To simulate the existence of barriers that would induce link breakages, we exploited NS2a#39;s ability to read a Digital Elevation ... the NS2 code that governs the receipt of wireless packets from the MAC layer to make use of this topographical data. ... If on the other hand a barrier does not exist then there must be a valid link between the source and destination nodes. ... 6.3 Evaluation We ran each simulation using the AODV and DSDV protocols respectively for a total of twelve simulations.
|Title||:||Proceedings of the ... International Workshop on Mobility Management & Wireless Access Protocols|