By Topic

A Principle Component Analysis Based Method on Evaluating Wireless Mobile Ad Hoc Network Routing Protocols

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Panlong Yang ; Inst. of Commun. Eng., PLAUST, Nanjing ; Guangcheng Qin ; Chang Tian ; Guihai Chen

In this paper, we study the performance evaluation method applying Principle Component Analysis (PCA) theory. Due to the self-organizing and distributed character, each metric has its representative character evaluation method. Metrics while considering various network scenarios reflect different aspects of routing protocol efficiency in mobile ad hoc network. By now, there isnpsilat any ad hoc routing protocol can outperform others in any network conditions. Principle Component Analysis method is successfully applied in analyzing different impact of routing metric on network overall performance. Considering the suggestions in RFC 2501, PCA method tackle the performance evaluation problem as different types of metrics may lead to confusing evaluation results. It proves to be reliable and rational. Statistical results provided by PCA show that different types of routing protocol, such as proactive routing and reactive routing, has different principle components and routing metrics will have different impact on them. A synthetic method in evaluating metric representing the overall performance of the network is proposed after the PCA procedure, and routing performance comparison could clearly and reasonably be done with it.

Published in:

Intelligent Information Technology and Security Informatics, 2009. IITSI '09. Second International Symposium on

Date of Conference:

23-25 Jan. 2009