A Group Mobility Model for Ad Hoc Wireless Networks

A Group Mobility Model for Ad Hoc Wireless Networks

A Group Mobility Model for Ad Hoc Wireless Networks Xiaoyan Hong, Mario Gerla, Guangyu Pei and Ching-Chuan Chiang Computer Science Department University of California Los Angeles, CA 90095-1596 hxy, gerla, pei, [email protected] Abstract cess to distributed resources (e.g., distributed database ac- cess for situation awareness inthe battlefield). In this paper, we present a survey of various mobility The hosts in an ad hoc network move according to var- models in both cellular networks and multi-hop networks. ious patterns. Realistic models for the motion patterns are We show that group motion occurs frequently in ad hoc net- needed in simulation in order to evaluate system and pro- works, and introduce a novel group mobility model - Refer- tocol performance. Most of the earlier research on mobil- ence Point Group Mobility (RPGM) - to represent the rela- ity patterns was based on cellular networks. Mobility pat- tionship among mobile hosts. RPGM can be readily applied terns have been used to derive traffic and mobility predic- to many existing applications. Moreover; by proper choice tion models in the study of various problems in cellular sys- of parameters, RPMG can be used to model several mobil- tems, such as handoff, location management, paging, regis- ity models which were previously proposed. One of the main tration, calling time, traffic load. Recently, mobility models themes of this paper is to investigate the impact of the mo- have been explored also in ad hoc networks. While in cellu- bility model on the performance of a specijc network proto- lar networks, mobility models are mainly focused on indi- col or application. To this end, we have applied our RPGM vidual movements since communications are point to point model to two different network protocol scenarios, cluster- rather than among groups; in ad hoc networks, communica- ing and routing, and have evaluated network pedormance tions are often among teams which tend to coordinate their under dtzerent mobility patterns and for different protocol movements (e.g., a firemen rescue team in a disaster recov- implementations. As expected, the results indicate that dtf- ery situation). Hence, the need arises for developing effi- ferent mobility patterns affect the various protocols in dtf- cient and realistic group mobility models. ferent ways. In particular; the ranking of routing algorithms Clearly, mobility models are application dependent. is influenced by the choice of mobility pattern. Moreover, we expect that the various mobility patterns will affect the performance of different network protocols in dif- ferent ways. Thus, we are developing a flexible mobility 1 Introduction framework which allows us to model different applications and network scenarios (e.g., individual and group; cellular Ad hoc wireless networks are networks which do not rely and ad hoc, etc) and to identify the impact of mobility on on a pre-existing communication infrastructure. Rather, different scenarios. The proposed mobility framework is they maintain a dynamic interconnection topology between called Reference Point Group Mobility (RPGM) model. In mobile users, often var multihoping. Ad hoc networks are the model, mobile hosts are organized by groups according expected to play an increasingly important role in future to their logical relationships. We study the impact of mobil- civilian and military settings where wireless access to a ity on: (a) network topology connectivity and; (b) routing wired backbone is either ineffective or impossible. Ad hoc protocols. We use DSDV [18], AODV [17] and HSR [16] network applications range from collaborative, distributed for the evaluation and comparison of routing scheme perfor- mobile computing to disaster recovery (fire, flood, earth- mance. Next, as we believe that a clustering infrastructure quake), law enforcement (crowd control, search and rescue) [9] can reduce the impact of topology changes on routing, and digital battlefield communications. Some key charac- we study the mobility impact on cluster stability as well. teristics of these systems are team collaboration of large This paper is organized as follows. A survey of mobil- number of mobile units, limited bandwidth, the need for ity models both in cellular systems and ad hoc networks supporting multimedia real time traffic and low latency ac- is given in section 2. Section 3 focuses on group mobil- 53 ity models. The Reference Point Group Mobility model is mathematically gives the conditions for movements from introduced and several mobility applications are described. the current region into the next region. His tracking of mo- The simulation results highlighting the influence of group bility leads to the calculation of channel holding time and mobility models on connectivity, cluster stability and rout- handover number. Decker characterizes an individual MH ing performance are given in section 4. Section 5 concludes with the mean duration of stay in the current position and the paper. the probability of choosing a moving path. A pre-designed state-transit matrix can give the mobile host a motion pat- 2 Existing Mobility Models for Cellular and tern such as moving on a highway, on streets or just like a Ad Hoc Wireless Networks random pedestrian. Haas [I l] presents a Random Gauss-Markov model for cellular networks. His model includes the random-walk In a wireless network, mobile hosts (MHs) can move in model (totally random) and the constant velocity model many different ways. Mobility models are commonly used (zero randomness) as its two extreme cases. to analyze newly designed systems or protocols in both cel- Some mobility studies in cellular system focus on traffic lular and ad hoc wireless networks. In cellular wireless net- modeling [ 15, 141 since the motion of mobile hosts affects works, studies for mobility models not only aim at describ- the traffic load. A simple example [14] of this approach ing individual motion behaviors such as changes in direc- defines traffic passing between cells as a function of cell tion and speed, but also consider the collective motion of population. If the population of region i is the traffic all the mobiles relative to a geographical area (cell) over Pi, passing between region i and j can be described as time. Models for ad hoc network mobility generally reflect Tivj = is the transit parameter. The model can be the behavior of an individual mobile, or a group of mobiles. Ki,jPiPi. Ki,j used to different scales, from world wide to nation wide or But there is no notion of collective movement of all mobiles a metropolitan area. with reference to a particular “cell”. 2.1 Mobility Models Used in Cellular net- 2.2 Mobility Models Used in Ad hoc Net- works works In a cellular wireless network there is a base station in In ad hoc wireless mobile networks, the mobility models the center of each cell. Calls originate or terminate in the focus on the individual motion behavior between mobility service areas of the base stations. When MHs cross cell epochs, which are the smallest time periods in a simulation boundaries, call hand-offs occur. Based on host mobility, in which a mobile host moves in a constant direction at a various research topics are addressed, such as, handoff, lo- constant speed. cation management, paging, registration, calling time and Many researchers use the random mobility model [21, traffic load. The mobility models are used for aggregated 201. According to this model, the speed and direction of traffic estimation and for mobility tracking. motion in a new time interval have no relation to their past The most common model is the random walk model. values in the previous epoch. This model can generate un- It has been used by many authors such as Rubin [19], realistic mobile behavior such as sharp turning or sudden Zonoozi [21], Decker [8] and Bar-Noy [2]. The model de- stopping. scribes individual movement relative to cells. In this model, Some authors use modified versions of the random mo- a mobile host moves from its current position to the next bility model. Basagni [3] describes the movement of MHs position randomly. The speed and direction are picked uni- in their simulation for the DREAM protocol such that a formly from the numerical ranges [urnin, v,,,] and [0,2n] MH has a random direction at every simulation clock tick, respectively. In a typical Markovian model [2] for one di- but a constant speed during the entire simulation period. mensional random walk, a MH in cell i is assumed to move The mobility model in Ko’s simulation for the LAR rout- to cells i + 1, i - 1 or to stay in cell i with given transition ing protocol [ 131 allows MHs to move along a path which probabilities. is made up of several segments. The segment lengths are The random walk model has been used to investigate a exponentially distributed and the direction of each seg- broad set of different system parameters. For example, Ru- ment is randomly chosen. Speed is distributed uniformly bin uses the random movement assumption to get the mean between[v - a, u + a!]. In Das’s model [7], a node chooses cell sojourn time E(S) first, then to derive many other sys- its speed, direction and distance based on a pre-defined dis- tem measures. Zonoozi conducts a systematic tracking of tribution, then calculates its next destination and the time to the random movement of a MH. At each instant, he parti- reach it. When the node reaches that point, it calculates a tions the whole area into several regions according to previ- new destination and time period to reach it again. ous, current and next motion directions of a mobile host. He Johnson’s Random Waypoint mobility model [12] is 54 also an extension of random walk. This model breaks the 3.1 Previous Work entire movement of a MH into repeating pause and motion periods.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us