README 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. INET Wireless Tutorial ======================
  2. The INET Wireless Tutorial contains a series of simulation models numbered 1
  3. through 19. The models are of increasing complexity -- they start from the
  4. basics and introduce new INET features and concepts related to wireless
  5. communication networks.
  6. Each model is self-contained, with its number in the file names, so e.g.
  7. Wireless03.ned contains all the necessary NED definitions. (The omnetpp.ini
  8. file is shared among all simulation steps). It is recommended read the comments
  9. of the corresponding NED file first to understand what the given step is
  10. supposed to demonstrate.
  11. Script for the tutorial (work in progress)
  12. ==========================================
  13. The INET Wireless Tutorial contains a series of simulation models numbered. 1
  14. through 16. The models are of increasing complexity -- they start from the
  15. basics and introduce new INET features and concepts related to wireless
  16. communication networks.
  17. Each model is self-contained, with its number in the file names, so e.g.
  18. Wireless03.ned contains all the necessary NED definitions. (The omnetpp.ini file
  19. is shared among all simulation steps). It is recommended to read the comments of
  20. the corresponding NED file first to understand what the given step is supposed
  21. to demonstrate.
  22. 1) In the first step we set up a very basic network containing two nodes in
  23. communication range that exchange data. We demonstrate how to configure nodes
  24. with applications, place them in the physical environment, assign IP address to
  25. them, configure the wireless interface and set up statistics to measure the
  26. traffic. (constant bitrate UDP traffic) At the moment we are not interested
  27. whether the actual wireless exchange is realistic or not, we just want the data
  28. to get from one host to the other (i.e. we assume a certain well defined
  29. transmission range and no collisions, attenuation or other physical effects).
  30. 2) In this step we add a neat transmission animation so in the future we will
  31. have a much better view what is actually happening in the network.
  32. 3) We will add some more hosts and reconfigure (decrease) the transmission
  33. range. We will find that the communication is no longer possible between the
  34. original hosts as they are now out of range, but it would be possible if we
  35. could use the newly added hosts as a relay.
  36. 4) To establish the communication again we have to enable static routing between
  37. the nodes and add routes manually to some of the nodes.
  38. 5) In this step we will check the throuput of the network. We expect that the
  39. communication bandwidth between the original nodes dropping because of the extra
  40. hop required to bridge the distance between the hosts. Collisions should happen
  41. becuase of the intermediate node. Let’s enable interfence detection to model
  42. also collisions.
  43. 6) Now we see that the trhuhput dramatically drops as collisions happen, but the
  44. radios do not care whether there is a transmission on the channel (as the mac
  45. protocol in ideal mac does not care). After setting up a more realistic MAC
  46. protocol (CSMA) we will see that the effects of the collisions are not so
  47. dramatic as the mac protocol now checks the medium before transmission.
  48. 7) Life is not static. Configure the relay nodes to actually move around. We are
  49. seeing that static routes are no longer valid and the communication breaks down.
  50. 8) Let’s forget the static routing as it is no longer useful in a dynamic
  51. environment. We will use a MANET protocol (AODV) to deal with the changing
  52. topology. We can check how a valid route breaks down and how the routing
  53. protocol reconfigures the nodes to route around the broken links.
  54. 9) The nodes are moving around so they are obviously not plugged to the mains.
  55. We can model a node’s energy consumption by adding energy store and consumption
  56. devices. To model sensor networks where energy is expensive this is a must...
  57. 10) In the real world nodes are rarely moving in the free space. They can be
  58. covered by obstacles etc. We add some obstacles into the physical environment to
  59. block some of the communication. Unfortunately we are not seeing the effect
  60. because of the simplified physical model we are using with the IdealRadio.
  61. 11) Let’s switch to a more realistic radio model that models the transmission on
  62. packet level and takes into account the obstacles, attenuation etc. We have to
  63. configure several physical parameters and the actual transmission range is now
  64. calculated from these values. Now we are seeing the effects from the obstacles
  65. introduced in the previous step.
  66. 12) As we are no longer in free space, let’s make the model even more accurate
  67. by configuring a better propagation model instead of free space:
  68. TwoRayGroundReflection
  69. 13) Some nodes are out of range, but not by much. Setting up directional
  70. antennas with better gain would allow them to communicate directly.
  71. 14) Let’s add some more reality. We are introducing heavy radio noise on an
  72. adjacent communication channel (on a neighboring frequency channel). We would
  73. expect this to limit the traffic, but we are not seeing the effect because the
  74. current radio model handles each radio channel independently.
  75. 15) To support the modeling of the cross-talk effect we will switch to
  76. dimensional analog radio model. This model requires much more processing power,
  77. but allows much more accurate modelling of each packets as they travel through
  78. space.
  79. 16) Now we are introducing some very short burst radio signals (1ns?) that can
  80. corrupt a single bit/symbol during the packet transmission. In real life this
  81. would not affect the throughput too much as low level error correction would fix
  82. these errors without introducing packet errors.
  83. 17) We are now switching to bit precise radio model. This complex radio model
  84. properly models all the layers of a real radio and allows us to see the positive
  85. effect of the error correction.
  86. 18) Add forward error correction, scrambling, interleaving
  87. 19) Optimize the simulation by adding MAC address and range filters (or
  88. additionally radio state and listening mode filter (i.e. 802.11b and 802.11g
  89. radios cannot communicate)