Application of a network dynamics analysis tool to mobile ad hoc networks

Violet Syrotiuk, K. Shaukat, Y. J. Kwon, M. Kraetzl, J. Arnold

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

We present an application of the Redback network dynamics analysis tool to mobile ad hoc networks. Our goal is to understand the network properties that arise from different mobility models and to quantify how these differences impact communications. We generate input for Redback as a graph series for varying node density and speed in the random waypoint, reference point group, freeway, and Manhattan mobility models by sampling network topology in the ns-2 network simulator, The graph series are analyzed using several distance and metric measures in the Redback tool and visualized as a time series, one of the Redback output displays. We rind measurable differences among mobility models that may impact mobile communications and influence protocol design.

Original languageEnglish (US)
Title of host publicationACM MSWiM 2006 - Proceedings of the Ninth ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
PublisherAssociation for Computing Machinery (ACM)
Pages36-43
Number of pages8
ISBN (Print)1595934774, 9781595934772
DOIs
StatePublished - 2006
EventACM MSWiM 2006 - 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems - Malaga, Spain
Duration: Oct 2 2006Oct 6 2006

Publication series

NameACM MSWiM 2006 - Proceedings of the 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
Volume2006

Other

OtherACM MSWiM 2006 - 9th ACM Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
Country/TerritorySpain
CityMalaga
Period10/2/0610/6/06

Keywords

  • Mobile ad hoc networks
  • Network analysis
  • Time series

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Application of a network dynamics analysis tool to mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this