A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH

Size: px
Start display at page:

Download "A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH"

Transcription

1 A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH Subhankar oarar 1, Vanana Bhattacheree 2 an Debasis Giri 1 1 Department of Computer Science an Engineering, Halia Institute of Technology,Halia, West Bengal, Inia subhankarranchi@yahoo.co.in, ebasis_giri@hotmail.com 2 Department of Computer Science an Engineering, Birla Institute of Technology,Mesra, Jharkhan, Inia vbhattacharya@bitmesra.ac.in ABSTRACT The maor causes of network congestion are the lack of network resources an the irrational allocation of network resources. The traitional congestion control methos such as rate control, winow mechanism, queue control an others can solve the congestion problem, but for the congestion ue to irrational allocation funamental solution is to make more effectively use of the network resources by austing the traffic routing epening on choice may be probabilistic, when congestion occurs. In mobile a hoc networks congestion creates elay in transmission an also loss of the packet that causes wastage of time an energy on recovery. The Wireless Networks have to play an important role to aopt an execute a large no of innovative application. New challenges have come consiering the maor limitations of the a hoc network like noe s limite processing power, balance the loa of network (to maintain the computation of the noe). To overcome the above problem some algorithm is invoke an there may be huge amount of packet loss an this leas to ecrease the lifetime of the network. Base on the concept of evolutionary cooperation in swarm Ant, we use the ants swarm intelligence to reinforce goo quality routes. The obective of our propose algorithm is to ientify the congestion areas between source an its neighboring noes to the estination an thus it will help to avoi the congestion of the network in the intermeiate links an also minimize the packet loss in the network. Using a new mathematical moel consiering the swarm-base ant intelligence concept, we foun an efficient congestion control mechanism (Ant s probabilistic transition rule). KEYWORDS A-Hoc Networks, Conitional Probability, Congestion, Distance Vector, Swarm Intelligence, Transmission Queue Length. 1. INTRODUCTION Mobile A hoc Networks are movable an also able to communicate within themselves using a wireless physical meium where there is no nee of pre existing network infrastructure. These networks can form stan-alone groups of wireless terminals, which can be again a part of any other cellular system or a fixe network. The main characteristic which raws the attention is that they are able to configure themselves without a centralize aministration. This paper is base on A Swarm inspire Probabilistic Path Selection with Congestion Control in MANETs by S.oarar, V.Bhattacheree, D.Giri which appeare in the proceeings of secon international conference on Computer Science, Engineering An Application, Springer-Verlag, Vol.2, pp , May 25-27, 2012 DOI : /iwmn

2 The Mobile a hoc network has several rawbacks that are not foun in fixe networks. Unlike in the traitional wireless networks, communication in such a ecentralize network is typically multi-hop, with the noes using each other as relay routers without any fixe infrastructure. This kin of network is very flexible an suitable for applications such as temporary information sharing in a conference, isaster rescue etc. However, multi-hop routing, ranom movement of mobile noes an other features in MANETs lea to The frequent change in network topology ue to the mobility of the noes causes a great eal of control information onto the network. The small capacity of batteries an the banwith limitation of wireless channels are other factors. The scalability is also a maor factor because the network performance egraes quickly as the no of noes increases Routing in Mobile A-hoc Wireless Networks Specially configure routing protocols are engage in orer to establish routes between noes which are more than a single hop. The ability to trace routes in spite of a ynamic topology is the unique feature of these protocols. These protocols can be categorize into two main types: Reactive (On-eman) an Proactive (Table-riven). Evaluating the routes continuously within the network is one by proactive protocols, so when a packet nees to be forware the route is alreay known an can be immeiately use. Reactive protocols appeal to a route etermination proceure on eman only Congestion in Mobile A-hoc Wireless Networks The network where the resources are share, to minimize the network overloa the ata rate must be auste use by the sener. The packets are roppe ue to some routers are not able to forwar the packets, so ue to the bottleneck conition leas to many packet rops. May be the roppe packets alreay travelle a long way in the network an thus consume significant amount of resources. So congestion leas to ecrease the network throughput. This type of situation occurre on the early Internet, the evelopment of the TCP congestion control mechanism. In mobile a hoc networks congestion occurs ue to the share wireless channel an ynamic topology, packet transmissions suffer from interference an faing. The network loa is burene through the transmission errors. There is an increasing eman of multimeia communications in MANETs so large amount of real-time traffic involves high banwith an it is liable to congestion. Congestion leas to packet losses an banwith egraation an also wastes time an energy on congestion recovery. Mobile A Hoc Networks have some unique properties that affect the esign of appropriate protocols an congestion control mechanism in particular. As it turne out, the vast ifferent environment in a mobile a-hoc network is highly problematic for TCP. The properties of MANETs are the noe mobility an a share, wireless multi-hop channel. Aapting new routes ue to noe mobility as well as unreliable meium result in unsteay packet elay an packet loses. Also these are not congestion loses. The wireless multi-hop channel allows only one ata transmission at a time within the transmission range of one noe. So close links as per the istance are not inepenent from each other. Internet routers typically are eicate hosts connecte by high banwith links. When congestion occurs on the Internet, it is usually concentrate on one single router, but in MANETs congestion affects a whole area because of the share meium. Not only noes are overloae, but regions of the networks are also overloae. 2. RELATED WORK The continuous research on congestion minimization for MANET still nees more new techniques. This section will illustrate the research relate to congestion control. 110

3 A istribute multi-path DSR protocol (MPDSR) was evelope to enhance the quality of service [1]. This protocol forwars the outgoing packets using multiple no of paths an with point to point reliability. Split Multi-path Routing protocol [2] uses a per-packet allocation technique to istribute the ata packets into multiple paths which prevents noes from being congeste in heavily loae traffic conitions. A novel technique Congestion Aaptive Routing in Mobile A Hoc Networks (CRP) [3] was propose. In CRP each noe on a route in the network sens a warn message to its previous noe when it is to be congeste. Then the previous noe uses a new route to bypass the congestion an get the first non congeste noe on the route. Traffic will be istribute probabilistically over these routes an there will be less chance of congestion occurrence. A ynamic loa aware base loa-balance routing for a hoc networks (DLBL) algorithm was evelope. The DLBL [4] uses intermeiate noe routing loa metric that helps the protocol to iscover a route with less network congestion. When a link fails because of the noe movement the algorithm uses the path maintenance to re oin the broken links to get a route from the source to the estination. Another novel algorithm propose is a Congestion-aware routing metric (CARM) [5] which consiers Mac-overhea, ata-rate an buffer queue elay to select low congestion with high throughput routes. Another mechanism that CARM applie was the use of link ata- rate categories to prevent the mismatche link ata-rate. CARM performe locally. An ant base DSR [6] will inform the source noe about QoS available to estination noe such as acceptable elay, itter an energy in the case of multimeia an real time application. They propose DSR using ACO an calle AntDSR(ADSR). Another novel algorithm propose a QoS-aware routing protocol [7] which consier two scheme amission control an feeback for the Qos requirements. Their maor works on the approximation of banwith estimation to calculate the rest amount of banwith available at each noe. A biologically inspire routing algorithm [8] for multi-hop networks consiers the concept of stigmergy an evaluates the optimal an sub-optimal routes without the whole system-wie connectivity information. They also incorporate MAC layer information into the routing ecision can prevent the forwar ata traffic into the congeste areas uner situation like various noal mobility, network ensity an ata loas. The success of ata transmission in Multipath routing [9] consiers the concept of traffic istribution strategy that efines how concurrently available paths are utilize an ata to the same estination as split an istribute over multiple paths. This paper shows when the no of path is single the entire ata packet is transmitte through it an maximum probability of success as the no of paths increases the probability of success of ata transmission will ecrease. 3. PROPOSED WORK In this section we will iscuss Swarm intelligence, Distance metric an the transmission Queue length Swarm Behaviour This algorithm is inspire by the foraging behaviour of biological ant colony [10], when they fin paths to foo sources. Each ant eposits a chemical calle pheromone when they move from source to the estination an the foragers follow such pheromone trails. By that more ants are attracte by these pheromone trails an in turn reinforce them even more. This natural phenomenon (stigmergy) plays a role in eveloping an manipulating local information Congestion Metric The maor parameters to control congestion areas probabilistically are the two metrics in a noe. 111

4 3.2.1 Distance Metric The first metric is the istance between the single hop by using the Time of arrival [11] estimating the time of signal travelling between noes (TOA) provies the istance between two noes. We can use ultrasoun sensor for measuring range between noes. For this purpose very accurate rubiium-base oscillators must be use. In orer to calculate the TOA parameter the noes must have a common clock, or exchange timing information by certain protocols such as two-way ranging protocol. The istance metric i where is the neighbor noe of i. i = C*( remote local )/2, C 3*10 8 m/s (1) The time between starting the transmission of a ata packet an receiving the corresponing immeiate acknowlege will refer as remote elay( remote ) an receiving one ata packet an sening out the immeiate acknowlegement will be the uration as local elay( local ). C is measure as the spee of light Transmission Queue Length Metric The secon metric is a heuristic value transmission queue length in the i th noe towars the neighbouring noes. The transmission queue length [8] can affect the packet latency an packet rop because of the size of the packet length. Figure 1 : Mobile noes with istance an out going transmission queue T q = 1 N i b q (2) 112

5 where q is the outgoing queue length in terms of bits waiting to be sent to the link [ i ] between i an an N is all the noes in the network an N is the neighbouring noes of b the noe i. We have consiere some ranom values as transmission queue in terms of bits. Using (2), we fin the gooness of heuristic values means small queue ata length will have higher heuristic value. From the figure 1, all the noes have symmetric link between them. We consier some hypothetical value as istance an transmission queue length, using (1), we foun the congestion metric T in the table 1 [8]. Table 1: Gooness of congestion metric T i Ant base probabilistic path selection When a source noe s, nees to route a estination without knowing the global topology, using the initial pheromone information available the ant will chose its next hop with probability P. We have propose an algorithm to fin the istance of neighbour noe from the i th noe an also we calculate the pheromone eposition, pheromone evaporation an resiual pheromone on the link l 1 τ = mvl, N [ i] i b i, (3) The istance from the noe i to its neighbouring noes can be calculate by using the equation 1, we assume some ranom istance metric for our algorithm. mvl is the minimum istance selecte from the neighbour noes of i. The τ i is the reciprocal of the istance on the link. We foun that the less istance have more reciprocal value of rate of pheromone eposition an vice versa. τ i = τi + τ i ρ (4) 113

6 e τ = τ (1 ρ) i i (5) τ i = 0.1 is the initial pheromone eposition an the ρ [12] specifies the rate at which pheromone evaporates means ant forget previous ecision for value ρ = 1 the pheromone evaporates rapily an search is ranom, when ρ = 0 results in slower evaporation rates, ρ [ 0,1]. We take ρ = 0.6. The final pheromone eposition is τ i. The final e pheromone evaporates from the link is τ. The resiual pheromone on the link is. i τ r = τ τ e i i i (6) Using (3) : τ = 3*1/5 =.6, τ = 3*1/4 =.75, 1,2 1,3 τ 1,4 = 3*1/3 =1, τ 1,6 = 3*1/6 =.5 Using (4) : ( ) τ 1,2 t =.1+(.6*.6)=.46, ( ) τ 1,3 t =.1+(.75*.6)=.55, τ ( ) 1,4 t =.1+(1*.6)=.7, τ ( ) 1,6 t =.1+(.5*.6)=.4 e Using (5) : ( ) e τ 1,2 t =.46*(1-.6)=.18, ( ) e τ 1,3 t =.55*(1-.6)=.22, τ ( ) 1,4 t =.7*(1-.6)=.28, e τ ( ) 1,6 t =.4*(1-.6)=.16 Using (6) : l ( t ) = =.28, l ( t ) = =.33, l ( t ) =.7-.28=.42, 1,2 1,3 1,4 l ( ) 1,6 t =.4-.16=.24. The link l from noe i shows when the istance is less compare to other neighbor noes, more pheromone eposition occurs. The noes resiual pheromone eposition metric in the table 2. i Table 2: Resiual pheromone metric τ i 114

7 When the pheromone information are available the ant will chose its next hop with probability P. We aopt this concept by using Baye s probability theorem α β P τ i T i =, α β τ T for i = 1 to N, (7) i i [ i] Nb where α 0 is the relative importance of the pheromone trail. β 0 is the relative importance of the congestion. α an β are the two tuneable parameter will control relative weight of pheromone trail an heuristic value T i. In the following, we calculate the probability corresponing to the noe i using. P 1,2 = (.28 3 *.85 1 ) / (.28 3 *.85 1 ) + (.33 3 *.78 1 ) + (.42 3 *.71 1 ) + (.24 3 *.64 1 ) =.17 P 1,3 = (.33 3 *.78 1 ) / (.28 3 *.85 1 ) + (.33 3 *.78 1 ) + (.42 3 *.71 1 ) + (.24 3 *.64 1 ) =.25 P 1,4 = (.42 3 *.71 1 ) / (.28 3 *.85 1 ) + (.33 3 *.78 1 ) + (.42 3 *.71 1 ) + (.24 3 *.64 1 ) =.48 P 1,6 = (.24 3 *.64 1 ) / (.28 3 *.85 1 ) + (.33 3 *.78 1 ) + (.42 3 *.71 1 ) + (.24 3 *.64 1 ) =.08 Analogously, we can calculate the probability corresponing to other noes which are shown in table 3. Table 3: Probability metric on l P, ( t ) i α > β Pi, ( t ) α < β P, i α > β Pi, α < β 1, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

8 3.4. Algorithm P 2 st : Noe i Processing for istribution of traffic Algorithm P 2 st( ) Input: i : Distance between the noes. q i : Transmission queue length. α : Relative importance of pheromone eposition. β : Relative importance of congestion. ρ : Rate at which pheromone evaporates. Output: P ( τ ) : Gooness of Congestion i P ( T ) : Resiual pheromone BEGIN 1. Upate parameter for Probabilistic path selection 2. τ Pheromone resiual on the link. i 3. Ti, Probability of congestion it iscars. 4. if (α>β) then 5. while( τ > τ ( ) ) i t i Nb 6. Distribute.Traffic( Max.Prob ( τ ) ) 7. wen 8. if(max( τ )= ( ) ) then i τ t i Nb 9. Distribute.Traffic( Max.Prob ( T ) ) 10. en if 11. else 12. if (α<β) then 13. while( T > Ti, N ) then b 14. Distribute.Traffic( Max.Prob ( T ) ) 15. wen 16. if (max( T ) = Ti, N ) then b 17. Distribute.Traffic( Max.Prob ( τ ) ) 18. en if 19. en if 20. en if 21. END 3.5. The Route Discovery i When initialization process starts the single-hop HELLO messages creates the neighbourhoo for each noe. The HELLO packet contains source IP aress an hop count (Initialize to 0). Whenever a traffic source s nees a route to a estination, it broacasts route request packets (RQ) across the network. The RQ packet contains estination IP aress, source IP aress, an broacast ID. For the route iscovery the solution woul be through flooing the RQ packets, we aopt the probabilistic broacast scheme in combine with the outgoing queue length in terms of bits an the istance metric. When a noe first receives a packet, Q D i, i 116

9 with probability p it broacasts the packet to its neighbours an with probability 1 p it iscars the packet. The probability value p is calculate as Q i, = q i, N i b q i, (8) D i, = i, N i b i, (9) P CONG = e σ ( Qi, ) (10) P Dist = e σ ( Di, ) (11) P = β ( P CONG ) + (1-β)( P Dist ), (12) where β lies between 0 an 1. Table 4: Probability metric of istance an congestion P CONG P Dist P CONG P Dist 1, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

10 Table 4: Probability metric on P P P P P P P β =.3 β =.5 β=.7 β =.3 β =.5 β=.7 1, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Algorithm P 2 scm : Noe i Processing for selection of path Algorithm P 2 scm( ) Input: i : Distance between the noes. q i : Transmission queue length. Output: P CONG : Gooness of Congestion P Dist : Gooness of istance P : Probability of path selection BEGIN 1. Upate parameter for Probabilistic path selection 2. Q i Relative Pheromone eposition on the link., 3. D Relative congestion on the link i, 4. if ( pi ( t ) > pi N b ) then 5. Max.Prob ( pi ( t ) ) 6. en if 7. END where σ (σ > 0) is the coefficient. where [ 0,1] β is the relative importance of the istance an congestion in the link. When β is equal to.5 the probability of gooness of congestion an istance metric can be calculate. This broacast scheme helps to iscover new routes avoiing congestion areas an aopting less istance probabilistically. If the probability value P CONG is less means more congestion in the path, ue to maximum probability is set on P the other 118

11 parameter like P Dist must be high means shorter istance is available in the link. When the link have the same probability, this broacast scheme by changing the tuneable parameter β as.7 sets a new probability value to fin a new path. During the course of flooing the intermeiate noe receives a Route Request (RQ) packet. By capturing the source aress an the previous hop noe in the message cache it first set the reverse path to the source. If a vali route to the estination is available, that is, there is at least one link associate with the pheromone trail greater than the other neighbour noe or least istance within the neighbour noe, the intermeiate noe generates a route reply (RP). The RP is route back to the source s via the reverse paths. Otherwise, the RQ is rebroacast. When the estination noe receives RQ it will sen a RP to all the neighbours from which it gets a RQ. The intermeiate noe can maintain multiple loop-free paths by recoring all the new paths that have the latest sequence number but a lower hop-count in its routing table, an also sen a RP to all the neighbours from which it gets a RQ. During the process of the RP back to the source s will assigns an initial pheromone value τ to the corresponing neighbour noe, which inicates a vali route to the estination Description of the Algorithms Our propose p 2 scm algorithm presents the pseuo coe of how a noe i process the out going queue an by using swarm intelligence how it will select the path an base on the routing table, the p 2 st will istribute the ata traffic accoring to the probabilities for each neighbour noe in the routing table[12]. The noe i first calculate the istance i between all its neighbour noes. By using the smallest istance mvl the noe i evaluate the relative istance between all its neighbour noes. P 2 st is also evaluate the τ i which is reciprocal to the istance i where the relative pheromone eposition occurs on the link l. Now p 2 st evaluate the resiual pheromone on the link l from the line 2 of the above algorithm. Seconly p 2 st evaluate the probability of gooness of q congestion ( 1 ). q [ i ] Nb In our propose algorithm from line no 4-10 when α>β it first checks the pheromone ( τ ) eposition in a particular link have the highest value within its neighbour or not. If foun yes then the maximum probability P will be on that link l. Next it checks a pair of paths with highest eposition an same value, if foun yes within that, less congeste (T ) path will have the highest probability[13]. Similarly from line no when the α<β, if Ti, have the highest value within its neighbour then the highest probability will be on that link l. Next it checks a pair of paths with highest an same value of Ti, or not if foun yes within that, more pheromone ( τ i ) eposite path will have the highest probability on that link l. 4. ANALYSIS P 2 st at first from noe i an the two tuneable parameter α>β we observe the higher pheromone on the link l i will have higher probability of path selection an higher gooness of congestion means small queue ata length will have low probability, if the eposition is same on both the link, we observe then p 2 st by using α>β an conitional probability evaluates the less congeste path means queue ata length is small. In our example noe 3 to its neighbour noe 1 an 2 from table 1, table 2 an table 3. Also by making α<β p 2 st consier the less congeste path probabilistically means when the queue ata length is same on both the link, the higher probability comes with higher pheromone i 119

12 concentration on the link an if the congestion is same within a pair of paths then it evaluates the paths which have more pheromone eposition. By using two tuneable parameters p 2 st ecies the path probabilistically which have less congeste or more pheromone eposition when the noes have ynamic topology at real time situation. Similarly P 2 scm evaluates the gooness of congestion as well as istance. If pi ( t ) > pi N b means the average value of pi ( t ) is maximum within all the links of the neighbouring noes. Another important feature of P 2 scm is that if the probabilistic value of gooness of congestion is low, the probabilistic value of gooness of istance must be high. As we have seen from the table CONCLUSION In this paper, we propose a new mathematical moel for congestion control. We have evelope a single hop congestion aware probabilistic path selection algorithm which employs the swarm intelligence of biological ant. Using istance an congestion metric the algorithm invokes route iscovery process with less congestion an shorter istance in a single hop at run time. By probabilistic approach the algorithm can prevent forwar ata traffic into the congeste areas an also fins the shortest istance probabilistically within a pair of noes. For ata transmission, if more congestion occurs in all the links of a noe, the algorithms by using the tuneable parameter that can shift the moe of transmission an can easily avoi the congeste areas. By using the above state mathematical moels an some hypothetical ata we trie to control the congestion at local noe level. REFERENCES [1] R.Leung, Jilei Liu, E.Poon, C.A.Chan & Baochun L (2001) MPDSR : a QoS-aware multipath ynamic source routing protocol for wireless a-hoc networks, In proceeings Local Computer Networks, 26 th Annual IEEE Conference, pp [2] S.Lee & Mario Garla, (2001) Split Multi-path Routing with Maximally Disoint Paths in A Hoc Networks, In proceeings International IEEE Conference on Communication, pp [3] Duc. A.Tran & Harish Raghavenra, (2006) Congestion Aaptive Routing in Mobile A Hoc Networks, IEEE transaction on parallel an Distribute systems, 17: pp [4] Xiangquan Zheng, Wei Guo, R.Liu & Yongchun Trian, (2004) A New Dynamic Loa-aware Base Loa-balance Routing for A Hoc Networks, IEEE, pp [5] Xiaoqin Chen, H.M.Jones & A.D.S.Jatyalath, (2007) Congestion- Aware Routing Protocol for Mobile A Hoc Networks, In proceeings of IEEE conference on vehicular Technology, Doi /VETECF , pp [6] R.Asokan, A.M.Nataraan & C.Venkatesh, (2008) Ant Base Dynamic Source Routing Protocol to Support Multiple Quality of Service(QoS) Metrics in Mobile A Hoc Networks, International Journal of Computer Science an Security, vol.2 no.3, pp [7] L. Chen & Weni B. Heinzelman, (2005) Qos-Aware Routing Base on Banwith Estimation for Mobile A Hoc Networks, IEEE on Selecte Areas in Communication, vol.23, pp [8] L. Zhenyu, M.Z.Kwiatkowska & Costas Constantinou, (2005) A Biologically Inspire Congestion Control Routing algorithm For MANETs, In Proceeings of the Thir IEEE International Conference on Pervasive Computing an Communications, pp

13 [9] A. K. Monal & P. K. Baneree, (2008) The Success of ata Transmission in Multipath Routing for MANET, Mobile an Pervasive Computing, CoMPC-2008, pp [10] R. Beckers, J.L.Deneubourg & S.Goss, (1992) Trails an u turns in the selection of the shortest path by the ant lasius niger, Journal of Theoretical Biology, pp [11] A. Gunther & Christian hoene, (2005) Measuring Roun trip times to etermine the istance between WLAN noes, In proceeings of Networking 2005, Springer-Verlag, pp [12] A.C.S.Jawahar, Ant Colony Optimization for Mobile A-Hoc Networks, aaychak@een.rutgers.eu. [13] S. Soarar, V. Bhattacheree & D. Gir (2012) A Swarm inspire Probabilistic Path Selection with Congestion Control in MANETs, In Proceeings of secon international conference on Computer Science, Engineering an Application, Springer-Verlag, Vol.2, pp Authors Subhankar Joarar is currently working as Assistant Professor at Halia Institute of Technology, Halia. He complete his MCA an M. Tech from Birla Institute of Technology, Mesra. Currently he is pursuing PhD From BIT, Mesra. His current research areas are Mobile a Hoc Networks, Swarm Intelligence an Avance Algorithm esign. DR. Vanana Bhattacheree is a member of the IEEE an the IEEE Computer Society. She is currently working as Associate Professor at Birla Institute of Technology, Ranchi. She complete her B. E. in Computer Science an Engineering from BIT Mesra in 1989, an M. Tech an PhD from Jawaharlal Nehru University, New Delhi in 1991 an 1995 respectively. Her current research areas are Software Process Moels, Software Cost Estimation, Data Mining an Mobile a Hoc Networks. Dr. Debasis Giri is presently Professor in the Department of Computer Science an Engineering, Halia Institute of Technology, Halia , Inia. He receive his Ph.D egree from Inian Institute of Technology, Kharagpur , Inia 1n He i his masters (M. Tech an M. Sc) both from IIT, Kharagpur in 2001 an 1998 respectively. He has tenth All Inia Rank with percentile score in the Grauate Aptitue Test in Engineering (GATE) Examination in He receive certificate from All Inia Science Teachers' Association for success in Science Aptitue & Talent Search Test in He has publishe more than 20 technical papers in the referre ournals/conferences. He is presently Eitorial Boar Members of many repute Journals, namely Journal of Convergence, International Journal of Computers an Applications, Journal of Security an Communication Networks (Wiley InterScience) etc. Further, he is a Reviewer of many repute International Journals. He is also Program Committee member of many International Conferences. He is a Life member of Cryptology Research Society of Inia. His current research interests inclue cryptography, Network security, Information security, E- commerce security, Security in Wireless Sensor Networks, Security in VANETs an Wireless Networks. 121

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Hybrid Glowworm Swarm Optimization (HGSO) agent for Qos based Routing in Wireless Networks

Hybrid Glowworm Swarm Optimization (HGSO) agent for Qos based Routing in Wireless Networks Hybri Glowworm Swarm Optimization (HGSO) agent for Qos base Routing in Wireless Networks T. Karthikeyan1 an B. Subramani2 1Associate Professor, P.S.G. College of Arts an Science, Coimbatore, 2 HoD, Dr.NGP

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) DWEEPNA GARG 1 & PARTH GOHIL 2 1,2 Dept. Of Computer Science and Engineering, Babaria Institute of Technology, Varnama, Vadodara, India E-mail

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Routing and quality of service support for mobile ad hoc networks

Routing and quality of service support for mobile ad hoc networks Computer Networks 51 (2007) 3142 3156 www.elsevier.com/locate/comnet Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks Congestion Control using Cross layer an Stochastic Approach in Distribute Networks Selvarani R Department of Computer science an Engineering Alliance College of Engineering an Design Bangalore, Inia Vinoha

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol

Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol Anubhuti Verma Abstract Ant Colony Optimization is based on the capability of real ant colonies of finding the

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE e Mobile Ad Hoc Networks

Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE e Mobile Ad Hoc Networks I. J. Communications, Network an System Sciences, 2008, 4, 285-385 Publishe Online November 2008 in SciRes (http://www.scirp.org/journal/ijcns/). Performance Stuy of a Cross-Layer Base Multipath Routing

More information

Routing in Ad-hoc Networks

Routing in Ad-hoc Networks 0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

[Jagtap*, 5 (4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

[Jagtap*, 5 (4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY: ANT BASED BIO-INSPIRED ALGORITHM FOR AD-HOC NETWORK Anjali A Jagtap *, Prof. Ankita Agarwal, Prof. Dipak R Raut, Prof.

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple

More information

Cellular Ants: Combining Ant-Based Clustering with Cellular Automata

Cellular Ants: Combining Ant-Based Clustering with Cellular Automata Cellular Ants: Combining Ant-Base Clustering with Cellular Automata Anrew Vane Moere & Justin James Clayen Key Centre of Design Computing & Cognition, University of Syney, Australia {anrew,justin}@arch.usy.eu.au

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

TCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network

TCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network Draft Version - Brunel University, Lonon TCP Timeout Mechanism for Optimization of Network Fairness an Performance in Multi-Hop Pipeline Network Siva Kumar Subramaniam 1, Rajagopal Nilavalan 3, Wamaeva

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18,  ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, July 18, www.ijcea.com ISSN 2321-3469 MULTICAST ROUTING: CONVENTIONAL ALGORITHMS VS ANT COLONY SYSTEM ABSTRACT

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS v xiv xvi xvii 1. INTRODUCTION TO WIRELESS NETWORKS AND ROUTING PROTOCOLS 1 1.1

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

An Infrastructureless End-to-End High Performance Mobility Protocol

An Infrastructureless End-to-End High Performance Mobility Protocol Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 An Infrastructureless En-to-En High Performance Mobility Protocol Saneep Davu, Rai Y. Zaghal

More information

On-path Cloudlet Pricing for Low Latency Application Provisioning

On-path Cloudlet Pricing for Low Latency Application Provisioning On-path Cloulet Pricing for Low Latency Application Provisioning Argyrios G. Tasiopoulos, Onur Ascigil, Ioannis Psaras, Stavros Toumpis, George Pavlou Dept. of Electronic an Electrical Engineering, University

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

Novel Design of Reliable Static Routing Algorithm For Multi-hop Linear Networks

Novel Design of Reliable Static Routing Algorithm For Multi-hop Linear Networks Novel Design of Reliable Static Routing Algorithm For Multi-hop Linear Networks A Thesis submitte in fulfilment of the requirements for the Degree of Doctor of Philosophy (Ph.D.) By Siva Kumar Subramaniam

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Underwater Acoustic Sensor Networks: A Survey on

Underwater Acoustic Sensor Networks: A Survey on Unerwater Acoustic Sensor Networks: A Survey on lifetime of the network. But there are many network layer player protocols have been propose MAC an Routing to improve Protocols the effective life time

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity

Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 10, OCTOBER 1997 1 Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity Te H. Szymanski, Member, IEEE

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks

An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks Peng Zeng Cuanzhi Zang Haibin Yu Shenyang Institute of Automation Chinese Academy of Sciences Target Tracking

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks Sensors 2014, 14, 18390-18409; oi:10.3390/s141018390 Article OPEN ACCESS sensors ISSN 1424-8220 www.mpi.com/journal/sensors Cascaing Multi-Hop Reservation an Transmission in Unerwater Acoustic Sensor Networks

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

k-nn Graph Construction: a Generic Online Approach

k-nn Graph Construction: a Generic Online Approach k-nn Graph Construction: a Generic Online Approach Wan-Lei Zhao arxiv:80.00v [cs.ir] Sep 08 Abstract Nearest neighbor search an k-nearest neighbor graph construction are two funamental issues arise from

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

A Review: Optimization of Energy in Wireless Sensor Networks

A Review: Optimization of Energy in Wireless Sensor Networks A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Efficient Recovery from False State in Distributed Routing Algorithms

Efficient Recovery from False State in Distributed Routing Algorithms Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,

More information

Protocol Configuration

Protocol Configuration Configuration Protocol Configuration Many items must be set before protocols can be use IP aress of each network interface Aress mask for each network Initial values in the forwaring table Process is known

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information