Wireless Networks with Elastic and Inelastic Traffic by Content Caching and Scheduling DR. G. PRAKASH BABU 1, PRASHANTHI. M 2

Size: px
Start display at page:

Download "Wireless Networks with Elastic and Inelastic Traffic by Content Caching and Scheduling DR. G. PRAKASH BABU 1, PRASHANTHI. M 2"

Transcription

1 ISSN Vol.04,Issue.10, August-2016, Pages: Wireless Networks with Elastic and Inelastic Traffic by Content Caching and Scheduling DR. G. PRAKASH BABU 1, PRASHANTHI. M 2 1 Professor, Dept of CSE, Intell Engineering College, Anantapur, AP, India, gpbabu27@gmail.com. 2 PG Scholar, Dept of CSE, Intell Engineering College, Anantapur, AP, India, prashanthilucky6@gmail.com. Abstract: The rapid development of wireless substance access suggests the requirement for substance placement and planning at wireless base stations. We examine a framework under which clients are separated into groups based on their channel conditions, and their solicitations are spoken to by various lines at logical front closures. Solicitations might be elastic (implying no hard delay constraint) or inelastic (requiring that a delay target be met). Correspondingly, we have demand lines that indicate the number of elastic solicitations, and shortage lines that indicate the deficiency in inelastic service. Caches are of limited size and can be revived periodically from a media vault. We consider two cost models that compare to inelastic solicitations for streaming put away substance and real-time streaming of occasions, separately. We plan provably optimal approaches that stabilize the solicitation lines (henceforth guaranteeing limited delays) and lessen average shortfall to zero [hence guaranteeing that the quality-of-service (QoS) target is met at small cost. Keywords: Quality-of-Service (QoS), Cache as a Service (CaaS), Infrastructure as a Service (IaaS), Virtual Machine (VM). I. INTRODUCTION In caches at wireless BSs, which can broadcast content. Users are grouped into clusters, each of whose requirements are aggregated at FEs. The asset abundance (redundancy) in many large data centers is increasingly designed to offer the spare capacity as a service like power, water, and gas. For example, open remote system service suppliers like Amazon Web Services virtualizes assets, for example, processors, storage and system gadgets, and offer them as services on demand, i.e., infrastructure as a service (IaaS) which is the main center of this paper. A virtual machine (VM) is a typical instance of IaaS. Although a VM acts as an isolated processing platform which is capable of running various applications, it is assumed in this study to be exclusively dedicated to a solitary application, and along these lines, we utilize the expressions VM and application interchangeably hereafter. Remote system services as virtualized entities are essentially elastic making a fantasy of "boundless" asset capacity. This elasticity with utility figuring (i.e., pay-as-yougo evaluating) inherently brings cost adequacy that is the primary main thrust behind the remote system. In this anticipate, address the issue of plate I/O performance in the context of caching in the remote system and present a cache as a service (CaaS) model as an additional service to IaaS. For example, a client can just determine more cache memory as an additional requirement to an IaaS instance with the base computational capacity (e.g.,micro/small instance in Amazon EC2) instead of an instance with large amount of memory (high-memory instance in Amazon EC2). Fig. 1. Wireless content distribution. A media vault is used to place content. The key contribution in this work is that our cache service display much augments cost proficiency and elasticity of the remote system from the viewpoint of both clients and suppliers. CaaS as an additional service (gave for the most part in separate cache servers) gives the supplier a chance to diminish both capital and operating costs utilizing a less number of active physical machines for IaaS; and this can legitimize the expense of cache servers in our model. The client also profits by CaaS as far as application performance with minimal extra cost; additionally, caching is enabled in a client transparent manner and cache capacity is not constrained to local memory. The particular contributions of this paper are recorded as takes after: in the first place, we outline and implement an elastic cache framework, as the 2016 IJIT. All rights reserved.

2 architectural foundation of CaaS, with remote memory (RM) servers or strong state drives (SSDs); this framework is intended to be pluggable and document framework independent. By incorporating our software component in existing operating frameworks, we can design various settings of storage hierarchies with no modification of operating frameworks and client applications. Currently, many clients abuse memory of appropriated machines (e.g., memcached) by integration of cache framework and clients' applications in an application level or a record framework level. In such cases, clients or administrators ought to prepare cache-enabled forms for clients' application or document framework to convey a cache advantage. II. RELATED WORK Jeffrey E. Wieselthier et al build up the Broadcast Incremental Power Algorithm, and adapt it to multicast operation as well. This algorithm abuses the broadcast nature of the remote communication environment, and addresses the requirement for energyefficient operation. we have identified a portion of the fundamental issues associated with vitality efficient broadcasting and multicasting in infrastructure less remote systems, and we have presented preliminary algorithms for the arrangement of this issue. Our studies demonstrate that enhanced performance can be obtained while misusing the properties of the remote medium; i.e., organizing plans ought to mirror the hub based nature of remote communications, rather than just adapt join based plans originally created for wired systems. In particular, the Broadcast Incremental Power (BIP) Algorithm, which misuses the remote multicast advantage, gives preferred performance over alternate algorithms we have concentrated on over an extensive variety of system examples. [1] Meghana M Amble et al target is to plan strategies for solicitation steering, content placement and content removal with the goal of small client delays. Stable strategies guarantee the limit of the solicitation lines, while great polices also lead to short line lengths. We first plan a throughput-optimal algorithm that takes care of the directing placement-removal issue. The configuration yields understanding into the impact of different cache revive strategies on line length, and we build throughput optimal algorithms that incite short line lengths. We illustrate the potential of our approach through simulations on different CDN topologies.. Future work incorporates streaming traffic with solicitations that have hard delay constraints, and which are dropped if such a constraint cannot be met. [2] Somanath Majhi et al Fourier arrangement based bend fitting with the alternatives of nonlinear least squares methodand trust-district algorithm is utilized as far as possible cycle parameters in the presence of measurement clamor. Examples are given to illustrate the value of the proposed method Relay feedback identification in procedure control can lead to wrong results if the framework parameters are estimated from the approximate depicting capacity approach. Exact analytical expressions are inferred and on the basis of these expressions an identification methodology is recommended which is capable of estimating the parameters DR. G. PRAKASH BABU, PRASHANTHI. M of a class of procedure transfer functions. When the farthest point cycle test measurements are sans mistake, the accurate values of the model parameters are estimated. The answers for the three examples demonstrate the generally accepted point about the DF technique that its accuracy increases with the relative request of the plant transfer capacity which is progressively 1, 2, and 5 in the examples. The present technique can be applied to identify the class of non minimum phase forms within the sight of measurement noise.[3] Bo Zhou et al formulate this stochastic optimization issue as an infinite horizon average cost Markov choice procedure (MDP). It is well known to be a troublesome issue and there generally just exist numerical arrangements. By utilizing relative value iteration algorithm and the special structures of the solicitation line dynamics,. we consider the optimal dynamic multicast planning to jointly minimize the average delay, control and bringing costs for cache-enabled content-centric remote systems. We formulate this stochastic optimization issue as a boundless skyline average cost MDP. We demonstrate that the optimal strategy has a switch structure in the uniform case anda partial switch structure in the non uniform case. Also, in the uniform case with two contents, we demonstrate that the switch bend is monotonically non-decreasing. The optimality properties obtained in this paper can give plan bits of knowledge to multicast planning in practical cache-enabled content centric remote systems A. Client Module This is any entity that requests data from a data server. When a client submits a request, besides the data it requests, it may also include some content service requirements, arising from device limitations and data format limitations Intermediate Server Module This is any entity that is allowed by a data server to provide content services in response to requests by clients. Intermediaries include caching proxies and transforming proxies. Totally we are using four proxy s. each proxy allotted for specific function. Based on user request the allotted proxy will process the request. if any one proxy busy with some function then the request delegated to the sub proxy that is assigned for the particular requested function. Integrated Cache-Routing: Nearest-caching tables can be used in conjunction with any underlying routing protocol to reach the nearest cache node, as long as the distances to other nodes are maintained by the routing protocol However, note that maintaining cache-routing tables instead of nearest-cache tables and routing tables doesn t offer any clear advantage in terms of number of messages transmissions. We could maintain the integrated cache-routing tables in the similar vein as routing tables are maintained in mobile ad hoc networks. Alternatively, we could have the servers periodically broadcast the latest cache lists. In our simulations, we adopted the latter strategy, since it

3 Wireless Networks with Elastic and Inelastic Traffic by Content Caching and Scheduling precludes the need to broadcast Add Cache and Delete Cache messages to some extent. Localized Caching Policy The caching policy of DCA is as follows. Each node computes benefit of data items based on its local traffic observed for a sufficiently long time. The local traffic of a node i includes its own local data requests, nonlocal data requests to data items cached at i, and the traffic that the node i is forwarding to other nodes in the network. A node decides to cache the most beneficial (in terms of local benefit per unit size of data item) data items that can fit in its local memory. When the local cache memory of a node is full, the following cache replacement policy is used. B. Data Server Module This is an entity that originally stores the data asked for by a client. The data server module contains the Intermediary profile table. The table contains the detail about the intermediary and particular capacity about particular intermediary and their keys are all put away in that table. The server utilizes all these details when the client sends the solicitation. And it contain work and comparing benefits table also. This table contains the detail about what are the data present in the server and there benefits present in the table. The client demand handled based on the benefits. It has two updates. Read and update. III. PROPOSED WORK In this research work, create algorithms for content dispersion with elastic and inelastic solicitations. Utilize a solicitation line to verifiably decide the popularity of elastic content. Similarly, the shortfall line decides the necessary service for inelastic solicitations. Content may be invigorated periodically at caches. We contemplate two different sorts of cost models, each of which is appropriate for a different content dispersion scenario. The first is the case of record appropriation (elastic) along with streaming of put away content (inelastic), where we demonstrate cost as far as the recurrence with which caches are revived. The second is the case of streaming of content that is generated in real-time, where content lapses after a certain time, and the expense of placement of each packet in the cache is considered. Advantages of Proposed System: It stabilizes the system load within the capacity region. Minimizes the average expected cost while stabilizing the deficit queues. Consider the content dispersion system delineated in Fig1. There is an arrangement of base stations and each base station is associated with a cache. The caches are all associated with a media vault that contains all the content. The clients in the framework are partitioned into groups based on their geographical positions, and we let mean the arrangement of these bunches. Also, as examined in the Introduction, there are front closures in each bunch, also indicated by whose object is to aggregate solicitations from the clients. Time is opened, and we separate time into frames comprising of timespaces. Solicitations are made at the start of each frame. There are two sorts of clients in this framework inelastic and elastic based on the kind of solicitations that they make. Requests made by inelastic users must be satisfied inside the frame in which they were made. Elastic clients don't have such a settled deadline, and these clients arrive, make a solicitation, are served, and depart. IV. PURE UNICAST ELASTIC SCENARIO In this section, we assume there are only requests for elastic content. As noted in Section II, these requests are to be served using uni-cast communications. For notational convenience, we assume that transmissions are between base stations and front ends, rather than to the actual users making the requests. We first determine the capacity region, which is the set of all feasible requests. Note that this model, in which front ends have independent and distinct channels to the caches, differs from the previously studied wired caching systems (see, e.g., [13]) because the wireless channels are not always ON. Therefore, the placement and scheduling must be properly coordinated according to the channel states. A. Value of Prediction Suppose we know the statistics of the elastic requests, i.e., the values of are known. The question is whether this information would help in designing a throughput-optimal caching and scheduling scheme. Using the capability to predict requests, we could potentially decide on the elastic content distribution scheme a priori. Notice that this is equivalent to solving (3) to find the appropriate joint distribution of the content placement and the service schedule. The solution would yield a set of caching and scheduling choices, and a probability with which to use each one based on channel realizations.while such an algorithm is very simple to implement, solving (3) for the set of schedules is quite hard. Consequently, we see that prediction of the elastic requests has limited value in the context of devising appropriate content distribution algorithms. V. EXPERIMENTAL RESULTS A. Content Distribution System In this module, we create algorithms for content dispersion with elastic and inelastic solicitations. We utilize a solicitation line to certainly decide the popularity of elastic content. Similarly, the shortage line decides the necessary service for inelastic solicitations. Content may be revived periodically at caches. We consider two different sorts of cost models, each of which is appropriate for a different content dispersion scenario. The first is the case of document dispersion (elastic) along with streaming of put away content (inelastic), where we demonstrate cost as far as the recurrence with which caches are invigorated. The second is the case of streaming of content that is generated in real-time, where content terminates after a certain time, and the expense of placement of each packet in the cache is considered.

4 B. Content Caching Framework In this module we outline Scheduling procedure that is what is to be broadcasted from caches. The caches are all associated with a media vault that contains all the content. Clients can frequently encounter developed system access time and record downloading time because of poor Web document retrieval performance. Poor performance can happen because the WebSEAL server is waiting for documents recovered from junctioned back-end servers. Caching of Web content gives you the adaptability of serving documents locally from Web SEAL rather than from a backend server across an intersection. The content caching feature allows you to store normally accessed Web document sorts in the Web SEAL server's memory. Clients can encounter much faster reaction to catch up solicitations for documents that have been cached in the Web SEAL server. Cached content can incorporate static content documents and graphic images. Dynamically generated documents, for example, database inquiry results, cannot be cached. Caching is performed on the basis of MIME sort. C. Elastic Traffic In this module, we assume there are only requests for elastic content. These requests are to be served using unicast communications. For notational convenience, we assume that transmissions are between base stations and front ends, rather than to the actual users making the requests. We first determine the capacity region, which is the set of all feasible requests. Note that this model, in which front ends have independent and distinct channels to the caches, differs from the previously studied wired caching systems because the wireless channels are not always ON. Therefore, the placement and scheduling must be properly coordinated according to the channel states. D. Inelastic Traffic In this module, we focus an inelastic caching problem where the contents expire after some time. In this new model, which is compatible with real-time streaming of live events, we only consider inelastic traffic and assume that the lifetime of an inelastic content is equal to the length of a frame. Hence, we can cache a content only for the duration of a frame after which the content will not be useful any longer. E. Joint Elastic-Inelastic Scenario In this segment, we concentrate on the general case where elastic and inelastic solicitations exist together in the framework. Recall that the elastic solicitations are assumed to be served through unicast communications between the caches and front finishes, while the base stations broadcast the inelastic contents to the inelastic clients. We advance assumed servers can utilize OFDMA strategy to simultaneously transmit over their single broadcast and various unicast channels. Although these two sorts of traffic don't share the access medium, all the content must share the regular space in the caches. Consequently, we require an algorithm that jointly explains the elastic and inelastic booking issues. In this segment, we first decide the general capacity area of the DR. G. PRAKASH BABU, PRASHANTHI. M framework, and then present our algorithm. 6. Immaculate unicast elastic scenario In this area, we assume there are solicitations for elastic content. As noted in the last segment, these solicitations are to be served utilizing unicast communications. For notational accommodation, we assume that transmissions are between base stations and front finishes, rather than to the actual clients making the solicitations. We first decide the capacity area, which is the arrangement of all feasible solicitations. Note that this model, in which front closures have independent and particular channels to the caches, varies from the already examined wired caching frameworks, because the remote channels are not always ON. In this way, the placement and booking must be appropriately coordinated according to the channel states. VI. CONCLUSION AND FUTURE WORK In this research work concentrated on algorithms for content placement and planning in remote broadcast systems. While there has been significant work on content caching algorithms, there is a great deal less on the interaction of caching and systems. Changing over the caching and load balancing issue into one of lining and planning is henceforth interesting. Considered a framework in which both inelastic and elastic solicitations exist together. Our goal was to stabilize the framework as far as limited line lengths for elastic traffic and zero average deficiency value for the inelastic traffic. In planning these plans, demonstrated that learning of the arrival procedure is of restricted value to taking content placement choices. Incorporated the expense of loading caches is in proposed issue with considering two different models. In the main model, cost compares to invigorating the caches with unit periodicity. In the second model relating to inelastic caching with expiry, straightforwardly assumed a unit cost for replacing each content after expiration. A max-weight-sort arrangement was recommended for this model, which can stabilize the shortfall lines and achieves an average cost that is arbitrarily near the base expense. VII. REFERENCES [1]. On the Construction of Energy-Efficient Broadcast and Multicast Trees in Wireless Networks by Jeffrey E. Wieselthier,Gam D. Nguyen, Anthony Ephremides. [2] I. Hou, V. Borkar, and P. Kumar, A theory of QoS for wireless, in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp [3] R. M. P. Raghavan, Randomized Algorithms. NewYork,NY,USA: Cambridge Univ. Press, [4] P. Cao and S. Irani, Cost-awareWWWproxy caching algorithms, in Proc. USENIX Symp. Internet Technol. Syst., Berkeley, CA, Dec. 1997, p. 18. [5] K. Psounis and B. Prabhakar, Efficient randomized Webcache replacement schemes using samples from past eviction times, IEEE/ACM Trans. Netw., vol. 10, no. 4, pp , Aug [6] N. Laoutaris, O.T. Orestis, V.Zissimopoulos, and I. Stavrakakis, Distributed selfish replication, IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 12, pp , Dec

5 Wireless Networks with Elastic and Inelastic Traffic by Content Caching and Scheduling [7] S. Borst, V. Gupta, and A. Walid, Distributed caching algorithms for content distribution networks, in Proc. IEEE INFOCOM, San Diego,CA, USA, Mar. 2010, pp [8] L. Tassiulas and A. Ephremides, Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks, IEEE Trans. Autom. Control, vol. 37, no. 12, pp , Dec [9] X. Lin and N. Shroff, Joint rate control and scheduling in multihop wireless networks, in Proc. 43rd IEEE CDC, Paradise Islands, Bahamas, Dec. 2004, vol. 2, pp Author s Profile: Dr. G Prakash Babu M Tech., Ph.D., Working as Professor at Intell Engineering College, Anantapur affiliated by JNTUA University Anantapur and has vast experience in Teaching field and has published may National and Internal Journals in various disciplines. Prashanthi M, is pursuing her M.Tech in Dept of CSE, Intell Engineering College, Affiliated to JNTUA University, Ananthapuramu.

Content Caching and Scheduling For Clusters with Elastic and Inelastic Traffic

Content Caching and Scheduling For Clusters with Elastic and Inelastic Traffic International Journal of Research Studies in Science, Engineering and Technology Volume 3, Issue 1, January 2016, PP 1-5 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Content Caching and Scheduling

More information

Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic B.Muniswamy, Dr. N. Geethanjali

Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic B.Muniswamy, Dr. N. Geethanjali www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 5 May 2016, Page No. 16679-16679 Content Caching and Scheduling in Wireless Networks with Elastic and

More information

Content Receiving and Planning in Wireless Networks Assessment of Content Distribution

Content Receiving and Planning in Wireless Networks Assessment of Content Distribution Content Receiving and Planning in Wireless Networks Assessment of Content Distribution 1 kare. Venkateswararao, 2 M.NARESH 2 Associate Professor 1 venky537gmail.com, 2 nareshmtech08@gmail.com Abstract-The

More information

REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY

REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY REDUCING DEFICIT QUEUE DELAY USING VIRTUAL MEMORY N.Deepa 1, V.R.Arulmozhi 2, B.Vijaya Nirmala 3 1,2,3 Assistant Professor/Department of CSE, RVS Educational Trust s Group of Institution Dindigul, Tamilnadu,

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks A Survey on Congestion Control and Maximization of Throughput in Wireless Networks K.Ravindra Babu Post graduate student V.R.Siddhartha Engineering College ravindra.bec2008@gmail.com J.Ranga Rao Assistant

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3

A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 A CLASSIFICATION FRAMEWORK FOR SCHEDULING ALGORITHMS IN WIRELESS MESH NETWORKS Lav Upadhyay 1, Himanshu Nagar 2, Dharmveer Singh Rajpoot 3 1,2,3 Department of Computer Science Engineering Jaypee Institute

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Multicasting in ad hoc networks: Energy efficient

Multicasting in ad hoc networks: Energy efficient Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient

More information

Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2

Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2 Optimizing Scheduling Policies and Analyzing Delay in Multi-Hop Wireless Networks P.Pavan kumar Reddy 1, Manohar Gosul 2 1 M.Tech in CSE Dept, 2 Associate Professor Abstract: In this paper a multi-hop

More information

Experiments with Broadcast Routing Algorithms for Energy- Constrained Mobile Adhoc Networks. (Due in class on 7 March 2002)

Experiments with Broadcast Routing Algorithms for Energy- Constrained Mobile Adhoc Networks. (Due in class on 7 March 2002) EE Project Description Winter Experiments with Broadcast Routing Algorithms for Energy- Constrained Mobile Adhoc Networks (Due in class on March ) Abstract In this project, you will experiment with the

More information

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

An Adaptive and Optimal Distributed Clustering for Wireless Sensor An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,

More information

A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks

A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks A Gateway Selections Using Signal Strength among Clusters in Ad Hoc Networks Mary Wu 1, ChongGun Kim 1 1*, HeeJoo park 1 Dept. of Computer Eng., Yeungnam Univ., Korea Dept. of Cyber Security., Kyungil

More information

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud 571 Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud T.R.V. Anandharajan 1, Dr. M.A. Bhagyaveni 2 1 Research Scholar, Department of Electronics and Communication,

More information

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh

More information

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks

Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks Routing Scheme in Energy efficient based Protocols for Wireless Sensor Networks 1 Chiranjeevi Rampilla, 2 Pallikonda Anil Kumar, 1 Student, DEPT.OF CSE, PVPSIT, KANURU, VIJAYAWADA. 2 Asst.Professor, DEPT.OF

More information

Wireless Mesh Network Deployed in Disaster Area using Gateway Selection

Wireless Mesh Network Deployed in Disaster Area using Gateway Selection Wireless Mesh Network Deployed in Disaster Area using Gateway Selection Supriya M. Nasre supriya.nasre4@gmail.com Dept. of E&TC, D. Y. Patil Collegee of Engineering,Akurdi, Pune. P. Malathi malathijesudason@ymail.com

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Survey on Multicast Routing Protocols in MANETs

Survey on Multicast Routing Protocols in MANETs Survey on Multicast Routing Protocols in MANETs A Viswanath, Dept of CSE, Sree Vidyanikethan Engineering College, Tirupati, AP, India. N Papanna, M.Tech, Assistant Professor, Sree Vidyanikethan Engineering

More information

An Algorithm for Dynamic SDN Controller in Data Centre Networks

An Algorithm for Dynamic SDN Controller in Data Centre Networks IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 04-08 www.iosrjen.org An Algorithm for Dynamic SDN Controller in Data Centre Networks Nirmala 1, Oliveruth 2, Varun 3 1

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs Sarita Naruka 1, Dr. Amit Sharma 2 1 M.Tech. Scholar, 2 Professor, Computer Science & Engineering, Vedant College of Engineering

More information

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model

Optimization of Multi-server Configuration for Profit Maximization using M/M/m Queuing Model International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-2, Issue-8 E-ISSN: 2347-2693 Optimization of Multi-server Configuration for Profit Maximization using M/M/m

More information

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Data Gathering for Wireless Sensor Network using PEGASIS Protocol Data Gathering for Wireless Sensor Network using PEGASIS Protocol Kumari Kalpna a, Kanu Gopal b, Navtej katoch c a Deptt. of ECE, College of Engg.& Mgmt.,Kapurthala, b Deptt. of CSE, College of Engg.&

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM Chauhan Ajitkumar 1, Asst. Prof. Jignesh V. Patel 2 1PG Scholar, EC Dept., SPCE, Visnagar, Gujarat, India. 2Assistant

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

Mobile Data Gathering With Load Balanced Clustering and Dual Data Uploading In Wireless Sensor Networks

Mobile Data Gathering With Load Balanced Clustering and Dual Data Uploading In Wireless Sensor Networks Mobile Data Gathering With Load Balanced Clustering and Dual Data Uploading In Wireless Sensor Networks 1 Mr. Shankargouda Biradar, 2 Mrs. Sarala D.V. 2 Asst.Professor, 1,2 APS college of Engg Bangalore,

More information

AUTONOMOUS RECONFIGURATION OF IP CORE UNITS USING BLRB ALGORITHM

AUTONOMOUS RECONFIGURATION OF IP CORE UNITS USING BLRB ALGORITHM AUTONOMOUS RECONFIGURATION OF IP CORE UNITS USING BLRB ALGORITHM B.HARIKRISHNA 1, DR.S.RAVI 2 1 Sathyabama Univeristy, Chennai, India 2 Department of Electronics Engineering, Dr. M. G. R. Univeristy, Chennai,

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS Haftom Gebrehiwet Kidanu 1, Prof. Pallam

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

CONGESTION CONTROL BASED ON SLIDING MODE CONTROL AND SCHEDULING WITH PRIORITIZED QUEUING FOR WIRELESS NETWORKS

CONGESTION CONTROL BASED ON SLIDING MODE CONTROL AND SCHEDULING WITH PRIORITIZED QUEUING FOR WIRELESS NETWORKS CONGESTION CONTROL BASED ON SLIDING MODE CONTROL AND SCHEDULING WITH PRIORITIZED QUEUING FOR WIRELESS NETWORKS R.Keerthana 1, S.Lavanya 2 1 PG Scholar, Dept. of CSE, Sona College of Technology, Salem 636005,

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE 554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

High Throughput in MANET Using relay algorithm and rebroadcast probability

High Throughput in MANET Using relay algorithm and rebroadcast probability RESEARCH ARTICLE OPEN ACCESS High Throughput in MANET Using relay algorithm and rebroadcast probability Mr. Marvin Mark M Dept of Electronics and Communication, Francis Xavier Engineering College, Tirunelveli-627003,

More information

ISSN 2319-8885 Vol.03,Issue.35 November-2014, Pages:6974-6978 www.ijsetr.com A Caching Scheme in Location Based Application SANDI WINN AYE 1, ZAR ZAR WINT 2 1 Dept of Information and Communication Technology,

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS

OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Chapter 2 OPTIMAL MULTI-CHANNEL ASSIGNMENTS IN VEHICULAR AD-HOC NETWORKS Hanan Luss and Wai Chen Telcordia Technologies, Piscataway, New Jersey 08854 hluss@telcordia.com, wchen@research.telcordia.com Abstract:

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

System Wide Average interruption of Packet Using forecast policy in Wireless System

System Wide Average interruption of Packet Using forecast policy in Wireless System System Wide Average interruption of Packet Using forecast policy in Wireless System Veerraju Gampala, Department of Computer Science and Engineering, GMR Institute of Technology, Rajam, Andhra Pradesh,

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

ENHANCING COVERAGE AREA AND ACHIEVING CONSISTENT SIGNALING RATE USING PARDA CONTROL ALGORITHM

ENHANCING COVERAGE AREA AND ACHIEVING CONSISTENT SIGNALING RATE USING PARDA CONTROL ALGORITHM This work by IJARBEST is licensed under Creative Commons Attribution 4.0 International License. Available at https://www.ijarbest.com ISSN (ONLINE): 2395-695X ENHANCING COVERAGE AREA AND ACHIEVING CONSISTENT

More information

COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS

COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBRID CLOUDS M.Angel Jasmine Shirley 1, Dr.Suneel Kumar 2 1Research Scholar, 2 Asst. Professor, Maharishi University Lucknow ------------------------------------------------------------------------------***--------------------------------------------------------------------------------

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP Realistic Mobility Model And Co-Operative Peer To Peer Data Transmission For VANET s Using SUMO And MOVE Nataraj B, Dr. T. Kantharaju 1,2 Electronics and Communication, JNTUA, BITIT, Hindupur, Andhra Pradesh,

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks

Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks 1662 Design and Implementation of AMRP for Multi hop wireless Mobile ad hoc Networks Dr.R.Balakrishna Professor & HOD, Dept of ISE, Rajarajeswari College of Engineering Bangalore, India. Email: rayankibala@yahoo.com

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Addressing Asymmetric Link in Wireless Mesh Networks

Addressing Asymmetric Link in Wireless Mesh Networks Vol.2, Issue.1, Jan-Feb 2012 pp-499-503 ISSN: 2249-6645 Addressing Asymmetric Link in Wireless Mesh Networks Ashok Kumar. S*, Krishnammal. N** *II M.E CSE, Sri Shakthi Institute Of Engineering and Technology,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 841 On Combining Shortest-Path and Back-Pressure Routing Over Multihop Wireless Networks Lei Ying, Member, IEEE, Sanjay Shakkottai, Member,

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Minimization of Congestion using Backpressure Routing Algorithm in Wireless Networks

Minimization of Congestion using Backpressure Routing Algorithm in Wireless Networks Vol. 3, Issue. 3, May.-June. 2013 pp-1681-1689 ISSN: 2249-6645 Minimization of Congestion using Backpressure Routing Algorithm in Wireless Networks A. Priyadharsini, Mr. S. Mohanarangan, Dr. D. Sivakumar

More information

Optimality of Periodwise Static Priority Policies in Real-time Communications

Optimality of Periodwise Static Priority Policies in Real-time Communications Optimality of Periodwise Static Priority Policies in Real-time Communications I-Hong Hou, Anh Truong, Santanu Chakraborty and P. R. Kumar Abstract We consider the problem of real-time communication with

More information

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,

More information

Multicasting through Hop-by-Hop Routing Protocol Using Modified Recursive Unicast

Multicasting through Hop-by-Hop Routing Protocol Using Modified Recursive Unicast Multicasting through Hop-by-Hop Routing Protocol Using Modified Recursive Unicast U.Raghunath Reddy, K.Sekhar, P.Prabhavathi Dept of Information Technology, G.Pullaiah College of Engineering & Technology

More information

An Energy Efficient Intrusion Detection System in MANET.

An Energy Efficient Intrusion Detection System in MANET. An Energy Efficient Intrusion Detection System in MANET. Namrata 1, Dr.Sukhvir Singh 2 1. M.Tech, Department of C.S.E, N.C College Of Engineering, Israna, Panipat. 2. Associate Professor Department of

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK Dr G.Charles Babu Professor MRE College Secunderabad, India. charlesbabu26@gmail.com N.Chennakesavulu Assoc.Professor Wesley PG

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP

FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1074

More information

2014, IJARCSSE All Rights Reserved Page 597

2014, IJARCSSE All Rights Reserved Page 597 Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Mobility Based

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Fig. 1. Superframe structure in IEEE

Fig. 1. Superframe structure in IEEE Analyzing the Performance of GTS Allocation Using Markov Model in IEEE 802.15.4 Alladi Ramesh 1,Dr.P.Sumithabhashini 2 1 Dept.of CSE, PETW, Hyderabad 2 Dept.of ECE, PETW, Hyderabad Abstract-In this paper,

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 47-53 Design and Implementation of a Simulator for Ad Hoc Network Routing

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

A Frame Aggregation Scheduler for IEEE n

A Frame Aggregation Scheduler for IEEE n A Frame Aggregation Scheduler for IEEE 802.11n Selvam T AU-KBC Research Centre MIT campus of Anna University Chennai, India selvam@au-kbc.org Srikanth S AU-KBC Research Centre MIT Campus of Anna University

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

LOAD BALANCING IN DISTRIBUTED SYSTEMS FOR CLOUD COMPUTING ENVIRONMENT

LOAD BALANCING IN DISTRIBUTED SYSTEMS FOR CLOUD COMPUTING ENVIRONMENT LOAD BALANCING IN DISTRIBUTED SYSTEMS FOR CLOUD COMPUTING ENVIRONMENT #1 PENUMATCHA RAGHU Pursuing M.Tech, #2 Dr. PENMETSA VAMSI KRISHNA RAJA -Principal, Dept of CSE, AMALAPURAM INSTITUTE OF MANAGEMENT

More information

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2 International Journal of Emerging Trends in Science and Technology Impact Factor: 2.838 INC-BEAT 2016 An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M.

More information

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 5 (June 2012), PP.12-17 www.ijerd.com A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical

More information

Tracing down Black hole attack in MANETS

Tracing down Black hole attack in MANETS IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 5, Ver. III (Sep.- Oct. 2017), PP 06-10 www.iosrjournals.org Dr. G. Krishna Kishore 1, K. Jahnavi 2,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network Journal of Computer Science 7 (5): 678-682, 2011 ISSN 1549-3636 2011 Science Publications Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network 1 V. Balaji and 2 V. Duraisamy

More information

Based on Distance Comparison Shortest Path Algorithm

Based on Distance Comparison Shortest Path Algorithm Volume 118 No. 20 2018, 853-860 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Based on Distance Comparison Shortest Path Algorithm 1 Y. NavyaSri, 2 K. Meghana, 3 D. Nageswari and

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS

DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS DATA WAREHOUSING DEVELOPING OPTIMIZED ALGORITHMS TO ENHANCE THE USABILITY OF SCHEMA IN DATA MINING AND ALLIED DATA INTELLIGENCE MODELS Harshit Yadav Student, Bal Bharati Public School, Dwarka, New Delhi

More information

Wireless Sensor Network Optimization using multiple Movable Sensors for Data Gathering

Wireless Sensor Network Optimization using multiple Movable Sensors for Data Gathering AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES ISSN:1991-8178 EISSN: 2309-8414 Journal home page: www.ajbasweb.com Wireless Sensor Network Optimization using multiple Movable Sensors for Data Gathering

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

EPARGA: A Resourceful Power Aware Routing Protocol for MANETs

EPARGA: A Resourceful Power Aware Routing Protocol for MANETs EPARGA: A Resourceful Power Aware Routing Protocol for MANETs Shipra Suman, Er. Aditi Agrawal, Prof. A.K. Jaiswal Abstract A Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts which

More information