 \times 8}{72.2} \right) = 166.205\]
\[TotalTranmissionTime\ (\mu s) = 166.205 + 40 = 206.205\]
  • We can see that the total transmission time is only about 2.16 times higher. Therefore, the total energy consumption is also 2.16 times higher than the previous scenario, and not three times\(\ \)higher.

Case #3: Results and discussion

Packet Size = 500B, Routing Protocol: AODV

We perform similar energy calculations for AODV and obtain the table below.

Node ID

Packet Type

Packet Size (B)

Tx Energy (mJ)

per packet

Rx Energy (mJ)

per packet

Node 1

AODV Control Packet (Req)

88

0.1570949

0.1295152

AODV Control Packet (Reply)

84

0.0562284

0.0463569

WLAN Block ACK

32

0.0861543

0.0710290

Application Packet 1

500

0.1087811

NA

Application Packet 2

500

NA

0.0896835

Node 2

AODV Control Packet (Req)

88

0.1570949

0.1295152

AODV Control Packet (Reply)

84

0.0562284

0.0463569

WLAN Block ACK

32

0.0861543

0.0710290

Application Packet 1

500

NA

0.0896835

Application Packet 2

500

0.1087811

NA

Table-13: Tx and Rx energy consumption per packet for 500-byte packet size and AODV routing protocol.

  • AODV Route Request is a broadcast packet.

  • Broadcast packet is sent at “broadcast” rate which is the lowest MCS.

  • Transmission time is higher leading to higher energy consumption.

  • AODV Route reply is a unicast packet.

  • This is sent at Unicast rate which is dependent on the received power. In this case it is sent at MCS 7 (QAM 64)

  • We see that the application and WLAN ACK packets have the same transmit and receive energies as in DSR.

  • Similar calculations as done for DSR can be carried out to verify the results.

Energy consumption plot:

_images/Figure-47.png

Figure-47 : Energy consumption plot for different packet types.

Application throughput variation with node mobility

Objective

To simulate and analyze how application throughput varies as the node moves away. This analysis is done for 802.11n standard.

Open NetSim and Select Examples->Mobile Ad hoc Networks->Application Throughput Variation with Node Mobility then click on the tile in the middle panel to load the example as shown in below screenshot Figure-48.

_images/Figure-48.png

Figure-48: List of scenarios for the example of Application Throughput Variation with Node Mobility

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file see Figure-49.

_images/Figure-49.png

Figure-49: Network set up for studying the Application Throughput variation with Node mobility

Network Settings

  1. The device coordinates were set as follows. To configure the below, click on device, expand the property panel on right and change the below in position layer.

Device Name

x- axis

y-axis

N1

10

150

N2

30

150

Table-14: Devices Position

  1. Set grid length to 300m*140m from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. To configure any properties in the nodes, click on the node, expand the property panel on the right side, and change the properties as mentioned below.

  3. IEEE standard was set to 802.11n in Interface (Wireless) > Physical layer of both the wireless nodes.

  4. The Physical layer properties were set as follows Table-15.

Interface Parameters

Standard

IEEE802.11n

No. of Frames to aggregated

1

Transmitter Power

100mW

Bandwidth

20MHz

Standard Channel

1 (2412MHz)

Reference distance (d0)

1m

Guard Interval

400ns

Antenna

Antenna height

1m

Antenna gain

0

Transmitting antennas

1

Receiving antennas

1

Table-15: Detailed Network Parameters

  1. The Medium Access Protocol was set to DCF in Interface (Wireless)-> Datalink layer of both wireless nodes.

  2. Click on N1 and expand right-hand side property panel and go to Network layer, Enable Static IP Route and Configure Static Route via GUI as shown below screenshot Figure-50.

_images/Figure-50.png

Figure-50: Static IP Route configuration window

  1. Rate Adaptation was set as False in Interface (Wireless) -> Datalink layer of both wireless nodes.

  2. Click on link and expand right-hand side property panel and set the Channel characteristics as: Path loss only; Path loss model: Log Distance; Path loss exponent: 3 under medium property.

  3. Click on the N1 and N2 devices and expand right-hand side property panel and set the mobility model to No Mobility in N1 and File Based Mobility in N2.

  4. Click on set traffic tab and configure Unicast CBR application from N1 to N2. Click on the created application, and in the right-side property panel, set the transport protocol to UDP and the start time to 0s. Set the packet size to 1460 bytes and Inter Arrival Time to 476.2 microseconds, which gives a Generation Rate of 25Mbps.

  5. Set application start time as 0 sec.

  6. The Transport protocol was set to UDP.

  7. Enable the Application throughput vs time plot and SNR vs time plot under Plots in Configure reports.

  8. Run the simulation for 45 seconds.

File based mobility file:

Time(s)

Node ID

X (m)

Y (m)

Z (m)

0

2

30

100

0

2

2

40

100

0

4

2

50

100

0

6

2

60

100

0

8

2

70

100

0

10

2

80

100

0

12

2

90

100

0

14

2

100

100

0

16

2

110

100

0

18

2

120

100

0

20

2

130

100

0

22

2

120

100

0

24

2

110

100

0

26

2

100

100

0

28

2

90

100

0

30

2

80

100

0

32

2

70

100

0

34

2

60

100

0

36

2

50

100

0

38

2

40

100

0

40

2

30

100

0

Table-16: File based mobility file that models the movement of N2. The X co-ordinate is incrementally increased till the 20th second ensuring N2 moves away from node1. Subsequently, the X-coordinate is decreased to facilitate N2’s return towards N1.

Output

_images/Figure-51.png

Figure-51: Plot of Application throughput vs. time.

_images/Figure-52.png

Figure 4 52: Plot of SNR vs Time.

Inference

We can also observe the SNR vs. Time plot obtained after the simulation. The SNR is high initially and gradually drops as N2 moves away from N1. After N2 moves back towards the transmitter around the 20th second, we observe an increase in the SNR. The pathloss exponent in the log distance pathloss model was set to 3.0.

Recall that throughput is proportional to SNR. We observe that the Application throughput drops from 25 Mbps to 20 Mbps at around 4 seconds (the distance at this time is 50 m), and then to 15.8 Mbps at 6.5 seconds (the distance at this time is 70 m) and to 10.2 Mbps at 12 seconds (the distance at this time is 90 m) and then to 5.8 Mbps at 20 seconds (the distance at this time is 130 m). After the 20th second N2 starts moving back towards N1 and we can see the increase in throughput.

Performance of range based pathloss model in MANETs

Open NetSim and Select Examples->Mobile Ad hoc Networks->Range Based pathloss model then click on the tile in the middle panel to load the example as shown in below screenshot Figure-53.

_images/Figure-53.png

Figure-53: List of scenarios for the example of Range based pathloss model.

Introduction

The propagation loss depends only on the distance (range) between transmitter and receiver. There is a single Range attribute that determines the path loss.

This is not a real-world loss model but a theoretical model useful for experimentation. Receivers at or within Range meters see a 0 dB pathloss. Hence received power equals transmit power. Receivers beyond Range see a 1000 dB pathloss. Hence received power will be close to -1000 dBm i.e., zero in linear units

_images/Figure-54.png

Figure-54: This figure explains a typical range based pathloss model. In this example, Node A and B are in transmission range with each other which is denoted by a blue circle where the pathloss is 0dB i.e, successful transmission. And Node C is beyond the range i.e, pathloss is 1000dB all packets are errored and dropped. In NetSim, users must specify the range of the node in meters in the links.

The Range-Based Path Loss Model can be used in networks such as Internetworks, MANET, VANET, TDMA, Pure ALOHA, Slotted ALOHA, Cognitive Radio, IoT, WSN, and UWAN.

In this example, we will study the different cases in Range based Pathloss using Mobile Ad hoc networks.

Case 1: Range Based Pathloss. Nodes Within Transmission Range.

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-55.png

Figure-55: For studying the range based pathloss model with range

Network Settings

  1. Set grid length as 400 x 200 from grid setting property panel on the right. This needs to be done before the any device is placed on the grid.

  2. Drop 2 wireless node and 1 Ad hoc link in Grid environment,

  3. Device placements of wireless nodes are:

Device

X-Coordinate

Y-Coordinate

Wireless Node-1

100

150

Wireless Node-2

180

150

Table-17: Device Placements

  1. Click on link and expand right-hand side property panel and set Channel Characteristics: Pathloss, Pathloss model to Range based, Range(m)=100 under medium property.

  2. Clicking on Wireless node and expand right-hand side property panel and set, Mobility Model: No-Mobility, for both nodes under position property

  3. Click on the set traffic tab present in the top ribbon. Create a CBR Application with 11Mbps generation rate (Set Packet size: 1460, Inter Arrival Time: 1061.81 µs) from wireless node-1 to wireless node-2. Set Transport protocol to UDP and start time to zero.

  4. Enable throughput vs time plot under Application and link performance by clicking on plots/logs tab in right panel.

  5. Run the simulation for 100 seconds.

Output and Plot

_images/Figure-56.png

Figure-56: Application Metrics window.

In Simulation result window, click on Throughput vs Time plot under Application performance. After the plot window is displayed, click on the plot option.

_images/Figure-57.png

Figure-57: Application throughput plot.

Discussion

The above results show continuous data transmission and constant throughput throughout the simulation. This occurs because Wireless Node-2 is within the transmission range of Wireless Node-1. Specifically, the range-based parameter is set to 100 meters, and Wireless Node-2 is positioned 80 meters away from Wireless Node-1.

Case 2: Range Based Pathloss. Nodes Beyond Transmission Range.

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-58.png

Figure-58: For studying the range based pathloss model with-out range

Network Settings

  1. Set Grid length as 400 x 200 from grid setting property panel on the right. This needs to be done before any device is placed on the grid

  2. Drop 2 wireless node and 1 Ad hoc link in Grid environment,

  3. Device placements of wireless nodes are:

Device

X-Coordinate

Y-Coordinate

Wireless Node-1

100

150

Wireless Node-2

180

150

Table-18: Device placements

  1. Click on link and expand right-hand side property panel and set channel characteristics: Pathloss, Pathloss model to Range based, Range(m)=50 meters under medium property.

  2. Click on wireless node and expand right-hand side property panel and set Mobility model: No-mobility, for both nodes under position property.

  3. Click on the set traffic tab present in the top ribbon, create a CBR Application with 11Mbps generation rate (Set Packet size: 1460, Inter Arrival Time: 1061.81 µs) from wireless node-1 to Wireless node-2. Set Transport protocol to UDP and start time to zero.

  4. In NetSim GUI Application and link throughput vs time plot should be enabled.

  5. Run the Simulation for 100 seconds.

Output and Plot

_images/Figure-59.png

Figure-59: Application Metrics window

Discussion

From the results, it is evident that there is no data transmission since wireless node-2 is outside the range of wireless node-1. The range-based parameter is set to 50 meters, whereas wireless node-2 is placed 80 meters away from wireless node-1.

Case 3: Range Based Pathloss with Node Mobility.

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-60.png

Figure-60: For studying the range based pathloss with ping pong in nature

Network Settings

  1. Set grid length as 400 x 200 from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. Drop 2 wireless node and 1 Ad hoc link in Grid environment,

  3. Device placements of wireless nodes are:

Device

X-Coordinate

Y-Coordinate

Wireless Node-1

100

150

Wireless Node-2

180

150

Table-19: Device Placements

  1. Click on link and expand right-hand side property panel and set Channel Characteristics: Pathloss, Pathloss model to Range based, Range(m)=100 under medium property.

  2. Click on Wireless node and expand right-hand side property panel and set Mobility model: No-mobility to Wireless node 1 and Mobility model: File based mobility to wireless node 2 under position property.

  3. The file-based mobility pattern specifies that at the 0th second, wireless node 2 will be within range, and at the 5th second, it will move out of range. This cycle of moving in and out of range every 5 seconds repeats continuously for 50-seconds.

_images/Figure-61.png

Figure-61: Mobility.csv file

  1. Click on the set traffic tab present in the top ribbon, create a CBR Application with 11Mbps generation rate (Set packet size: 1460, Inter Arrival Time: 1061.81 µs) from wireless node-1 to wireless node-2. Set Transport protocol to UDP and set start time to zero

  2. Clicking on wireless node 1 will open a right-hand side property panel and go to Network layer, enable Static IP Route and configure static route via GUI from Wireless node 1 to Wireless node 2 as shown in below table.

Devices

Network Destination

Gateway

Subnet Mask

Metrics

Interface ID

Wireless node 1

192.169.0.3

192.169.0.3

255.255.255.255

1

1

Table-20: Static route configuration for wireless nodes.

  1. In NetSim GUI Application and link throughput vs time plot should be enabled.

  2. Run the Simulation for 55 seconds.

Output and Plot

_images/Figure-62.png

Figure-62: Application Metrics window.

  1. Open the Application throughput vs. Time plot and uncheck the Accelerate plotting and observe the below plot

_images/Figure-63.png

Figure-63: Application throughput vs. Time.

Discussion

The observed results from the plot indicate that data transmission commences at the 0th second and continues until the 5th second, followed by a pause in transmission until the 10th second. Transmission then resumes from the 15th second and ends at 20th second. This pattern repeats until the 50th second. This behavior aligns with the mobility pattern defined for wireless node-2, in which it is within a 100-meter range of wireless node-1 for the first 5 seconds, and then moves out of range for the next 5 seconds, and so forth.

Case 4: Range Based Pathloss with Multi-hop Communication.

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-64.png

Figure-64: Scenario for studying the range based pathloss model with multihop communication

Network Settings

  1. Set grid length as 400 x 200 from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. Drop 3 wireless node and 1 Ad hoc link in grid environment,

  3. Device placements of wireless nodes are:

Device

X-Coordinate

Y-Coordinate

Wireless Node-1

100

150

Wireless Node-2

140

150

Wireless Node-3

180

150

Table-21: Device Placements

  1. Click on link and expand right-hand side property panel and set Channel characteristics: pathloss, pathloss model to Range based, Range(m)=50 under medium property.

  2. Click on wireless node and expand right-hand side property panel and set Mobility model: No-mobility to 3 devices under position property.

  3. Configure an application between any two nodes by selecting a CBR application with 11Mbps generation rate (Set packet size: 1460, Inter arrival time: 1061.81 µs) from wireless node-1 to wireless node-3 from the set traffic tab. Set transport protocol to UDP and set start time to zero.

  4. Clicking on wireless node 1 and wireless node 2 will open a right-hand side property panel and go to Network layer, enable Static IP Route and configure static route via GUI from wireless node 1 to wireless node 2 and from wireless node 2 to wireless node 3 as shown in below table.

Devices

Network Destination

Gateway

Subnet Mask

Metrics

Interface ID

Wireless node 1

192.169.0.4

192.169.0.3

255.255.255.255

1

1

Wireless node 2

192.169.0.4

192.169.0.4

255.255.255.255

1

1

Table-22: Static route configuration for Wireless Node 1 and 2

  1. Enable throughput vs time plot under Application and link performance by clicking on plots/logs tab in right panel.

  2. Run the simulation for 100 seconds.

Output and Plot

_images/Figure-65.png

Figure-65: Application Metrics window.

_images/Figure-66.png

Figure-66: NetSim Plot window.

In the packet trace, filter packets of type Control Packet Type/APP Name to APP1 CBR. Now you can observe multi-hop communication between node 1 and wireless 3 via node 2. The configuration involves an application from wireless node 1 to wireless node 3, with a range-based parameter set at 50 meters. The direct distance between wireless node 1 and wireless Node 3 is 80 meters, which exceeds the specified range. However, wireless node 2 is within range of both wireless node 1 and wireless node 3, acting as an intermediate node. Therefore, wireless node 1 utilizes wireless node 2 for data transmission, enabling effective multi-hop communication despite the distance constraints.

_images/Figure-67.png

Figure-67: Data transmission from WN1 to WN2

_images/Figure-68.png

Figure-68: Filter the Packet Id to 1

Case 5: Range Based Pathloss with Multi-hop Communication and Node Mobility

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-69.png

Figure-69: Scenario for studying the range based pathloss model with Multihop and node mobility

Network Settings

  1. Set grid length as 500 x 250 from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. Drop 3 wireless node and 1 Ad hoc link in Grid environment,

  3. Device placements of wireless nodes are:

Device

X-Coordinate

Y-Coordinate

Wireless Node-1

0

200

Wireless Node-2

50

200

Wireless Node-3

100

200

Table-23: Device Placements

  1. Click on link and expand right-hand side property panel and set Channel characteristics: Pathloss, Pathloss model to Range based, Range(m)=50 under medium property.

  2. Click on wireless node and expand right-hand side property panel and set mobility model: No-mobility for wireless node 1 and mobility model: File based mobility for wireless node 2 and wireless node 3 under position property.

  3. The file-based mobility file specifies the following sequence: At the 0th second, both wireless node 2 (WN2) and wireless Node 3 (WN3) will be out of range. By the 10th second, wireless node 2 will move within range of wireless node 1, while wireless node 3 remains out of range. Starting from the 20th second, wireless node 2 will stay within range, and wireless node 3 will also come into range of wireless node 2. This setup dictates the mobility and connectivity pattern for the nodes throughout the simulation.

_images/Figure-70.png

Figure-70: Mobility.csv file

  1. Click on the set traffic tab present in the top ribbon, create CBR application with 11Mbps generation rate (set packet size: 1460, Inter arrival time: 1061.81 µs) from wireless node-1 to wireless node-2 and wireless node-1 to wireless node-3. Set Transport protocol to UDP and set start time to zero.

  2. Clicking on wireless node 1 and wireless node 2 will open a right-hand side property panel and go to Network layer, enable static IP route and configure static route via GUI from wireless node 1 to wireless node 2 and from wireless node 2 to wireless node 3 as shown in below table.

Devices

Network Destination

Gateway

Subnet Mask

Metrics

Interface ID

Wireless node 1

192.169.0.4

192.169.0.3

255.255.255.255

1

1

Wireless node 1

192.169.0.3

192.169.0.3

255.255.255.255

1

1

Wireless node 2

192.169.0.4

192.169.0.4

255.255.255.255

1

1

Table-24: Static route configuration for wireless nodes 1 and 2

  1. In NetSim GUI Application throughput vs time and Link throughput vs time plots should be enabled.

  2. Run the simulation for 60 seconds

Output and Plot

_images/Figure-71.png

Figure-71: Application Metrics window.

_images/Figure-72.png

Figure-72: NetSim Link Throughput plot window.

_images/Figure-73.png

Figure-73: Application 1 Throughput Plot window.

_images/Figure-74.png

Figure-74: Application 2 Throughput Plot window.

Case 6: Range Based Pathloss. Nodes within range and beyond range. Broadcast Application

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-75.png

Figure-75: Scenario for studying the range based pathloss within range out-of-range with broadcast application

Network Settings

  1. Set grid length as 600 x 300 from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. Drop 3 wireless node and 1 ad hoc link in grid environment,

  3. Device placements of wireless nodes are:

Device

X-Coordinate

Y-Coordinate

Wireless Node-1

0

200

Wireless Node-2

50

200

Wireless Node-3

200

200

Table-25: Device Placements

  1. Click on link and expand right-hand side property panel and set Channel characteristics: Pathloss, Pathloss model to Range based, range(m)=100 under medium property.

  2. Click on wireless node and expand right-hand side property panel and set Mobility model: No-mobility for all the nodes under position property and set Interface-1(wireless), Data link layer, Medium access protocol to DCF.

  3. Click on the set traffic tab present in the top ribbon, create broadcast CBR application with 11Mbps generation rate (Set packet size: 1460, Inter arrival time: 1061.81 µs) from wireless node-2. Set Transport protocol to UDP and set start time to zero.

  4. Run the simulation for 100 seconds.

Output

_images/Figure-76.png

Figure-76: Data transmission from WN1 to WN2

From the packet trace analysis, it is evident that data transmission occurs between wireless node 1 (WN1) and wireless node 2 (WN2), but not between WN2 and WN3. This outcome is due to the broadcast application configured from WN2, with a range-based path loss setting of 100 meters. Since WN1 is within this range of WN2, data transmission is successfully occurring. However, WN3 is positioned outside the 100-meter range, resulting in no data transmission between WN2 and WN3.

_images/Figure-77.png

Figure-77: Application Metrics window.

Case 7: Range Based Pathloss. Transmission Failure due to Interference.

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-78.png

Figure-78: Scenario for studying the range based pathloss Transmission failure due to interference from neighboring transmissions

Network Settings

  1. Set grid length as 400 x 200 from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. Drop 4 wireless node and 1 Ad hoc link in grid environment,

  3. Device placements of wireless nodes are:

Device

X-Coordinate

Y-Coordinate

Wireless Node-1

0

150

Wireless Node-2

50

150

Wireless Node-3

110

150

Wireless Node-4

140

150

Table-26: Device Placements

  1. Click on link and expand right-hand side property panel and set Channel Characteristics: Pathloss, Pathloss model to Range Based, Range(m)=100.

  2. Click on Wireless node and expand right-hand side property panel and set Mobility Model: No-Mobility for all the nodes under position property and set Interface-(Wireless), Data Link Layer, Medium access protocol to DCF.

  3. Click on the set traffic tab present in the top ribbon, create CBR application with 11Mbps generation rate (Set Packet size: 1460, Inter Arrival Time: 1061.81 µs) from Wireless Node-1 to Wireless Node-2 and Wireless Node-3 to Wireless Node-4. Set Transport Protocol to UDP and Set start time to zero.

  4. Run the Simulation for 100 seconds.

Output

In this scenario we have traffic from WN1 to WN2 and from WN3 to WN4. Note however that WN2 is within the range of WN3. In this scenario there is no successful data transmission between WN1 to WN 2. This is because WN2 is within the range of WN 3 which is transmitting to WN4. Packets sent from WN1 cannot be successfully received (decoded) at WN2 due to the interference of the WN3 to WN4 transmission.

_images/Figure-79.png

Figure-79: Application Metrics. We see that the first application has NIL throughput while the second application sees throughput.

Case 8: Range Based Pathloss. Carrier sense (CS) blocking due to neighboring transmissions.

The following network diagram illustrates what the NetSim UI displays when you open the example configuration file.

_images/Figure-80.png

Figure-80: Scenario for studying the range based pathloss Carrier sense (CS) Blocking due to neighboring transmissions.

Network Settings

  1. Set grid length as 400 x 200 from grid setting property panel on the right. This needs to be done before any device is placed on the grid.

  2. Drop 4 wireless node and 1 Ad hoc link in Grid environment,

  3. Device placements of wireless nodes are:

Device

X-Coordinate

Y-Coordinate

Wireless Node-1

50

150

Wireless Node-2

0

150

Wireless Node-3

100

150

Wireless Node-4

160

150

Table-27: Device Placements

  1. Click on link and expand right-hand side property panel and set Channel Characteristics: Pathloss, Pathloss model to Range Based, Range(m)=100.

  2. Click on Wireless node and expand right-hand side property panel and set Mobility Model: No-Mobility for all the nodes under position property and set Interface-(Wireless), Data Link Layer, Medium access protocol to DCF.

  3. Click on the set traffic tab present in the top ribbon, create CBR Application with 11Mbps generation rate (Set Packet size: 1460, Inter Arrival Time: 1061.81 µs) from Wireless Node-1 to Wireless Node-2 and Wireless Node-3 to Wireless Node-4. Set Transport Protocol to UDP and Set start time to zero.

  4. Run the Simulation for 100 seconds.

Output

We observe that Wireless Node 1 (WN1) is within the range of Wireless Node 2 (WN2) and Wireless Node 3 (WN3), and WN3 is also within range of Wireless Node 4 (WN4). We have configured one application from WN1 to WN2 and another from WN3 to WN4.

In this scenario, WN1 is within the carrier sense range of both WN3 and WN4. Consequently, when WN3 transmits data to WN4, WN1 will delay its transmission due to carrier sense blocking, as it detects the active transmission nearby. Similarly, when WN1 is transmitting data to WN2, WN3 will wait before transmitting to WN4, as it is within the carrier sense range of WN1.

_images/Figure-81.png

Figure-81: Application Metrics window

On the other hand, with only WN1-WN2 transmission the obtained throughput is 5.92 Mbps and with only WN3-WN4 transmission the throughput is 5.91 Mbps. We see that when both transmissions are occurring simultaneously the individual throughputs drop to 3.62 Mbps and 3.59 Mbps due to carrier sense blocking.

Previous Next

© Copyright 2025, TETCOS LLP.

Built with Sphinx using a theme provided by Read the Docs.