Beyond the EU: DORA and NIS 2 Directive's Global Impact
Mobility model for convex areas
1. Obstruction Avoidance Generously
Mobility (OAGM) a new Obstacle
Mobility Model Based on Graph-Theory
17-Apr-2014 V.Vasanthi-10JLDRCS002 1
Research Scholar:
V.Vasanthi
10JLDRCS002
Dept. Computer Science
Karpagam University
Research Guide:
Dr. M. Hemalatha
Prof. Dept. Computer
Science
Karpagam University
2. Introduction
Aim and Objectives
Background(Literature Review)
Methodology
Results and Discussions
Conclusion
Future work
References
17-Apr-2014V.Vasanthi-10JLDRCS002 2
3. Ad-hoc and Sensor Network
• It is a self-configuring of nodes connected by wireless
link
• It forms an arbitrary topology
• It is distributed sensing and processing in wide range of
applications
• It consists of new concepts and optimization problems
openly
Mobility Model
• plays a vital role in movement
• dictates to the nodes their initial places and movement
patterns
• emulate real-life Scenarios
17-Apr-2014V.Vasanthi-10JLDRCS002 3
4. Contd..
Aspects of Mobility Models
User friendly
Sufficient and easy to understand
Mathematical properties
Scope and Validity
Realistic model(i.e)
It is not restricted in pre-defined pathways. The movement
pattern of the nodes in a natural way. The types of
Environments such as Urban, Social, emergency services
like fire station, healthcare etc.
Mobility model is divided into sub-models are
Environmental model
Movement pattern model
Signal Blocking model
17-Apr-2014V.Vasanthi-10JLDRCS002 4
6. To Create a new movement model
Movement patterns of all types of nodes that are
suitable for any environment without any predefined
paths in Ad-hoc Wireless sensor Network
Incorporate obstacles
Construct realistic movement (i.e) all types of Real
Environment
Determine movement pattern, signal blocking and
environment regions created by obstacles
17-Apr-2014V.Vasanthi-10JLDRCS002 6
7. 17-Apr-2014V.Vasanthi-10JLDRCS002 7
– The Existing Mobility Model mainly focused on movement
patterns of the nodes that are suited for limited
Environments with predefined paths.
– Few existing models does not consider obstacles. In
Obstacle Mobility model a Pre-defined pathways are used to
analyze the movement patterns.
– Mission Critical Mobility(MCM) model the nodes movement
in the simulation terrain without restrictions where the edge
detection is followed.
– To solve the above problems a new model was proposed by
using graph theory technique for movement patterns of all
types of nodes that are suitable for any environment without
any predefined paths.
8. Survey of Existing Models
Performance Analysis of existing Mobility Models
Design of a new Realistic obstacle based mobility
Model (OAGM)
• Performance analysis of Proposed model.
17-Apr-2014V.Vasanthi-10JLDRCS002 8
11. 17-Apr-2014V.Vasanthi-10JLDRCS002 11
Mobility Models Type Movement pattern
Random Walk Mobility Model
(Zonoozi & Dassanayake)
Entity model
Randomly chooses S/D with
TI
Random Waypoint Mobility Model
(Johnson)
Entity model
Select the destination
randomly and distributed
SPD
Random Direction Mobility Model
(Johnson)
Entity Model Change S/D in time Slot
Realistic mobility model
(A.Kamal, J.AI-Karaki)
Entity Model
S/D follows Distributed
Nodes
A Boundless Simulation Area Mobility
Model
(Z.Hass)
Entity Model Pre-S/D follows with new
12. 17-Apr-2014V.Vasanthi-10JLDRCS002 12
Mobility Models Type Movement pattern
Gauss-Markov Mobility Model
(Z.Hass)
Temporal
dependency model
Different level of parameters
City Section Mobility Model
(V.Davies )
Temporal
Dependency
Street in a city -Realistic movement
Reference Point Group Model
(X. Hong, M. Gerla, G. Pei, C. –
C. Chiang)
Group Model Group leader-Member
Column Mobility Model
(Sanchez)
Group Model Straight line- change in time slot
Pursue mobility model
(Sanchez)
Group Model Chance the target
Nomandic Community mobility
model (Sanchez):
Group Model Common reference point
Manhattan mobility model
(F.Bai , sadagopan, A.helmy)
Geographic/Realist
ic model
Vanet-Urban area-vertical/Horizontal
13. Mobility Models Type Movement pattern
Obstacle Mobility Model
( A.Jardosh)
Realistic/Geographic
Restriction model
pre-defined path(Voronoi
diagram-obstacle)
Pathway mobility model
( J.Tian )
Realistic/Geographic
Restriction model
Predefined edges –street and
pathways
Freeway mobility model
( F.Bai ,N.sadagopan, A.helmy )
Geographic Restriction
model
Lane of a freeway
Environment mobility model
( H.Babaei )
Geographic Restriction
model
Geometric and non-geometric
with different factors
Obstacle aware mobility model
( S.Ahmed ):
Geographic Restriction
model
Anchor concept, Not consider
Ad-hoc
Obstacle based on social networks
( P.Venkateswaran)
Geographic Restriction
model
Social network-with obstacle
Mission Critical mobility model
( C.Papageorgiou)
Geographic Restriction
model
Add-on of OM model-
Emergency, health care etc.
17-Apr-2014V.Vasanthi-10JLDRCS002 13
14. Proactive protocols
◦ Traditional distributed shortest-path protocols
◦ Maintain routes between every host pair at all times
◦ Based on periodic updates; High routing overhead
◦ Example: DSDV (destination sequenced distance vector)
Reactive protocols
◦ Determine route if and when needed
◦ Source initiates route discovery
◦ Example: DSR (dynamic source routing-Johnson96)
Hybrid protocols
◦ Adaptive; Combination of proactive and reactive
◦ Example : ZRP (zone routing protocol)
17-Apr-2014V.Vasanthi-10JLDRCS002 14
15. Reactive or On Demand
Developed at CMU in 1996
Route discovery cycle used for route finding – on Demand
Maintenance of active routes
No periodic activity of any kind – Hello Messages in AODV
Utilizes source routing (entire route is part of the header)
Use of caches to store routes
Supports unidirectional links -> Asymmetric routes are
supported
17-Apr-2014V.Vasanthi-10JLDRCS002 15
16. Routes maintained only between nodes who need to
communicate
reduces overhead of route maintenance
Route caching can further reduce route discovery
overhead
A single route discovery may yield many routes to the
destination, due to intermediate nodes replying from
local caches
17-Apr-2014V.Vasanthi-10JLDRCS002 16
17. Mobility
Models
Average
Connectivity
Graph
Protocol
Performance
Performance
Metrics
Random waypoint(RWP)
Reference Point Group Mobility(RPGM)
Gauss-Markov Mobility model(GM)
Manhattan Mobility Model(MHN)
Mission Critical Model(MCM)
1.Generated Packets
2.Packet Delivery Ratio%
3.End to End Delay
4.Dropped data
5.Control Overhead
6.Received Packets
DSR
17-Apr-2014V.Vasanthi-10JLDRCS002
17
Performance of Different Mobility models
18. 17-Apr-2014V.Vasanthi-10JLDRCS002 18
Duration 300s
Traffic Sources CBR, 512 byte packet, 4 packets per second
Transport protocol UDP
MAC protocol Mac/802.11
N/W interface Phy/wireless phy
Propagation model Two ray ground
Radius of node 250m
Antenna Omni Antenna
Area Size 1000m*1000m
Mobility Models RWP,MHN,RPGM,MCM,GM, OAGM
No of Nodes 50-250 (interval of 50)
Speed m/s 0-10m/s (interval of 2m/s)
Table: Simulation Parameter set
19. Performance metrics:
1.Generated Packets: The Number of packets send.
17-Apr-2014V.Vasanthi-10JLDRCS002 19
No of
Nodes
50 100 150 200 250
No of
Packets
generated
3480 5798 9272 11586 13898
Simulation Results
Here, all the mobility models use the nodes 50-250
(with the interval nodes of 50) with different Speed
0 to 10 ms with the time interval of 2ms (maximum
speed = 10 m/s). The Generated Packets (GP)
remains same even in the change of number of
Speed varies.
20. 17-Apr-2014V.Vasanthi-10JLDRCS002 20
The ratio of the data packets delivered to the destinations
to those generated by the sources. Mathematically, it can
be expressed as:
where p is the Ratio of successfully delivered packets, c
is the total number of flow or connections, f is the unique
flow id serving as index, Rf is the count of packets
received from flow f and Nf is the count of packets
transmitted to f.
21. This includes all possible delays caused by buffering during route
discovery latency, queuing at the interface queue, retransmission
delays at the MAC, and propagation and transfer times. It can be
defined as:
where D is the number of successfully received packets, i is
unique packet identifier, ri is time at which a packet with unique
id i is received, si is time at which a packet with unique id i is sent
and D is measured in ms. It should be less for high performance.
17-Apr-2014V.Vasanthi-10JLDRCS002 21
Performance metrics
22. 17-Apr-2014V.Vasanthi-10JLDRCS002 22
The ratio of the data packets not delivered to the
destinations to those generated by the sources.
Mathematically, it can be expressed as:
where DP is the Number of Dropped Packets, i is unique
packet identifier, ri is time at which a packet with unique
id i is received, si is time at which a packet with unique
id add with it and N is the number of connections, flows,
i is sent .
Performance metrics
24. 17-Apr-2014V.Vasanthi-10JLDRCS002 24
6.Received Packets (RP)
It is defined as number of packets received to the
destination successfully. It is declared as Rf i.e
count of packets received from flow f
Performance metrics
25. Random Models are not realistic.
Group models will take more time to reach
Destination from source.
Geographic Restriction Models use obstacle by
assumption in the simulation terrain which is not
realistic.
Obstacle models are restricted in pre-defined
pathways.
The MCM model nodes moves to the destination
through the edges of obstacles.
These models are not in real-life trace. The MCM
model is best suited only for emergency and health-
care. In these models PDR is low result and End to
End delay high variance.
17-Apr-2014V.Vasanthi-10JLDRCS002 25
26. Networks can be represented by graphs
The mobile nodes are vertices
The communication links are edges
17-Apr-2014V.Vasanthi-10JLDRCS002 26
Vertices
Edges
27. In this model the Features are as follows
1. Node Movement process
2. Hierarchical node organization
3. Physical obstacle placement
4. Source selection and Destination selection
17-Apr-2014V.Vasanthi-10JLDRCS002 27
28. 17-Apr-2014V.Vasanthi-10JLDRCS002 28
Step1 : Placement of Obstacle i.e. Rectangle or Square
Step2 : Placement of nodes randomly
Step3: Select the nodes initial point and obstacle position are
stored in files
Step4 : Movement process using graph theory(Hybrid bellman-
ford Dijkstra )
Step5 : Selecting min and max Speed
Step6 : Shortest path is finding and then repeat until it
reach the Destination
Step7: Check whether obstacle is available if not reach
the destination
Step8: If is obstacle is available then step 4
Step 9: Till Simulation time ends
Step 10: Stop process
29. 17-Apr-2014V.Vasanthi-10JLDRCS002 29
Algorithm1: The Movement Node Process
i = 0
Ci S
While there is an obstacle between Ci and D do
if ||D - Ni1|| ≤ ||D - Ni2|| then
if Mindis(V1,V2) = =1
Q1=Rp(V)
Else
Ni1V (Mindis[V1|V2])
Qi Ni1
else
QiNi2
end if
Q Q + {Qi}
Ci+1 Qi
i i + 1
end while
Qi D
RETURN Q
Features of the Proposed OAGM
1.Node Movement Process
30. 17-Apr-2014V.Vasanthi-10JLDRCS002 30
Figure 1: An example of how a node moves towards its destination point
around the obstacles in the network area according to the Proposed mobility
model.
31. Figures: An example of how a node moves towards its destination point around the
obstacles in the network area according to the Proposed mobility model.
17-Apr-2014V.Vasanthi-10JLDRCS002 31
32. 17-Apr-2014V.Vasanthi-10JLDRCS002 32
Hybrid Bellman ford algorithm to find the
shortest path
Initialization
d(v) ∞← , for all v є V
π(v) ← nil, for all v є V
d(s) ← 0
Relax(u, v)
if d(u) + c(u, v) < d(v)
d(v) ← d(u) + c(u, v)
π (v) ← u
Plain scan
for each edge (u, v) є E
Relax(u, v)
Dijkstra scan
S ← є
while (there is a vertex in V S with d < ∞) do
find vertex u in V S with the minimal value of d
S ← S {є u}
for each edge (u, v) ∈ E /* scanning u */
Relax(u, v)
Dijkstra(G, s)
Initialization
Dijkstra scan
return(d, )
Bellman-Ford(G, s)
33. 17-Apr-2014V.Vasanthi-10JLDRCS002 33
Initialization
i ← 0
do
i++
Plain scan
until ((there was no change of d at Plain scan) or (i = |V |))
if (i < |V |) return(d, )
else return(”There exists a negative cycle reachable from s.”)
Algorithm Bellman-Ford-Dijkstra (BFD) is as follows:
Bellman-Ford-Dijkstra (G, s)
Initialization
i ← 0
do
i++
Dijkstra scan
until ((there was no change of d at Dijkstra scan) or (i = |V | − 1))
if (i < |V | − 1) return(d, )
else return(”There exists a negative cycle reachable from s.”)
Notice : BFD may be considered as a particular version of BF, since at each
round, Relax is executed on all edges reachable from s.
34. 17-Apr-2014V.Vasanthi-10JLDRCS002 34
2.Hierarchical Node Organization
•The nodes are organized in groups with a pre-
defined leader/group.
•GS Each group contains certain no of nodes.
•GS is a parameter that can be act based on specific
characteristics of the scenarios.
•Each member group is set the Destination selection
and a point within a constant distance from its leader’s
destination point referred as distance and begins
towards it.
35. The obstacle can be placed anywhere inside the
simulation area.
The shape normally assumed is rectangle or square.
We select the four corners as the block edges and
store them in a file to be used during mobility
generation.
The obstacle has to be placed before we place the
nodes in their initial position.
17-Apr-2014V.Vasanthi-10JLDRCS002 35
36. The source and destination nodes are selected
randomly from the total no. of nodes simulated.
We have taken approximately 5% of nodes in
communication at any given time during the
simulation interval.
Total 10% of the nodes will be either source or
destination and remaining nodes will work as
forwarding nodes.
17-Apr-2014V.Vasanthi-10JLDRCS002 36
63. – Existing mobility models like obstacle mobility model
forces the nodes to move in a predefined pathways still
some pathways will result in congestion.
– The Mission Critical Model(MCM) is a realistic model
that are restricted to the environment like Health Care
and Emergency services.
– The proposed Obstruction Avoidance Generously
Mobility(OAGM) model is realistic too, and can able to
place obstacle any where in the simulation terrain in
user friendly manner and suitable for any environment.
– The Overall Performance Result of this model gives
higher percentage of 2% than MCM mobility model.
17-Apr-2014V.Vasanthi-10JLDRCS002 63
65. I thank Karpagam University and Karpagam trust
members for doing my research at this
university with award of KURF supported Grant
Reference No:2265
17-Apr-2014V.Vasanthi-10JLDRCS002 65
66. Jardosh, E. Belding-Royer, K. Almeroth, (2005) S. Suri, Real-world environment
models for mobile network Evaluation, IEEE Journal on Selected Areas in
Communications 23 622–632.
Johnson, D. Maltz, 1996 Dynamic source routing in ad hoc wireless networks, in:
Mobile Computing, Kluwer Academic Publishers, pp. 153–181.
Guolong Lin, Guevara Noubir, and Rajmohan Raja-maran. 2004 Mobility Models
for Ad-hoc Network Simulation, Proceedings of INFOCOM,.
D. Shukla, 2001 Mobility models in ad hoc networks, Master's thesis, KRESIT-ITT
Bombay.
Ariyakhajorn, Jinthana Wannawilai, Pattana Sathitwiriyawong, Chanboon,2006 A
Comparative Study of Random Waypoint and Gauss-Markov Mobility Models in
the Performance Evaluation of MANET” Communications and Information
Technologies,. ISCIT Proceeding pp.894 - 899 .
Kamal, J. Al-Karaki, A new realistic mobility model for mobile ad-hoc networks, in:
IEEE International Conference on Communications, 2007, pp. 3370–3375.
Kapang Lego et. al.,2010 Comparative Study of Adhoc Routing Protocol AODV,
DSR and DSDV in Mobile Adhoc NETwork” Indian Journal of Computer Science
and Engineering 1(4): pp 364-371.
M. I. M. Saad and Z. A. Zukarnain,2009 “Performance Analysis of Random-based
Mobility Models in MANET Routing Protocol,” European Journal of Scientific
Research, 32(4): pp. 444-454.
17-Apr-2014V.Vasanthi-10JLDRCS002 66
67. Mission Critical Mobility model for ad hoc networks. <http://
w.w.wltl.ee.upatras.gr/mcm>.
Valentina Timcenko, Mirjana Stojanovic and Slavica Bostjancic Rakas,
“MANET Routing Protocols vs. Mobility Models: Performance Analysis and
Comparison”, Proceedings of the 9th WSEAS International Conference on
Applied Informatics and Communications (AIC '09), Moscow, Russia, August
20-22, 2009.
Natarajan Mehanathan “A simulation study on the impact of mobility models
on the network Connectivity, Hop Count and Lifetime of routes for Ad-Hoc
Networks” Informatics(2010) pp.207-22.
Natarajan Mehanathan “Impact of the Gauss-Markov Mobility Model on
Network Connectivity, Lifetime and Hop Count of Routes for Mobile Ad hoc
Networks” Journals of Networks 5(5),may2010 pp..
Christos Papageorgiou at el,2012.Modeling human mobility in obstacle-
constrained ad hoc networks” Ad-hoc Networks 10 pp.421-435
Youssef Saadi et al, 2012 Simulation Analysis of Routing Protocols using
Manhattan Grid Mobility Model in MANET, International Journal of Computer
Applications 45 (23), pp.24-30.
Y. Dinitz and R. Itzhak. Hybrid bellman-ford-dijkstra algorithm. Technical
Report CS-10-04,Ben-Gurion University of the Negev, 2010.
17-Apr-2014V.Vasanthi-10JLDRCS002 67
Contd.,
68. Vasanthi.V and Hemalatha.M, 2013. Simulation of Obstruction Avoidance
Generously Mobility (OAGM) Model using Graph-Theory Technique. Research
Journal of Applied Sciences, Engineering and Technology.5(07):2799-2808. ISI
Thomson-Scopus Indexed
Vasanthi.V and Hemalatha.M, 2012. Simulation and Evaluation of different mobility
model using DSR protocol Ad-hoc Sensor Network Using Bonnmotion Tool. Recent
Trends in Computer Networks and Distributed Systems Security SPRINGER LNCS
335:157-167.
Vasanthi,V and Hemalatha.M, 2012. Mobility Scenario of Dissimilar MobilityModel
using the DSR protocol in Ad-hoc Sensor network-A Survey. Spl Issue of Int. J.
Computer Applications 1(4):1-14. Impact Factor:0.814
Vasanthi.V and Hemalatha.M, 2012. A Proportional Analysis of Dissimilar Mobility
Models in Ad-Hoc Sensor Network over DSR Protocol. Int. J. Computer Applications
42(15): 26-32.
Vasanthi.V, Ajith Singh.N, Romen Kumar.M and Hemalatha.M, 2011. A Detailed
Study of Mobility Model in Sensor Network. Int. J. Theoretical and Applied
Information Technology, 33(1): 7-14 (Impact Factor: 1.71 Scopus Indexed).
Vasanthi.V and Hemalatha.M, 2011. Empirical Study on Security Attacks in Wireless
Sensor Network. Int. J. Advanced Research in Computer Science, 2(1):23-28.
Vasanthi.V, Nagarajan.P, Bharathi.B and Hemalatha.M, 2010. A Perspective
Analysis of Routing Protocols in Wireless Sensor Network. Int. J. Computer Science
and Engineering 2(8):2511-2518.
17-Apr-2014V.Vasanthi-10JLDRCS002 68
69. International and National Conference
Vasanthi. V and Hemalatha.M, 2013. Obstruction Avoidance Generously Mobility Model for Adhoc
and Sensor Networks- International Conference on Computer Science and Information Technology
(ICCSIT), Coimbatore, Feb 17.IOAJ sponsor
Vasanthi.V and Hemalatha.M,2012. Mobility Scenario of Dissimilar Mobility Model using the DSR
protocol in Ad-hoc Sensor network-A Survey –ICNICT2012 –Sri Krishna Institute of Engineering
and Science. Sep.7 & 8.pg.no 15-21.
Vasanthi.V and Hemalatha.M,2012. Simulation and Evaluation of different mobility model using
DSR protocol Ad-hoc Sensor Network Using Bonnmotion Tool -SNDS 2012-Indian Institute of
Information Technology and Management – Kerala. Springer Proc. Int. Conf. Recent Trends in
Computer Networks and Distributed Systems Security CCIS (335); pp 157-167 .
Vasanthi.V and Hemalatha.M, 2012. A Review on Path Planning Algorithms for Ad-Hoc Wireless
Sensor Network. National Conference on Simulations in Computing Nexus (NCSCN 12),
Coimbatore Institute of Engineering & Technology, Narasipuram, Thondamuthur(via), Coimbatore.
Mar. 2.
Vasanthi.V and Hemalatha.M 2011. Impact of Different Mobility Models using DSR Protocol for
Wireless sensor Networks. Proceeding of Int. Conf. on Networks Intelligence and Computing
Technologies (ICNICT 2011), Department of Computer Science, Karpagam University, Coimbatore
pp: 580-583, Dec 15-16.
Vasanthi,V, Ajith Singh.N, Romen Kumar.M and Hemalatha.M, 2011. Evaluation of Protocols and
Algorithms to improve the performance of Tcp/Ip over Wired/Wireless networks. Int. Conference
on Computational Intelligence and Information Technology (CIIT), Pune. Nov. 7&8. Springer
LNCS, Communication in Computer and Information Science, 250(1):521-525 (Scopus Indexed)
17-Apr-2014V.Vasanthi-10JLDRCS002 69